use_pty:FALSE /usr/share/restraint/plugins/run_task_plugins bash ./runtest.sh Loading net.sh. Uploading skip_waive.list .done Uploading param.list .done mkdir: cannot create directory ‘/usr/libexec/kselftests’: File exists :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 14:09:16 ] :: [ BEGIN ] :: Running 'install_kselftests' :: [ 14:09:16 ] :: [ BEGIN ] :: Running 'dnf -y install kernel-modules-extra-5.14.0-254.2000_765447393.el9' Last metadata expiration check: 0:09:29 ago on Thu 02 Feb 2023 01:59:48 PM EST. Package kernel-modules-extra-5.14.0-254.2000_765447393.el9.x86_64 is already installed. Dependencies resolved. Nothing to do. Complete! :: [ 14:09:18 ] :: [ PASS ] :: Command 'dnf -y install kernel-modules-extra-5.14.0-254.2000_765447393.el9' (Expected 0, got 0) kernel-selftests-internal-5.14.0-254.2000_765447393.el9.x86_64 :: [ 14:09:18 ] :: [ LOG ] :: Delivered kselftests installed... :: [ 14:09:18 ] :: [ PASS ] :: Command 'install_kselftests' (Expected 0, got 0) Uploading kselftest-list.txt .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 2s :: Assertions: 2 good, 0 bad :: RESULT: PASS (Setup) ** Setup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: netfilter :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 14:09:18 ] :: [ LOG ] :: Test Start Time: Thu Feb 2 02:09:18 PM EST 2023 :: [ 14:09:18 ] :: [ BEGIN ] :: Running 'do_netfilter_config' /usr/sbin/conntrack /usr/bin/which: no sendip in (/root/.local/bin:/root/bin:/usr/share/Modules/bin:/usr/local/bin:/usr/bin:/bin:/usr/local/sbin:/usr/sbin:/sbin) Enabling a Copr repository. Please note that this repository is not part of the main distribution, and quality may vary. The Fedora Project does not exercise any power over the contents of this repository beyond the rules outlined in the Copr FAQ at , and packages are not held to any quality or security level. Please do not file bug reports about these packages in Fedora Bugzilla. In case of problems, contact the owner of this repository. Repository successfully enabled. Copr repo for SendIP owned by cygn 7.3 kB/s | 2.9 kB 00:00 Dependencies resolved. ================================================================================ Package Arch Version Repository Size ================================================================================ Installing: sendip x86_64 2.7-1 copr:copr.fedorainfracloud.org:cygn:SendIP 66 k Transaction Summary ================================================================================ Install 1 Package Total download size: 66 k Installed size: 237 k Downloading Packages: sendip-2.7-1.x86_64.rpm 166 kB/s | 66 kB 00:00 -------------------------------------------------------------------------------- Total 165 kB/s | 66 kB 00:00 Copr repo for SendIP owned by cygn 4.8 kB/s | 989 B 00:00 Importing GPG key 0xA1AE5ADC: Userid : "cygn_SendIP (None) " Fingerprint: D8FC 5160 F0EB 4848 9C78 AC9F 781E 5EAD A1AE 5ADC From : https://download.copr.fedorainfracloud.org/results/cygn/SendIP/pubkey.gpg Key imported successfully Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction Preparing : 1/1 Installing : sendip-2.7-1.x86_64 1/1 Running scriptlet: sendip-2.7-1.x86_64 1/1 Verifying : sendip-2.7-1.x86_64 1/1 Installed: sendip-2.7-1.x86_64 Complete! /usr/bin/sendip :: [ 14:09:23 ] :: [ PASS ] :: Command 'do_netfilter_config' (Expected 0, got 0) :: [ 14:09:23 ] :: [ LOG ] :: === Running: netfilter:nft_trans_stress.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: nft add/delete test returned 0 PASS: nft reload test returned 0 PASS: nft add/delete with nftrace enabled test returned 0 PASS: nft add/delete with nftrace enabled test returned 0 /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/1..16 selftests: netfilter:nft_trans_stress.sh [PASS] PASS Score:1 Uploading resultoutputfile.log .done :: [ 14:10:01 ] :: [ LOG ] :: === Running: netfilter:nft_fib.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: fib expression did not cause unwanted packet drops PASS: fib expression did drop packets for 1.1.1.1 PASS: fib expression did drop packets for 1c3::c01d /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/2..16 selftests: netfilter:nft_fib.sh [PASS] PASS Score:2 Uploading resultoutputfile.log .done :: [ 14:10:24 ] :: [ LOG ] :: === Running: netfilter:nft_nat.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: netns routing/connectivity: ns0-FwC7hb59 can reach ns1-FwC7hb59 and ns2-FwC7hb59 PASS: ping to ns1-FwC7hb59 was ip NATted to ns2-FwC7hb59 PASS: ping to ns1-FwC7hb59 OK after ip nat output chain flush PASS: ipv6 ping to ns1-FwC7hb59 was ip6 NATted to ns2-FwC7hb59 PASS: inet port rewrite without l3 address PASS: ping to ns1-FwC7hb59 was inet NATted to ns2-FwC7hb59 PASS: ping to ns1-FwC7hb59 OK after inet nat output chain flush PASS: ipv6 ping to ns1-FwC7hb59 was inet NATted to ns2-FwC7hb59 PASS: ip IP masquerade for ns2-FwC7hb59 PASS: ip6 IPv6 masquerade for ns2-FwC7hb59 PASS: inet IP masquerade for ns2-FwC7hb59 PASS: inet IPv6 masquerade for ns2-FwC7hb59 PASS: ip IP masquerade fully-random for ns2-FwC7hb59 PASS: ip6 IPv6 masquerade fully-random for ns2-FwC7hb59 PASS: inet IP masquerade fully-random for ns2-FwC7hb59 PASS: inet IPv6 masquerade fully-random for ns2-FwC7hb59 PASS: ip IP redirection for ns2-FwC7hb59 PASS: ip6 IPv6 redirection for ns2-FwC7hb59 PASS: inet IP redirection for ns2-FwC7hb59 PASS: inet IPv6 redirection for ns2-FwC7hb59 PASS: portshadow test default: got reply from CLIENT PASS: portshadow test port-filter: got reply from ROUTER PASS: portshadow test port-notrack: got reply from ROUTER PASS: portshadow test pat: got reply from ROUTER PASS: IP statless for ns2-FwC7hb59 /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/3..16 selftests: netfilter:nft_nat.sh [PASS] PASS Score:3 Uploading resultoutputfile.log .done :: [ 14:10:37 ] :: [ LOG ] :: === Running: netfilter:bridge_brouter.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: netns connectivity: ns1 and ns2 can reach each other ebtables v1.8.8 (nf_tables): table 'broute' does not exist Perhaps ebtables or your kernel needs to be upgraded. SKIP: Could not add ebtables broute redirect rule /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests :: [ SKIP ] :: Test '4..16 selftests: netfilter:bridge_brouter.sh [SKIP]' ** kselftests/4..16 selftests: netfilter:bridge_brouter.sh [SKIP] SKIP Score:1 Uploading resultoutputfile.log .done :: [ 14:10:38 ] :: [ LOG ] :: === Running: netfilter:conntrack_icmp_related.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: icmp mtu error had RELATED state /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/5..16 selftests: netfilter:conntrack_icmp_related.sh [PASS] PASS Score:4 Uploading resultoutputfile.log .done :: [ 14:10:41 ] :: [ LOG ] :: === Running: netfilter:nft_flowtable.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: netns routing/connectivity: ns1 can reach ns2 PASS: flow offloaded for ns1/ns2 FAIL: file mismatch for ns1 <- ns2 -rw-------. 1 root root 7498752 Feb 2 14:10 /tmp/tmp.tpTLwjrjpH -rw-------. 1 root root 4972544 Feb 2 14:10 /tmp/tmp.XOdjr6WxOg FAIL: flow offload for ns1/ns2 with NAT table inet filter { flowtable f1 { hook ingress priority filter devices = { veth0, veth1 } } chain forward { type filter hook forward priority filter; policy drop; oif "veth1" tcp dport 12345 flow add @f1 counter packets 2 bytes 104 tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 744 bytes 5800704 tcp flags fin,rst ct mark set 0x00000000 accept meta length > 1500 accept comment "something-to-grep-for" tcp sport 12345 ct mark 0x00000001 counter packets 0 bytes 0 log prefix "mark failure " drop ct state established,related accept meta length < 200 oif "veth1" tcp dport 12345 counter packets 2 bytes 120 accept meta l4proto icmp accept meta l4proto ipv6-icmp accept } } table ip nat { chain prerouting { type nat hook prerouting priority filter; policy accept; iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 } chain postrouting { type nat hook postrouting priority filter; policy accept; oifname "veth1" counter packets 1 bytes 60 masquerade } } FAIL: file mismatch for ns1 -> ns2 -rw-------. 1 root root 2892800 Feb 2 14:10 /tmp/tmp.tBI6bnF7Qq -rw-------. 1 root root 2706792 Feb 2 14:10 /tmp/tmp.zqbsEtGOfU FAIL: flow offload for ns1/ns2 with NAT and pmtu discovery table inet filter { flowtable f1 { hook ingress priority filter devices = { veth0, veth1 } } chain forward { type filter hook forward priority filter; policy drop; oif "veth1" tcp dport 12345 flow add @f1 counter packets 3 bytes 156 tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 752 bytes 5849856 tcp flags fin,rst ct mark set 0x00000000 accept tcp sport 12345 ct mark 0x00000001 counter packets 6 bytes 348 log prefix "mark failure " drop ct state established,related accept meta length < 200 oif "veth1" tcp dport 12345 counter packets 3 bytes 180 accept meta l4proto icmp accept meta l4proto ipv6-icmp accept } } table ip nat { chain prerouting { type nat hook prerouting priority filter; policy accept; iif "veth0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 } chain postrouting { type nat hook postrouting priority filter; policy accept; oifname "veth1" counter packets 2 bytes 120 masquerade } } FAIL: file mismatch for ns1 -> ns2 -rw-------. 1 root root 2892800 Feb 2 14:10 /tmp/tmp.tBI6bnF7Qq -rw-------. 1 root root 1643736 Feb 2 14:10 /tmp/tmp.zqbsEtGOfU FAIL: flow offload for ns1/ns2 with bridge NAT table inet filter { flowtable f1 { hook ingress priority filter devices = { veth0, veth1 } } chain forward { type filter hook forward priority filter; policy drop; oif "veth1" tcp dport 12345 flow add @f1 counter packets 4 bytes 208 tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 762 bytes 5887528 tcp flags fin,rst ct mark set 0x00000000 accept tcp sport 12345 ct mark 0x00000001 counter packets 15 bytes 852 log prefix "mark failure " drop ct state established,related accept meta length < 200 oif "veth1" tcp dport 12345 counter packets 4 bytes 240 accept meta l4proto icmp accept meta l4proto ipv6-icmp accept } } table ip nat { chain prerouting { type nat hook prerouting priority filter; policy accept; iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 } chain postrouting { type nat hook postrouting priority filter; policy accept; oifname "veth1" counter packets 1 bytes 60 masquerade } } FAIL: file mismatch for ns1 -> ns2 -rw-------. 1 root root 2892800 Feb 2 14:10 /tmp/tmp.tBI6bnF7Qq -rw-------. 1 root root 2504848 Feb 2 14:10 /tmp/tmp.zqbsEtGOfU FAIL: flow offload for ns1/ns2 with bridge NAT and VLAN table inet filter { flowtable f1 { hook ingress priority filter devices = { veth0, veth1 } } chain forward { type filter hook forward priority filter; policy drop; oif "veth1" tcp dport 12345 flow add @f1 counter packets 5 bytes 260 tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 771 bytes 5917908 tcp flags fin,rst ct mark set 0x00000000 accept tcp sport 12345 ct mark 0x00000001 counter packets 24 bytes 1356 log prefix "mark failure " drop ct state established,related accept meta length < 200 oif "veth1" tcp dport 12345 counter packets 5 bytes 300 accept meta l4proto icmp accept meta l4proto ipv6-icmp accept } } table ip nat { chain prerouting { type nat hook prerouting priority filter; policy accept; iif "br0" ip daddr 10.6.6.6 tcp dport 1666 counter packets 0 bytes 0 dnat to 10.0.2.99:12345 } chain postrouting { type nat hook postrouting priority filter; policy accept; oifname "veth1" counter packets 2 bytes 120 masquerade } } FAIL: file mismatch for ns1 -> ns2 -rw-------. 1 root root 2892800 Feb 2 14:10 /tmp/tmp.tBI6bnF7Qq -rw-------. 1 root root 2728928 Feb 2 14:11 /tmp/tmp.zqbsEtGOfU FAIL: ipsec tunnel mode for ns1/ns2 table inet filter { flowtable f1 { hook ingress priority filter devices = { veth0, veth1 } } chain forward { type filter hook forward priority filter; policy drop; oif "veth1" tcp dport 12345 flow add @f1 counter packets 6 bytes 312 tcp dport 12345 meta length > 200 ct mark set 0x00000001 counter packets 785 bytes 6000286 tcp flags fin,rst ct mark set 0x00000000 accept tcp sport 12345 ct mark 0x00000001 counter packets 30 bytes 1704 log prefix "mark failure " drop ct state established,related accept meta length < 200 oif "veth1" tcp dport 12345 counter packets 6 bytes 360 accept meta l4proto icmp accept meta l4proto ipv6-icmp accept } } XfrmInError 0 XfrmInBufferError 0 XfrmInHdrError 0 XfrmInNoStates 0 XfrmInStateProtoError 0 XfrmInStateModeError 0 XfrmInStateSeqError 0 XfrmInStateExpired 0 XfrmInStateMismatch 0 XfrmInStateInvalid 0 XfrmInTmplMismatch 0 XfrmInNoPols 0 XfrmInPolBlock 0 XfrmInPolError 0 XfrmOutError 0 XfrmOutBundleGenError 0 XfrmOutBundleCheckError 0 XfrmOutNoStates 0 XfrmOutStateProtoError 0 XfrmOutStateModeError 0 XfrmOutStateSeqError 0 XfrmOutStateExpired 0 XfrmOutPolBlock 0 XfrmOutPolDead 0 XfrmOutPolError 0 XfrmFwdHdrError 0 XfrmOutStateInvalid 0 XfrmAcquireError 0 /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/6..16 selftests: netfilter:nft_flowtable.sh [WAIVE] PASS Score:5 Uploading resultoutputfile.log .done :: [ 14:11:07 ] :: [ LOG ] :: === Running: netfilter:ipvs.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests Testing DR mode... Testing NAT mode... Testing Tunnel mode... ipvs.sh: PASS /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/7..16 selftests: netfilter:ipvs.sh [PASS] PASS Score:6 Uploading resultoutputfile.log .done :: [ 14:11:11 ] :: [ LOG ] :: === Running: netfilter:nft_concat_range.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests TEST: reported issues Add two elements, flush, re-add [ OK ] net,mac with reload [ OK ] TEST: correctness net,port [ OK ] port,net [ OK ] net6,port [ OK ] port,proto [ OK ] net6,port,mac [ OK ] net6,port,mac,proto [ OK ] net,port,net [ OK ] net,mac [ OK ] mac,net [ OK ] net,mac - ICMP [ OK ] net6,mac - ICMPv6 [ OK ] net6,port,net6,port [ OK ] net,port,mac,proto,net [ OK ] TEST: concurrency net,port [ OK ] port,net [ OK ] net6,port [ OK ] net,port,net [ OK ] net6,port,net6,port [ OK ] TEST: timeout net,port [ OK ] port,net [ OK ] net6,port [ OK ] port,proto [ OK ] net6,port,mac [ OK ] net6,port,mac,proto [ OK ] net,port,net [ OK ] net,mac [ OK ] mac,net [ OK ] net,mac - ICMP [ OK ] net6,mac - ICMPv6 [ OK ] net6,port,net6,port [ OK ] net,port,mac,proto,net [ OK ] TEST: performance net,port [SKIP] perf not supported port,net [SKIP] perf not supported net6,port [SKIP] perf not supported port,proto [SKIP] perf not supported net6,port,mac [SKIP] perf not supported net6,port,mac,proto [SKIP] perf not supported net,mac [SKIP] perf not supported /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/8..16 selftests: netfilter:nft_concat_range.sh [PASS] PASS Score:7 Uploading resultoutputfile.log .done :: [ 14:17:27 ] :: [ LOG ] :: === Running: netfilter:nft_conntrack_helper.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: ns1-ys2vKJgy connection on port 2121 has ftp helper attached PASS: ns2-ys2vKJgy connection on port 2121 has ftp helper attached PASS: ns1-ys2vKJgy connection on port 2121 has ftp helper attached PASS: ns2-ys2vKJgy connection on port 2121 has ftp helper attached PASS: ns1-ys2vKJgy connection on port 21 has ftp helper attached PASS: ns2-ys2vKJgy connection on port 21 has ftp helper attached PASS: ns1-ys2vKJgy connection on port 21 has ftp helper attached PASS: ns2-ys2vKJgy connection on port 21 has ftp helper attached /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/9..16 selftests: netfilter:nft_conntrack_helper.sh [PASS] PASS Score:8 Uploading resultoutputfile.log .done :: [ 14:17:39 ] :: [ LOG ] :: === Running: netfilter:nft_queue.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: ns1-n0BnEIhV can reach ns2-n0BnEIhV PASS: ip: statement with no listener results in packet drop PASS: ip6: statement with no listener results in packet drop PASS: Expected and received 10 packets total PASS: Expected and received 20 packets total PASS: tcp and nfqueue in forward chain PASS: tcp via loopback PASS: tcp via loopback with connect/close PASS: tcp via loopback and re-queueing /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/10..16 selftests: netfilter:nft_queue.sh [PASS] PASS Score:9 Uploading resultoutputfile.log .done :: [ 14:18:23 ] :: [ LOG ] :: === Running: netfilter:nft_meta.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests OK: nftables meta iif/oif counters at expected values OK: nftables meta cpu counter at expected values /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/11..16 selftests: netfilter:nft_meta.sh [PASS] PASS Score:10 Uploading resultoutputfile.log .done :: [ 14:18:23 ] :: [ LOG ] :: === Running: netfilter:nf_nat_edemux.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests PASS: socat can connect via NAT'd address /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/12..16 selftests: netfilter:nf_nat_edemux.sh [PASS] PASS Score:11 Uploading resultoutputfile.log .done :: [ 14:18:26 ] :: [ LOG ] :: === Running: netfilter:ipip-conntrack-mtu.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests OK: PMTU without connection tracking OK: PMTU with connection tracking /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/13..16 selftests: netfilter:ipip-conntrack-mtu.sh [PASS] PASS Score:12 Uploading resultoutputfile.log .done :: [ 14:18:35 ] :: [ LOG ] :: === Running: netfilter:conntrack_tcp_unreplied.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests INFO: connect ns1-4oHsmCkN -> ns2-4oHsmCkN to the virtual ip INFO: NAT redirect added in ns ns2-4oHsmCkN, waiting for 20 seconds for nat to take effect .........Ncat: TIMEOUT. .. PASS: redirection took effect after 11 seconds PASS: redirection counter has expected values /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/14..16 selftests: netfilter:conntrack_tcp_unreplied.sh [PASS] PASS Score:13 Uploading resultoutputfile.log .done :: [ 14:18:48 ] :: [ LOG ] :: === Skipping: netfilter:conntrack_vrf.sh :: [ SKIP ] :: Test '15..16 selftests: netfilter:conntrack_vrf.sh [SKIP]' ** kselftests/15..16 selftests: netfilter:conntrack_vrf.sh [SKIP] SKIP Score:2 Uploading resultoutputfile.log .done :: [ 14:18:49 ] :: [ LOG ] :: === Running: netfilter:rpath.sh /usr/libexec/kselftests/netfilter /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests exec of "" failed: No such file or directory FAIL: ip6tables match not effective /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests ** kselftests/16..16 selftests: netfilter:rpath.sh [FAIL] FAIL Score:1 Uploading resultoutputfile.log .done :: [ 14:18:51 ] :: [ BEGIN ] :: Running 'do_netfilter_reset' modprobe: FATAL: Module gre is in use. modprobe: FATAL: Module udp_tunnel is in use. :: [ 14:18:54 ] :: [ PASS ] :: Command 'do_netfilter_reset' (Expected 0, got 0) :: [ 14:18:54 ] :: [ LOG ] :: Test End Time: Thu Feb 2 02:18:54 PM EST 2023 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 576s :: Assertions: 2 good, 0 bad :: RESULT: PASS (netfilter) ** netfilter PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 14:18:54 ] :: [ BEGIN ] :: Running 'pushd '/root'' ~ /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/kselftests :: [ 14:18:54 ] :: [ PASS ] :: Command 'pushd '/root'' (Expected 0, got 0) :: [ 14:18:54 ] :: [ BEGIN ] :: Running 'rm -rf /var/tmp/20230202140915' :: [ 14:18:54 ] :: [ PASS ] :: Command 'rm -rf /var/tmp/20230202140915' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 2 good, 0 bad :: RESULT: PASS (Cleanup) ** Cleanup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: kselftests :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 14:18:55 ] :: [ LOG ] :: Phases fingerprint: GpTeNtEf :: [ 14:18:55 ] :: [ LOG ] :: Asserts fingerprint: wG6Jb0bU Uploading journal.xml .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 579s :: Phases: 3 good, 0 bad :: OVERALL RESULT: PASS (kselftests)