Blame SOURCES/0042-tests-Disable-tests-known-to-fail-on-RHEL8.patch

1374ad
From f9dca1704ce66be31eceac4d7317b825269b3d07 Mon Sep 17 00:00:00 2001
1374ad
From: Phil Sutter <psutter@redhat.com>
1374ad
Date: Tue, 2 Mar 2021 17:06:06 +0100
1374ad
Subject: [PATCH] tests: Disable tests known to fail on RHEL8
1374ad
1374ad
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1919203
1374ad
Upstream Status: RHEL-only
1374ad
1374ad
RHEL8 kernel does not support:
1374ad
1374ad
- ct timeout or expectation objects
1374ad
- synproxy
1374ad
- flowtables in families other than inet
1374ad
- meta time
1374ad
- bridge family-specific meta expressions (e.g. ibrvproto, ibrpvid)
1374ad
- socket mark
1374ad
- osf
1374ad
- delete set elements from packet path
1374ad
- update stateful objects
1374ad
- explicitly setting set element expiration (commit 79ebb5bb4e3)
1374ad
- flushing chains and deleting referenced objects in the same
1374ad
  transaction (upstream commits with 'bogus EBUSY' in subject)
1374ad
1374ad
Disable all related tests to make the testsuites pass.
1374ad
---
1374ad
 tests/monitor/testcases/object.t                   | 14 +++----
1374ad
 tests/py/any/meta.t                                | 36 ++++++++---------
1374ad
 tests/py/bridge/meta.t                             |  8 ++--
1374ad
 tests/py/inet/osf.t                                | 24 +++++------
1374ad
 tests/py/inet/socket.t                             |  2 +-
1374ad
 tests/py/inet/synproxy.t                           | 12 +++---
1374ad
 tests/py/ip/objects.t                              | 46 +++++++++++-----------
1374ad
 tests/py/ip6/sets.t                                |  2 +-
1374ad
 .../testcases/flowtable/0002create_flowtable_0     |  8 ++--
1374ad
 .../testcases/flowtable/0003add_after_flush_0      |  8 ++--
1374ad
 .../testcases/flowtable/0004delete_after_add_0     |  6 +--
1374ad
 .../shell/testcases/flowtable/0005delete_in_use_1  | 10 ++---
1374ad
 tests/shell/testcases/flowtable/0007prio_0         |  6 +--
1374ad
 tests/shell/testcases/flowtable/0008prio_1         |  4 +-
1374ad
 .../testcases/flowtable/0009deleteafterflush_0     | 12 +++---
1374ad
 tests/shell/testcases/listing/0013objects_0        |  2 +
1374ad
 tests/shell/testcases/nft-f/0017ct_timeout_obj_0   |  2 +
1374ad
 .../shell/testcases/nft-f/0018ct_expectation_obj_0 |  2 +
1374ad
 .../testcases/nft-f/dumps/0017ct_timeout_obj_0.nft | 11 ------
1374ad
 .../nft-f/dumps/0017ct_timeout_obj_0.nft.disabled  | 11 ++++++
1374ad
 .../testcases/optionals/update_object_handles_0    |  2 +
1374ad
 .../sets/0036add_set_element_expiration_0          |  2 +
1374ad
 tests/shell/testcases/transactions/0046set_0       |  2 +
1374ad
 23 files changed, 122 insertions(+), 110 deletions(-)
1374ad
 delete mode 100644 tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft
1374ad
 create mode 100644 tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft.disabled
1374ad
1374ad
diff --git a/tests/monitor/testcases/object.t b/tests/monitor/testcases/object.t
1374ad
index 2afe33c..1b30384 100644
1374ad
--- a/tests/monitor/testcases/object.t
1374ad
+++ b/tests/monitor/testcases/object.t
1374ad
@@ -37,10 +37,10 @@ I delete ct helper ip t cth
1374ad
 O -
1374ad
 J {"delete": {"ct helper": {"family": "ip", "name": "cth", "table": "t", "handle": 0, "type": "sip", "protocol": "tcp", "l3proto": "ip"}}}
1374ad
 
1374ad
-I add ct timeout ip t ctt { protocol udp; l3proto ip; policy = { unreplied : 15, replied : 12 }; }
1374ad
-O -
1374ad
-J {"add": {"ct timeout": {"family": "ip", "name": "ctt", "table": "t", "handle": 0, "protocol": "udp", "l3proto": "ip", "policy": {"unreplied": 15, "replied": 12}}}}
1374ad
-
1374ad
-I delete ct timeout ip t ctt
1374ad
-O -
1374ad
-J {"delete": {"ct timeout": {"family": "ip", "name": "ctt", "table": "t", "handle": 0, "protocol": "udp", "l3proto": "ip", "policy": {"unreplied": 15, "replied": 12}}}}
1374ad
+# I add ct timeout ip t ctt { protocol udp; l3proto ip; policy = { unreplied : 15, replied : 12 }; }
1374ad
+# O -
1374ad
+# J {"add": {"ct timeout": {"family": "ip", "name": "ctt", "table": "t", "handle": 0, "protocol": "udp", "l3proto": "ip", "policy": {"unreplied": 15, "replied": 12}}}}
1374ad
+# 
1374ad
+# I delete ct timeout ip t ctt
1374ad
+# O -
1374ad
+# J {"delete": {"ct timeout": {"family": "ip", "name": "ctt", "table": "t", "handle": 0, "protocol": "udp", "l3proto": "ip", "policy": {"unreplied": 15, "replied": 12}}}}
1374ad
diff --git a/tests/py/any/meta.t b/tests/py/any/meta.t
1374ad
index 327f973..241b466 100644
1374ad
--- a/tests/py/any/meta.t
1374ad
+++ b/tests/py/any/meta.t
1374ad
@@ -204,21 +204,21 @@ meta iif . meta oif vmap { "lo" . "lo" : drop };ok;iif . oif vmap { "lo" . "lo"
1374ad
 meta random eq 1;ok;meta random 1
1374ad
 meta random gt 1000000;ok;meta random > 1000000
1374ad
 
1374ad
-meta time "1970-05-23 21:07:14" drop;ok
1374ad
-meta time 12341234 drop;ok;meta time "1970-05-23 22:07:14" drop
1374ad
-meta time "2019-06-21 17:00:00" drop;ok
1374ad
-meta time "2019-07-01 00:00:00" drop;ok
1374ad
-meta time "2019-07-01 00:01:00" drop;ok
1374ad
-meta time "2019-07-01 00:00:01" drop;ok
1374ad
-meta day "Saturday" drop;ok
1374ad
-meta day 6 drop;ok;meta day "Saturday" drop
1374ad
-meta day "Satturday" drop;fail
1374ad
-meta hour "17:00" drop;ok
1374ad
-meta hour "17:00:00" drop;ok;meta hour "17:00" drop
1374ad
-meta hour "17:00:01" drop;ok
1374ad
-meta hour "00:00" drop;ok
1374ad
-meta hour "00:01" drop;ok
1374ad
-
1374ad
-meta time "meh";fail
1374ad
-meta hour "24:00" drop;fail
1374ad
-meta day 7 drop;fail
1374ad
+- meta time "1970-05-23 21:07:14" drop;ok
1374ad
+- meta time 12341234 drop;ok;meta time "1970-05-23 22:07:14" drop
1374ad
+- meta time "2019-06-21 17:00:00" drop;ok
1374ad
+- meta time "2019-07-01 00:00:00" drop;ok
1374ad
+- meta time "2019-07-01 00:01:00" drop;ok
1374ad
+- meta time "2019-07-01 00:00:01" drop;ok
1374ad
+- meta day "Saturday" drop;ok
1374ad
+- meta day 6 drop;ok;meta day "Saturday" drop
1374ad
+- meta day "Satturday" drop;fail
1374ad
+- meta hour "17:00" drop;ok
1374ad
+- meta hour "17:00:00" drop;ok;meta hour "17:00" drop
1374ad
+- meta hour "17:00:01" drop;ok
1374ad
+- meta hour "00:00" drop;ok
1374ad
+- meta hour "00:01" drop;ok
1374ad
+
1374ad
+- meta time "meh";fail
1374ad
+- meta hour "24:00" drop;fail
1374ad
+- meta day 7 drop;fail
1374ad
diff --git a/tests/py/bridge/meta.t b/tests/py/bridge/meta.t
1374ad
index 94525f2..9f55cde 100644
1374ad
--- a/tests/py/bridge/meta.t
1374ad
+++ b/tests/py/bridge/meta.t
1374ad
@@ -2,7 +2,7 @@
1374ad
 
1374ad
 *bridge;test-bridge;input
1374ad
 
1374ad
-meta obrname "br0";ok
1374ad
-meta ibrname "br0";ok
1374ad
-meta ibrvproto vlan;ok
1374ad
-meta ibrpvid 100;ok
1374ad
+- meta obrname "br0";ok
1374ad
+- meta ibrname "br0";ok
1374ad
+- meta ibrvproto vlan;ok
1374ad
+- meta ibrpvid 100;ok
1374ad
diff --git a/tests/py/inet/osf.t b/tests/py/inet/osf.t
1374ad
index c828541..5191e72 100644
1374ad
--- a/tests/py/inet/osf.t
1374ad
+++ b/tests/py/inet/osf.t
1374ad
@@ -4,15 +4,15 @@
1374ad
 *ip6;osfip6;osfchain
1374ad
 *inet;osfinet;osfchain
1374ad
 
1374ad
-osf name "Linux";ok
1374ad
-osf ttl loose name "Linux";ok
1374ad
-osf ttl skip name "Linux";ok
1374ad
-osf ttl skip version "Linux:3.0";ok
1374ad
-osf ttl skip version "morethan:sixteenbytes";fail
1374ad
-osf ttl nottl name "Linux";fail
1374ad
-osf name "morethansixteenbytes";fail
1374ad
-osf name ;fail
1374ad
-osf name { "Windows", "MacOs" };ok
1374ad
-osf version { "Windows:XP", "MacOs:Sierra" };ok
1374ad
-ct mark set osf name map { "Windows" : 0x00000001, "MacOs" : 0x00000002 };ok
1374ad
-ct mark set osf version map { "Windows:XP" : 0x00000003, "MacOs:Sierra" : 0x00000004 };ok
1374ad
+- osf name "Linux";ok
1374ad
+- osf ttl loose name "Linux";ok
1374ad
+- osf ttl skip name "Linux";ok
1374ad
+- osf ttl skip version "Linux:3.0";ok
1374ad
+- osf ttl skip version "morethan:sixteenbytes";fail
1374ad
+- osf ttl nottl name "Linux";fail
1374ad
+- osf name "morethansixteenbytes";fail
1374ad
+- osf name ;fail
1374ad
+- osf name { "Windows", "MacOs" };ok
1374ad
+- osf version { "Windows:XP", "MacOs:Sierra" };ok
1374ad
+- ct mark set osf name map { "Windows" : 0x00000001, "MacOs" : 0x00000002 };ok
1374ad
+- ct mark set osf version map { "Windows:XP" : 0x00000003, "MacOs:Sierra" : 0x00000004 };ok
1374ad
diff --git a/tests/py/inet/socket.t b/tests/py/inet/socket.t
1374ad
index 91846e8..dbc0554 100644
1374ad
--- a/tests/py/inet/socket.t
1374ad
+++ b/tests/py/inet/socket.t
1374ad
@@ -8,4 +8,4 @@ socket transparent 0;ok
1374ad
 socket transparent 1;ok
1374ad
 socket transparent 2;fail
1374ad
 
1374ad
-socket mark 0x00000005;ok
1374ad
+- socket mark 0x00000005;ok
1374ad
diff --git a/tests/py/inet/synproxy.t b/tests/py/inet/synproxy.t
1374ad
index 55a05e1..9c58239 100644
1374ad
--- a/tests/py/inet/synproxy.t
1374ad
+++ b/tests/py/inet/synproxy.t
1374ad
@@ -4,10 +4,10 @@
1374ad
 *ip6;synproxyip6;synproxychain
1374ad
 *inet;synproxyinet;synproxychain
1374ad
 
1374ad
-synproxy;ok
1374ad
-synproxy mss 1460 wscale 7;ok
1374ad
-synproxy mss 1460 wscale 5 timestamp sack-perm;ok
1374ad
-synproxy timestamp sack-perm;ok
1374ad
-synproxy timestamp;ok
1374ad
-synproxy sack-perm;ok
1374ad
+-synproxy;ok
1374ad
+-synproxy mss 1460 wscale 7;ok
1374ad
+-synproxy mss 1460 wscale 5 timestamp sack-perm;ok
1374ad
+-synproxy timestamp sack-perm;ok
1374ad
+-synproxy timestamp;ok
1374ad
+-synproxy sack-perm;ok
1374ad
 
1374ad
diff --git a/tests/py/ip/objects.t b/tests/py/ip/objects.t
1374ad
index 4fcde7c..06e94f1 100644
1374ad
--- a/tests/py/ip/objects.t
1374ad
+++ b/tests/py/ip/objects.t
1374ad
@@ -33,26 +33,26 @@ ip saddr 192.168.1.3 limit name "lim1";ok
1374ad
 ip saddr 192.168.1.3 limit name "lim3";fail
1374ad
 limit name tcp dport map {443 : "lim1", 80 : "lim2", 22 : "lim1"};ok
1374ad
 
1374ad
-# ct timeout
1374ad
-%cttime1 type ct timeout { protocol tcp; policy = { established:122 } ;};ok
1374ad
-%cttime2 type ct timeout { protocol udp; policy = { syn_sent:122 } ;};fail
1374ad
-%cttime3 type ct timeout { protocol tcp; policy = { established:132, close:16, close_wait:16 } ; l3proto ip ;};ok
1374ad
-%cttime4 type ct timeout { protocol udp; policy = { replied:14, unreplied:19 } ;};ok
1374ad
-%cttime5 type ct timeout {protocol tcp; policy = { estalbished:100 } ;};fail
1374ad
-
1374ad
-ct timeout set "cttime1";ok
1374ad
-
1374ad
-# ct expectation
1374ad
-%ctexpect1 type ct expectation { protocol tcp; dport 1234; timeout 2m; size 12; };ok
1374ad
-%ctexpect2 type ct expectation { protocol udp; };fail
1374ad
-%ctexpect3 type ct expectation { protocol tcp; dport 4321; };fail
1374ad
-%ctexpect4 type ct expectation { protocol tcp; dport 4321; timeout 2m; };fail
1374ad
-%ctexpect5 type ct expectation { protocol udp; dport 9876; timeout 2m; size 12; l3proto ip; };ok
1374ad
-
1374ad
-ct expectation set "ctexpect1";ok
1374ad
-
1374ad
-# synproxy
1374ad
-%synproxy1 type synproxy mss 1460 wscale 7;ok
1374ad
-%synproxy2 type synproxy mss 1460 wscale 7 timestamp sack-perm;ok
1374ad
-
1374ad
-synproxy name tcp dport map {443 : "synproxy1", 80 : "synproxy2"};ok
1374ad
+# # ct timeout
1374ad
+# %cttime1 type ct timeout { protocol tcp; policy = { established:122 } ;};ok
1374ad
+# %cttime2 type ct timeout { protocol udp; policy = { syn_sent:122 } ;};fail
1374ad
+# %cttime3 type ct timeout { protocol tcp; policy = { established:132, close:16, close_wait:16 } ; l3proto ip ;};ok
1374ad
+# %cttime4 type ct timeout { protocol udp; policy = { replied:14, unreplied:19 } ;};ok
1374ad
+# %cttime5 type ct timeout {protocol tcp; policy = { estalbished:100 } ;};fail
1374ad
+# 
1374ad
+# ct timeout set "cttime1";ok
1374ad
+
1374ad
+# # ct expectation
1374ad
+# %ctexpect1 type ct expectation { protocol tcp; dport 1234; timeout 2m; size 12; };ok
1374ad
+# %ctexpect2 type ct expectation { protocol udp; };fail
1374ad
+# %ctexpect3 type ct expectation { protocol tcp; dport 4321; };fail
1374ad
+# %ctexpect4 type ct expectation { protocol tcp; dport 4321; timeout 2m; };fail
1374ad
+# %ctexpect5 type ct expectation { protocol udp; dport 9876; timeout 2m; size 12; l3proto ip; };ok
1374ad
+# 
1374ad
+# ct expectation set "ctexpect1";ok
1374ad
+
1374ad
+# # synproxy
1374ad
+# %synproxy1 type synproxy mss 1460 wscale 7;ok
1374ad
+# %synproxy2 type synproxy mss 1460 wscale 7 timestamp sack-perm;ok
1374ad
+# 
1374ad
+# synproxy name tcp dport map {443 : "synproxy1", 80 : "synproxy2"};ok
1374ad
diff --git a/tests/py/ip6/sets.t b/tests/py/ip6/sets.t
1374ad
index add82eb..cc43aca 100644
1374ad
--- a/tests/py/ip6/sets.t
1374ad
+++ b/tests/py/ip6/sets.t
1374ad
@@ -40,4 +40,4 @@ ip6 saddr != @set33 drop;fail
1374ad
 !set5 type ipv6_addr . ipv6_addr;ok
1374ad
 ip6 saddr . ip6 daddr @set5 drop;ok
1374ad
 add @set5 { ip6 saddr . ip6 daddr };ok
1374ad
-delete @set5 { ip6 saddr . ip6 daddr };ok
1374ad
+- delete @set5 { ip6 saddr . ip6 daddr };ok
1374ad
diff --git a/tests/shell/testcases/flowtable/0002create_flowtable_0 b/tests/shell/testcases/flowtable/0002create_flowtable_0
1374ad
index 4c85c3f..8b80e34 100755
1374ad
--- a/tests/shell/testcases/flowtable/0002create_flowtable_0
1374ad
+++ b/tests/shell/testcases/flowtable/0002create_flowtable_0
1374ad
@@ -1,12 +1,12 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
 set -e
1374ad
-$NFT add table t
1374ad
-$NFT add flowtable t f { hook ingress priority 10 \; devices = { lo }\; }
1374ad
-if $NFT create flowtable t f { hook ingress priority 10 \; devices = { lo }\; } 2>/dev/null ; then
1374ad
+$NFT add table inet t
1374ad
+$NFT add flowtable inet t f { hook ingress priority 10 \; devices = { lo }\; }
1374ad
+if $NFT create flowtable inet t f { hook ingress priority 10 \; devices = { lo }\; } 2>/dev/null ; then
1374ad
 	echo "E: flowtable creation not failing on existing set" >&2
1374ad
 	exit 1
1374ad
 fi
1374ad
-$NFT add flowtable t f { hook ingress priority 10 \; devices = { lo }\; }
1374ad
+$NFT add flowtable inet t f { hook ingress priority 10 \; devices = { lo }\; }
1374ad
 
1374ad
 exit 0
1374ad
diff --git a/tests/shell/testcases/flowtable/0003add_after_flush_0 b/tests/shell/testcases/flowtable/0003add_after_flush_0
1374ad
index 481c7ed..b4243bc 100755
1374ad
--- a/tests/shell/testcases/flowtable/0003add_after_flush_0
1374ad
+++ b/tests/shell/testcases/flowtable/0003add_after_flush_0
1374ad
@@ -1,8 +1,8 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
 set -e
1374ad
-$NFT add table x
1374ad
-$NFT add flowtable x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
+$NFT add table inet x
1374ad
+$NFT add flowtable inet x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
 $NFT flush ruleset
1374ad
-$NFT add table x
1374ad
-$NFT add flowtable x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
+$NFT add table inet x
1374ad
+$NFT add flowtable inet x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
diff --git a/tests/shell/testcases/flowtable/0004delete_after_add_0 b/tests/shell/testcases/flowtable/0004delete_after_add_0
1374ad
index 8d9a842..4618595 100755
1374ad
--- a/tests/shell/testcases/flowtable/0004delete_after_add_0
1374ad
+++ b/tests/shell/testcases/flowtable/0004delete_after_add_0
1374ad
@@ -1,6 +1,6 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
 set -e
1374ad
-$NFT add table x
1374ad
-$NFT add flowtable x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
-$NFT delete flowtable x y
1374ad
+$NFT add table inet x
1374ad
+$NFT add flowtable inet x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
+$NFT delete flowtable inet x y
1374ad
diff --git a/tests/shell/testcases/flowtable/0005delete_in_use_1 b/tests/shell/testcases/flowtable/0005delete_in_use_1
1374ad
index ef52620..eda1fb9 100755
1374ad
--- a/tests/shell/testcases/flowtable/0005delete_in_use_1
1374ad
+++ b/tests/shell/testcases/flowtable/0005delete_in_use_1
1374ad
@@ -1,11 +1,11 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
 set -e
1374ad
-$NFT add table x
1374ad
-$NFT add chain x x
1374ad
-$NFT add flowtable x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
-$NFT add rule x x flow add @y
1374ad
+$NFT add table inet x
1374ad
+$NFT add chain inet x x
1374ad
+$NFT add flowtable inet x y { hook ingress priority 0\; devices = { lo }\;}
1374ad
+$NFT add rule inet x x flow add @y
1374ad
 
1374ad
-$NFT delete flowtable x y || exit 0
1374ad
+$NFT delete flowtable inet x y || exit 0
1374ad
 echo "E: delete flowtable in use"
1374ad
 exit 1
1374ad
diff --git a/tests/shell/testcases/flowtable/0007prio_0 b/tests/shell/testcases/flowtable/0007prio_0
1374ad
index 49bbcac..0ea262f 100755
1374ad
--- a/tests/shell/testcases/flowtable/0007prio_0
1374ad
+++ b/tests/shell/testcases/flowtable/0007prio_0
1374ad
@@ -15,10 +15,10 @@ format_offset () {
1374ad
 	fi
1374ad
 }
1374ad
 
1374ad
-$NFT add table t
1374ad
+$NFT add table inet t
1374ad
 for offset in -11 -10 0 10 11
1374ad
 do
1374ad
-	$NFT add flowtable t f "{ hook ingress priority filter `format_offset $offset`; devices = { lo }; }"
1374ad
-	$NFT delete flowtable t f
1374ad
+	$NFT add flowtable inet t f "{ hook ingress priority filter `format_offset $offset`; devices = { lo }; }"
1374ad
+	$NFT delete flowtable inet t f
1374ad
 done
1374ad
 
1374ad
diff --git a/tests/shell/testcases/flowtable/0008prio_1 b/tests/shell/testcases/flowtable/0008prio_1
1374ad
index 48953d7..0d8cdff 100755
1374ad
--- a/tests/shell/testcases/flowtable/0008prio_1
1374ad
+++ b/tests/shell/testcases/flowtable/0008prio_1
1374ad
@@ -1,9 +1,9 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
-$NFT add table t
1374ad
+$NFT add table inet t
1374ad
 for prioname in raw mangle dstnar security srcnat out dummy
1374ad
 do
1374ad
-	$NFT add flowtable t f { hook ingress priority $prioname \; devices = { lo }\; }
1374ad
+	$NFT add flowtable inet t f { hook ingress priority $prioname \; devices = { lo }\; }
1374ad
 	if (($? == 0))
1374ad
 	then
1374ad
 		echo "E: $prioname should not be a valid priority name for flowtables" >&2
1374ad
diff --git a/tests/shell/testcases/flowtable/0009deleteafterflush_0 b/tests/shell/testcases/flowtable/0009deleteafterflush_0
1374ad
index 2cda563..061e22e 100755
1374ad
--- a/tests/shell/testcases/flowtable/0009deleteafterflush_0
1374ad
+++ b/tests/shell/testcases/flowtable/0009deleteafterflush_0
1374ad
@@ -1,9 +1,9 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
 set -e
1374ad
-$NFT add table x
1374ad
-$NFT add chain x y
1374ad
-$NFT add flowtable x f { hook ingress priority 0\; devices = { lo }\;}
1374ad
-$NFT add rule x y flow add @f
1374ad
-$NFT flush chain x y
1374ad
-$NFT delete flowtable x f
1374ad
+$NFT add table inet x
1374ad
+$NFT add chain inet x y
1374ad
+$NFT add flowtable inet x f { hook ingress priority 0\; devices = { lo }\;}
1374ad
+$NFT add rule inet x y flow add @f
1374ad
+$NFT flush chain inet x y
1374ad
+$NFT delete flowtable inet x f
1374ad
diff --git a/tests/shell/testcases/listing/0013objects_0 b/tests/shell/testcases/listing/0013objects_0
1374ad
index 4d39143..130d02c 100755
1374ad
--- a/tests/shell/testcases/listing/0013objects_0
1374ad
+++ b/tests/shell/testcases/listing/0013objects_0
1374ad
@@ -1,5 +1,7 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
+exit 0
1374ad
+
1374ad
 # list table with all objects and chains
1374ad
 
1374ad
 EXPECTED="table ip test {
1374ad
diff --git a/tests/shell/testcases/nft-f/0017ct_timeout_obj_0 b/tests/shell/testcases/nft-f/0017ct_timeout_obj_0
1374ad
index 4f40779..e0f9e44 100755
1374ad
--- a/tests/shell/testcases/nft-f/0017ct_timeout_obj_0
1374ad
+++ b/tests/shell/testcases/nft-f/0017ct_timeout_obj_0
1374ad
@@ -1,5 +1,7 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
+exit 0
1374ad
+
1374ad
 EXPECTED='table ip filter {
1374ad
 	ct timeout cttime{
1374ad
 		protocol tcp
1374ad
diff --git a/tests/shell/testcases/nft-f/0018ct_expectation_obj_0 b/tests/shell/testcases/nft-f/0018ct_expectation_obj_0
1374ad
index 4f9872f..f518cf7 100755
1374ad
--- a/tests/shell/testcases/nft-f/0018ct_expectation_obj_0
1374ad
+++ b/tests/shell/testcases/nft-f/0018ct_expectation_obj_0
1374ad
@@ -1,5 +1,7 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
+exit 0
1374ad
+
1374ad
 EXPECTED='table ip filter {
1374ad
 	ct expectation ctexpect{
1374ad
 		protocol tcp
1374ad
diff --git a/tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft b/tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft
1374ad
deleted file mode 100644
1374ad
index 7cff1ed..0000000
1374ad
--- a/tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft
1374ad
+++ /dev/null
1374ad
@@ -1,11 +0,0 @@
1374ad
-table ip filter {
1374ad
-	ct timeout cttime {
1374ad
-		protocol tcp
1374ad
-		l3proto ip
1374ad
-		policy = { established : 123, close : 12 }
1374ad
-	}
1374ad
-
1374ad
-	chain c {
1374ad
-		ct timeout set "cttime"
1374ad
-	}
1374ad
-}
1374ad
diff --git a/tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft.disabled b/tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft.disabled
1374ad
new file mode 100644
1374ad
index 0000000..7cff1ed
1374ad
--- /dev/null
1374ad
+++ b/tests/shell/testcases/nft-f/dumps/0017ct_timeout_obj_0.nft.disabled
1374ad
@@ -0,0 +1,11 @@
1374ad
+table ip filter {
1374ad
+	ct timeout cttime {
1374ad
+		protocol tcp
1374ad
+		l3proto ip
1374ad
+		policy = { established : 123, close : 12 }
1374ad
+	}
1374ad
+
1374ad
+	chain c {
1374ad
+		ct timeout set "cttime"
1374ad
+	}
1374ad
+}
1374ad
diff --git a/tests/shell/testcases/optionals/update_object_handles_0 b/tests/shell/testcases/optionals/update_object_handles_0
1374ad
index 8b12b8c..e11b4e7 100755
1374ad
--- a/tests/shell/testcases/optionals/update_object_handles_0
1374ad
+++ b/tests/shell/testcases/optionals/update_object_handles_0
1374ad
@@ -1,5 +1,7 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
+exit 0
1374ad
+
1374ad
 set -e
1374ad
 $NFT add table test-ip
1374ad
 $NFT add counter test-ip traffic-counter
1374ad
diff --git a/tests/shell/testcases/sets/0036add_set_element_expiration_0 b/tests/shell/testcases/sets/0036add_set_element_expiration_0
1374ad
index 51ed0f2..043bb8f 100755
1374ad
--- a/tests/shell/testcases/sets/0036add_set_element_expiration_0
1374ad
+++ b/tests/shell/testcases/sets/0036add_set_element_expiration_0
1374ad
@@ -1,5 +1,7 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
+exit 0
1374ad
+
1374ad
 set -e
1374ad
 
1374ad
 RULESET="add table ip x
1374ad
diff --git a/tests/shell/testcases/transactions/0046set_0 b/tests/shell/testcases/transactions/0046set_0
1374ad
index 172e24d..1b24964 100755
1374ad
--- a/tests/shell/testcases/transactions/0046set_0
1374ad
+++ b/tests/shell/testcases/transactions/0046set_0
1374ad
@@ -1,5 +1,7 @@
1374ad
 #!/bin/bash
1374ad
 
1374ad
+exit 0
1374ad
+
1374ad
 RULESET='add table ip filter
1374ad
 add chain ip filter group_7933
1374ad
 add map ip filter group_7933 { type ipv4_addr : classid; flags interval; }
1374ad
-- 
1374ad
1.8.3.1
1374ad