use_pty:FALSE /usr/share/restraint/plugins/run_task_plugins bash ./runtest.sh /etc/pki/ca-trust/source/anchors /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/macsec/sanity_check --2022-12-21 15:51:21-- https://password.corp.redhat.com/legacy.crt Resolving password.corp.redhat.com (password.corp.redhat.com)... 10.2.111.154 Connecting to password.corp.redhat.com (password.corp.redhat.com)|10.2.111.154|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 1338 (1.3K) Saving to: ‘legacy.crt.1’ 0K . 100% 65.2M=0s 2022-12-21 15:51:22 (65.2 MB/s) - ‘legacy.crt.1’ saved [1338/1338] --2022-12-21 15:51:22-- https://password.corp.redhat.com/RH-IT-Root-CA.crt Resolving password.corp.redhat.com (password.corp.redhat.com)... 10.2.111.154 Connecting to password.corp.redhat.com (password.corp.redhat.com)|10.2.111.154|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 1517 (1.5K) Saving to: ‘RH-IT-Root-CA.crt.1’ 0K . 100% 68.6M=0s 2022-12-21 15:51:22 (68.6 MB/s) - ‘RH-IT-Root-CA.crt.1’ saved [1517/1517] /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/macsec/sanity_check :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:51:24 ] :: [ BEGIN ] :: Running 'modinfo macsec' filename: /lib/modules/6.0.15-300.fc37.ppc64le/kernel/drivers/net/macsec.ko.xz license: GPL v2 description: MACsec IEEE 802.1AE alias: net-pf-16-proto-16-family-macsec alias: rtnl-link-macsec depends: intree: Y name: macsec vermagic: 6.0.15-300.fc37.ppc64le SMP mod_unload mprofile-kernel relocatable sig_id: PKCS#7 signer: Fedora kernel signing key sig_key: 2D:87:39:14:2B:7B:13:EA:EA:76:52:E1:1B:44:E4:50:62:5B:6B:39 sig_hashalgo: sha256 signature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utput of 'modinfo macsec': :: [ 15:51:24 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:24 ] :: [ LOG ] :: filename: /lib/modules/6.0.15-300.fc37.ppc64le/kernel/drivers/net/macsec.ko.xz :: [ 15:51:24 ] :: [ LOG ] :: license: GPL v2 :: [ 15:51:24 ] :: [ LOG ] :: description: MACsec IEEE 802.1AE :: [ 15:51:24 ] :: [ LOG ] :: alias: net-pf-16-proto-16-family-macsec :: [ 15:51:24 ] :: [ LOG ] :: alias: rtnl-link-macsec :: [ 15:51:24 ] :: [ LOG ] :: depends: :: [ 15:51:24 ] :: [ LOG ] :: intree: Y :: [ 15:51:24 ] :: [ LOG ] :: name: macsec :: [ 15:51:24 ] :: [ LOG ] :: vermagic: 6.0.15-300.fc37.ppc64le SMP mod_unload mprofile-kernel relocatable :: [ 15:51:24 ] :: [ LOG ] :: sig_id: PKCS#7 :: [ 15:51:24 ] :: [ LOG ] :: signer: Fedora kernel signing key :: [ 15:51:24 ] :: [ LOG ] :: sig_key: 2D:87:39:14:2B:7B:13:EA:EA:76:52:E1:1B:44:E4:50:62:5B:6B:39 :: [ 15:51:24 ] :: [ LOG ] :: sig_hashalgo: sha256 :: [ 15:51:24 ] :: [ LOG ] :: signature: 0B:0C:AE:BE:C4:55:EA:46:9B:1E:63:61:15:1C:16:6D:E6:05:FC:A1: :: [ 15:51:24 ] :: [ LOG ] :: A1:3E:96:52:EE:02:FE:D2:05:31:39:CA:23:11:BF:97:0A:27:BB:26: :: [ 15:51:24 ] :: [ LOG ] :: 17:C7:5A:DB:09:69:00:1F:CA:A6:07:08:21:63:A6:44:62:7D:D6:22: :: [ 15:51:24 ] :: [ LOG ] :: AE:86:0C:AD:47:BA:EE:B1:3C:87:3A:9C:9C:2E:AF:5A:E5:19:2C:1E: :: [ 15:51:24 ] :: [ LOG ] :: B5:5B:B9:5D:89:97:D1:5F:AC:A6:8E:56:B6:54:A0:E8:FD:8D:EE:8F: :: [ 15:51:24 ] :: [ LOG ] :: FE:C0:C8:7E:DB:F2:4C:67:05:AC:94:19:35:71:B8:E0:9D:20:6A:64: :: [ 15:51:24 ] :: [ LOG ] :: EA:B7:18:95:25:F6:2E:EE:54:FC:AB:3A:2A:D6:B4:CC:07:A8:81:56: :: [ 15:51:24 ] :: [ LOG ] :: E7:CF:CA:B2:AB:AE:7D:1E:88:38:58:D5:A7:F4:A4:67:B7:49:6D:50: :: [ 15:51:24 ] :: [ LOG ] :: C5:5B:D8:52:C5:72:97:57:CA:0A:3F:39:66:64:0E:04:DE:08:C9:B9: :: [ 15:51:24 ] :: [ LOG ] :: 45:22:55:69:96:4F:87:E2:F9:31:B3:7E:80:6D:A9:6C:D8:39:41:DC: :: [ 15:51:24 ] :: [ LOG ] :: 4F:96:09:0B:77:78:CA:0F:92:75:B3:BA:47:9A:E8:0E:5C:7D:B4:83: :: [ 15:51:24 ] :: [ LOG ] :: F8:42:B3:B9:69:42:D5:1E:12:F3:75:ED:18:4F:3B:7E:E9:A1:9C:B7: :: [ 15:51:24 ] :: [ LOG ] :: F6:68:F9:BE:4A:D2:E9:6D:EF:98:58:78:AF:AC:CC:D1:D2:1B:F4:CE: :: [ 15:51:24 ] :: [ LOG ] :: 0F:25:1D:DE:31:CF:5A:2E:79:F5:EA:44:22:47:E5:A8:79:B2:DA:77: :: [ 15:51:24 ] :: [ LOG ] :: 7C:84:34:11:3E:E5:03:FC:D4:C8:99:A1:BA:C1:04:69:A8:15:A9:3A: :: [ 15:51:24 ] :: [ LOG ] :: 5D:D7:24:22:C2:11:F3:A3:95:BF:B5:D3:A7:E4:C9:4C:D0:51:53:8D: :: [ 15:51:24 ] :: [ LOG ] :: CC:38:39:40:4E:81:FC:DE:B4:D4:FD:B4:90:7F:E8:49:82:42:99:B6: :: [ 15:51:24 ] :: [ LOG ] :: A8:85:AF:A5:D0:3B:23:CC:44:64:7A:F3:DD:42:E7:8D:7B:80:1B:85: :: [ 15:51:24 ] :: [ LOG ] :: B0:41:05:84:8C:13:AD:AC:2F:E2:BB:D6:08:42:59:D1:BD:AA:1A:4A: :: [ 15:51:24 ] :: [ LOG ] :: AF:92:81:0E:F0:E9:54:54:58:B3:2D:AB:58:11:72:49:3B:55:9E:91: :: [ 15:51:24 ] :: [ LOG ] :: 23:1B:ED:A2:C4:F6:45:56:BF:22:66:19:0D:B3:CD:D1:55:D0:7B:42: :: [ 15:51:24 ] :: [ LOG ] :: 3C:71:17:61:50:30:5E:02:91:E9:88:0F:EE:60:FD:0D:0F:6F:40:FC: :: [ 15:51:24 ] :: [ LOG ] :: A1:33:8F:CA:D4:8B:67:53:78:D2:6B:CD:4C:AD:B2:1D:D2:34:18:5B: :: [ 15:51:24 ] :: [ LOG ] :: 84:12:09:6F:3B:95:CB:10:24:74:30:CE:08:BD:CC:9E:BE:AC:4C:4A: :: [ 15:51:24 ] :: [ LOG ] :: 51:8C:4F:68:B1:27:0A:FC:A3:AB:30:01:46:65:99:57:5C:9F:84:0E: :: [ 15:51:24 ] :: [ LOG ] :: DA:2D:BC:0B:A7:E5:09:11:B3:80:4C:B2 :: [ 15:51:24 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:24 ] :: [ PASS ] :: Command 'modinfo macsec' (Expected 0, got 0) :: [ 15:51:24 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 15:51:24 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0, got 0) :: [ 15:51:24 ] :: [ BEGIN ] :: Running 'ip macsec help' Usage: ip macsec add DEV tx sa { 0..3 } [ OPTS ] key ID KEY ip macsec set DEV tx sa { 0..3 } [ OPTS ] ip macsec del DEV tx sa { 0..3 } ip macsec add DEV rx SCI [ on | off ] ip macsec set DEV rx SCI [ on | off ] ip macsec del DEV rx SCI ip macsec add DEV rx SCI sa { 0..3 } [ OPTS ] key ID KEY ip macsec set DEV rx SCI sa { 0..3 } [ OPTS ] ip macsec del DEV rx SCI sa { 0..3 } ip macsec show ip macsec show DEV ip macsec offload DEV [ off | phy | mac ] where OPTS := [ pn ] [ on | off ] ID := 128-bit hex string KEY := 128-bit or 256-bit hex string SCI := { sci | port { 1..2^16-1 } address } :: [ 15:51:25 ] :: [ LOG ] :: Output of 'ip macsec help': :: [ 15:51:25 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:25 ] :: [ LOG ] :: Usage: ip macsec add DEV tx sa { 0..3 } [ OPTS ] key ID KEY :: [ 15:51:25 ] :: [ LOG ] :: ip macsec set DEV tx sa { 0..3 } [ OPTS ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec del DEV tx sa { 0..3 } :: [ 15:51:25 ] :: [ LOG ] :: ip macsec add DEV rx SCI [ on | off ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec set DEV rx SCI [ on | off ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec del DEV rx SCI :: [ 15:51:25 ] :: [ LOG ] :: ip macsec add DEV rx SCI sa { 0..3 } [ OPTS ] key ID KEY :: [ 15:51:25 ] :: [ LOG ] :: ip macsec set DEV rx SCI sa { 0..3 } [ OPTS ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec del DEV rx SCI sa { 0..3 } :: [ 15:51:25 ] :: [ LOG ] :: ip macsec show :: [ 15:51:25 ] :: [ LOG ] :: ip macsec show DEV :: [ 15:51:25 ] :: [ LOG ] :: ip macsec offload DEV [ off | phy | mac ] :: [ 15:51:25 ] :: [ LOG ] :: where OPTS := [ pn ] [ on | off ] :: [ 15:51:25 ] :: [ LOG ] :: ID := 128-bit hex string :: [ 15:51:25 ] :: [ LOG ] :: KEY := 128-bit or 256-bit hex string :: [ 15:51:25 ] :: [ LOG ] :: SCI := { sci | port { 1..2^16-1 } address } :: [ 15:51:25 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:25 ] :: [ PASS ] :: Command 'ip macsec help' (Expected 255, got 255) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 3 good, 0 bad :: RESULT: PASS (Setup) ** Setup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: load/unload macsec module :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 12s :: Assertions: 0 good, 0 bad :: RESULT: PASS (load/unload macsec module) ** load-unload-macsec-module PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip link add macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists Last metadata expiration check: 0:28:44 ago on Wed 21 Dec 2022 03:22:54 PM EST. Dependencies resolved. ================================================================================ Package Arch Version Repository Size ================================================================================ Installing: netperf ppc64le 2.7.0-3.20210803git3bc455b.fc37 beaker-Fedora-Everything 645 k Transaction Summary ================================================================================ Install 1 Package Total download size: 645 k Installed size: 1.6 M Downloading Packages: netperf-2.7.0-3.20210803git3bc455b.fc37.ppc64le 17 MB/s | 645 kB 00:00 -------------------------------------------------------------------------------- Total 17 MB/s | 645 kB 00:00 Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction Preparing : 1/1 Installing : netperf-2.7.0-3.20210803git3bc455b.fc37.ppc64le 1/1 Running scriptlet: netperf-2.7.0-3.20210803git3bc455b.fc37.ppc64le 1/1 Verifying : netperf-2.7.0-3.20210803git3bc455b.fc37.ppc64le 1/1 Installed: netperf-2.7.0-3.20210803git3bc455b.fc37.ppc64le Complete! Netperf version 2.7.1 :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec1 type macsec' :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec1 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ BEGIN ] :: Running 'ip link del macsec1' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del macsec1' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec9999 type macsec' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec9999 type macsec' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link del macsec9999' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del macsec9999' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name ttt type macsec' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name ttt type macsec' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link set ttt up' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link set ttt up' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link show ttt' 82: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 02:5f:68:59:fa:56 brd ff:ff:ff:ff:ff:ff :: [ 15:51:44 ] :: [ LOG ] :: Output of 'ip link show ttt': :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:44 ] :: [ LOG ] :: 82: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 15:51:44 ] :: [ LOG ] :: link/ether 02:5f:68:59:fa:56 brd ff:ff:ff:ff:ff:ff :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link show ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip -d link show ttt' 82: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 02:5f:68:59:fa:56 brd ff:ff:ff:ff:ff:ff promiscuity 0 minmtu 0 maxmtu 65535 macsec sci 025f6859fa560001 protect on cipher GCM-AES-128 icvlen 16 encodingsa 0 validate strict encrypt off send_sci on end_station off scb off replay off addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 gro_max_size 65536 :: [ 15:51:44 ] :: [ LOG ] :: Output of 'ip -d link show ttt': :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:44 ] :: [ LOG ] :: 82: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 15:51:44 ] :: [ LOG ] :: link/ether 02:5f:68:59:fa:56 brd ff:ff:ff:ff:ff:ff promiscuity 0 minmtu 0 maxmtu 65535 :: [ 15:51:44 ] :: [ LOG ] :: macsec sci 025f6859fa560001 protect on cipher GCM-AES-128 icvlen 16 encodingsa 0 validate strict encrypt off send_sci on end_station off scb off replay off addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 gro_max_size 65536 :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip -d link show ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip macsec show ttt' 82: ttt: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 025f6859fa560001 on SA 0 offload: off :: [ 15:51:44 ] :: [ LOG ] :: Output of 'ip macsec show ttt': :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:44 ] :: [ LOG ] :: 82: ttt: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off :: [ 15:51:44 ] :: [ LOG ] :: cipher suite: GCM-AES-128, using ICV length 16 :: [ 15:51:44 ] :: [ LOG ] :: TXSC: 025f6859fa560001 on SA 0 :: [ 15:51:44 ] :: [ LOG ] :: offload: off :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link del ttt' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port -1' Error: argument "-1" is wrong: expected port :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port -1' (Expected 255, got 255) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 0' Error: argument "0" is wrong: expected port != 0 :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 0' (Expected 255, got 255) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 65536' Error: argument "65536" is wrong: expected port :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 65536' (Expected 255, got 255) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec sci 1' :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 1' (Expected 0, got 0) :: [ 15:51:44 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec sci 0100560212005452' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 0100560212005452' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 0' Error: argument "0" is wrong: ICV length must be in the range {8..16} :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 0' (Expected 255, got 255) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 16' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 16' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: verify icvlen (Assert: '16' should equal '16') :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encrypt aa' Error: argument of "encrypt" must be one of "off", "on", not "aa" :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt aa' (Expected 1, got 1) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: default encrypt is off (Assert: 'off' should equal 'off') :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encrypt on' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt on' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: veirfy encrypt is on (Assert: 'on' should equal 'on') :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec send_sci aa' Error: argument of "send_sci" must be one of "off", "on", not "aa" :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci aa' (Expected 1, got 1) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: default send_sci is on (Assert: 'on' should equal 'on') :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec send_sci off' :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci off' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: veirfy send_sci is off (Assert: 'off' should equal 'off') :: [ 15:51:45 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec end_station aa' Error: argument of "end_station" must be one of "off", "on", not "aa" :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station aa' (Expected 1, got 1) :: [ 15:51:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:46 ] :: [ PASS ] :: default end_station is off (Assert: 'off' should equal 'off') :: [ 15:51:46 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec end_station on' :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station on' (Expected 0, got 0) :: [ 15:51:46 ] :: [ PASS ] :: veirfy end_station is on (Assert: 'on' should equal 'on') :: [ 15:51:46 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec scb aa' Error: argument of "scb" must be one of "off", "on", not "aa" :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb aa' (Expected 1, got 1) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: default scb is off (Assert: 'off' should equal 'off') :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec scb on' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb on' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: veirfy scb is on (Assert: 'on' should equal 'on') :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec protect aa' Error: argument of "protect" must be one of "off", "on", not "aa" :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect aa' (Expected 1, got 1) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: default protect is on (Assert: 'on' should equal 'on') :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec protect off' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect off' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: veirfy protect is off (Assert: 'off' should equal 'off') :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay aa' Error: argument of "replay" must be one of "off", "on", not "aa" :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay aa' (Expected 1, got 1) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: default replay is off (Assert: 'off' should equal 'off') :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ BEGIN ] :: should specify window size :: actually running 'ip link add link dummy0 name macsec0 type macsec replay on' replay protection enabled, but no window set. did you mean 'replay on window VALUE'? :: [ 15:51:47 ] :: [ PASS ] :: should specify window size (Expected 1, got 1) :: [ 15:51:47 ] :: [ BEGIN ] :: should turn replay on :: actually running 'ip link add link dummy0 name macsec0 type macsec window 1024' replay window set, but replay protection not enabled. did you mean 'replay on window 1024'? :: [ 15:51:47 ] :: [ PASS ] :: should turn replay on (Expected 1, got 1) :: [ 15:51:47 ] :: [ BEGIN ] :: out of window size :: actually running 'ip link add link dummy0 name macsec0 type macsec replay on window -1' Error: argument "-1" is wrong: expected replay window size :: [ 15:51:47 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 15:51:47 ] :: [ BEGIN ] :: out of window size :: actually running 'ip link add link dummy0 name macsec0 type macsec replay on window 4294967296' Error: argument "4294967296" is wrong: expected replay window size :: [ 15:51:47 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 15:51:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 10240' :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 10240' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy replay is on (Assert: 'on' should equal 'on') :: [ 15:51:48 ] :: [ PASS ] :: veirfy window is 10240 (Assert: '10240' should equal '10240') :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec validate aa' Error: argument of "validate" must be one of "disabled", "check", "strict", not "aa" :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate aa' (Expected 1, got 1) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: default validate is strict (Assert: 'strict' should equal 'strict') :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec validate check' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate check' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy validate is check (Assert: 'check' should equal 'check') :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec validate disabled' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate disabled' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy validate is disabled (Assert: 'disabled' should equal 'disabled') :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa aa' Error: argument "aa" is wrong: expected an { 0..3 } :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa aa' (Expected 255, got 255) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa -1' Error: argument "-1" is wrong: expected an { 0..3 } :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa -1' (Expected 255, got 255) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa 4' Error: argument "4" is wrong: expected an { 0..3 } :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 4' (Expected 255, got 255) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: default encodingsa is 0 (Assert: '0' should equal '0') :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa 2' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 2' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy encodingsa is 2 (Assert: '2' should equal '2') :: [ 15:51:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 11s :: Assertions: 95 good, 0 bad :: RESULT: PASS (ip link add macsec) ** ip-link-add-macsec PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec sci 0100560212005452 encrypt on' :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec sci 0100560212005452 encrypt on' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx sci 0100567212005452' :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 1 pn 1 on key 01 81818181818181818181818181816262' :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 1 pn 1 on key 01 81818181818181818181818181816262' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip macsec show ttt' Device "ttt" does not exist. :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 1, got 1) :: [ 15:51:49 ] :: [ BEGIN ] :: Running 'ip macsec show macsec0' 105: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 0100560212005452 on SA 0 0: PN 2, state on, key 00000000000000000000000000000000 1: PN 1, state on, key 01000000000000000000000000000000 RXSC: 0100567212005452, state on 0: PN 1, state on, key 00000000000000000000000000000000 offload: off :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec show macsec0' (Expected 0, got 0) :: [ 15:51:49 ] :: [ BEGIN ] :: must specify a key :: actually running 'ip macsec add macsec0 tx sa 2' cannot create SA without key :: [ 15:51:49 ] :: [ PASS ] :: must specify a key (Expected 1, got 1) :: [ 15:51:49 ] :: [ BEGIN ] :: must specify the pn :: actually running 'ip macsec add macsec0 tx sa 2 key 99 123456789123456789' must specify a packet number != 0 :: [ 15:51:49 ] :: [ PASS ] :: must specify the pn (Expected 1, got 1) :: [ 15:51:49 ] :: [ BEGIN ] :: bad key length :: actually running 'ip macsec add macsec0 tx sa 2 pn 100 key 03 123456789123456789' RTNETLINK answers: Invalid argument :: [ 15:51:49 ] :: [ PASS ] :: bad key length (Expected 2, got 2) :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 2 pn 100 key de0377f82a7cbd3a36374ae52aed82dc 62427099c808f2cefd2341f1ec5aa5b9' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 2 pn 100 key de0377f82a7cbd3a36374ae52aed82dc 62427099c808f2cefd2341f1ec5aa5b9' (Expected 0, got 0) :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip macsec show | grep de0377f82a7cbd3a36374ae52aed82dc' 2: PN 100, state off, key de0377f82a7cbd3a36374ae52aed82dc :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec show | grep de0377f82a7cbd3a36374ae52aed82dc' (Expected 0, got 0) :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip macsec set macsec0 tx sa 2 pn 1024 off' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 off' (Expected 0, got 0) :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip macsec set macsec0 tx sa 2 pn 1024 on' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 on' (Expected 0, got 0) :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci 0100567212005452' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci 0100567212005452' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 16 good, 0 bad :: RESULT: PASS (ip macsec) ** ip-macsec PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check MTU :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: default real_dev MTU is 1500 (Assert: '1500' should equal '1500') :: [ 15:51:50 ] :: [ PASS ] :: default macsec header + tailer is 32 (Assert: '1468' should equal '1468') :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:50 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 8' :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 8' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: set macsec tailer to 8 (Assert: '1476' should equal '1476') :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 16' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 16' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: set macsec tailer to 16 (Assert: '1468' should equal '1468') :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 9000' RTNETLINK answers: Numerical result out of range :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 9000' (Expected 2, got 2) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 100' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 100' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1500' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1500' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 3000' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 3000' (Expected 0, got 0) :: [ 15:51:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0, got 0) :: [ 15:51:52 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 15:51:52 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 15:51:52 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '8968' should equal '8968') :: [ 15:51:55 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 5000' :: [ 15:51:55 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 5000' (Expected 0, got 0) :: [ 15:51:55 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '4968' should equal '4968') :: [ 15:51:56 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:51:56 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0, got 0) :: [ 15:51:56 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '1468' should equal '1468') :: [ 15:51:58 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 100' :: [ 15:51:58 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 100' (Expected 0, got 0) :: [ 15:51:59 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '68' should equal '68') :: [ 15:51:59 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:51:59 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 9s :: Assertions: 26 good, 0 bad :: RESULT: PASS (check MTU) ** check-MTU PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check promiscuous mode :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :: [ 15:51:59 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 15:51:59 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:52:00 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:52:00 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0, got 0) :: [ 15:52:00 ] :: [ BEGIN ] :: Running 'if_dev_promisc dummy0' :: [ 15:52:00 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 0, got 0) :: [ 15:52:00 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' :: [ 15:52:00 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 15:52:00 ] :: [ BEGIN ] :: Running 'if_dev_promisc dummy0' :: [ 15:52:00 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 1, got 1) :: [ 15:52:00 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:52:00 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 6 good, 0 bad :: RESULT: PASS (check promiscuous mode) ** check-promiscuous-mode PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup masec between 2 netns, do ping/netperf test :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC 114: veth1@if115: mtu 1500 master br0 state forwarding priority 32 cost 2 116: veth3@if117: mtu 1500 master br0 state forwarding priority 32 cost 2 lo: flags=8 mtu 65536 loop txqueuelen 1000 (Local Loopback) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 veth0: flags=4163 mtu 1500 inet 192.168.100.11 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 2001:db8:100::11 prefixlen 64 scopeid 0x0 inet6 fe80::38d2:47ff:fe5e:3d50 prefixlen 64 scopeid 0x20 ether 3a:d2:47:5e:3d:50 txqueuelen 1000 (Ethernet) RX packets 3 bytes 262 (262.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 1 bytes 110 (110.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=8 mtu 65536 loop txqueuelen 1000 (Local Loopback) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 veth2: flags=4163 mtu 1500 inet 192.168.100.21 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 fe80::6015:e6ff:fe0a:5fa prefixlen 64 scopeid 0x20 inet6 2001:db8:100::21 prefixlen 64 scopeid 0x0 ether 62:15:e6:0a:05:fa txqueuelen 1000 (Ethernet) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 :: [ 15:52:00 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ping 192.168.100.21 -c 5' PING 192.168.100.21 (192.168.100.21) 56(84) bytes of data. 64 bytes from 192.168.100.21: icmp_seq=1 ttl=64 time=0.068 ms 64 bytes from 192.168.100.21: icmp_seq=2 ttl=64 time=0.056 ms 64 bytes from 192.168.100.21: icmp_seq=3 ttl=64 time=0.035 ms 64 bytes from 192.168.100.21: icmp_seq=4 ttl=64 time=0.042 ms 64 bytes from 192.168.100.21: icmp_seq=5 ttl=64 time=0.044 ms --- 192.168.100.21 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4188ms rtt min/avg/max/mdev = 0.035/0.049/0.068/0.011 ms :: [ 15:52:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping 192.168.100.21 -c 5' (Expected 0, got 0) :: [ 15:52:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ping6 2001:db8:100::21 -c 5' PING 2001:db8:100::21(2001:db8:100::21) 56 data bytes 64 bytes from 2001:db8:100::21: icmp_seq=1 ttl=64 time=0.079 ms 64 bytes from 2001:db8:100::21: icmp_seq=2 ttl=64 time=0.048 ms 64 bytes from 2001:db8:100::21: icmp_seq=3 ttl=64 time=0.045 ms 64 bytes from 2001:db8:100::21: icmp_seq=4 ttl=64 time=0.048 ms 64 bytes from 2001:db8:100::21: icmp_seq=5 ttl=64 time=0.046 ms --- 2001:db8:100::21 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4134ms rtt min/avg/max/mdev = 0.045/0.053/0.079/0.012 ms :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping6 2001:db8:100::21 -c 5' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip link add link veth0 macsec0 type macsec sci 0100567112005452 encrypt on' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link add link veth0 macsec0 type macsec sci 0100567112005452 encrypt on' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip link set macsec0 up' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link set macsec0 up' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec show macsec0' 2: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 0100567112005452 on SA 0 0: PN 1, state on, key 00000000000000000000000000000000 RXSC: 0100567212005452, state on 0: PN 1, state on, key 00000000000000000000000000000000 offload: off :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec show macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip addr add 192.168.9.1/24 dev macsec0' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 192.168.9.1/24 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip addr add 2009::01/64 dev macsec0' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 2009::01/64 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip link add link veth2 macsec0 type macsec sci 0100567212005452 encrypt on' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link add link veth2 macsec0 type macsec sci 0100567212005452 encrypt on' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip link set macsec0 up' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link set macsec0 up' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec show macsec0' 2: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 0100567212005452 on SA 0 0: PN 2, state on, key 00000000000000000000000000000000 RXSC: 0100567112005452, state on 0: PN 1, state on, key 00000000000000000000000000000000 offload: off :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec show macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip addr add 192.168.9.2/24 dev macsec0' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 192.168.9.2/24 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip addr add 2009::02/64 dev macsec0' :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 2009::02/64 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 arping 192.168.9.1 -I veth2 -c 5' ARPING 192.168.9.1 from 192.168.100.21 veth2 Unicast reply from 192.168.9.1 [3A:D2:47:5E:3D:50] 0.527ms Unicast reply from 192.168.9.1 [3A:D2:47:5E:3D:50] 0.533ms Unicast reply from 192.168.9.1 [3A:D2:47:5E:3D:50] 0.539ms Unicast reply from 192.168.9.1 [3A:D2:47:5E:3D:50] 0.538ms Unicast reply from 192.168.9.1 [3A:D2:47:5E:3D:50] 0.543ms Sent 5 probes (1 broadcast(s)) Received 5 response(s) :: [ 15:52:14 ] :: [ PASS ] :: Command 'ip netns exec ns1 arping 192.168.9.1 -I veth2 -c 5' (Expected 0, got 0) :: [ 15:52:14 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ping 192.168.9.1 -c 5' PING 192.168.9.1 (192.168.9.1) 56(84) bytes of data. 64 bytes from 192.168.9.1: icmp_seq=1 ttl=64 time=0.116 ms 64 bytes from 192.168.9.1: icmp_seq=2 ttl=64 time=0.079 ms 64 bytes from 192.168.9.1: icmp_seq=3 ttl=64 time=0.084 ms 64 bytes from 192.168.9.1: icmp_seq=4 ttl=64 time=0.083 ms 64 bytes from 192.168.9.1: icmp_seq=5 ttl=64 time=0.099 ms --- 192.168.9.1 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4143ms rtt min/avg/max/mdev = 0.079/0.092/0.116/0.013 ms :: [ 15:52:18 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping 192.168.9.1 -c 5' (Expected 0, got 0) :: [ 15:52:18 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ping6 2009::01 -c 5' PING 2009::01(2009::1) 56 data bytes 64 bytes from 2009::1: icmp_seq=1 ttl=64 time=0.144 ms 64 bytes from 2009::1: icmp_seq=2 ttl=64 time=0.091 ms 64 bytes from 2009::1: icmp_seq=3 ttl=64 time=0.092 ms 64 bytes from 2009::1: icmp_seq=4 ttl=64 time=0.093 ms 64 bytes from 2009::1: icmp_seq=5 ttl=64 time=0.094 ms --- 2009::01 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4132ms rtt min/avg/max/mdev = 0.091/0.102/0.144/0.020 ms :: [ 15:52:23 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping6 2009::01 -c 5' (Expected 0, got 0) :: [ 15:52:23 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 192.168.9.1 -t TCP_STREAM -l 30' MIGRATED TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 192.168.9.1 () port 0 AF_INET : histogram : interval : dirty data : demo Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 131072 16384 16384 30.00 92.37 :: [ 15:52:53 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 15:52:53 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 2009::01 -t TCP_STREAM -l 30' MIGRATED TCP STREAM TEST from ::0 (::) port 0 AF_INET6 to 2009::01 (2009::1) port 0 AF_INET6 : histogram : interval : dirty data : demo Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 131072 16384 16384 30.00 91.44 :: [ 15:53:23 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 15:53:23 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 192.168.9.1 -t UDP_STREAM -l 30' MIGRATED UDP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 192.168.9.1 () port 0 AF_INET : histogram : interval : dirty data : demo Socket Message Elapsed Messages Size Size Time Okay Errors Throughput bytes bytes secs # # 10^6bits/sec 229376 65507 30.00 5519 0 96.41 229376 30.00 5519 96.41 :: [ 15:53:53 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t UDP_STREAM -l 30' (Expected 0, got 0) :: [ 15:53:53 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 2009::01 -t UDP_STREAM -l 30' MIGRATED UDP STREAM TEST from ::0 (::) port 0 AF_INET6 to 2009::01 (2009::1) port 0 AF_INET6 : histogram : interval : dirty data : demo Socket Message Elapsed Messages Size Size Time Okay Errors Throughput bytes bytes secs # # 10^6bits/sec 229376 65507 30.00 5388 0 94.12 229376 30.00 5387 94.10 :: [ 15:54:23 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t UDP_STREAM -l 30' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 144s :: Assertions: 25 good, 0 bad :: RESULT: PASS (Setup masec between 2 netns, do ping/netperf test) ** Setup-masec-between-2-netns-do-ping-netperf-test PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: fault injection :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'CMD_ARRAY=( 'modprobe -r macsec' 'modprobe macsec' 'ip link delete dummy0' 'ip link add dev dummy0 type dummy' 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' 'ip link add link dummy0 name macsec0 type macsec port 12345' 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' 'ip link set dummy0 up' 'ip link set macsec0 up' 'ip addr add 192.168.9.1/24 dev macsec0' 'ip addr add 2009::01/64 dev macsec0' 'arping 192.168.9.9 -I macsec0 -c 30' 'ip link set dummy0 mtu 9000' 'ip link set dummy0 mtu 1500' 'ip link set macsec0 mtu 8968' 'ip link set macsec0 mtu 1468' 'ip link set dummy0 down' 'ip link set macsec0 down' 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' 'ip link del macsec0' )' :: [ 15:54:24 ] :: [ PASS ] :: Command 'CMD_ARRAY=( 'modprobe -r macsec' 'modprobe macsec' 'ip link delete dummy0' 'ip link add dev dummy0 type dummy' 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' 'ip link add link dummy0 name macsec0 type macsec port 12345' 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' 'ip link set dummy0 up' 'ip link set macsec0 up' 'ip addr add 192.168.9.1/24 dev macsec0' 'ip addr add 2009::01/64 dev macsec0' 'arping 192.168.9.9 -I macsec0 -c 30' 'ip link set dummy0 mtu 9000' 'ip link set dummy0 mtu 1500' 'ip link set macsec0 mtu 8968' 'ip link set macsec0 mtu 1468' 'ip link set dummy0 down' 'ip link set macsec0 down' 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' 'ip link del macsec0' )' (Expected 0, got 0) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'CMD_CNT=23' :: [ 15:54:24 ] :: [ PASS ] :: Command 'CMD_CNT=23' (Expected 0, got 0) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' Cannot find device "macsec0" :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' Cannot find device "macsec0" :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' RTNETLINK answers: File exists :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 2) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' RTNETLINK answers: File exists :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link set dummy0 down' :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link set dummy0 down' (Expected 0-100, got 0) :: [ 15:54:24 ] :: [ BEGIN ] :: Running 'ip link delete dummy0' :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip link set macsec0 down' Cannot find device "macsec0" :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' Cannot find device "macsec0" :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' Cannot find device "macsec0" :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 15:54:25 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' Device "macsec0" does not exist. :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 15:54:25 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' Cannot find device "macsec0" :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' arping: Device macsec0 not available. :: [ 15:54:26 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' arping: Device macsec0 not available. :: [ 15:54:26 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' Cannot find device "macsec0" :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' Cannot find device "macsec0" :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' Interface "macsec0" is down :: [ 15:54:26 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 15:54:26 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link delete dummy0' :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' Cannot find device "dummy0" :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link delete dummy0' Cannot find device "dummy0" :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' Cannot find device "dummy0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link set macsec0 down' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' arping: Device macsec0 not available. :: [ 15:54:27 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link set macsec0 down' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 15:54:27 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip link del macsec0' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' Cannot find device "macsec0" :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' Cannot find device "macsec0" :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' RTNETLINK answers: File exists :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 2) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' RTNETLINK answers: File exists :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 15:54:28 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' Cannot find device "macsec0" :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' RTNETLINK answers: File exists :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' :: [ 15:54:29 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 0) :: [ 15:54:29 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' ARPING 192.168.9.9 from 10.16.233.91 macsec0 Sent 30 probes (30 broadcast(s)) Received 0 response(s) :: [ 15:54:59 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' RTNETLINK answers: File exists :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' RTNETLINK answers: File exists :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 2) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 15:54:59 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' Cannot find device "macsec0" :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' Cannot find device "macsec0" :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip link set macsec0 down' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 15:55:00 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 0) :: [ 15:55:00 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' RTNETLINK answers: File exists :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :: [ 15:55:00 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' RTNETLINK answers: File exists :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :: [ 15:55:00 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' RTNETLINK answers: File exists :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 36s :: Assertions: 102 good, 0 bad :: RESULT: PASS (fault injection) ** fault-injection PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:55:00 ] :: [ BEGIN ] :: Running 'reset_network_env' Starting reset_network_env ... RTNETLINK answers: Numerical result out of range rsync: [sender] change_dir "/mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/system-connections.no_nm" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1336) [sender=3.2.7] Redirecting to /bin/systemctl restart network.service Failed to restart network.service: Unit network.service not found. :: [ 15:55:01 ] :: [ PASS ] :: Command 'reset_network_env' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) ** Cleanup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: TEST PROTOCOL :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Test run ID : 18 Package : unknown beakerlib RPM : beakerlib-1.29.2-1.fc37.noarch Test name : unknown Test started : 2022-12-21 15:51:24 EST Test finished : 2022-12-21 15:55:04 EST (still running) Test duration : 220 seconds Distro : Fedora release 37 (Thirty Seven) Hostname : ibm-p9z-07-lp7.khw3.lab.eng.bos.redhat.com Architecture : ppc64le CPUs : 0 x RAM size : 32623 MB HDD size : 109.86 GB :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Test description :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MACsec sanity check 1. Module load unload Load macsec driver, configure some SC/SA then unload the driver, repeat the loop 50 times. 2. Configuration Setup macsec between 2 hosts and do basic check, should cover ip-macsec options as many as possible 3. Run basic network traffic 4. MTU check :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:51:24 ] :: [ LOG ] :: Output of 'modinfo macsec': :: [ 15:51:24 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:24 ] :: [ LOG ] :: filename: /lib/modules/6.0.15-300.fc37.ppc64le/kernel/drivers/net/macsec.ko.xz :: [ 15:51:24 ] :: [ LOG ] :: license: GPL v2 :: [ 15:51:24 ] :: [ LOG ] :: description: MACsec IEEE 802.1AE :: [ 15:51:24 ] :: [ LOG ] :: alias: net-pf-16-proto-16-family-macsec :: [ 15:51:24 ] :: [ LOG ] :: alias: rtnl-link-macsec :: [ 15:51:24 ] :: [ LOG ] :: depends: :: [ 15:51:24 ] :: [ LOG ] :: intree: Y :: [ 15:51:24 ] :: [ LOG ] :: name: macsec :: [ 15:51:24 ] :: [ LOG ] :: vermagic: 6.0.15-300.fc37.ppc64le SMP mod_unload mprofile-kernel relocatable :: [ 15:51:24 ] :: [ LOG ] :: sig_id: PKCS#7 :: [ 15:51:24 ] :: [ LOG ] :: signer: Fedora kernel signing key :: [ 15:51:24 ] :: [ LOG ] :: sig_key: 2D:87:39:14:2B:7B:13:EA:EA:76:52:E1:1B:44:E4:50:62:5B:6B:39 :: [ 15:51:24 ] :: [ LOG ] :: sig_hashalgo: sha256 :: [ 15:51:24 ] :: [ LOG ] :: signature: 0B:0C:AE:BE:C4:55:EA:46:9B:1E:63:61:15:1C:16:6D:E6:05:FC:A1: :: [ 15:51:24 ] :: [ LOG ] :: A1:3E:96:52:EE:02:FE:D2:05:31:39:CA:23:11:BF:97:0A:27:BB:26: :: [ 15:51:24 ] :: [ LOG ] :: 17:C7:5A:DB:09:69:00:1F:CA:A6:07:08:21:63:A6:44:62:7D:D6:22: :: [ 15:51:24 ] :: [ LOG ] :: AE:86:0C:AD:47:BA:EE:B1:3C:87:3A:9C:9C:2E:AF:5A:E5:19:2C:1E: :: [ 15:51:24 ] :: [ LOG ] :: B5:5B:B9:5D:89:97:D1:5F:AC:A6:8E:56:B6:54:A0:E8:FD:8D:EE:8F: :: [ 15:51:24 ] :: [ LOG ] :: FE:C0:C8:7E:DB:F2:4C:67:05:AC:94:19:35:71:B8:E0:9D:20:6A:64: :: [ 15:51:24 ] :: [ LOG ] :: EA:B7:18:95:25:F6:2E:EE:54:FC:AB:3A:2A:D6:B4:CC:07:A8:81:56: :: [ 15:51:24 ] :: [ LOG ] :: E7:CF:CA:B2:AB:AE:7D:1E:88:38:58:D5:A7:F4:A4:67:B7:49:6D:50: :: [ 15:51:24 ] :: [ LOG ] :: C5:5B:D8:52:C5:72:97:57:CA:0A:3F:39:66:64:0E:04:DE:08:C9:B9: :: [ 15:51:24 ] :: [ LOG ] :: 45:22:55:69:96:4F:87:E2:F9:31:B3:7E:80:6D:A9:6C:D8:39:41:DC: :: [ 15:51:24 ] :: [ LOG ] :: 4F:96:09:0B:77:78:CA:0F:92:75:B3:BA:47:9A:E8:0E:5C:7D:B4:83: :: [ 15:51:24 ] :: [ LOG ] :: F8:42:B3:B9:69:42:D5:1E:12:F3:75:ED:18:4F:3B:7E:E9:A1:9C:B7: :: [ 15:51:24 ] :: [ LOG ] :: F6:68:F9:BE:4A:D2:E9:6D:EF:98:58:78:AF:AC:CC:D1:D2:1B:F4:CE: :: [ 15:51:24 ] :: [ LOG ] :: 0F:25:1D:DE:31:CF:5A:2E:79:F5:EA:44:22:47:E5:A8:79:B2:DA:77: :: [ 15:51:24 ] :: [ LOG ] :: 7C:84:34:11:3E:E5:03:FC:D4:C8:99:A1:BA:C1:04:69:A8:15:A9:3A: :: [ 15:51:24 ] :: [ LOG ] :: 5D:D7:24:22:C2:11:F3:A3:95:BF:B5:D3:A7:E4:C9:4C:D0:51:53:8D: :: [ 15:51:24 ] :: [ LOG ] :: CC:38:39:40:4E:81:FC:DE:B4:D4:FD:B4:90:7F:E8:49:82:42:99:B6: :: [ 15:51:24 ] :: [ LOG ] :: A8:85:AF:A5:D0:3B:23:CC:44:64:7A:F3:DD:42:E7:8D:7B:80:1B:85: :: [ 15:51:24 ] :: [ LOG ] :: B0:41:05:84:8C:13:AD:AC:2F:E2:BB:D6:08:42:59:D1:BD:AA:1A:4A: :: [ 15:51:24 ] :: [ LOG ] :: AF:92:81:0E:F0:E9:54:54:58:B3:2D:AB:58:11:72:49:3B:55:9E:91: :: [ 15:51:24 ] :: [ LOG ] :: 23:1B:ED:A2:C4:F6:45:56:BF:22:66:19:0D:B3:CD:D1:55:D0:7B:42: :: [ 15:51:24 ] :: [ LOG ] :: 3C:71:17:61:50:30:5E:02:91:E9:88:0F:EE:60:FD:0D:0F:6F:40:FC: :: [ 15:51:24 ] :: [ LOG ] :: A1:33:8F:CA:D4:8B:67:53:78:D2:6B:CD:4C:AD:B2:1D:D2:34:18:5B: :: [ 15:51:24 ] :: [ LOG ] :: 84:12:09:6F:3B:95:CB:10:24:74:30:CE:08:BD:CC:9E:BE:AC:4C:4A: :: [ 15:51:24 ] :: [ LOG ] :: 51:8C:4F:68:B1:27:0A:FC:A3:AB:30:01:46:65:99:57:5C:9F:84:0E: :: [ 15:51:24 ] :: [ LOG ] :: DA:2D:BC:0B:A7:E5:09:11:B3:80:4C:B2 :: [ 15:51:24 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:24 ] :: [ PASS ] :: Command 'modinfo macsec' (Expected 0, got 0) :: [ 15:51:24 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0, got 0) :: [ 15:51:25 ] :: [ LOG ] :: Output of 'ip macsec help': :: [ 15:51:25 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:25 ] :: [ LOG ] :: Usage: ip macsec add DEV tx sa { 0..3 } [ OPTS ] key ID KEY :: [ 15:51:25 ] :: [ LOG ] :: ip macsec set DEV tx sa { 0..3 } [ OPTS ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec del DEV tx sa { 0..3 } :: [ 15:51:25 ] :: [ LOG ] :: ip macsec add DEV rx SCI [ on | off ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec set DEV rx SCI [ on | off ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec del DEV rx SCI :: [ 15:51:25 ] :: [ LOG ] :: ip macsec add DEV rx SCI sa { 0..3 } [ OPTS ] key ID KEY :: [ 15:51:25 ] :: [ LOG ] :: ip macsec set DEV rx SCI sa { 0..3 } [ OPTS ] :: [ 15:51:25 ] :: [ LOG ] :: ip macsec del DEV rx SCI sa { 0..3 } :: [ 15:51:25 ] :: [ LOG ] :: ip macsec show :: [ 15:51:25 ] :: [ LOG ] :: ip macsec show DEV :: [ 15:51:25 ] :: [ LOG ] :: ip macsec offload DEV [ off | phy | mac ] :: [ 15:51:25 ] :: [ LOG ] :: where OPTS := [ pn ] [ on | off ] :: [ 15:51:25 ] :: [ LOG ] :: ID := 128-bit hex string :: [ 15:51:25 ] :: [ LOG ] :: KEY := 128-bit or 256-bit hex string :: [ 15:51:25 ] :: [ LOG ] :: SCI := { sci | port { 1..2^16-1 } address } :: [ 15:51:25 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:25 ] :: [ PASS ] :: Command 'ip macsec help' (Expected 255, got 255) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 3 good, 0 bad :: RESULT: PASS (Setup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: load/unload macsec module :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 12s :: Assertions: 0 good, 0 bad :: RESULT: PASS (load/unload macsec module) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip link add macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:43 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec1 type macsec' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del macsec1' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec9999 type macsec' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del macsec9999' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name ttt type macsec' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link set ttt up' (Expected 0, got 0) :: [ 15:51:44 ] :: [ LOG ] :: Output of 'ip link show ttt': :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:44 ] :: [ LOG ] :: 82: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 15:51:44 ] :: [ LOG ] :: link/ether 02:5f:68:59:fa:56 brd ff:ff:ff:ff:ff:ff :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link show ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ LOG ] :: Output of 'ip -d link show ttt': :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:44 ] :: [ LOG ] :: 82: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 15:51:44 ] :: [ LOG ] :: link/ether 02:5f:68:59:fa:56 brd ff:ff:ff:ff:ff:ff promiscuity 0 minmtu 0 maxmtu 65535 :: [ 15:51:44 ] :: [ LOG ] :: macsec sci 025f6859fa560001 protect on cipher GCM-AES-128 icvlen 16 encodingsa 0 validate strict encrypt off send_sci on end_station off scb off replay off addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 gro_max_size 65536 :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip -d link show ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ LOG ] :: Output of 'ip macsec show ttt': :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 15:51:44 ] :: [ LOG ] :: 82: ttt: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off :: [ 15:51:44 ] :: [ LOG ] :: cipher suite: GCM-AES-128, using ICV length 16 :: [ 15:51:44 ] :: [ LOG ] :: TXSC: 025f6859fa560001 on SA 0 :: [ 15:51:44 ] :: [ LOG ] :: offload: off :: [ 15:51:44 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del ttt' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port -1' (Expected 255, got 255) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 0' (Expected 255, got 255) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 65536' (Expected 255, got 255) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:44 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 1' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 0100560212005452' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 0' (Expected 255, got 255) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 16' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: verify icvlen (Assert: '16' should equal '16') :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt aa' (Expected 1, got 1) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: default encrypt is off (Assert: 'off' should equal 'off') :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt on' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: veirfy encrypt is on (Assert: 'on' should equal 'on') :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci aa' (Expected 1, got 1) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: default send_sci is on (Assert: 'on' should equal 'on') :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci off' (Expected 0, got 0) :: [ 15:51:45 ] :: [ PASS ] :: veirfy send_sci is off (Assert: 'off' should equal 'off') :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station aa' (Expected 1, got 1) :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:46 ] :: [ PASS ] :: default end_station is off (Assert: 'off' should equal 'off') :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station on' (Expected 0, got 0) :: [ 15:51:46 ] :: [ PASS ] :: veirfy end_station is on (Assert: 'on' should equal 'on') :: [ 15:51:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb aa' (Expected 1, got 1) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: default scb is off (Assert: 'off' should equal 'off') :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb on' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: veirfy scb is on (Assert: 'on' should equal 'on') :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect aa' (Expected 1, got 1) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: default protect is on (Assert: 'on' should equal 'on') :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect off' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: veirfy protect is off (Assert: 'off' should equal 'off') :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay aa' (Expected 1, got 1) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: default replay is off (Assert: 'off' should equal 'off') :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:47 ] :: [ PASS ] :: should specify window size (Expected 1, got 1) :: [ 15:51:47 ] :: [ PASS ] :: should turn replay on (Expected 1, got 1) :: [ 15:51:47 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 15:51:47 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 15:51:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 10240' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy replay is on (Assert: 'on' should equal 'on') :: [ 15:51:48 ] :: [ PASS ] :: veirfy window is 10240 (Assert: '10240' should equal '10240') :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate aa' (Expected 1, got 1) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: default validate is strict (Assert: 'strict' should equal 'strict') :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate check' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy validate is check (Assert: 'check' should equal 'check') :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate disabled' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy validate is disabled (Assert: 'disabled' should equal 'disabled') :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa aa' (Expected 255, got 255) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa -1' (Expected 255, got 255) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 4' (Expected 255, got 255) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: default encodingsa is 0 (Assert: '0' should equal '0') :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 2' (Expected 0, got 0) :: [ 15:51:48 ] :: [ PASS ] :: veirfy encodingsa is 2 (Assert: '2' should equal '2') :: [ 15:51:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 11s :: Assertions: 95 good, 0 bad :: RESULT: PASS (ip link add macsec) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec sci 0100560212005452 encrypt on' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 1 pn 1 on key 01 81818181818181818181818181816262' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 1, got 1) :: [ 15:51:49 ] :: [ PASS ] :: Command 'ip macsec show macsec0' (Expected 0, got 0) :: [ 15:51:49 ] :: [ PASS ] :: must specify a key (Expected 1, got 1) :: [ 15:51:49 ] :: [ PASS ] :: must specify the pn (Expected 1, got 1) :: [ 15:51:49 ] :: [ PASS ] :: bad key length (Expected 2, got 2) :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 2 pn 100 key de0377f82a7cbd3a36374ae52aed82dc 62427099c808f2cefd2341f1ec5aa5b9' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec show | grep de0377f82a7cbd3a36374ae52aed82dc' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 off' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 on' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci 0100567212005452' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 16 good, 0 bad :: RESULT: PASS (ip macsec) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check MTU :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: default real_dev MTU is 1500 (Assert: '1500' should equal '1500') :: [ 15:51:50 ] :: [ PASS ] :: default macsec header + tailer is 32 (Assert: '1468' should equal '1468') :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:50 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 8' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: set macsec tailer to 8 (Assert: '1476' should equal '1476') :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 16' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: set macsec tailer to 16 (Assert: '1468' should equal '1468') :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 9000' (Expected 2, got 2) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 100' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1500' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 3000' (Expected 0, got 0) :: [ 15:51:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0, got 0) :: [ 15:51:52 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 15:51:52 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '8968' should equal '8968') :: [ 15:51:55 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 5000' (Expected 0, got 0) :: [ 15:51:55 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '4968' should equal '4968') :: [ 15:51:56 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0, got 0) :: [ 15:51:56 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '1468' should equal '1468') :: [ 15:51:58 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 100' (Expected 0, got 0) :: [ 15:51:59 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '68' should equal '68') :: [ 15:51:59 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 9s :: Assertions: 26 good, 0 bad :: RESULT: PASS (check MTU) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check promiscuous mode :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:51:59 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 15:52:00 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0, got 0) :: [ 15:52:00 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 0, got 0) :: [ 15:52:00 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 15:52:00 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 1, got 1) :: [ 15:52:00 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 6 good, 0 bad :: RESULT: PASS (check promiscuous mode) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup masec between 2 netns, do ping/netperf test :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:52:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping 192.168.100.21 -c 5' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping6 2001:db8:100::21 -c 5' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link add link veth0 macsec0 type macsec sci 0100567112005452 encrypt on' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link set macsec0 up' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec show macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 192.168.9.1/24 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 2009::01/64 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link add link veth2 macsec0 type macsec sci 0100567212005452 encrypt on' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link set macsec0 up' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec show macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 192.168.9.2/24 dev macsec0' (Expected 0, got 0) :: [ 15:52:09 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 2009::02/64 dev macsec0' (Expected 0, got 0) :: [ 15:52:14 ] :: [ PASS ] :: Command 'ip netns exec ns1 arping 192.168.9.1 -I veth2 -c 5' (Expected 0, got 0) :: [ 15:52:18 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping 192.168.9.1 -c 5' (Expected 0, got 0) :: [ 15:52:23 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping6 2009::01 -c 5' (Expected 0, got 0) :: [ 15:52:53 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 15:53:23 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 15:53:53 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t UDP_STREAM -l 30' (Expected 0, got 0) :: [ 15:54:23 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t UDP_STREAM -l 30' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 144s :: Assertions: 25 good, 0 bad :: RESULT: PASS (Setup masec between 2 netns, do ping/netperf test) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: fault injection :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:54:24 ] :: [ PASS ] :: Command 'CMD_ARRAY=( 'modprobe -r macsec' 'modprobe macsec' 'ip link delete dummy0' 'ip link add dev dummy0 type dummy' 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' 'ip link add link dummy0 name macsec0 type macsec port 12345' 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' 'ip link set dummy0 up' 'ip link set macsec0 up' 'ip addr add 192.168.9.1/24 dev macsec0' 'ip addr add 2009::01/64 dev macsec0' 'arping 192.168.9.9 -I macsec0 -c 30' 'ip link set dummy0 mtu 9000' 'ip link set dummy0 mtu 1500' 'ip link set macsec0 mtu 8968' 'ip link set macsec0 mtu 1468' 'ip link set dummy0 down' 'ip link set macsec0 down' 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' 'ip link del macsec0' )' (Expected 0, got 0) :: [ 15:54:24 ] :: [ PASS ] :: Command 'CMD_CNT=23' (Expected 0, got 0) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 2) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 15:54:24 ] :: [ PASS ] :: Command 'ip link set dummy0 down' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:25 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:26 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 1) :: [ 15:54:26 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 1) :: [ 15:54:27 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 2) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 0) :: [ 15:54:28 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 0) :: [ 15:54:29 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 2) :: [ 15:54:59 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 0) :: [ 15:54:59 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 0) :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :: [ 15:55:00 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 36s :: Assertions: 102 good, 0 bad :: RESULT: PASS (fault injection) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:55:01 ] :: [ PASS ] :: Command 'reset_network_env' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: unknown :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 15:55:04 ] :: [ LOG ] :: Phases fingerprint: qYP1zJ4N :: [ 15:55:04 ] :: [ LOG ] :: Asserts fingerprint: xlgG/dyb Uploading journal.xml .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 220s :: Phases: 9 good, 0 bad :: OVERALL RESULT: PASS (unknown)