use_pty:FALSE /usr/share/restraint/plugins/run_task_plugins bash ./runtest.sh :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 08:58:27 ] :: [ BEGIN ] :: Running 'systemctl stop firewalld' :: [ 08:58:27 ] :: [ PASS ] :: Command 'systemctl stop firewalld' (Expected 0, got 0) :: [ 08:58:28 ] :: [ BEGIN ] :: Running 'sleep 60' :: [ 08:59:28 ] :: [ PASS ] :: Command 'sleep 60' (Expected 0, got 0) :: [ 08:59:28 ] :: [ BEGIN ] :: Running 'systemctl status firewalld' ○ firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled; preset: enabled) Active: inactive (dead) Docs: man:firewalld(1) :: [ 08:59:28 ] :: [ PASS ] :: Command 'systemctl status firewalld' (Expected 1-255, got 3) :: [ 08:59:28 ] :: [ BEGIN ] :: Running 'nft delete table inet filter' Error: Could not process rule: No such file or directory delete table inet filter ^^^^^^ :: [ 08:59:28 ] :: [ PASS ] :: Command 'nft delete table inet filter' (Expected 0-255, got 1) :: [ 08:59:28 ] :: [ BEGIN ] :: Running 'sleep 10' :: [ 08:59:38 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 08:59:38 ] :: [ BEGIN ] :: Running 'sys_ka_idle=7200' :: [ 08:59:38 ] :: [ PASS ] :: Command 'sys_ka_idle=7200' (Expected 0, got 0) :: [ 08:59:38 ] :: [ BEGIN ] :: Running 'sys_ka_interval=75' :: [ 08:59:38 ] :: [ PASS ] :: Command 'sys_ka_interval=75' (Expected 0, got 0) :: [ 08:59:38 ] :: [ BEGIN ] :: Running 'sys_ka_idle=9' :: [ 08:59:38 ] :: [ PASS ] :: Command 'sys_ka_idle=9' (Expected 0, got 0) :: [ 08:59:38 ] :: [ BEGIN ] :: iproute installed :: actually running '/usr/bin/dnf -y install iproute' Last metadata expiration check: 0:37:47 ago on Tue 17 Jan 2023 08:21:51 AM EST. Package iproute-6.0.0-2.el9.x86_64 is already installed. Dependencies resolved. Nothing to do. Complete! :: [ 08:59:39 ] :: [ PASS ] :: iproute installed (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'ip netns add netns_ka' :: [ 08:59:39 ] :: [ PASS ] :: Command 'ip netns add netns_ka' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'ip netns exec netns_ka ip link set lo up' :: [ 08:59:39 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ip link set lo up' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'netns_sys_ka_idle=7200' :: [ 08:59:39 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=7200' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'netns_sys_ka_interval=75' :: [ 08:59:39 ] :: [ PASS ] :: Command 'netns_sys_ka_interval=75' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'netns_sys_ka_idle=9' :: [ 08:59:39 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=9' (Expected 0, got 0) :: [ 08:59:39 ] :: [ LOG ] :: socket settings of keepalive will overide the system's :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'idle=6' :: [ 08:59:39 ] :: [ PASS ] :: Command 'idle=6' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'interval=1' :: [ 08:59:39 ] :: [ PASS ] :: Command 'interval=1' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'maxpkt=10' :: [ 08:59:39 ] :: [ PASS ] :: Command 'maxpkt=10' (Expected 0, got 0) :: [ 08:59:39 ] :: [ BEGIN ] :: Running 'port=7811' :: [ 08:59:40 ] :: [ PASS ] :: Command 'port=7811' (Expected 0, got 0) :: [ 08:59:40 ] :: [ BEGIN ] :: Running 'gcc -g -Wall -o keepalive keepalive.c' keepalive.c: In function ‘main’: keepalive.c:119:9: warning: implicit declaration of function ‘wait’ [-Wimplicit-function-declaration] 119 | wait(&status); | ^~~~ :: [ 08:59:40 ] :: [ PASS ] :: Command 'gcc -g -Wall -o keepalive keepalive.c' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 73s :: Assertions: 19 good, 0 bad :: RESULT: PASS (Setup) ** Setup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: host :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 08:59:40 ] :: [ BEGIN ] :: Running 'tcpdump -nn -i lo port 7811 -w tcpdump.host.pcap &' dropped privs to tcpdump tcpdump: listening on lo, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 08:59:40 ] :: [ PASS ] :: Command 'tcpdump -nn -i lo port 7811 -w tcpdump.host.pcap &' (Expected 0, got 0) :: [ 08:59:45 ] :: [ BEGIN ] :: Running './keepalive 127.0.0.1 7811 6 1 10 &' /usr/sbin/nft :: [ 08:59:45 ] :: [ PASS ] :: Command './keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) table inet filter { chain input { type filter hook input priority filter; policy accept; iifname "lo" ip protocol tcp tcp dport 7811 tcp flags ack / fin,syn,rst,psh,ack,urg drop } } :: [ 08:59:45 ] :: [ BEGIN ] :: Running 'sleep 31 ' :: [ 09:00:16 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 09:00:16 ] :: [ BEGIN ] :: Running 'childpid=596019' :: [ 09:00:17 ] :: [ PASS ] :: Command 'childpid=596019' (Expected 0, got 0) :: [ 09:00:17 ] :: [ BEGIN ] :: Running 'kill -s SIGINT 596019' connected accepted, and block ACK from client Child process terminated normally! nft delete table inet filter:: [ 09:00:17 ] :: [ PASS ] :: Command 'kill -s SIGINT 596019' (Expected 0, got 0) :: [ 09:00:17 ] :: [ BEGIN ] :: Running 'pkill tcpdump' 24 packets captured 48 packets received by filter 0 packets dropped by kernel :: [ 09:00:17 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 09:00:22 ] :: [ BEGIN ] :: Running 'tcpdump -r tcpdump.host.pcap' reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump 08:59:45.861553 IP localhost.51344 > localhost.7811: Flags [S], seq 3645734511, win 65495, options [mss 65495,sackOK,TS val 3799928463 ecr 0,nop,wscale 7], length 0 08:59:45.861565 IP localhost.7811 > localhost.51344: Flags [S.], seq 2997362954, ack 3645734512, win 65483, options [mss 65495,sackOK,TS val 3799928463 ecr 3799928463,nop,wscale 7], length 0 08:59:45.861576 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799928463 ecr 3799928463], length 0 08:59:52.357695 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799934960 ecr 3799928463], length 0 08:59:52.357718 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799934960 ecr 3799928463], length 0 08:59:53.381524 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799935983 ecr 3799928463], length 0 08:59:53.381532 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799935983 ecr 3799928463], length 0 08:59:54.405673 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799937007 ecr 3799928463], length 0 08:59:54.405693 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799937008 ecr 3799928463], length 0 08:59:55.429611 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799938031 ecr 3799928463], length 0 08:59:55.429622 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799938031 ecr 3799928463], length 0 08:59:56.453636 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799939055 ecr 3799928463], length 0 08:59:56.453656 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799939055 ecr 3799928463], length 0 08:59:57.477603 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799940079 ecr 3799928463], length 0 08:59:57.477645 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799940079 ecr 3799928463], length 0 08:59:58.501591 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799941103 ecr 3799928463], length 0 08:59:58.501600 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799941103 ecr 3799928463], length 0 08:59:59.525667 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799942127 ecr 3799928463], length 0 08:59:59.525688 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799942128 ecr 3799928463], length 0 09:00:00.549633 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799943151 ecr 3799928463], length 0 09:00:00.549643 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799943151 ecr 3799928463], length 0 09:00:01.573630 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799944175 ecr 3799928463], length 0 09:00:01.573640 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799944175 ecr 3799928463], length 0 09:00:02.597649 IP localhost.7811 > localhost.51344: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 3799945199 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.host.pcap': :: [ 09:00:22 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 09:00:22 ] :: [ LOG ] :: reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 09:00:22 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 09:00:22 ] :: [ LOG ] :: 08:59:45.861553 IP localhost.51344 > localhost.7811: Flags [S], seq 3645734511, win 65495, options [mss 65495,sackOK,TS val 3799928463 ecr 0,nop,wscale 7], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:45.861565 IP localhost.7811 > localhost.51344: Flags [S.], seq 2997362954, ack 3645734512, win 65483, options [mss 65495,sackOK,TS val 3799928463 ecr 3799928463,nop,wscale 7], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:45.861576 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799928463 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:52.357695 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799934960 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:52.357718 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799934960 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:53.381524 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799935983 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:53.381532 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799935983 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:54.405673 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799937007 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:54.405693 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799937008 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:55.429611 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799938031 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:55.429622 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799938031 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:56.453636 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799939055 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:56.453656 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799939055 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:57.477603 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799940079 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:57.477645 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799940079 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:58.501591 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799941103 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:58.501600 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799941103 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:59.525667 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799942127 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:59.525688 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799942128 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:00.549633 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799943151 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:00.549643 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799943151 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:01.573630 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799944175 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:01.573640 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799944175 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:02.597649 IP localhost.7811 > localhost.51344: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 3799945199 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 09:00:22 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.host.pcap' (Expected 0, got 0) reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump :: [ 09:00:22 ] :: [ BEGIN ] :: Running 'kalive_pkts=10' :: [ 09:00:22 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 09:00:22 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 42s :: Assertions: 9 good, 0 bad :: RESULT: PASS (host) ** host PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: netns :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 09:00:23 ] :: [ BEGIN ] :: Running 'ip netns exec netns_ka tcpdump -nn -i lo port 7811 -w tcpdump.netns.pcap &' dropped privs to tcpdump tcpdump: listening on lo, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 09:00:23 ] :: [ PASS ] :: Command 'ip netns exec netns_ka tcpdump -nn -i lo port 7811 -w tcpdump.netns.pcap &' (Expected 0, got 0) :: [ 09:00:28 ] :: [ BEGIN ] :: Running 'ip netns exec netns_ka ./keepalive 127.0.0.1 7811 6 1 10 &' :: [ 09:00:28 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ./keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) /usr/sbin/nft table inet filter { chain input { type filter hook input priority filter; policy accept; iifname "lo" ip protocol tcp tcp dport 7811 tcp flags ack / fin,syn,rst,psh,ack,urg drop } } :: [ 09:00:28 ] :: [ BEGIN ] :: Running 'sleep 31 ' :: [ 09:00:59 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 09:00:59 ] :: [ BEGIN ] :: Running 'childpid=596654' :: [ 09:00:59 ] :: [ PASS ] :: Command 'childpid=596654' (Expected 0, got 0) :: [ 09:00:59 ] :: [ BEGIN ] :: Running 'kill -s SIGINT 596654' connected accepted, and block ACK from client Child process terminated normally! nft delete table inet filter:: [ 09:00:59 ] :: [ PASS ] :: Command 'kill -s SIGINT 596654' (Expected 0, got 0) :: [ 09:00:59 ] :: [ BEGIN ] :: Running 'pkill tcpdump' 24 packets captured 48 packets received by filter 0 packets dropped by kernel :: [ 09:00:59 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 09:01:04 ] :: [ BEGIN ] :: Running 'tcpdump -r tcpdump.netns.pcap' reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump 09:00:28.292257 IP localhost.50574 > localhost.7811: Flags [S], seq 3983048337, win 65495, options [mss 65495,sackOK,TS val 3799970894 ecr 0,nop,wscale 7], length 0 09:00:28.292273 IP localhost.7811 > localhost.50574: Flags [S.], seq 3836565145, ack 3983048338, win 65483, options [mss 65495,sackOK,TS val 3799970894 ecr 3799970894,nop,wscale 7], length 0 09:00:28.292286 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799970894 ecr 3799970894], length 0 09:00:34.341590 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799976943 ecr 3799970894], length 0 09:00:34.341614 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799976943 ecr 3799970894], length 0 09:00:35.365638 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799977967 ecr 3799970894], length 0 09:00:35.365659 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799977967 ecr 3799970894], length 0 09:00:36.389657 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799978991 ecr 3799970894], length 0 09:00:36.389674 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799978992 ecr 3799970894], length 0 09:00:37.413529 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799980015 ecr 3799970894], length 0 09:00:37.413540 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799980015 ecr 3799970894], length 0 09:00:38.437726 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799981040 ecr 3799970894], length 0 09:00:38.437747 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799981040 ecr 3799970894], length 0 09:00:39.461604 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799982063 ecr 3799970894], length 0 09:00:39.461622 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799982063 ecr 3799970894], length 0 09:00:40.485530 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799983087 ecr 3799970894], length 0 09:00:40.485540 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799983087 ecr 3799970894], length 0 09:00:41.509524 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799984111 ecr 3799970894], length 0 09:00:41.509535 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799984111 ecr 3799970894], length 0 09:00:42.533578 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799985135 ecr 3799970894], length 0 09:00:42.533595 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799985135 ecr 3799970894], length 0 09:00:43.557663 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799986159 ecr 3799970894], length 0 09:00:43.557685 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799986160 ecr 3799970894], length 0 09:00:44.581608 IP localhost.7811 > localhost.50574: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 3799987183 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.netns.pcap': :: [ 09:01:04 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 09:01:04 ] :: [ LOG ] :: reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 09:01:04 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 09:01:04 ] :: [ LOG ] :: 09:00:28.292257 IP localhost.50574 > localhost.7811: Flags [S], seq 3983048337, win 65495, options [mss 65495,sackOK,TS val 3799970894 ecr 0,nop,wscale 7], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:28.292273 IP localhost.7811 > localhost.50574: Flags [S.], seq 3836565145, ack 3983048338, win 65483, options [mss 65495,sackOK,TS val 3799970894 ecr 3799970894,nop,wscale 7], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:28.292286 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799970894 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:34.341590 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799976943 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:34.341614 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799976943 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:35.365638 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799977967 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:35.365659 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799977967 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:36.389657 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799978991 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:36.389674 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799978992 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:37.413529 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799980015 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:37.413540 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799980015 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:38.437726 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799981040 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:38.437747 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799981040 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:39.461604 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799982063 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:39.461622 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799982063 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:40.485530 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799983087 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:40.485540 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799983087 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:41.509524 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799984111 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:41.509535 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799984111 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:42.533578 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799985135 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:42.533595 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799985135 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:43.557663 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799986159 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:43.557685 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799986160 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:44.581608 IP localhost.7811 > localhost.50574: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 3799987183 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 09:01:04 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.netns.pcap' (Expected 0, got 0) reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump :: [ 09:01:04 ] :: [ BEGIN ] :: Running 'kalive_pkts=10' :: [ 09:01:04 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 09:01:04 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 41s :: Assertions: 9 good, 0 bad :: RESULT: PASS (netns) ** netns PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 09:01:05 ] :: [ BEGIN ] :: Running 'ip netns del netns_ka' :: [ 09:01:05 ] :: [ PASS ] :: Command 'ip netns del netns_ka' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) ** Cleanup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: TEST PROTOCOL :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Test run ID : 18 Package : unknown beakerlib RPM : beakerlib-1.29.2-2.el9.noarch bl-redhat RPM : beakerlib-redhat-1-33.el9.noarch Test name : unknown Test started : 2023-01-17 08:58:27 EST Test finished : 2023-01-17 09:01:06 EST (still running) Test duration : 159 seconds Distro : CentOS Stream release 9 Hostname : kvm-04-guest01.lab.eng.rdu2.redhat.com Architecture : x86_64 CPUs : 1 x Intel Xeon Processor (Skylake, IBRS) RAM size : 3348 MB HDD size : 50.19 GB :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Test description :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Keep-Alive Process: There are three configurable properties that determine how Keep-Alives work. On Linux they are1: tcp_keepalive_time default 7200 seconds tcp_keepalive_probes default 9 tcp_keepalive_intvl default 75 seconds TCP keepalive works like this: Client opens TCP connection If the connection is silent for tcp_keepalive_time seconds, send a single empty ACK packet.1 Did the server respond with a corresponding ACK of its own? No Wait tcp_keepalive_intvl seconds, then send another ACK Repeat until the number of ACK probes that have been sent equals tcp_keepalive_probes. If no response has been received at this point, send a RST and terminate the connection. Yes: Return to step 2 This process is enabled by default on most operating systems, and thus dead TCP connections are regularly pruned once the other end has been responsive for 2 hours 11 minutes (7200 seconds + 75 * 9 seconds). This test case: Use socket options to overide the system's, and test keepalive process. TCP_KEEPIDLE ----> tcp_keepalive_time TCP_KEEPCNT ----> tcp_keepalive_probes TCP_KEEPINTVL ----> tcp_keepalive_intvl For namespace: Bug 1476667 - [RFE] Namespace tcp_keepalive_time sysctl knob :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 08:58:27 ] :: [ PASS ] :: Command 'systemctl stop firewalld' (Expected 0, got 0) :: [ 08:59:28 ] :: [ PASS ] :: Command 'sleep 60' (Expected 0, got 0) :: [ 08:59:28 ] :: [ PASS ] :: Command 'systemctl status firewalld' (Expected 1-255, got 3) :: [ 08:59:28 ] :: [ PASS ] :: Command 'nft delete table inet filter' (Expected 0-255, got 1) :: [ 08:59:38 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 08:59:38 ] :: [ PASS ] :: Command 'sys_ka_idle=7200' (Expected 0, got 0) :: [ 08:59:38 ] :: [ PASS ] :: Command 'sys_ka_interval=75' (Expected 0, got 0) :: [ 08:59:38 ] :: [ PASS ] :: Command 'sys_ka_idle=9' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: iproute installed (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'ip netns add netns_ka' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ip link set lo up' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=7200' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'netns_sys_ka_interval=75' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=9' (Expected 0, got 0) :: [ 08:59:39 ] :: [ LOG ] :: socket settings of keepalive will overide the system's :: [ 08:59:39 ] :: [ PASS ] :: Command 'idle=6' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'interval=1' (Expected 0, got 0) :: [ 08:59:39 ] :: [ PASS ] :: Command 'maxpkt=10' (Expected 0, got 0) :: [ 08:59:40 ] :: [ PASS ] :: Command 'port=7811' (Expected 0, got 0) :: [ 08:59:40 ] :: [ PASS ] :: Command 'gcc -g -Wall -o keepalive keepalive.c' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 73s :: Assertions: 19 good, 0 bad :: RESULT: PASS (Setup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: host :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 08:59:40 ] :: [ PASS ] :: Command 'tcpdump -nn -i lo port 7811 -w tcpdump.host.pcap &' (Expected 0, got 0) :: [ 08:59:45 ] :: [ PASS ] :: Command './keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) :: [ 09:00:16 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 09:00:17 ] :: [ PASS ] :: Command 'childpid=596019' (Expected 0, got 0) :: [ 09:00:17 ] :: [ PASS ] :: Command 'kill -s SIGINT 596019' (Expected 0, got 0) :: [ 09:00:17 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 09:00:22 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.host.pcap': :: [ 09:00:22 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 09:00:22 ] :: [ LOG ] :: reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 09:00:22 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 09:00:22 ] :: [ LOG ] :: 08:59:45.861553 IP localhost.51344 > localhost.7811: Flags [S], seq 3645734511, win 65495, options [mss 65495,sackOK,TS val 3799928463 ecr 0,nop,wscale 7], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:45.861565 IP localhost.7811 > localhost.51344: Flags [S.], seq 2997362954, ack 3645734512, win 65483, options [mss 65495,sackOK,TS val 3799928463 ecr 3799928463,nop,wscale 7], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:45.861576 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799928463 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:52.357695 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799934960 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:52.357718 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799934960 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:53.381524 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799935983 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:53.381532 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799935983 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:54.405673 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799937007 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:54.405693 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799937008 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:55.429611 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799938031 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:55.429622 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799938031 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:56.453636 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799939055 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:56.453656 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799939055 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:57.477603 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799940079 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:57.477645 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799940079 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:58.501591 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799941103 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:58.501600 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799941103 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:59.525667 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799942127 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 08:59:59.525688 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799942128 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:00.549633 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799943151 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:00.549643 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799943151 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:01.573630 IP localhost.7811 > localhost.51344: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799944175 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:01.573640 IP localhost.51344 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799944175 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: 09:00:02.597649 IP localhost.7811 > localhost.51344: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 3799945199 ecr 3799928463], length 0 :: [ 09:00:22 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 09:00:22 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.host.pcap' (Expected 0, got 0) :: [ 09:00:22 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 09:00:22 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 42s :: Assertions: 9 good, 0 bad :: RESULT: PASS (host) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: netns :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 09:00:23 ] :: [ PASS ] :: Command 'ip netns exec netns_ka tcpdump -nn -i lo port 7811 -w tcpdump.netns.pcap &' (Expected 0, got 0) :: [ 09:00:28 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ./keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) :: [ 09:00:59 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 09:00:59 ] :: [ PASS ] :: Command 'childpid=596654' (Expected 0, got 0) :: [ 09:00:59 ] :: [ PASS ] :: Command 'kill -s SIGINT 596654' (Expected 0, got 0) :: [ 09:00:59 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 09:01:04 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.netns.pcap': :: [ 09:01:04 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 09:01:04 ] :: [ LOG ] :: reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 09:01:04 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 09:01:04 ] :: [ LOG ] :: 09:00:28.292257 IP localhost.50574 > localhost.7811: Flags [S], seq 3983048337, win 65495, options [mss 65495,sackOK,TS val 3799970894 ecr 0,nop,wscale 7], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:28.292273 IP localhost.7811 > localhost.50574: Flags [S.], seq 3836565145, ack 3983048338, win 65483, options [mss 65495,sackOK,TS val 3799970894 ecr 3799970894,nop,wscale 7], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:28.292286 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799970894 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:34.341590 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799976943 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:34.341614 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799976943 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:35.365638 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799977967 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:35.365659 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799977967 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:36.389657 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799978991 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:36.389674 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799978992 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:37.413529 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799980015 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:37.413540 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799980015 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:38.437726 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799981040 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:38.437747 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799981040 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:39.461604 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799982063 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:39.461622 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799982063 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:40.485530 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799983087 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:40.485540 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799983087 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:41.509524 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799984111 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:41.509535 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799984111 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:42.533578 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799985135 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:42.533595 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799985135 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:43.557663 IP localhost.7811 > localhost.50574: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799986159 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:43.557685 IP localhost.50574 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 3799986160 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: 09:00:44.581608 IP localhost.7811 > localhost.50574: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 3799987183 ecr 3799970894], length 0 :: [ 09:01:04 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 09:01:04 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.netns.pcap' (Expected 0, got 0) :: [ 09:01:04 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 09:01:04 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 41s :: Assertions: 9 good, 0 bad :: RESULT: PASS (netns) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 09:01:05 ] :: [ PASS ] :: Command 'ip netns del netns_ka' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: unknown :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 09:01:06 ] :: [ LOG ] :: Phases fingerprint: 3TFH3dbq :: [ 09:01:06 ] :: [ LOG ] :: Asserts fingerprint: cDYg/isO Uploading journal.xml .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 159s :: Phases: 4 good, 0 bad :: OVERALL RESULT: PASS (unknown)