use_pty:FALSE /usr/share/restraint/plugins/run_task_plugins bash ./runtest.sh /etc/pki/ca-trust/source/anchors /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/ipsec/ipsec_basic/ipsec_basic_netns --2023-01-26 17:07:23-- https://password.corp.redhat.com/legacy.crt Resolving password.corp.redhat.com (password.corp.redhat.com)... 10.2.111.154 Connecting to password.corp.redhat.com (password.corp.redhat.com)|10.2.111.154|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 1338 (1.3K) Saving to: ‘legacy.crt.1’ 0K . 100% 59.5M=0s 2023-01-26 17:07:24 (59.5 MB/s) - ‘legacy.crt.1’ saved [1338/1338] --2023-01-26 17:07:24-- https://password.corp.redhat.com/RH-IT-Root-CA.crt Resolving password.corp.redhat.com (password.corp.redhat.com)... 10.2.111.154 Connecting to password.corp.redhat.com (password.corp.redhat.com)|10.2.111.154|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 1517 (1.5K) Saving to: ‘RH-IT-Root-CA.crt.1’ 0K . 100% 186M=0s 2023-01-26 17:07:24 (186 MB/s) - ‘RH-IT-Root-CA.crt.1’ saved [1517/1517] /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/ipsec/ipsec_basic/ipsec_basic_netns :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:07:25 ] :: [ BEGIN ] :: Running 'netperf_install' Last metadata expiration check: 1:34:58 ago on Thu 26 Jan 2023 03:32:27 PM EST. No match for argument: netperf Error: Unable to find a match: netperf Netperf version 2.7.1 :: [ 17:07:26 ] :: [ PASS ] :: Command 'netperf_install' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'source /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/ipsec/ipsec_basic/ipsec_basic_netns/ipsec-parameter-setting.sh -p esp -e des3_ede -a sha256 -m transport -s '65470'' TEST_VER=4, SPI=1000, IPSEC_MODE=transport, PROTO=proto esp, ALG=enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f ls: cannot access '/lib/modules/5.14.0-245.1965_758819703.el9.s390x/kernel/arch/x86/crypto/': No such file or directory :: [ 17:07:26 ] :: [ PASS ] :: Command 'source /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/ipsec/ipsec_basic/ipsec_basic_netns/ipsec-parameter-setting.sh -p esp -e des3_ede -a sha256 -m transport -s '65470'' (Expected 0, got 0) :: [ 17:07:26 ] :: [ LOG ] :: TEST_VER=4, SPI=1000, IPSEC_MODE=transport, PROTO=proto esp, ALG=enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'spi1='0x1000'' :: [ 17:07:26 ] :: [ PASS ] :: Command 'spi1='0x1000'' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'spi2='0x1001'' :: [ 17:07:26 ] :: [ PASS ] :: Command 'spi2='0x1001'' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'source /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/tools/netns_1_net.sh' +++ MASK[4]=24 +++ MASK[6]=64 +++ BR0_IP[4]=192.168.0.254 +++ HA_IP[4]=192.168.0.1 +++ HB_IP[4]=192.168.0.2 +++ BR0_IP[6]=2000::254 +++ HA_IP[6]=2000::1 +++ HB_IP[6]=2000::2 +++ nets='ha hb' +++ for net in $nets +++ ip netns del ha Cannot remove namespace file "/var/run/netns/ha": No such file or directory +++ for net in $nets +++ ip netns del hb Cannot remove namespace file "/var/run/netns/hb": No such file or directory +++ modprobe -r veth +++ ip link show br0 Device "br0" does not exist. +++ for net in $nets +++ ip netns add ha +++ for net in $nets +++ ip netns add hb +++ ip link add br0 type bridge +++ ip link add ha_veth0 type veth peer name ha_veth0_br +++ ip link add hb_veth0 type veth peer name hb_veth0_br +++ ip link set ha_veth0_br master br0 +++ ip link set hb_veth0_br master br0 +++ ip link set ha_veth0 netns ha +++ ip link set hb_veth0 netns hb +++ HA='ip netns exec ha' +++ HB='ip netns exec hb' +++ out_ifaces='br0 ha_veth0_br hb_veth0_br' +++ for iface in $out_ifaces +++ ip link set br0 up +++ for iface in $out_ifaces +++ ip link set ha_veth0_br up +++ for iface in $out_ifaces +++ ip link set hb_veth0_br up +++ ip netns exec ha ip link set lo up +++ ip netns exec ha ip link set ha_veth0 up +++ ip netns exec hb ip link set lo up +++ ip netns exec hb ip link set hb_veth0 up +++ ip addr add 192.168.0.254/24 dev br0 +++ ip netns exec ha ip addr add 192.168.0.1/24 dev ha_veth0 +++ ip netns exec hb ip addr add 192.168.0.2/24 dev hb_veth0 +++ ip addr add 2000::254/64 dev br0 +++ ip netns exec ha ip addr add 2000::1/64 dev ha_veth0 +++ ip netns exec hb ip addr add 2000::2/64 dev hb_veth0 +++ set +x :: [ 17:07:26 ] :: [ PASS ] :: Command 'source /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/tools/netns_1_net.sh' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'ip netns exec ha ip xfrm state add src 192.168.0.1 dst 192.168.0.2 spi 0x1000 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.1 dst 192.168.0.2' :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm state add src 192.168.0.1 dst 192.168.0.2 spi 0x1000 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.1 dst 192.168.0.2' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'ip netns exec ha ip xfrm state add src 192.168.0.2 dst 192.168.0.1 spi 0x1001 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.2 dst 192.168.0.1' :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm state add src 192.168.0.2 dst 192.168.0.1 spi 0x1001 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.2 dst 192.168.0.1' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'ip netns exec ha ip xfrm policy add dir out src 192.168.0.1 dst 192.168.0.2 tmpl src 192.168.0.1 dst 192.168.0.2 proto esp mode transport' :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm policy add dir out src 192.168.0.1 dst 192.168.0.2 tmpl src 192.168.0.1 dst 192.168.0.2 proto esp mode transport' (Expected 0, got 0) :: [ 17:07:26 ] :: [ BEGIN ] :: Running 'ip netns exec ha ip xfrm policy add dir in src 192.168.0.2 dst 192.168.0.1 tmpl src 192.168.0.2 dst 192.168.0.1 proto esp mode transport level use' :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm policy add dir in src 192.168.0.2 dst 192.168.0.1 tmpl src 192.168.0.2 dst 192.168.0.1 proto esp mode transport level use' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'ip netns exec hb ip xfrm state add src 192.168.0.2 dst 192.168.0.1 spi 0x1001 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.2 dst 192.168.0.1' :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm state add src 192.168.0.2 dst 192.168.0.1 spi 0x1001 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.2 dst 192.168.0.1' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'ip netns exec hb ip xfrm state add src 192.168.0.1 dst 192.168.0.2 spi 0x1000 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.1 dst 192.168.0.2' :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm state add src 192.168.0.1 dst 192.168.0.2 spi 0x1000 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.1 dst 192.168.0.2' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'ip netns exec hb ip xfrm policy add dir out src 192.168.0.2 dst 192.168.0.1 tmpl src 192.168.0.2 dst 192.168.0.1 proto esp mode transport' :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm policy add dir out src 192.168.0.2 dst 192.168.0.1 tmpl src 192.168.0.2 dst 192.168.0.1 proto esp mode transport' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'ip netns exec hb ip xfrm policy add dir in src 192.168.0.1 dst 192.168.0.2 tmpl src 192.168.0.1 dst 192.168.0.2 proto esp mode transport level use' :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm policy add dir in src 192.168.0.1 dst 192.168.0.2 tmpl src 192.168.0.1 dst 192.168.0.2 proto esp mode transport level use' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 2s :: Assertions: 13 good, 0 bad :: RESULT: PASS (Setup) ** Setup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: -p esp -e des3_ede -a sha256 -m transport -s '65470' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'tcpport=4053' :: [ 17:07:27 ] :: [ PASS ] :: Command 'tcpport=4053' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'udpport=4053' :: [ 17:07:27 ] :: [ PASS ] :: Command 'udpport=4053' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'sctpport=4053' :: [ 17:07:27 ] :: [ PASS ] :: Command 'sctpport=4053' (Expected 0, got 0) :: [ 17:07:27 ] :: [ LOG ] :: ***** icmp ****** :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'tcpdump -i br0 > icmp.packet &' :: [ 17:07:27 ] :: [ PASS ] :: Command 'tcpdump -i br0 > icmp.packet &' (Expected 0, got 0) :: [ 17:07:27 ] :: [ BEGIN ] :: Running 'sleep 2' dropped privs to tcpdump tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on br0, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 17:07:29 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:29 ] :: [ BEGIN ] :: Running 'ip netns exec ha ping -i 0.4 -c 5 -s 10 192.168.0.2' PING 192.168.0.2 (192.168.0.2) 10(38) bytes of data. 18 bytes from 192.168.0.2: icmp_seq=1 ttl=64 18 bytes from 192.168.0.2: icmp_seq=2 ttl=64 18 bytes from 192.168.0.2: icmp_seq=3 ttl=64 18 bytes from 192.168.0.2: icmp_seq=4 ttl=64 18 bytes from 192.168.0.2: icmp_seq=5 ttl=64 --- 192.168.0.2 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 1613ms :: [ 17:07:31 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 10 192.168.0.2' (Expected 0, got 0) :: [ 17:07:31 ] :: [ BEGIN ] :: Running 'ip netns exec ha ping -i 0.4 -c 5 -s 1442 192.168.0.2' PING 192.168.0.2 (192.168.0.2) 1442(1470) bytes of data. 1450 bytes from 192.168.0.2: icmp_seq=1 ttl=64 time=0.069 ms 1450 bytes from 192.168.0.2: icmp_seq=2 ttl=64 time=0.210 ms 1450 bytes from 192.168.0.2: icmp_seq=3 ttl=64 time=0.152 ms 1450 bytes from 192.168.0.2: icmp_seq=4 ttl=64 time=0.214 ms 1450 bytes from 192.168.0.2: icmp_seq=5 ttl=64 time=0.155 ms --- 192.168.0.2 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 1639ms rtt min/avg/max/mdev = 0.069/0.160/0.214/0.052 ms :: [ 17:07:33 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 1442 192.168.0.2' (Expected 0, got 0) :: [ 17:07:33 ] :: [ BEGIN ] :: Running 'ip netns exec ha ping -i 0.4 -c 5 -s 65470 192.168.0.2' PING 192.168.0.2 (192.168.0.2) 65470(65498) bytes of data. 65478 bytes from 192.168.0.2: icmp_seq=1 ttl=64 time=0.575 ms 65478 bytes from 192.168.0.2: icmp_seq=2 ttl=64 time=0.759 ms 65478 bytes from 192.168.0.2: icmp_seq=3 ttl=64 time=0.726 ms 65478 bytes from 192.168.0.2: icmp_seq=4 ttl=64 time=0.747 ms 65478 bytes from 192.168.0.2: icmp_seq=5 ttl=64 time=0.696 ms --- 192.168.0.2 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 1607ms rtt min/avg/max/mdev = 0.575/0.700/0.759/0.066 ms :: [ 17:07:34 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 65470 192.168.0.2' (Expected 0, got 0) :: [ 17:07:34 ] :: [ BEGIN ] :: Running 'pkill tcpdump; sleep 2' 386 packets captured 510 packets received by filter 0 packets dropped by kernel :: [ 17:07:36 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:07:36 ] :: [ BEGIN ] :: Running 'cat icmp.packet | egrep 'AH|ESP|IPComp' | head -n5' 17:07:29.790915 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x1), length 52 17:07:29.790951 IP 192.168.0.2 > 192.168.0.1: ESP(spi=0x00001001,seq=0x1), length 52 17:07:30.192990 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x2), length 52 17:07:30.193063 IP 192.168.0.2 > 192.168.0.1: ESP(spi=0x00001001,seq=0x2), length 52 17:07:30.603062 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x3), length 52 :: [ 17:07:36 ] :: [ PASS ] :: Command 'cat icmp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:07:36 ] :: [ LOG ] :: ***** tcp ****** :: [ 17:07:36 ] :: [ BEGIN ] :: Running 'tcpdump -i br0 > tcp.packet &' :: [ 17:07:36 ] :: [ PASS ] :: Command 'tcpdump -i br0 > tcp.packet &' (Expected 0, got 0) :: [ 17:07:36 ] :: [ BEGIN ] :: Running 'sleep 2' dropped privs to tcpdump tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on br0, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 17:07:38 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:38 ] :: [ BEGIN ] :: Running 'ip netns exec hb socat -u -4 tcp-l:4053 open:tcprecv,creat &' :: [ 17:07:38 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 tcp-l:4053 open:tcprecv,creat &' (Expected 0, got 0) :: [ 17:07:38 ] :: [ BEGIN ] :: Running 'sleep 2' :: [ 17:07:40 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:40 ] :: [ BEGIN ] :: Running 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1048576 tcp-connect:192.168.0.2:4053' :: [ 17:07:40 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1048576 tcp-connect:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:07:40 ] :: [ BEGIN ] :: Running 'sleep 4' :: [ 17:07:44 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 17:07:45 ] :: [ BEGIN ] :: tcp should receive 1048576 bytes, received 1048576 bytes :: actually running 'ls -l tcprecv | grep 1048576' -rw-r--r--. 1 root root 1048576 Jan 26 17:07 tcprecv :: [ 17:07:45 ] :: [ PASS ] :: tcp should receive 1048576 bytes, received 1048576 bytes (Expected 0, got 0) :: [ 17:07:45 ] :: [ BEGIN ] :: Running 'pkill tcpdump; sleep 2' 1347 packets captured 1347 packets received by filter 0 packets dropped by kernel :: [ 17:07:47 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:07:47 ] :: [ BEGIN ] :: Running 'cat tcp.packet | egrep 'AH|ESP|IPComp' | head -n5' 17:07:40.958251 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x10), length 76 17:07:40.958302 IP 192.168.0.2 > 192.168.0.1: ESP(spi=0x00001001,seq=0x10), length 76 17:07:40.958318 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x11), length 68 17:07:40.958493 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x12), length 1476 17:07:40.958507 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x13), length 1476 :: [ 17:07:47 ] :: [ PASS ] :: Command 'cat tcp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:07:47 ] :: [ LOG ] :: ***** udp ****** :: [ 17:07:47 ] :: [ BEGIN ] :: Running 'tcpdump -i br0 > udp.packet &' :: [ 17:07:47 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 17:07:47 ] :: [ BEGIN ] :: Running 'sleep 2' dropped privs to tcpdump tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on br0, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 17:07:49 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:49 ] :: [ BEGIN ] :: Running 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' :: [ 17:07:49 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 17:07:49 ] :: [ BEGIN ] :: Running 'sleep 2' :: [ 17:07:51 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:51 ] :: [ BEGIN ] :: Running 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1442 udp-sendto:192.168.0.2:4053' :: [ 17:07:51 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1442 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:07:51 ] :: [ BEGIN ] :: Running 'sleep 10' :: [ 17:08:01 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 17:08:01 ] :: [ BEGIN ] :: udp should receive 1442 bytes, received 1442 bytes :: actually running 'ls -l udprecv | grep 1442' -rw-r--r--. 1 root root 1442 Jan 26 17:07 udprecv :: [ 17:08:01 ] :: [ PASS ] :: udp should receive 1442 bytes, received 1442 bytes (Expected 0, got 0) :: [ 17:08:01 ] :: [ BEGIN ] :: Running 'pkill socat' :: [ 17:08:01 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 17:08:01 ] :: [ BEGIN ] :: Running 'pkill tcpdump; sleep 2' 5 packets captured 5 packets received by filter 0 packets dropped by kernel :: [ 17:08:03 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:08:03 ] :: [ BEGIN ] :: Running 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' 17:07:51.293550 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x314), length 1440 :: [ 17:08:03 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:08:03 ] :: [ BEGIN ] :: Running 'tcpdump -i br0 > udp.packet &' :: [ 17:08:03 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 17:08:03 ] :: [ BEGIN ] :: Running 'sleep 2' dropped privs to tcpdump tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on br0, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 17:08:05 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:05 ] :: [ BEGIN ] :: Running 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' :: [ 17:08:05 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 17:08:05 ] :: [ BEGIN ] :: Running 'sleep 2' :: [ 17:08:07 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:07 ] :: [ BEGIN ] :: Running 'ip netns exec ha socat -u -4 /dev/zero,readbytes=3000 udp-sendto:192.168.0.2:4053' :: [ 17:08:07 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=3000 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:08:07 ] :: [ BEGIN ] :: Running 'sleep 10' :: [ 17:08:17 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 17:08:17 ] :: [ BEGIN ] :: udp should receive 3000 bytes, received 3000 bytes :: actually running 'ls -l udprecv | grep 3000' -rw-r--r--. 1 root root 3000 Jan 26 17:08 udprecv :: [ 17:08:17 ] :: [ PASS ] :: udp should receive 3000 bytes, received 3000 bytes (Expected 0, got 0) :: [ 17:08:17 ] :: [ BEGIN ] :: Running 'pkill socat' :: [ 17:08:17 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 17:08:17 ] :: [ BEGIN ] :: Running 'pkill tcpdump; sleep 2' 5 packets captured 5 packets received by filter 0 packets dropped by kernel :: [ 17:08:19 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:08:19 ] :: [ BEGIN ] :: Running 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' 17:08:07.612921 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x315), length 1440 :: [ 17:08:19 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:08:19 ] :: [ LOG ] :: ***** sctp ****** :: [ 17:08:19 ] :: [ BEGIN ] :: Running 'tcpdump -i br0 > sctp.packet &' :: [ 17:08:19 ] :: [ PASS ] :: Command 'tcpdump -i br0 > sctp.packet &' (Expected 0, got 0) :: [ 17:08:19 ] :: [ BEGIN ] :: Running 'sleep 2' dropped privs to tcpdump tcpdump: verbose output suppressed, use -v[v]... for full protocol decode listening on br0, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 17:08:21 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:21 ] :: [ BEGIN ] :: Running 'ip netns exec hb socat -u -4 sctp-listen:4053 open:sctprecv,creat &' :: [ 17:08:21 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 sctp-listen:4053 open:sctprecv,creat &' (Expected 0, got 0) :: [ 17:08:21 ] :: [ BEGIN ] :: Running 'sleep 2' :: [ 17:08:23 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:23 ] :: [ BEGIN ] :: Running 'ip netns exec ha socat -u -4 /dev/zero,readbytes=2000 sctp:192.168.0.2:4053' :: [ 17:08:23 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=2000 sctp:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:08:23 ] :: [ BEGIN ] :: Running 'sleep 4' :: [ 17:08:27 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 17:08:27 ] :: [ BEGIN ] :: sctp should receive 2000 bytes, received 2000 bytes :: actually running 'ls -l sctprecv | grep 2000' -rw-r--r--. 1 root root 2000 Jan 26 17:08 sctprecv :: [ 17:08:28 ] :: [ PASS ] :: sctp should receive 2000 bytes, received 2000 bytes (Expected 0, got 0) :: [ 17:08:28 ] :: [ BEGIN ] :: Running 'pkill tcpdump; sleep 2' 13 packets captured 14 packets received by filter 0 packets dropped by kernel :: [ 17:08:30 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:08:30 ] :: [ BEGIN ] :: Running 'cat sctp.packet | egrep 'AH|ESP|IPComp' | head -n5' 17:08:23.955249 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x316), length 84 17:08:23.955308 IP 192.168.0.2 > 192.168.0.1: ESP(spi=0x00001001,seq=0x24c), length 308 17:08:23.955329 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x317), length 276 17:08:23.955347 IP 192.168.0.2 > 192.168.0.1: ESP(spi=0x00001001,seq=0x24d), length 52 17:08:23.956218 IP 192.168.0.1 > 192.168.0.2: ESP(spi=0x00001000,seq=0x318), length 1476 :: [ 17:08:30 ] :: [ PASS ] :: Command 'cat sctp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:08:30 ] :: [ INFO ] :: Sending proc_crypto as proc_crypto Uploading proc_crypto .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 63s :: Assertions: 48 good, 0 bad :: RESULT: PASS (-p esp -e des3_ede -a sha256 -m transport -s '65470') ** -p-esp-e-des3-ede-a-sha256-m-transport-s-65470- PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:08:30 ] :: [ BEGIN ] :: Running 'bash /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/tools/netns_clean.sh' :: [ 17:08:31 ] :: [ PASS ] :: Command 'bash /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/tools/netns_clean.sh' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) ** Cleanup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: TEST PROTOCOL :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Test run ID : 29 Package : ipsec beakerlib RPM : beakerlib-1.29.2-2.el9.noarch bl-redhat RPM : beakerlib-redhat-1-33.el9.noarch Test name : networking/ipsec/ipsec_basic/ipsec_basic_netns Test started : 2023-01-26 17:07:25 EST Test finished : 2023-01-26 17:08:31 EST (still running) Test duration : 66 seconds Distro : CentOS Stream release 9 Hostname : s390x-kvm-041.lab.eng.rdu2.redhat.com Architecture : s390x CPUs : 0 x RAM size : 7517 MB HDD size : 111.96 GB :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Test description :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: IPsec compression: same message size but different content will result in different data size after compression. So we just use a large enough message size(65000) for testing [cipher]: des3_ede: blocksize = 8; min keysize = 24; max keysize = 24 aes: blocksize = 16; min keysize = 16; max keysize = 32 blowfish: blocksize = 8; min keysize = 16; max keysize = 56 twofish: blocksize = 16; min keysize = 16; max keysize = 32 cast6: blocksize = 16; min keysize = 16; max keysize = 32 cast5: blocksize = 8; min keysize = 5; max keysize = 16 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:07:26 ] :: [ PASS ] :: Command 'netperf_install' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'source /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/ipsec/ipsec_basic/ipsec_basic_netns/ipsec-parameter-setting.sh -p esp -e des3_ede -a sha256 -m transport -s '65470'' (Expected 0, got 0) :: [ 17:07:26 ] :: [ LOG ] :: TEST_VER=4, SPI=1000, IPSEC_MODE=transport, PROTO=proto esp, ALG=enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f :: [ 17:07:26 ] :: [ PASS ] :: Command 'spi1='0x1000'' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'spi2='0x1001'' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'source /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/tools/netns_1_net.sh' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm state add src 192.168.0.1 dst 192.168.0.2 spi 0x1000 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.1 dst 192.168.0.2' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm state add src 192.168.0.2 dst 192.168.0.1 spi 0x1001 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.2 dst 192.168.0.1' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm policy add dir out src 192.168.0.1 dst 192.168.0.2 tmpl src 192.168.0.1 dst 192.168.0.2 proto esp mode transport' (Expected 0, got 0) :: [ 17:07:26 ] :: [ PASS ] :: Command 'ip netns exec ha ip xfrm policy add dir in src 192.168.0.2 dst 192.168.0.1 tmpl src 192.168.0.2 dst 192.168.0.1 proto esp mode transport level use' (Expected 0, got 0) :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm state add src 192.168.0.2 dst 192.168.0.1 spi 0x1001 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.2 dst 192.168.0.1' (Expected 0, got 0) :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm state add src 192.168.0.1 dst 192.168.0.2 spi 0x1000 proto esp enc des3_ede 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f auth hmac\(sha256\) 0x0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f0f mode transport sel src 192.168.0.1 dst 192.168.0.2' (Expected 0, got 0) :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm policy add dir out src 192.168.0.2 dst 192.168.0.1 tmpl src 192.168.0.2 dst 192.168.0.1 proto esp mode transport' (Expected 0, got 0) :: [ 17:07:27 ] :: [ PASS ] :: Command 'ip netns exec hb ip xfrm policy add dir in src 192.168.0.1 dst 192.168.0.2 tmpl src 192.168.0.1 dst 192.168.0.2 proto esp mode transport level use' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 2s :: Assertions: 13 good, 0 bad :: RESULT: PASS (Setup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: -p esp -e des3_ede -a sha256 -m transport -s '65470' :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:07:27 ] :: [ PASS ] :: Command 'tcpport=4053' (Expected 0, got 0) :: [ 17:07:27 ] :: [ PASS ] :: Command 'udpport=4053' (Expected 0, got 0) :: [ 17:07:27 ] :: [ PASS ] :: Command 'sctpport=4053' (Expected 0, got 0) :: [ 17:07:27 ] :: [ LOG ] :: ***** icmp ****** :: [ 17:07:27 ] :: [ PASS ] :: Command 'tcpdump -i br0 > icmp.packet &' (Expected 0, got 0) :: [ 17:07:29 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:31 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 10 192.168.0.2' (Expected 0, got 0) :: [ 17:07:33 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 1442 192.168.0.2' (Expected 0, got 0) :: [ 17:07:34 ] :: [ PASS ] :: Command 'ip netns exec ha ping -i 0.4 -c 5 -s 65470 192.168.0.2' (Expected 0, got 0) :: [ 17:07:36 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:07:36 ] :: [ PASS ] :: Command 'cat icmp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:07:36 ] :: [ LOG ] :: ***** tcp ****** :: [ 17:07:36 ] :: [ PASS ] :: Command 'tcpdump -i br0 > tcp.packet &' (Expected 0, got 0) :: [ 17:07:38 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:38 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 tcp-l:4053 open:tcprecv,creat &' (Expected 0, got 0) :: [ 17:07:40 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:40 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1048576 tcp-connect:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:07:44 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 17:07:45 ] :: [ PASS ] :: tcp should receive 1048576 bytes, received 1048576 bytes (Expected 0, got 0) :: [ 17:07:47 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:07:47 ] :: [ PASS ] :: Command 'cat tcp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:07:47 ] :: [ LOG ] :: ***** udp ****** :: [ 17:07:47 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 17:07:49 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:49 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 17:07:51 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:07:51 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=1442 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:08:01 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 17:08:01 ] :: [ PASS ] :: udp should receive 1442 bytes, received 1442 bytes (Expected 0, got 0) :: [ 17:08:01 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 17:08:03 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:08:03 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:08:03 ] :: [ PASS ] :: Command 'tcpdump -i br0 > udp.packet &' (Expected 0, got 0) :: [ 17:08:05 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:05 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 udp-l:4053 open:udprecv,creat &' (Expected 0, got 0) :: [ 17:08:07 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:07 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=3000 udp-sendto:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:08:17 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 17:08:17 ] :: [ PASS ] :: udp should receive 3000 bytes, received 3000 bytes (Expected 0, got 0) :: [ 17:08:17 ] :: [ PASS ] :: Command 'pkill socat' (Expected 0, got 0) :: [ 17:08:19 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:08:19 ] :: [ PASS ] :: Command 'cat udp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:08:19 ] :: [ LOG ] :: ***** sctp ****** :: [ 17:08:19 ] :: [ PASS ] :: Command 'tcpdump -i br0 > sctp.packet &' (Expected 0, got 0) :: [ 17:08:21 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:21 ] :: [ PASS ] :: Command 'ip netns exec hb socat -u -4 sctp-listen:4053 open:sctprecv,creat &' (Expected 0, got 0) :: [ 17:08:23 ] :: [ PASS ] :: Command 'sleep 2' (Expected 0, got 0) :: [ 17:08:23 ] :: [ PASS ] :: Command 'ip netns exec ha socat -u -4 /dev/zero,readbytes=2000 sctp:192.168.0.2:4053' (Expected 0, got 0) :: [ 17:08:27 ] :: [ PASS ] :: Command 'sleep 4' (Expected 0, got 0) :: [ 17:08:28 ] :: [ PASS ] :: sctp should receive 2000 bytes, received 2000 bytes (Expected 0, got 0) :: [ 17:08:30 ] :: [ PASS ] :: Command 'pkill tcpdump; sleep 2' (Expected 0, got 0) :: [ 17:08:30 ] :: [ PASS ] :: Command 'cat sctp.packet | egrep 'AH|ESP|IPComp' | head -n5' (Expected 0, got 0) :: [ 17:08:30 ] :: [ INFO ] :: Sending proc_crypto as proc_crypto :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 63s :: Assertions: 48 good, 0 bad :: RESULT: PASS (-p esp -e des3_ede -a sha256 -m transport -s '65470') :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:08:31 ] :: [ PASS ] :: Command 'bash /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/tools/netns_clean.sh' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: networking/ipsec/ipsec_basic/ipsec_basic_netns :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 17:08:32 ] :: [ LOG ] :: Phases fingerprint: GpTeNtEf :: [ 17:08:32 ] :: [ LOG ] :: Asserts fingerprint: T1cCTj04 Uploading journal.xml .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 66s :: Phases: 3 good, 0 bad :: OVERALL RESULT: PASS (networking/ipsec/ipsec_basic/ipsec_basic_netns)