use_pty:FALSE /usr/share/restraint/plugins/run_task_plugins bash ./runtest.sh /etc/pki/ca-trust/source/anchors /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/macsec/sanity_check --2023-01-29 16:48:29-- https://password.corp.redhat.com/legacy.crt Resolving password.corp.redhat.com (password.corp.redhat.com)... 10.2.111.154 Connecting to password.corp.redhat.com (password.corp.redhat.com)|10.2.111.154|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 1338 (1.3K) Saving to: ‘legacy.crt.1’ 0K . 100% 154M=0s 2023-01-29 16:48:30 (154 MB/s) - ‘legacy.crt.1’ saved [1338/1338] --2023-01-29 16:48:30-- https://password.corp.redhat.com/RH-IT-Root-CA.crt Resolving password.corp.redhat.com (password.corp.redhat.com)... 10.2.111.154 Connecting to password.corp.redhat.com (password.corp.redhat.com)|10.2.111.154|:443... connected. HTTP request sent, awaiting response... 200 OK Length: 1517 (1.5K) Saving to: ‘RH-IT-Root-CA.crt.1’ 0K . 100% 14.7M=0s 2023-01-29 16:48:30 (14.7 MB/s) - ‘RH-IT-Root-CA.crt.1’ saved [1517/1517] /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common /mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/macsec/sanity_check :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:48:31 ] :: [ BEGIN ] :: Running 'modinfo macsec' filename: /lib/modules/6.2.0-rc5/kernel/drivers/net/macsec.ko license: GPL v2 description: MACsec IEEE 802.1AE alias: net-pf-16-proto-16-family-macsec alias: rtnl-link-macsec depends: intree: Y name: macsec vermagic: 6.2.0-rc5 SMP mod_unload sig_id: PKCS#7 signer: Build time autogenerated kernel key sig_key: 26:63:3E:56:F6:32:E8:CB:7D:53:D7:D2:04:50:D9:C1:74:C7:68:9B sig_hashalgo: sha512 signature: BF:A6:F7:DE:8A:44:67:3C:25:37:0F:D4:98:14:53:07:7F:E7:59:A1: 7D:1E:01:4D:CF:14:F7:ED:78:56:16:57:8A:7F:86:C3:1B:18:BB:87: 2A:97:D3:A3:A6:3B:6E:F2:FD:D1:4A:20:42:CD:2D:3E:A0:16:42:FF: 70:5E:6B:63:B7:83:D3:A4:76:C2:77:D9:BB:90:40:21:5D:64:40:02: F0:06:AF:E8:72:6B:CD:85:ED:CC:E8:5E:70:C9:6B:06:D4:F1:06:DB: 45:6E:9A:64:D2:75:BA:0E:70:24:71:42:46:07:5F:7F:92:46:A3:22: 06:28:9D:9B:54:EE:7A:B0:8E:65:0D:52:DB:15:0A:6B:19:B4:10:C8: 4D:EC:20:F3:B4:CE:FB:B8:57:37:46:E8:15:41:85:9B:BF:9A:47:8D: F5:56:26:54:AE:21:27:B9:C4:E2:39:0D:3F:CE:E0:23:30:B7:8A:72: D4:3B:FC:23:6C:6D:3C:26:19:2D:BC:38:74:17:CB:73:35:3D:4E:36: 9F:CB:24:ED:CC:21:D3:CA:0F:D2:34:AB:83:74:2A:96:28:42:51:BE: 99:8A:88:1A:0D:62:52:4F:40:78:F0:77:A5:B9:C2:F1:E8:11:7C:ED: 9A:AC:BF:39:AC:67:8F:D3:37:23:EA:FC:DE:D2:3D:7B:74:25:8A:93: 41:79:2F:CF:53:BC:39:20:09:A1:E8:8D:87:46:D0:E3:D3:C3:22:11: B4:09:14:A0:C3:A5:5E:72:9A:5E:52:EF:95:9B:37:3A:63:05:BD:37: 78:42:68:36:B9:75:8B:6D:5B:EE:F9:EB:96:E6:09:D1:1A:F1:A1:7C: 3B:37:D1:94:91:0D:8B:83:DF:C1:22:2D:BF:D2:B5:D4:C6:FC:E6:3B: 82:E7:85:78:B7:81:84:60:0A:A3:84:8F:1C:76:8F:68:39:FE:6F:6D: 26:3F:E9:1A:22:5E:C7:D9:C2:C0:95:C9:32:51:21:8A:39:17:A9:A7: D3:9C:3D:71:3A:92:C1:3A:92:23:B2:D2:3E:E3:85:3F:66:9B:0B:FA: 48:E4:D2:35:B9:B5:E1:4C:FA:28:B2:7F:A8:04:95:0F:7D:D3:D7:7E: B9:AE:3C:D0:3F:85:F9:E7:9C:37:64:A7:8B:33:D9:14:08:DE:F7:06: 1A:80:71:F6:E6:E0:EB:A4:F8:18:23:71:25:62:76:2B:63:C6:A2:AE: 57:DB:48:2F:48:C1:EC:74:BA:08:EA:69:67:32:AE:73:EB:14:42:D0: B5:2E:D2:58:C2:C1:7C:A8:4D:30:F3:3F:A1:FB:62:D5:E7:AD:61:D7: D2:72:A3:C4:6D:64:B3:A3:5A:8A:0A:8C :: [ 16:48:32 ] :: [ LOG ] :: Output of 'modinfo macsec': :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:32 ] :: [ LOG ] :: filename: /lib/modules/6.2.0-rc5/kernel/drivers/net/macsec.ko :: [ 16:48:32 ] :: [ LOG ] :: license: GPL v2 :: [ 16:48:32 ] :: [ LOG ] :: description: MACsec IEEE 802.1AE :: [ 16:48:32 ] :: [ LOG ] :: alias: net-pf-16-proto-16-family-macsec :: [ 16:48:32 ] :: [ LOG ] :: alias: rtnl-link-macsec :: [ 16:48:32 ] :: [ LOG ] :: depends: :: [ 16:48:32 ] :: [ LOG ] :: intree: Y :: [ 16:48:32 ] :: [ LOG ] :: name: macsec :: [ 16:48:32 ] :: [ LOG ] :: vermagic: 6.2.0-rc5 SMP mod_unload :: [ 16:48:32 ] :: [ LOG ] :: sig_id: PKCS#7 :: [ 16:48:32 ] :: [ LOG ] :: signer: Build time autogenerated kernel key :: [ 16:48:32 ] :: [ LOG ] :: sig_key: 26:63:3E:56:F6:32:E8:CB:7D:53:D7:D2:04:50:D9:C1:74:C7:68:9B :: [ 16:48:32 ] :: [ LOG ] :: sig_hashalgo: sha512 :: [ 16:48:32 ] :: [ LOG ] :: signature: BF:A6:F7:DE:8A:44:67:3C:25:37:0F:D4:98:14:53:07:7F:E7:59:A1: :: [ 16:48:32 ] :: [ LOG ] :: 7D:1E:01:4D:CF:14:F7:ED:78:56:16:57:8A:7F:86:C3:1B:18:BB:87: :: [ 16:48:32 ] :: [ LOG ] :: 2A:97:D3:A3:A6:3B:6E:F2:FD:D1:4A:20:42:CD:2D:3E:A0:16:42:FF: :: [ 16:48:32 ] :: [ LOG ] :: 70:5E:6B:63:B7:83:D3:A4:76:C2:77:D9:BB:90:40:21:5D:64:40:02: :: [ 16:48:32 ] :: [ LOG ] :: F0:06:AF:E8:72:6B:CD:85:ED:CC:E8:5E:70:C9:6B:06:D4:F1:06:DB: :: [ 16:48:32 ] :: [ LOG ] :: 45:6E:9A:64:D2:75:BA:0E:70:24:71:42:46:07:5F:7F:92:46:A3:22: :: [ 16:48:32 ] :: [ LOG ] :: 06:28:9D:9B:54:EE:7A:B0:8E:65:0D:52:DB:15:0A:6B:19:B4:10:C8: :: [ 16:48:32 ] :: [ LOG ] :: 4D:EC:20:F3:B4:CE:FB:B8:57:37:46:E8:15:41:85:9B:BF:9A:47:8D: :: [ 16:48:32 ] :: [ LOG ] :: F5:56:26:54:AE:21:27:B9:C4:E2:39:0D:3F:CE:E0:23:30:B7:8A:72: :: [ 16:48:32 ] :: [ LOG ] :: D4:3B:FC:23:6C:6D:3C:26:19:2D:BC:38:74:17:CB:73:35:3D:4E:36: :: [ 16:48:32 ] :: [ LOG ] :: 9F:CB:24:ED:CC:21:D3:CA:0F:D2:34:AB:83:74:2A:96:28:42:51:BE: :: [ 16:48:32 ] :: [ LOG ] :: 99:8A:88:1A:0D:62:52:4F:40:78:F0:77:A5:B9:C2:F1:E8:11:7C:ED: :: [ 16:48:32 ] :: [ LOG ] :: 9A:AC:BF:39:AC:67:8F:D3:37:23:EA:FC:DE:D2:3D:7B:74:25:8A:93: :: [ 16:48:32 ] :: [ LOG ] :: 41:79:2F:CF:53:BC:39:20:09:A1:E8:8D:87:46:D0:E3:D3:C3:22:11: :: [ 16:48:32 ] :: [ LOG ] :: B4:09:14:A0:C3:A5:5E:72:9A:5E:52:EF:95:9B:37:3A:63:05:BD:37: :: [ 16:48:32 ] :: [ LOG ] :: 78:42:68:36:B9:75:8B:6D:5B:EE:F9:EB:96:E6:09:D1:1A:F1:A1:7C: :: [ 16:48:32 ] :: [ LOG ] :: 3B:37:D1:94:91:0D:8B:83:DF:C1:22:2D:BF:D2:B5:D4:C6:FC:E6:3B: :: [ 16:48:32 ] :: [ LOG ] :: 82:E7:85:78:B7:81:84:60:0A:A3:84:8F:1C:76:8F:68:39:FE:6F:6D: :: [ 16:48:32 ] :: [ LOG ] :: 26:3F:E9:1A:22:5E:C7:D9:C2:C0:95:C9:32:51:21:8A:39:17:A9:A7: :: [ 16:48:32 ] :: [ LOG ] :: D3:9C:3D:71:3A:92:C1:3A:92:23:B2:D2:3E:E3:85:3F:66:9B:0B:FA: :: [ 16:48:32 ] :: [ LOG ] :: 48:E4:D2:35:B9:B5:E1:4C:FA:28:B2:7F:A8:04:95:0F:7D:D3:D7:7E: :: [ 16:48:32 ] :: [ LOG ] :: B9:AE:3C:D0:3F:85:F9:E7:9C:37:64:A7:8B:33:D9:14:08:DE:F7:06: :: [ 16:48:32 ] :: [ LOG ] :: 1A:80:71:F6:E6:E0:EB:A4:F8:18:23:71:25:62:76:2B:63:C6:A2:AE: :: [ 16:48:32 ] :: [ LOG ] :: 57:DB:48:2F:48:C1:EC:74:BA:08:EA:69:67:32:AE:73:EB:14:42:D0: :: [ 16:48:32 ] :: [ LOG ] :: B5:2E:D2:58:C2:C1:7C:A8:4D:30:F3:3F:A1:FB:62:D5:E7:AD:61:D7: :: [ 16:48:32 ] :: [ LOG ] :: D2:72:A3:C4:6D:64:B3:A3:5A:8A:0A:8C :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:32 ] :: [ PASS ] :: Command 'modinfo macsec' (Expected 0, got 0) :: [ 16:48:32 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 16:48:32 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0, got 0) :: [ 16:48:32 ] :: [ BEGIN ] :: Running 'ip macsec help' Usage: ip macsec add DEV tx sa { 0..3 } [ OPTS ] key ID KEY ip macsec set DEV tx sa { 0..3 } [ OPTS ] ip macsec del DEV tx sa { 0..3 } ip macsec add DEV rx SCI [ on | off ] ip macsec set DEV rx SCI [ on | off ] ip macsec del DEV rx SCI ip macsec add DEV rx SCI sa { 0..3 } [ OPTS ] key ID KEY ip macsec set DEV rx SCI sa { 0..3 } [ OPTS ] ip macsec del DEV rx SCI sa { 0..3 } ip macsec show ip macsec show DEV ip macsec offload DEV [ off | phy | mac ] where OPTS := [ pn | xpn ] [ salt SALT ] [ ssci ] [ on | off ] ID := 128-bit hex string KEY := 128-bit or 256-bit hex string SCI := { sci | port { 1..2^16-1 } address } SALT := 96-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: Output of 'ip macsec help': :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:32 ] :: [ LOG ] :: Usage: ip macsec add DEV tx sa { 0..3 } [ OPTS ] key ID KEY :: [ 16:48:32 ] :: [ LOG ] :: ip macsec set DEV tx sa { 0..3 } [ OPTS ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec del DEV tx sa { 0..3 } :: [ 16:48:32 ] :: [ LOG ] :: ip macsec add DEV rx SCI [ on | off ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec set DEV rx SCI [ on | off ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec del DEV rx SCI :: [ 16:48:32 ] :: [ LOG ] :: ip macsec add DEV rx SCI sa { 0..3 } [ OPTS ] key ID KEY :: [ 16:48:32 ] :: [ LOG ] :: ip macsec set DEV rx SCI sa { 0..3 } [ OPTS ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec del DEV rx SCI sa { 0..3 } :: [ 16:48:32 ] :: [ LOG ] :: ip macsec show :: [ 16:48:32 ] :: [ LOG ] :: ip macsec show DEV :: [ 16:48:32 ] :: [ LOG ] :: ip macsec offload DEV [ off | phy | mac ] :: [ 16:48:32 ] :: [ LOG ] :: where OPTS := [ pn | xpn ] [ salt SALT ] [ ssci ] [ on | off ] :: [ 16:48:32 ] :: [ LOG ] :: ID := 128-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: KEY := 128-bit or 256-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: SCI := { sci | port { 1..2^16-1 } address } :: [ 16:48:32 ] :: [ LOG ] :: SALT := 96-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:32 ] :: [ PASS ] :: Command 'ip macsec help' (Expected 255, got 255) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 3 good, 0 bad :: RESULT: PASS (Setup) ** Setup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: load/unload macsec module :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 8s :: Assertions: 0 good, 0 bad :: RESULT: PASS (load/unload macsec module) ** load-unload-macsec-module PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip link add macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists Last metadata expiration check: 0:24:06 ago on Sun 29 Jan 2023 04:24:36 PM EST. Dependencies resolved. ================================================================================ Package Arch Version Repository Size ================================================================================ Installing: netperf s390x 2.7.0-5.20210803git3bc455b.fc38 beaker-Fedora-Everything 651 k Transaction Summary ================================================================================ Install 1 Package Total download size: 651 k Installed size: 1.3 M Downloading Packages: netperf-2.7.0-5.20210803git3bc455b.fc38.s390x.r 9.9 MB/s | 651 kB 00:00 -------------------------------------------------------------------------------- Total 9.8 MB/s | 651 kB 00:00 Running transaction check Transaction check succeeded. Running transaction test Transaction test succeeded. Running transaction Preparing : 1/1 Installing : netperf-2.7.0-5.20210803git3bc455b.fc38.s390x 1/1 Running scriptlet: netperf-2.7.0-5.20210803git3bc455b.fc38.s390x 1/1 Verifying : netperf-2.7.0-5.20210803git3bc455b.fc38.s390x 1/1 Installed: netperf-2.7.0-5.20210803git3bc455b.fc38.s390x Complete! Netperf version 2.7.1 :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec1 type macsec' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec1 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link del macsec1' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec1' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec9999 type macsec' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec9999 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link del macsec9999' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec9999' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name ttt type macsec' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name ttt type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link set ttt up' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link set ttt up' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link show ttt' 74: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 1e:75:34:74:9e:0e brd ff:ff:ff:ff:ff:ff :: [ 16:48:46 ] :: [ LOG ] :: Output of 'ip link show ttt': :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:46 ] :: [ LOG ] :: 74: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 16:48:46 ] :: [ LOG ] :: link/ether 1e:75:34:74:9e:0e brd ff:ff:ff:ff:ff:ff :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link show ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip -d link show ttt' 74: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ether 1e:75:34:74:9e:0e brd ff:ff:ff:ff:ff:ff promiscuity 0 allmulti 0 minmtu 0 maxmtu 65535 macsec sci 1e7534749e0e0001 protect on cipher GCM-AES-128 icvlen 16 encodingsa 0 validate strict encrypt off send_sci on end_station off scb off replay off addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 tso_max_size 65536 tso_max_segs 65535 gro_max_size 65536 :: [ 16:48:46 ] :: [ LOG ] :: Output of 'ip -d link show ttt': :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:46 ] :: [ LOG ] :: 74: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 16:48:46 ] :: [ LOG ] :: link/ether 1e:75:34:74:9e:0e brd ff:ff:ff:ff:ff:ff promiscuity 0 allmulti 0 minmtu 0 maxmtu 65535 :: [ 16:48:46 ] :: [ LOG ] :: macsec sci 1e7534749e0e0001 protect on cipher GCM-AES-128 icvlen 16 encodingsa 0 validate strict encrypt off send_sci on end_station off scb off replay off addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 tso_max_size 65536 tso_max_segs 65535 gro_max_size 65536 :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip -d link show ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip macsec show ttt' 74: ttt: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 1e7534749e0e0001 on SA 0 offload: off :: [ 16:48:46 ] :: [ LOG ] :: Output of 'ip macsec show ttt': :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:46 ] :: [ LOG ] :: 74: ttt: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off :: [ 16:48:46 ] :: [ LOG ] :: cipher suite: GCM-AES-128, using ICV length 16 :: [ 16:48:46 ] :: [ LOG ] :: TXSC: 1e7534749e0e0001 on SA 0 :: [ 16:48:46 ] :: [ LOG ] :: offload: off :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link del ttt' :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port -1' Error: argument "-1" is wrong: expected port :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port -1' (Expected 255, got 255) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 0' Error: argument "0" is wrong: expected port != 0 :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 0' (Expected 255, got 255) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 65536' Error: argument "65536" is wrong: expected port :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 65536' (Expected 255, got 255) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec sci 1' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 1' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec sci 0100560212005452' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 0100560212005452' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 0' Error: argument "0" is wrong: ICV length must be in the range {8..16} :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 0' (Expected 255, got 255) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 16' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 16' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: verify icvlen (Assert: '16' should equal '16') :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encrypt aa' Error: argument of "encrypt" must be one of "off", "on", not "aa" :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt aa' (Expected 1, got 1) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: default encrypt is off (Assert: 'off' should equal 'off') :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encrypt on' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt on' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: veirfy encrypt is on (Assert: 'on' should equal 'on') :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec send_sci aa' Error: argument of "send_sci" must be one of "off", "on", not "aa" :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci aa' (Expected 1, got 1) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: default send_sci is on (Assert: 'on' should equal 'on') :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec send_sci off' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci off' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: veirfy send_sci is off (Assert: 'off' should equal 'off') :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec end_station aa' Error: argument of "end_station" must be one of "off", "on", not "aa" :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default end_station is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec end_station on' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station on' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: veirfy end_station is on (Assert: 'on' should equal 'on') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec scb aa' Error: argument of "scb" must be one of "off", "on", not "aa" :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default scb is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec scb on' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb on' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: veirfy scb is on (Assert: 'on' should equal 'on') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec protect aa' Error: argument of "protect" must be one of "off", "on", not "aa" :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default protect is on (Assert: 'on' should equal 'on') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec protect off' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect off' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: veirfy protect is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay aa' Error: argument of "replay" must be one of "off", "on", not "aa" :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default replay is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ BEGIN ] :: should specify window size :: actually running 'ip link add link dummy0 name macsec0 type macsec replay on' replay protection enabled, but no window set. did you mean 'replay on window VALUE'? :: [ 16:48:48 ] :: [ PASS ] :: should specify window size (Expected 1, got 1) :: [ 16:48:48 ] :: [ BEGIN ] :: should turn replay on :: actually running 'ip link add link dummy0 name macsec0 type macsec window 1024' replay window set, but replay protection not enabled. did you mean 'replay on window 1024'? :: [ 16:48:48 ] :: [ PASS ] :: should turn replay on (Expected 1, got 1) :: [ 16:48:49 ] :: [ BEGIN ] :: out of window size :: actually running 'ip link add link dummy0 name macsec0 type macsec replay on window -1' Error: argument "-1" is wrong: expected replay window size :: [ 16:48:49 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 16:48:49 ] :: [ BEGIN ] :: out of window size :: actually running 'ip link add link dummy0 name macsec0 type macsec replay on window 4294967296' Error: argument "4294967296" is wrong: expected replay window size :: [ 16:48:49 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 10240' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 10240' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy replay is on (Assert: 'on' should equal 'on') :: [ 16:48:49 ] :: [ PASS ] :: veirfy window is 10240 (Assert: '10240' should equal '10240') :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec validate aa' Error: argument of "validate" must be one of "disabled", "check", "strict", not "aa" :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate aa' (Expected 1, got 1) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: default validate is strict (Assert: 'strict' should equal 'strict') :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec validate check' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate check' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy validate is check (Assert: 'check' should equal 'check') :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec validate disabled' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate disabled' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy validate is disabled (Assert: 'disabled' should equal 'disabled') :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa aa' Error: argument "aa" is wrong: expected an { 0..3 } :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa aa' (Expected 255, got 255) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa -1' Error: argument "-1" is wrong: expected an { 0..3 } :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa -1' (Expected 255, got 255) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa 4' Error: argument "4" is wrong: expected an { 0..3 } :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 4' (Expected 255, got 255) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: default encodingsa is 0 (Assert: '0' should equal '0') :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec encodingsa 2' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 2' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy encodingsa is 2 (Assert: '2' should equal '2') :: [ 16:48:49 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 8s :: Assertions: 95 good, 0 bad :: RESULT: PASS (ip link add macsec) ** ip-link-add-macsec PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec sci 0100560212005452 encrypt on' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec sci 0100560212005452 encrypt on' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx sci 0100567212005452' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 1 pn 1 on key 01 81818181818181818181818181816262' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 1 pn 1 on key 01 81818181818181818181818181816262' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec show ttt' Device "ttt" does not exist. :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 1, got 1) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec show macsec0' 97: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 0100560212005452 on SA 0 0: PN 0, state on, key 00000000000000000000000000000000 1: PN 0, state on, key 01000000000000000000000000000000 RXSC: 0100567212005452, state off 0: PN 0, state on, key 00000000000000000000000000000000 offload: off :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec show macsec0' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: must specify a key :: actually running 'ip macsec add macsec0 tx sa 2' cannot create SA without key :: [ 16:48:50 ] :: [ PASS ] :: must specify a key (Expected 1, got 1) :: [ 16:48:50 ] :: [ BEGIN ] :: must specify the pn :: actually running 'ip macsec add macsec0 tx sa 2 key 99 123456789123456789' must specify a packet number != 0 :: [ 16:48:50 ] :: [ PASS ] :: must specify the pn (Expected 1, got 1) :: [ 16:48:50 ] :: [ BEGIN ] :: bad key length :: actually running 'ip macsec add macsec0 tx sa 2 pn 100 key 03 123456789123456789' RTNETLINK answers: Invalid argument :: [ 16:48:50 ] :: [ PASS ] :: bad key length (Expected 2, got 2) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 2 pn 100 key 280a67381fb156a73693cd650d4cc2c9 050cfebea0ec8729d03c846b59349922' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 2 pn 100 key 280a67381fb156a73693cd650d4cc2c9 050cfebea0ec8729d03c846b59349922' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec show | grep 280a67381fb156a73693cd650d4cc2c9' 2: PN 0, state off, key 280a67381fb156a73693cd650d4cc2c9 :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec show | grep 280a67381fb156a73693cd650d4cc2c9' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec set macsec0 tx sa 2 pn 1024 off' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 off' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec set macsec0 tx sa 2 pn 1024 on' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 on' (Expected 0, got 0) :: [ 16:48:50 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci 0100567212005452' :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci 0100567212005452' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 16 good, 0 bad :: RESULT: PASS (ip macsec) ** ip-macsec PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check MTU :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: default real_dev MTU is 1500 (Assert: '1500' should equal '1500') :: [ 16:48:51 ] :: [ PASS ] :: default macsec header + tailer is 32 (Assert: '1468' should equal '1468') :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 8' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 8' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: set macsec tailer to 8 (Assert: '1476' should equal '1476') :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 16' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 16' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: set macsec tailer to 16 (Assert: '1468' should equal '1468') :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 9000' RTNETLINK answers: Numerical result out of range :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 9000' (Expected 2, got 2) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 100' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 100' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1500' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1500' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 3000' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 3000' (Expected 0, got 0) :: [ 16:48:51 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0, got 0) :: [ 16:48:52 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:48:52 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 16:48:52 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '8968' should equal '8968') :: [ 16:48:53 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 5000' :: [ 16:48:53 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 5000' (Expected 0, got 0) :: [ 16:48:53 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '4968' should equal '4968') :: [ 16:48:54 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 16:48:54 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0, got 0) :: [ 16:48:54 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '1468' should equal '1468') :: [ 16:48:55 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 100' :: [ 16:48:55 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 100' (Expected 0, got 0) :: [ 16:48:55 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '68' should equal '68') :: [ 16:48:55 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:55 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 4s :: Assertions: 26 good, 0 bad :: RESULT: PASS (check MTU) ** check-MTU PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check promiscuous mode :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists :: [ 16:48:56 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 macsec0 type macsec' :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:56 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0, got 0) :: [ 16:48:56 ] :: [ BEGIN ] :: Running 'if_dev_promisc dummy0' :: [ 16:48:56 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 0, got 0) :: [ 16:48:56 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 16:48:56 ] :: [ BEGIN ] :: Running 'if_dev_promisc dummy0' :: [ 16:48:56 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 1, got 1) :: [ 16:48:56 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 6 good, 0 bad :: RESULT: PASS (check promiscuous mode) ** check-promiscuous-mode PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup masec between 2 netns, do ping/netperf test :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: RTNETLINK answers: File exists Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC Starting netserver with host 'IN(6)ADDR_ANY' port '12865' and family AF_UNSPEC 105: veth1@if106: mtu 1500 master br0 state forwarding priority 32 cost 2 107: veth3@if108: mtu 1500 master br0 state forwarding priority 32 cost 2 lo: flags=8 mtu 65536 loop txqueuelen 1000 (Local Loopback) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 veth0: flags=4163 mtu 1500 inet 192.168.100.11 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 2001:db8:100::11 prefixlen 64 scopeid 0x0 inet6 fe80::b862:33ff:fe02:e67b prefixlen 64 scopeid 0x20 ether ba:62:33:02:e6:7b txqueuelen 1000 (Ethernet) RX packets 3 bytes 286 (286.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 2 bytes 200 (200.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 lo: flags=8 mtu 65536 loop txqueuelen 1000 (Local Loopback) RX packets 0 bytes 0 (0.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 veth2: flags=4163 mtu 1500 inet 192.168.100.21 netmask 255.255.255.0 broadcast 0.0.0.0 inet6 2001:db8:100::21 prefixlen 64 scopeid 0x0 inet6 fe80::a0d4:86ff:feac:5c49 prefixlen 64 scopeid 0x20 ether a2:d4:86:ac:5c:49 txqueuelen 1000 (Ethernet) RX packets 1 bytes 90 (90.0 B) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 0 bytes 0 (0.0 B) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 :: [ 16:48:57 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ping 192.168.100.21 -c 5' PING 192.168.100.21 (192.168.100.21) 56(84) bytes of data. 64 bytes from 192.168.100.21: icmp_seq=1 ttl=64 time=0.047 ms 64 bytes from 192.168.100.21: icmp_seq=2 ttl=64 time=0.049 ms 64 bytes from 192.168.100.21: icmp_seq=3 ttl=64 time=0.091 ms 64 bytes from 192.168.100.21: icmp_seq=4 ttl=64 time=0.097 ms 64 bytes from 192.168.100.21: icmp_seq=5 ttl=64 time=0.104 ms --- 192.168.100.21 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4134ms rtt min/avg/max/mdev = 0.047/0.077/0.104/0.024 ms :: [ 16:49:01 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping 192.168.100.21 -c 5' (Expected 0, got 0) :: [ 16:49:01 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ping6 2001:db8:100::21 -c 5' PING 2001:db8:100::21(2001:db8:100::21) 56 data bytes 64 bytes from 2001:db8:100::21: icmp_seq=1 ttl=64 time=0.103 ms 64 bytes from 2001:db8:100::21: icmp_seq=2 ttl=64 time=0.101 ms 64 bytes from 2001:db8:100::21: icmp_seq=3 ttl=64 time=0.087 ms 64 bytes from 2001:db8:100::21: icmp_seq=4 ttl=64 time=0.089 ms 64 bytes from 2001:db8:100::21: icmp_seq=5 ttl=64 time=0.101 ms --- 2001:db8:100::21 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4127ms rtt min/avg/max/mdev = 0.087/0.096/0.103/0.006 ms :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping6 2001:db8:100::21 -c 5' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip link add link veth0 macsec0 type macsec sci 0100567112005452 encrypt on' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link add link veth0 macsec0 type macsec sci 0100567112005452 encrypt on' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip link set macsec0 up' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link set macsec0 up' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip macsec show macsec0' 2: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 0100567112005452 on SA 0 0: PN 0, state on, key 00000000000000000000000000000000 RXSC: 0100567212005452, state off 0: PN 0, state on, key 00000000000000000000000000000000 offload: off :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec show macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip addr add 192.168.9.1/24 dev macsec0' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 192.168.9.1/24 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns0 ip addr add 2009::01/64 dev macsec0' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 2009::01/64 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip link add link veth2 macsec0 type macsec sci 0100567212005452 encrypt on' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link add link veth2 macsec0 type macsec sci 0100567212005452 encrypt on' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip link set macsec0 up' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link set macsec0 up' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip macsec show macsec0' 2: macsec0: protect on validate strict sc off sa off encrypt on send_sci on end_station off scb off replay off cipher suite: GCM-AES-128, using ICV length 16 TXSC: 0100567212005452 on SA 0 0: PN 0, state on, key 00000000000000000000000000000000 RXSC: 0100567112005452, state off 0: PN 0, state on, key 00000000000000000000000000000000 offload: off :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec show macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip addr add 192.168.9.2/24 dev macsec0' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 192.168.9.2/24 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ip addr add 2009::02/64 dev macsec0' :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 2009::02/64 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 arping 192.168.9.1 -I veth2 -c 5' ARPING 192.168.9.1 from 192.168.100.21 veth2 Unicast reply from 192.168.9.1 [BA:62:33:02:E6:7B] 0.524ms Unicast reply from 192.168.9.1 [BA:62:33:02:E6:7B] 0.592ms Unicast reply from 192.168.9.1 [BA:62:33:02:E6:7B] 0.632ms Unicast reply from 192.168.9.1 [BA:62:33:02:E6:7B] 0.541ms Unicast reply from 192.168.9.1 [BA:62:33:02:E6:7B] 0.584ms Sent 5 probes (1 broadcast(s)) Received 5 response(s) :: [ 16:49:10 ] :: [ PASS ] :: Command 'ip netns exec ns1 arping 192.168.9.1 -I veth2 -c 5' (Expected 0, got 0) :: [ 16:49:10 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ping 192.168.9.1 -c 5' PING 192.168.9.1 (192.168.9.1) 56(84) bytes of data. 64 bytes from 192.168.9.1: icmp_seq=1 ttl=64 time=0.082 ms 64 bytes from 192.168.9.1: icmp_seq=2 ttl=64 time=0.127 ms 64 bytes from 192.168.9.1: icmp_seq=3 ttl=64 time=0.124 ms 64 bytes from 192.168.9.1: icmp_seq=4 ttl=64 time=0.159 ms 64 bytes from 192.168.9.1: icmp_seq=5 ttl=64 time=0.109 ms --- 192.168.9.1 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4074ms rtt min/avg/max/mdev = 0.082/0.120/0.159/0.025 ms :: [ 16:49:14 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping 192.168.9.1 -c 5' (Expected 0, got 0) :: [ 16:49:15 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 ping6 2009::01 -c 5' PING 2009::01(2009::1) 56 data bytes 64 bytes from 2009::1: icmp_seq=1 ttl=64 time=0.121 ms 64 bytes from 2009::1: icmp_seq=2 ttl=64 time=0.253 ms 64 bytes from 2009::1: icmp_seq=3 ttl=64 time=0.128 ms 64 bytes from 2009::1: icmp_seq=4 ttl=64 time=0.188 ms 64 bytes from 2009::1: icmp_seq=5 ttl=64 time=0.126 ms --- 2009::01 ping statistics --- 5 packets transmitted, 5 received, 0% packet loss, time 4115ms rtt min/avg/max/mdev = 0.121/0.163/0.253/0.051 ms :: [ 16:49:19 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping6 2009::01 -c 5' (Expected 0, got 0) :: [ 16:49:19 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 192.168.9.1 -t TCP_STREAM -l 30' MIGRATED TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 192.168.9.1 () port 0 AF_INET : histogram : interval : dirty data : demo Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 131072 16384 16384 30.00 3635.85 :: [ 16:49:49 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 16:49:49 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 2009::01 -t TCP_STREAM -l 30' MIGRATED TCP STREAM TEST from ::0 (::) port 0 AF_INET6 to 2009::01 (2009::1) port 0 AF_INET6 : histogram : interval : dirty data : demo Recv Send Send Socket Socket Message Elapsed Size Size Size Time Throughput bytes bytes bytes secs. 10^6bits/sec 131072 16384 16384 30.01 3801.91 :: [ 16:50:19 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 16:50:19 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 192.168.9.1 -t UDP_STREAM -l 30' MIGRATED UDP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to 192.168.9.1 () port 0 AF_INET : histogram : interval : dirty data : demo Socket Message Elapsed Messages Size Size Time Okay Errors Throughput bytes bytes secs # # 10^6bits/sec 262144 65507 30.00 311029 0 5433.20 262144 30.00 185382 3238.34 :: [ 16:50:53 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t UDP_STREAM -l 30' (Expected 0, got 0) :: [ 16:50:53 ] :: [ BEGIN ] :: Running 'ip netns exec ns1 netperf -H 2009::01 -t UDP_STREAM -l 30' MIGRATED UDP STREAM TEST from ::0 (::) port 0 AF_INET6 to 2009::01 (2009::1) port 0 AF_INET6 : histogram : interval : dirty data : demo Socket Message Elapsed Messages Size Size Time Okay Errors Throughput bytes bytes secs # # 10^6bits/sec 262144 65507 30.00 277887 0 4854.26 262144 30.00 170946 2986.16 :: [ 16:51:27 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t UDP_STREAM -l 30' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 151s :: Assertions: 25 good, 0 bad :: RESULT: PASS (Setup masec between 2 netns, do ping/netperf test) ** Setup-masec-between-2-netns-do-ping-netperf-test PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: fault injection :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'CMD_ARRAY=( 'modprobe -r macsec' 'modprobe macsec' 'ip link delete dummy0' 'ip link add dev dummy0 type dummy' 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' 'ip link add link dummy0 name macsec0 type macsec port 12345' 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' 'ip link set dummy0 up' 'ip link set macsec0 up' 'ip addr add 192.168.9.1/24 dev macsec0' 'ip addr add 2009::01/64 dev macsec0' 'arping 192.168.9.9 -I macsec0 -c 30' 'ip link set dummy0 mtu 9000' 'ip link set dummy0 mtu 1500' 'ip link set macsec0 mtu 8968' 'ip link set macsec0 mtu 1468' 'ip link set dummy0 down' 'ip link set macsec0 down' 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' 'ip link del macsec0' )' :: [ 16:51:28 ] :: [ PASS ] :: Command 'CMD_ARRAY=( 'modprobe -r macsec' 'modprobe macsec' 'ip link delete dummy0' 'ip link add dev dummy0 type dummy' 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' 'ip link add link dummy0 name macsec0 type macsec port 12345' 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' 'ip link set dummy0 up' 'ip link set macsec0 up' 'ip addr add 192.168.9.1/24 dev macsec0' 'ip addr add 2009::01/64 dev macsec0' 'arping 192.168.9.9 -I macsec0 -c 30' 'ip link set dummy0 mtu 9000' 'ip link set dummy0 mtu 1500' 'ip link set macsec0 mtu 8968' 'ip link set macsec0 mtu 1468' 'ip link set dummy0 down' 'ip link set macsec0 down' 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' 'ip link del macsec0' )' (Expected 0, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'CMD_CNT=23' :: [ 16:51:28 ] :: [ PASS ] :: Command 'CMD_CNT=23' (Expected 0, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' Cannot find device "macsec0" :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 1) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' Interface "macsec0" is down :: [ 16:51:28 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 16:51:28 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' RTNETLINK answers: File exists :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip addr add 2009::01/64 dev macsec0' RTNETLINK answers: File exists :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' RTNETLINK answers: File exists :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' Interface "macsec0" is down :: [ 16:51:29 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' RTNETLINK answers: File exists :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'modprobe macsec' :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' RTNETLINK answers: Device or resource busy :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 2) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 16:51:30 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' Device "macsec0" does not exist. :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' Device "macsec0" does not exist. :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' RTNETLINK answers: File exists :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:30 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' RTNETLINK answers: No such device :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' RTNETLINK answers: File exists :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 1468' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' RTNETLINK answers: No such device :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' RTNETLINK answers: Device or resource busy :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link del macsec0' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 16:51:31 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' arping: Device macsec0 not available. :: [ 16:51:31 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' Device "macsec0" does not exist. :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link set macsec0 down' Cannot find device "macsec0" :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'ip link set dummy0 down' :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set dummy0 down' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 16:51:32 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link delete dummy0' :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' Cannot find device "dummy0" :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' Cannot find device "macsec0" :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link delete dummy0' :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' Cannot find device "macsec0" :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' arping: Device macsec0 not available. :: [ 16:51:32 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:32 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' arping: Device macsec0 not available. :: [ 16:51:32 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:33 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' Device "macsec0" does not exist. :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' RTNETLINK answers: File exists :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:33 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' Cannot find device "macsec0" :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' Cannot find device "macsec0" :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 16:51:33 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' Cannot find device "macsec0" :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link del macsec0' Cannot find device "macsec0" :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link del macsec0' Cannot find device "macsec0" :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set macsec0 up' Cannot find device "macsec0" :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 9000' :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set dummy0 down' :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 down' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' Cannot find device "macsec0" :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' Device "macsec0" does not exist. :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set dummy0 up' :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ BEGIN ] :: Running 'ip link set dummy0 mtu 1500' :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' Device "macsec0" does not exist. :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' RTNETLINK answers: File exists :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' Interface "macsec0" is down :: [ 16:51:35 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'arping 192.168.9.9 -I macsec0 -c 30' Interface "macsec0" is down :: [ 16:51:35 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' RTNETLINK answers: No such device :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' RTNETLINK answers: File exists :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip link set macsec0 mtu 8968' RTNETLINK answers: Numerical result out of range :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' RTNETLINK answers: No such device :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip link set macsec0 down' :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'modprobe -r macsec' :: [ 16:51:35 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip link add link dummy0 name macsec0 type macsec port 12345' :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip link add dev dummy0 type dummy' RTNETLINK answers: File exists :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ BEGIN ] :: Running 'ip addr add 192.168.9.1/24 dev macsec0' :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 8s :: Assertions: 102 good, 0 bad :: RESULT: PASS (fault injection) ** fault-injection PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:51:36 ] :: [ BEGIN ] :: Running 'reset_network_env' Starting reset_network_env ... RTNETLINK answers: Numerical result out of range rsync: [sender] change_dir "/mnt/tests/gitlab.com/redhat/centos-stream/tests/kernel/kernel-tests/-/archive/main/kernel-tests-main.zip/networking/common/system-connections.no_nm" failed: No such file or directory (2) rsync error: some files/attrs were not transferred (see previous errors) (code 23) at main.c(1336) [sender=3.2.7] Redirecting to /bin/systemctl restart network.service Failed to restart network.service: Unit network.service not found. :: [ 16:51:36 ] :: [ PASS ] :: Command 'reset_network_env' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) ** Cleanup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: TEST PROTOCOL :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Test run ID : 15 Package : unknown beakerlib RPM : beakerlib-1.29.3-2.fc38.noarch Test name : unknown Test started : 2023-01-29 16:48:31 EST Test finished : 2023-01-29 16:51:36 EST (still running) Test duration : 185 seconds Distro : Fedora release 38 (Rawhide) Hostname : ibm-z-511.lab.eng.rdu2.redhat.com Architecture : unknown CPUs : 0 x RAM size : 5996 MB HDD size : 38.08 GB :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Test description :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MACsec sanity check 1. Module load unload Load macsec driver, configure some SC/SA then unload the driver, repeat the loop 50 times. 2. Configuration Setup macsec between 2 hosts and do basic check, should cover ip-macsec options as many as possible 3. Run basic network traffic 4. MTU check :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:48:32 ] :: [ LOG ] :: Output of 'modinfo macsec': :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:32 ] :: [ LOG ] :: filename: /lib/modules/6.2.0-rc5/kernel/drivers/net/macsec.ko :: [ 16:48:32 ] :: [ LOG ] :: license: GPL v2 :: [ 16:48:32 ] :: [ LOG ] :: description: MACsec IEEE 802.1AE :: [ 16:48:32 ] :: [ LOG ] :: alias: net-pf-16-proto-16-family-macsec :: [ 16:48:32 ] :: [ LOG ] :: alias: rtnl-link-macsec :: [ 16:48:32 ] :: [ LOG ] :: depends: :: [ 16:48:32 ] :: [ LOG ] :: intree: Y :: [ 16:48:32 ] :: [ LOG ] :: name: macsec :: [ 16:48:32 ] :: [ LOG ] :: vermagic: 6.2.0-rc5 SMP mod_unload :: [ 16:48:32 ] :: [ LOG ] :: sig_id: PKCS#7 :: [ 16:48:32 ] :: [ LOG ] :: signer: Build time autogenerated kernel key :: [ 16:48:32 ] :: [ LOG ] :: sig_key: 26:63:3E:56:F6:32:E8:CB:7D:53:D7:D2:04:50:D9:C1:74:C7:68:9B :: [ 16:48:32 ] :: [ LOG ] :: sig_hashalgo: sha512 :: [ 16:48:32 ] :: [ LOG ] :: signature: BF:A6:F7:DE:8A:44:67:3C:25:37:0F:D4:98:14:53:07:7F:E7:59:A1: :: [ 16:48:32 ] :: [ LOG ] :: 7D:1E:01:4D:CF:14:F7:ED:78:56:16:57:8A:7F:86:C3:1B:18:BB:87: :: [ 16:48:32 ] :: [ LOG ] :: 2A:97:D3:A3:A6:3B:6E:F2:FD:D1:4A:20:42:CD:2D:3E:A0:16:42:FF: :: [ 16:48:32 ] :: [ LOG ] :: 70:5E:6B:63:B7:83:D3:A4:76:C2:77:D9:BB:90:40:21:5D:64:40:02: :: [ 16:48:32 ] :: [ LOG ] :: F0:06:AF:E8:72:6B:CD:85:ED:CC:E8:5E:70:C9:6B:06:D4:F1:06:DB: :: [ 16:48:32 ] :: [ LOG ] :: 45:6E:9A:64:D2:75:BA:0E:70:24:71:42:46:07:5F:7F:92:46:A3:22: :: [ 16:48:32 ] :: [ LOG ] :: 06:28:9D:9B:54:EE:7A:B0:8E:65:0D:52:DB:15:0A:6B:19:B4:10:C8: :: [ 16:48:32 ] :: [ LOG ] :: 4D:EC:20:F3:B4:CE:FB:B8:57:37:46:E8:15:41:85:9B:BF:9A:47:8D: :: [ 16:48:32 ] :: [ LOG ] :: F5:56:26:54:AE:21:27:B9:C4:E2:39:0D:3F:CE:E0:23:30:B7:8A:72: :: [ 16:48:32 ] :: [ LOG ] :: D4:3B:FC:23:6C:6D:3C:26:19:2D:BC:38:74:17:CB:73:35:3D:4E:36: :: [ 16:48:32 ] :: [ LOG ] :: 9F:CB:24:ED:CC:21:D3:CA:0F:D2:34:AB:83:74:2A:96:28:42:51:BE: :: [ 16:48:32 ] :: [ LOG ] :: 99:8A:88:1A:0D:62:52:4F:40:78:F0:77:A5:B9:C2:F1:E8:11:7C:ED: :: [ 16:48:32 ] :: [ LOG ] :: 9A:AC:BF:39:AC:67:8F:D3:37:23:EA:FC:DE:D2:3D:7B:74:25:8A:93: :: [ 16:48:32 ] :: [ LOG ] :: 41:79:2F:CF:53:BC:39:20:09:A1:E8:8D:87:46:D0:E3:D3:C3:22:11: :: [ 16:48:32 ] :: [ LOG ] :: B4:09:14:A0:C3:A5:5E:72:9A:5E:52:EF:95:9B:37:3A:63:05:BD:37: :: [ 16:48:32 ] :: [ LOG ] :: 78:42:68:36:B9:75:8B:6D:5B:EE:F9:EB:96:E6:09:D1:1A:F1:A1:7C: :: [ 16:48:32 ] :: [ LOG ] :: 3B:37:D1:94:91:0D:8B:83:DF:C1:22:2D:BF:D2:B5:D4:C6:FC:E6:3B: :: [ 16:48:32 ] :: [ LOG ] :: 82:E7:85:78:B7:81:84:60:0A:A3:84:8F:1C:76:8F:68:39:FE:6F:6D: :: [ 16:48:32 ] :: [ LOG ] :: 26:3F:E9:1A:22:5E:C7:D9:C2:C0:95:C9:32:51:21:8A:39:17:A9:A7: :: [ 16:48:32 ] :: [ LOG ] :: D3:9C:3D:71:3A:92:C1:3A:92:23:B2:D2:3E:E3:85:3F:66:9B:0B:FA: :: [ 16:48:32 ] :: [ LOG ] :: 48:E4:D2:35:B9:B5:E1:4C:FA:28:B2:7F:A8:04:95:0F:7D:D3:D7:7E: :: [ 16:48:32 ] :: [ LOG ] :: B9:AE:3C:D0:3F:85:F9:E7:9C:37:64:A7:8B:33:D9:14:08:DE:F7:06: :: [ 16:48:32 ] :: [ LOG ] :: 1A:80:71:F6:E6:E0:EB:A4:F8:18:23:71:25:62:76:2B:63:C6:A2:AE: :: [ 16:48:32 ] :: [ LOG ] :: 57:DB:48:2F:48:C1:EC:74:BA:08:EA:69:67:32:AE:73:EB:14:42:D0: :: [ 16:48:32 ] :: [ LOG ] :: B5:2E:D2:58:C2:C1:7C:A8:4D:30:F3:3F:A1:FB:62:D5:E7:AD:61:D7: :: [ 16:48:32 ] :: [ LOG ] :: D2:72:A3:C4:6D:64:B3:A3:5A:8A:0A:8C :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:32 ] :: [ PASS ] :: Command 'modinfo macsec' (Expected 0, got 0) :: [ 16:48:32 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0, got 0) :: [ 16:48:32 ] :: [ LOG ] :: Output of 'ip macsec help': :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:32 ] :: [ LOG ] :: Usage: ip macsec add DEV tx sa { 0..3 } [ OPTS ] key ID KEY :: [ 16:48:32 ] :: [ LOG ] :: ip macsec set DEV tx sa { 0..3 } [ OPTS ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec del DEV tx sa { 0..3 } :: [ 16:48:32 ] :: [ LOG ] :: ip macsec add DEV rx SCI [ on | off ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec set DEV rx SCI [ on | off ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec del DEV rx SCI :: [ 16:48:32 ] :: [ LOG ] :: ip macsec add DEV rx SCI sa { 0..3 } [ OPTS ] key ID KEY :: [ 16:48:32 ] :: [ LOG ] :: ip macsec set DEV rx SCI sa { 0..3 } [ OPTS ] :: [ 16:48:32 ] :: [ LOG ] :: ip macsec del DEV rx SCI sa { 0..3 } :: [ 16:48:32 ] :: [ LOG ] :: ip macsec show :: [ 16:48:32 ] :: [ LOG ] :: ip macsec show DEV :: [ 16:48:32 ] :: [ LOG ] :: ip macsec offload DEV [ off | phy | mac ] :: [ 16:48:32 ] :: [ LOG ] :: where OPTS := [ pn | xpn ] [ salt SALT ] [ ssci ] [ on | off ] :: [ 16:48:32 ] :: [ LOG ] :: ID := 128-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: KEY := 128-bit or 256-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: SCI := { sci | port { 1..2^16-1 } address } :: [ 16:48:32 ] :: [ LOG ] :: SALT := 96-bit hex string :: [ 16:48:32 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:32 ] :: [ PASS ] :: Command 'ip macsec help' (Expected 255, got 255) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 3 good, 0 bad :: RESULT: PASS (Setup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: load/unload macsec module :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 8s :: Assertions: 0 good, 0 bad :: RESULT: PASS (load/unload macsec module) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip link add macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec1 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec1' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec9999 type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del macsec9999' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name ttt type macsec' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link set ttt up' (Expected 0, got 0) :: [ 16:48:46 ] :: [ LOG ] :: Output of 'ip link show ttt': :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:46 ] :: [ LOG ] :: 74: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 16:48:46 ] :: [ LOG ] :: link/ether 1e:75:34:74:9e:0e brd ff:ff:ff:ff:ff:ff :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link show ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ LOG ] :: Output of 'ip -d link show ttt': :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:46 ] :: [ LOG ] :: 74: ttt@dummy0: mtu 1468 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 :: [ 16:48:46 ] :: [ LOG ] :: link/ether 1e:75:34:74:9e:0e brd ff:ff:ff:ff:ff:ff promiscuity 0 allmulti 0 minmtu 0 maxmtu 65535 :: [ 16:48:46 ] :: [ LOG ] :: macsec sci 1e7534749e0e0001 protect on cipher GCM-AES-128 icvlen 16 encodingsa 0 validate strict encrypt off send_sci on end_station off scb off replay off addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 tso_max_size 65536 tso_max_segs 65535 gro_max_size 65536 :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip -d link show ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ LOG ] :: Output of 'ip macsec show ttt': :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 16:48:46 ] :: [ LOG ] :: 74: ttt: protect on validate strict sc off sa off encrypt off send_sci on end_station off scb off replay off :: [ 16:48:46 ] :: [ LOG ] :: cipher suite: GCM-AES-128, using ICV length 16 :: [ 16:48:46 ] :: [ LOG ] :: TXSC: 1e7534749e0e0001 on SA 0 :: [ 16:48:46 ] :: [ LOG ] :: offload: off :: [ 16:48:46 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link del ttt' (Expected 0, got 0) :: [ 16:48:46 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port -1' (Expected 255, got 255) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 0' (Expected 255, got 255) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 65536' (Expected 255, got 255) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 1' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec sci 0100560212005452' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 0' (Expected 255, got 255) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec cipher GCM-AES-128 icvlen 16' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: verify icvlen (Assert: '16' should equal '16') :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt aa' (Expected 1, got 1) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: default encrypt is off (Assert: 'off' should equal 'off') :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encrypt on' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: veirfy encrypt is on (Assert: 'on' should equal 'on') :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci aa' (Expected 1, got 1) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: default send_sci is on (Assert: 'on' should equal 'on') :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec send_sci off' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: veirfy send_sci is off (Assert: 'off' should equal 'off') :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:47 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default end_station is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec end_station on' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: veirfy end_station is on (Assert: 'on' should equal 'on') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default scb is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec scb on' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: veirfy scb is on (Assert: 'on' should equal 'on') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default protect is on (Assert: 'on' should equal 'on') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec protect off' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: veirfy protect is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay aa' (Expected 1, got 1) :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: default replay is off (Assert: 'off' should equal 'off') :: [ 16:48:48 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:48 ] :: [ PASS ] :: should specify window size (Expected 1, got 1) :: [ 16:48:48 ] :: [ PASS ] :: should turn replay on (Expected 1, got 1) :: [ 16:48:49 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 16:48:49 ] :: [ PASS ] :: out of window size (Expected 255, got 255) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 10240' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy replay is on (Assert: 'on' should equal 'on') :: [ 16:48:49 ] :: [ PASS ] :: veirfy window is 10240 (Assert: '10240' should equal '10240') :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate aa' (Expected 1, got 1) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: default validate is strict (Assert: 'strict' should equal 'strict') :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate check' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy validate is check (Assert: 'check' should equal 'check') :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec validate disabled' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy validate is disabled (Assert: 'disabled' should equal 'disabled') :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa aa' (Expected 255, got 255) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa -1' (Expected 255, got 255) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 4' (Expected 255, got 255) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: default encodingsa is 0 (Assert: '0' should equal '0') :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec encodingsa 2' (Expected 0, got 0) :: [ 16:48:49 ] :: [ PASS ] :: veirfy encodingsa is 2 (Assert: '2' should equal '2') :: [ 16:48:49 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 8s :: Assertions: 95 good, 0 bad :: RESULT: PASS (ip link add macsec) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: ip macsec :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec sci 0100560212005452 encrypt on' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 1 pn 1 on key 01 81818181818181818181818181816262' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec show ttt' (Expected 1, got 1) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec show macsec0' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: must specify a key (Expected 1, got 1) :: [ 16:48:50 ] :: [ PASS ] :: must specify the pn (Expected 1, got 1) :: [ 16:48:50 ] :: [ PASS ] :: bad key length (Expected 2, got 2) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 2 pn 100 key 280a67381fb156a73693cd650d4cc2c9 050cfebea0ec8729d03c846b59349922' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec show | grep 280a67381fb156a73693cd650d4cc2c9' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 off' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec set macsec0 tx sa 2 pn 1024 on' (Expected 0, got 0) :: [ 16:48:50 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci 0100567212005452' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 16 good, 0 bad :: RESULT: PASS (ip macsec) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check MTU :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: default real_dev MTU is 1500 (Assert: '1500' should equal '1500') :: [ 16:48:51 ] :: [ PASS ] :: default macsec header + tailer is 32 (Assert: '1468' should equal '1468') :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 8' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: set macsec tailer to 8 (Assert: '1476' should equal '1476') :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec cipher default icvlen 16' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: set macsec tailer to 16 (Assert: '1468' should equal '1468') :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 9000' (Expected 2, got 2) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 100' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1500' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 3000' (Expected 0, got 0) :: [ 16:48:51 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0, got 0) :: [ 16:48:52 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0, got 0) :: [ 16:48:52 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '8968' should equal '8968') :: [ 16:48:53 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 5000' (Expected 0, got 0) :: [ 16:48:53 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '4968' should equal '4968') :: [ 16:48:54 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0, got 0) :: [ 16:48:54 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '1468' should equal '1468') :: [ 16:48:55 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 100' (Expected 0, got 0) :: [ 16:48:55 ] :: [ PASS ] :: macsec should adapt to real_dev (Assert: '68' should equal '68') :: [ 16:48:55 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 4s :: Assertions: 26 good, 0 bad :: RESULT: PASS (check MTU) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: check promiscuous mode :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link add link dummy0 macsec0 type macsec' (Expected 0, got 0) :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0, got 0) :: [ 16:48:56 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 0, got 0) :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0, got 0) :: [ 16:48:56 ] :: [ PASS ] :: Command 'if_dev_promisc dummy0' (Expected 1, got 1) :: [ 16:48:56 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 6 good, 0 bad :: RESULT: PASS (check promiscuous mode) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup masec between 2 netns, do ping/netperf test :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:49:01 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping 192.168.100.21 -c 5' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ping6 2001:db8:100::21 -c 5' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link add link veth0 macsec0 type macsec sci 0100567112005452 encrypt on' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 rx sci 0100567212005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip link set macsec0 up' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip macsec show macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 192.168.9.1/24 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns0 ip addr add 2009::01/64 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link add link veth2 macsec0 type macsec sci 0100567212005452 encrypt on' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 rx sci 0100567112005452 sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec add macsec0 tx sa 0 pn 1 on key 00 81818181818181818181818181816161' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip link set macsec0 up' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip macsec show macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 192.168.9.2/24 dev macsec0' (Expected 0, got 0) :: [ 16:49:05 ] :: [ PASS ] :: Command 'ip netns exec ns1 ip addr add 2009::02/64 dev macsec0' (Expected 0, got 0) :: [ 16:49:10 ] :: [ PASS ] :: Command 'ip netns exec ns1 arping 192.168.9.1 -I veth2 -c 5' (Expected 0, got 0) :: [ 16:49:14 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping 192.168.9.1 -c 5' (Expected 0, got 0) :: [ 16:49:19 ] :: [ PASS ] :: Command 'ip netns exec ns1 ping6 2009::01 -c 5' (Expected 0, got 0) :: [ 16:49:49 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 16:50:19 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t TCP_STREAM -l 30' (Expected 0, got 0) :: [ 16:50:53 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 192.168.9.1 -t UDP_STREAM -l 30' (Expected 0, got 0) :: [ 16:51:27 ] :: [ PASS ] :: Command 'ip netns exec ns1 netperf -H 2009::01 -t UDP_STREAM -l 30' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 151s :: Assertions: 25 good, 0 bad :: RESULT: PASS (Setup masec between 2 netns, do ping/netperf test) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: fault injection :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:51:28 ] :: [ PASS ] :: Command 'CMD_ARRAY=( 'modprobe -r macsec' 'modprobe macsec' 'ip link delete dummy0' 'ip link add dev dummy0 type dummy' 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' 'ip link add link dummy0 name macsec0 type macsec port 12345' 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' 'ip link set dummy0 up' 'ip link set macsec0 up' 'ip addr add 192.168.9.1/24 dev macsec0' 'ip addr add 2009::01/64 dev macsec0' 'arping 192.168.9.9 -I macsec0 -c 30' 'ip link set dummy0 mtu 9000' 'ip link set dummy0 mtu 1500' 'ip link set macsec0 mtu 8968' 'ip link set macsec0 mtu 1468' 'ip link set dummy0 down' 'ip link set macsec0 down' 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' 'ip link del macsec0' )' (Expected 0, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'CMD_CNT=23' (Expected 0, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 1) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip addr add 2009::01/64 dev macsec0' (Expected 0-100, got 2) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:28 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 2) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 16:51:29 ] :: [ PASS ] :: Command 'modprobe macsec' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:29 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 2) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:30 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec replay on window 429496729' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 1468' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0' (Expected 0-100, got 1) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 1) :: [ 16:51:31 ] :: [ PASS ] :: Command 'ip link set dummy0 down' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link delete dummy0' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 0) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:32 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:32 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip macsec add macsec0 tx sa 0 pn 1024 on key 01 81818181818181818181818181818181' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:33 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link del macsec0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set macsec0 up' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 9000' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 down' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 1) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 up' (Expected 0-100, got 0) :: [ 16:51:34 ] :: [ PASS ] :: Command 'ip link set dummy0 mtu 1500' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 1) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add link dummy0 type macsec sci 0100560212005452 encrypt on' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'arping 192.168.9.9 -I macsec0 -c 30' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip macsec add macsec0 rx port 1234 address c6:19:52:8f:e6:a0 sa 0 pn 1 on key 00 82828282828282828282828282828282' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link set macsec0 mtu 8968' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip macsec del macsec0 rx sci d204a0e68f5219c6 sa 0' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link set macsec0 down' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ PASS ] :: Command 'modprobe -r macsec' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add link dummy0 name macsec0 type macsec port 12345' (Expected 0-100, got 0) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip link add dev dummy0 type dummy' (Expected 0-100, got 2) :: [ 16:51:35 ] :: [ PASS ] :: Command 'ip addr add 192.168.9.1/24 dev macsec0' (Expected 0-100, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 8s :: Assertions: 102 good, 0 bad :: RESULT: PASS (fault injection) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:51:36 ] :: [ PASS ] :: Command 'reset_network_env' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 0s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: unknown :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 16:51:36 ] :: [ LOG ] :: Phases fingerprint: qYP1zJ4N :: [ 16:51:36 ] :: [ LOG ] :: Asserts fingerprint: xlgG/dyb Uploading journal.xml .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 185s :: Phases: 9 good, 0 bad :: OVERALL RESULT: PASS (unknown)