use_pty:FALSE /usr/share/restraint/plugins/run_task_plugins bash ./runtest.sh :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:27:53 ] :: [ BEGIN ] :: Running 'systemctl stop firewalld' :: [ 00:27:53 ] :: [ PASS ] :: Command 'systemctl stop firewalld' (Expected 0, got 0) :: [ 00:27:54 ] :: [ BEGIN ] :: Running 'sleep 60' :: [ 00:28:54 ] :: [ PASS ] :: Command 'sleep 60' (Expected 0, got 0) :: [ 00:28:55 ] :: [ BEGIN ] :: Running 'systemctl status firewalld' ○ firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled; preset: enabled) Active: inactive (dead) Docs: man:firewalld(1) :: [ 00:28:55 ] :: [ PASS ] :: Command 'systemctl status firewalld' (Expected 1-255, got 3) :: [ 00:28:56 ] :: [ BEGIN ] :: Running 'nft delete table inet filter' Error: Could not process rule: No such file or directory delete table inet filter ^^^^^^ :: [ 00:28:57 ] :: [ PASS ] :: Command 'nft delete table inet filter' (Expected 0-255, got 1) :: [ 00:28:58 ] :: [ BEGIN ] :: Running 'sleep 10' :: [ 00:29:08 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 00:29:08 ] :: [ BEGIN ] :: Running 'sys_ka_idle=7200' :: [ 00:29:08 ] :: [ PASS ] :: Command 'sys_ka_idle=7200' (Expected 0, got 0) :: [ 00:29:09 ] :: [ BEGIN ] :: Running 'sys_ka_interval=75' :: [ 00:29:09 ] :: [ PASS ] :: Command 'sys_ka_interval=75' (Expected 0, got 0) :: [ 00:29:09 ] :: [ BEGIN ] :: Running 'sys_ka_idle=9' :: [ 00:29:10 ] :: [ PASS ] :: Command 'sys_ka_idle=9' (Expected 0, got 0) :: [ 00:29:10 ] :: [ BEGIN ] :: iproute installed :: actually running '/usr/bin/dnf -y install iproute' Last metadata expiration check: 3:52:21 ago on Sun 29 Jan 2023 08:36:54 PM EST. Package iproute-6.1.0-1.fc38.x86_64 is already installed. Dependencies resolved. Nothing to do. Complete! :: [ 00:29:17 ] :: [ PASS ] :: iproute installed (Expected 0, got 0) :: [ 00:29:18 ] :: [ BEGIN ] :: Running 'ip netns add netns_ka' :: [ 00:29:18 ] :: [ PASS ] :: Command 'ip netns add netns_ka' (Expected 0, got 0) :: [ 00:29:18 ] :: [ BEGIN ] :: Running 'ip netns exec netns_ka ip link set lo up' :: [ 00:29:19 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ip link set lo up' (Expected 0, got 0) :: [ 00:29:19 ] :: [ BEGIN ] :: Running 'netns_sys_ka_idle=7200' :: [ 00:29:19 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=7200' (Expected 0, got 0) :: [ 00:29:20 ] :: [ BEGIN ] :: Running 'netns_sys_ka_interval=75' :: [ 00:29:20 ] :: [ PASS ] :: Command 'netns_sys_ka_interval=75' (Expected 0, got 0) :: [ 00:29:20 ] :: [ BEGIN ] :: Running 'netns_sys_ka_idle=9' :: [ 00:29:20 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=9' (Expected 0, got 0) :: [ 00:29:21 ] :: [ LOG ] :: socket settings of keepalive will overide the system's :: [ 00:29:21 ] :: [ BEGIN ] :: Running 'idle=6' :: [ 00:29:21 ] :: [ PASS ] :: Command 'idle=6' (Expected 0, got 0) :: [ 00:29:22 ] :: [ BEGIN ] :: Running 'interval=1' :: [ 00:29:22 ] :: [ PASS ] :: Command 'interval=1' (Expected 0, got 0) :: [ 00:29:22 ] :: [ BEGIN ] :: Running 'maxpkt=10' :: [ 00:29:22 ] :: [ PASS ] :: Command 'maxpkt=10' (Expected 0, got 0) :: [ 00:29:23 ] :: [ BEGIN ] :: Running 'port=7811' :: [ 00:29:23 ] :: [ PASS ] :: Command 'port=7811' (Expected 0, got 0) :: [ 00:29:23 ] :: [ BEGIN ] :: Running 'gcc -g -Wall -o keepalive keepalive.c' keepalive.c: In function ‘main’: keepalive.c:119:9: warning: implicit declaration of function ‘wait’ [-Wimplicit-function-declaration] 119 | wait(&status); | ^~~~ :: [ 00:29:24 ] :: [ PASS ] :: Command 'gcc -g -Wall -o keepalive keepalive.c' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 92s :: Assertions: 19 good, 0 bad :: RESULT: PASS (Setup) ** Setup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: host :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:29:33 ] :: [ BEGIN ] :: Running 'tcpdump -nn -i lo port 7811 -w tcpdump.host.pcap &' dropped privs to tcpdump tcpdump: listening on lo, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 00:29:33 ] :: [ PASS ] :: Command 'tcpdump -nn -i lo port 7811 -w tcpdump.host.pcap &' (Expected 0, got 0) :: [ 00:29:38 ] :: [ BEGIN ] :: Running './keepalive 127.0.0.1 7811 6 1 10 &' /usr/sbin/nft :: [ 00:29:38 ] :: [ PASS ] :: Command './keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) :: [ 00:29:39 ] :: [ BEGIN ] :: Running 'sleep 31 ' table inet filter { chain input { type filter hook input priority filter; policy accept; iifname "lo" ip protocol tcp tcp dport 7811 tcp flags ack / fin,syn,rst,psh,ack,urg drop } } :: [ 00:30:10 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 00:30:11 ] :: [ BEGIN ] :: Running 'childpid=278133' :: [ 00:30:11 ] :: [ PASS ] :: Command 'childpid=278133' (Expected 0, got 0) :: [ 00:30:12 ] :: [ BEGIN ] :: Running 'kill -s SIGINT 278133' connected :: [ 00:30:12 ] :: [ PASS ] :: Command 'kill -s SIGINT 278133' (Expected 0, got 0) accepted, and block ACK from client Child process terminated normally! nft delete table inet filter:: [ 00:30:12 ] :: [ BEGIN ] :: Running 'pkill tcpdump' 24 packets captured 48 packets received by filter 0 packets dropped by kernel :: [ 00:30:13 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 00:30:18 ] :: [ BEGIN ] :: Running 'tcpdump -r tcpdump.host.pcap' reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump 00:29:38.814834 IP localhost.52252 > localhost.7811: Flags [S], seq 3606332018, win 65495, options [mss 65495,sackOK,TS val 310144341 ecr 0,nop,wscale 7], length 0 00:29:38.815133 IP localhost.7811 > localhost.52252: Flags [S.], seq 2379755687, ack 3606332019, win 65483, options [mss 65495,sackOK,TS val 310144342 ecr 310144341,nop,wscale 7], length 0 00:29:38.815308 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310144342 ecr 310144342], length 0 00:29:45.230254 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310150756 ecr 310144342], length 0 00:29:45.230698 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310150757 ecr 310144342], length 0 00:29:46.253709 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310151781 ecr 310144342], length 0 00:29:46.253915 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310151781 ecr 310144342], length 0 00:29:47.277677 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310152804 ecr 310144342], length 0 00:29:47.277875 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310152805 ecr 310144342], length 0 00:29:48.301746 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310153828 ecr 310144342], length 0 00:29:48.301901 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310153829 ecr 310144342], length 0 00:29:49.325746 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310154852 ecr 310144342], length 0 00:29:49.325969 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310154853 ecr 310144342], length 0 00:29:50.349741 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310155876 ecr 310144342], length 0 00:29:50.349986 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310155877 ecr 310144342], length 0 00:29:51.373728 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310156900 ecr 310144342], length 0 00:29:51.373961 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310156901 ecr 310144342], length 0 00:29:52.397704 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310157924 ecr 310144342], length 0 00:29:52.397904 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310157925 ecr 310144342], length 0 00:29:53.421741 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310158948 ecr 310144342], length 0 00:29:53.421970 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310158949 ecr 310144342], length 0 00:29:54.445706 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310159972 ecr 310144342], length 0 00:29:54.445859 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310159973 ecr 310144342], length 0 00:29:55.469880 IP localhost.7811 > localhost.52252: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 310160997 ecr 310144342], length 0 :: [ 00:30:18 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.host.pcap': :: [ 00:30:19 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 00:30:19 ] :: [ LOG ] :: reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 00:30:19 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 00:30:19 ] :: [ LOG ] :: 00:29:38.814834 IP localhost.52252 > localhost.7811: Flags [S], seq 3606332018, win 65495, options [mss 65495,sackOK,TS val 310144341 ecr 0,nop,wscale 7], length 0 :: [ 00:30:19 ] :: [ LOG ] :: 00:29:38.815133 IP localhost.7811 > localhost.52252: Flags [S.], seq 2379755687, ack 3606332019, win 65483, options [mss 65495,sackOK,TS val 310144342 ecr 310144341,nop,wscale 7], length 0 :: [ 00:30:19 ] :: [ LOG ] :: 00:29:38.815308 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310144342 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:45.230254 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310150756 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:45.230698 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310150757 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:46.253709 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310151781 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:46.253915 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310151781 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:47.277677 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310152804 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:47.277875 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310152805 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:48.301746 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310153828 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:48.301901 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310153829 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:49.325746 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310154852 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:49.325969 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310154853 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:50.349741 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310155876 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:50.349986 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310155877 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:51.373728 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310156900 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:51.373961 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310156901 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:52.397704 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310157924 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:52.397904 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310157925 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:53.421741 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310158948 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:53.421970 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310158949 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:54.445706 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310159972 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:54.445859 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310159973 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:55.469880 IP localhost.7811 > localhost.52252: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 310160997 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 00:30:23 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.host.pcap' (Expected 0, got 0) reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump :: [ 00:30:23 ] :: [ BEGIN ] :: Running 'kalive_pkts=10' :: [ 00:30:23 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 00:30:24 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 52s :: Assertions: 9 good, 0 bad :: RESULT: PASS (host) ** host PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: netns :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:30:33 ] :: [ BEGIN ] :: Running 'ip netns exec netns_ka tcpdump -nn -i lo port 7811 -w tcpdump.netns.pcap &' :: [ 00:30:33 ] :: [ PASS ] :: Command 'ip netns exec netns_ka tcpdump -nn -i lo port 7811 -w tcpdump.netns.pcap &' (Expected 0, got 0) dropped privs to tcpdump tcpdump: listening on lo, link-type EN10MB (Ethernet), snapshot length 262144 bytes :: [ 00:30:38 ] :: [ BEGIN ] :: Running 'ip netns exec netns_ka ./keepalive 127.0.0.1 7811 6 1 10 &' /usr/sbin/nft :: [ 00:30:38 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ./keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) :: [ 00:30:39 ] :: [ BEGIN ] :: Running 'sleep 31 ' table inet filter { chain input { type filter hook input priority filter; policy accept; iifname "lo" ip protocol tcp tcp dport 7811 tcp flags ack / fin,syn,rst,psh,ack,urg drop } } :: [ 00:31:10 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 00:31:11 ] :: [ BEGIN ] :: Running 'childpid=278754' :: [ 00:31:11 ] :: [ PASS ] :: Command 'childpid=278754' (Expected 0, got 0) :: [ 00:31:11 ] :: [ BEGIN ] :: Running 'kill -s SIGINT 278754' connected :: [ 00:31:12 ] :: [ PASS ] :: Command 'kill -s SIGINT 278754' (Expected 0, got 0) accepted, and block ACK from client Child process terminated normally! nft delete table inet filter:: [ 00:31:12 ] :: [ BEGIN ] :: Running 'pkill tcpdump' 24 packets captured 48 packets received by filter 0 packets dropped by kernel :: [ 00:31:12 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 00:31:18 ] :: [ BEGIN ] :: Running 'tcpdump -r tcpdump.netns.pcap' reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump 00:30:38.813778 IP localhost.52124 > localhost.7811: Flags [S], seq 3621702313, win 65495, options [mss 65495,sackOK,TS val 310204340 ecr 0,nop,wscale 7], length 0 00:30:38.814221 IP localhost.7811 > localhost.52124: Flags [S.], seq 4199865624, ack 3621702314, win 65483, options [mss 65495,sackOK,TS val 310204341 ecr 310204340,nop,wscale 7], length 0 00:30:38.814485 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310204341 ecr 310204341], length 0 00:30:45.133815 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310210660 ecr 310204341], length 0 00:30:45.134096 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310210661 ecr 310204341], length 0 00:30:46.157807 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310211685 ecr 310204341], length 0 00:30:46.158001 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310211685 ecr 310204341], length 0 00:30:47.181719 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310212708 ecr 310204341], length 0 00:30:47.181913 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310212709 ecr 310204341], length 0 00:30:48.205693 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310213732 ecr 310204341], length 0 00:30:48.205892 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310213733 ecr 310204341], length 0 00:30:49.229765 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310214757 ecr 310204341], length 0 00:30:49.229958 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310214757 ecr 310204341], length 0 00:30:50.253736 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310215780 ecr 310204341], length 0 00:30:50.254023 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310215781 ecr 310204341], length 0 00:30:51.277760 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310216804 ecr 310204341], length 0 00:30:51.278104 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310216805 ecr 310204341], length 0 00:30:52.301814 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310217828 ecr 310204341], length 0 00:30:52.301969 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310217829 ecr 310204341], length 0 00:30:53.325931 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310218853 ecr 310204341], length 0 00:30:53.326196 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310218853 ecr 310204341], length 0 00:30:54.349915 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310219876 ecr 310204341], length 0 00:30:54.350113 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310219877 ecr 310204341], length 0 00:30:55.373852 IP localhost.7811 > localhost.52124: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 310220901 ecr 310204341], length 0 :: [ 00:31:18 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.netns.pcap': :: [ 00:31:19 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 00:31:19 ] :: [ LOG ] :: reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 00:31:19 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 00:31:19 ] :: [ LOG ] :: 00:30:38.813778 IP localhost.52124 > localhost.7811: Flags [S], seq 3621702313, win 65495, options [mss 65495,sackOK,TS val 310204340 ecr 0,nop,wscale 7], length 0 :: [ 00:31:19 ] :: [ LOG ] :: 00:30:38.814221 IP localhost.7811 > localhost.52124: Flags [S.], seq 4199865624, ack 3621702314, win 65483, options [mss 65495,sackOK,TS val 310204341 ecr 310204340,nop,wscale 7], length 0 :: [ 00:31:19 ] :: [ LOG ] :: 00:30:38.814485 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310204341 ecr 310204341], length 0 :: [ 00:31:19 ] :: [ LOG ] :: 00:30:45.133815 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310210660 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:45.134096 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310210661 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:46.157807 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310211685 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:46.158001 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310211685 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:47.181719 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310212708 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:47.181913 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310212709 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:48.205693 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310213732 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:48.205892 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310213733 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:49.229765 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310214757 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:49.229958 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310214757 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:50.253736 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310215780 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:50.254023 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310215781 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:51.277760 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310216804 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:51.278104 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310216805 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:52.301814 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310217828 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:52.301969 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310217829 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:53.325931 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310218853 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:53.326196 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310218853 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:54.349915 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310219876 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:54.350113 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310219877 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:55.373852 IP localhost.7811 > localhost.52124: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 310220901 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 00:31:23 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.netns.pcap' (Expected 0, got 0) reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 dropped privs to tcpdump :: [ 00:31:23 ] :: [ BEGIN ] :: Running 'kalive_pkts=10' :: [ 00:31:24 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 00:31:24 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 52s :: Assertions: 9 good, 0 bad :: RESULT: PASS (netns) ** netns PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:31:33 ] :: [ BEGIN ] :: Running 'ip netns del netns_ka' :: [ 00:31:33 ] :: [ PASS ] :: Command 'ip netns del netns_ka' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) ** Cleanup PASS Score:0 Uploading resultoutputfile.log .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: TEST PROTOCOL :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Test run ID : 20 Package : unknown beakerlib RPM : beakerlib-1.29.3-2.fc38.noarch Test name : unknown Test started : 2023-01-30 00:27:48 EST Test finished : 2023-01-30 00:31:39 EST (still running) Test duration : 231 seconds Distro : Fedora release 38 (Rawhide) Hostname : koza-1.4a2m.lab.eng.bos.redhat.com Architecture : unknown CPUs : 4 x Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz RAM size : 15612 MB HDD size : 607.79 GB :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Test description :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Keep-Alive Process: There are three configurable properties that determine how Keep-Alives work. On Linux they are1: tcp_keepalive_time default 7200 seconds tcp_keepalive_probes default 9 tcp_keepalive_intvl default 75 seconds TCP keepalive works like this: Client opens TCP connection If the connection is silent for tcp_keepalive_time seconds, send a single empty ACK packet.1 Did the server respond with a corresponding ACK of its own? No Wait tcp_keepalive_intvl seconds, then send another ACK Repeat until the number of ACK probes that have been sent equals tcp_keepalive_probes. If no response has been received at this point, send a RST and terminate the connection. Yes: Return to step 2 This process is enabled by default on most operating systems, and thus dead TCP connections are regularly pruned once the other end has been responsive for 2 hours 11 minutes (7200 seconds + 75 * 9 seconds). This test case: Use socket options to overide the system's, and test keepalive process. TCP_KEEPIDLE ----> tcp_keepalive_time TCP_KEEPCNT ----> tcp_keepalive_probes TCP_KEEPINTVL ----> tcp_keepalive_intvl For namespace: Bug 1476667 - [RFE] Namespace tcp_keepalive_time sysctl knob :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Setup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:27:53 ] :: [ PASS ] :: Command 'systemctl stop firewalld' (Expected 0, got 0) :: [ 00:28:54 ] :: [ PASS ] :: Command 'sleep 60' (Expected 0, got 0) :: [ 00:28:55 ] :: [ PASS ] :: Command 'systemctl status firewalld' (Expected 1-255, got 3) :: [ 00:28:57 ] :: [ PASS ] :: Command 'nft delete table inet filter' (Expected 0-255, got 1) :: [ 00:29:08 ] :: [ PASS ] :: Command 'sleep 10' (Expected 0, got 0) :: [ 00:29:08 ] :: [ PASS ] :: Command 'sys_ka_idle=7200' (Expected 0, got 0) :: [ 00:29:09 ] :: [ PASS ] :: Command 'sys_ka_interval=75' (Expected 0, got 0) :: [ 00:29:10 ] :: [ PASS ] :: Command 'sys_ka_idle=9' (Expected 0, got 0) :: [ 00:29:17 ] :: [ PASS ] :: iproute installed (Expected 0, got 0) :: [ 00:29:18 ] :: [ PASS ] :: Command 'ip netns add netns_ka' (Expected 0, got 0) :: [ 00:29:19 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ip link set lo up' (Expected 0, got 0) :: [ 00:29:19 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=7200' (Expected 0, got 0) :: [ 00:29:20 ] :: [ PASS ] :: Command 'netns_sys_ka_interval=75' (Expected 0, got 0) :: [ 00:29:20 ] :: [ PASS ] :: Command 'netns_sys_ka_idle=9' (Expected 0, got 0) :: [ 00:29:21 ] :: [ LOG ] :: socket settings of keepalive will overide the system's :: [ 00:29:21 ] :: [ PASS ] :: Command 'idle=6' (Expected 0, got 0) :: [ 00:29:22 ] :: [ PASS ] :: Command 'interval=1' (Expected 0, got 0) :: [ 00:29:22 ] :: [ PASS ] :: Command 'maxpkt=10' (Expected 0, got 0) :: [ 00:29:23 ] :: [ PASS ] :: Command 'port=7811' (Expected 0, got 0) :: [ 00:29:24 ] :: [ PASS ] :: Command 'gcc -g -Wall -o keepalive keepalive.c' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 92s :: Assertions: 19 good, 0 bad :: RESULT: PASS (Setup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: host :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:29:33 ] :: [ PASS ] :: Command 'tcpdump -nn -i lo port 7811 -w tcpdump.host.pcap &' (Expected 0, got 0) :: [ 00:29:38 ] :: [ PASS ] :: Command './keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) :: [ 00:30:10 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 00:30:11 ] :: [ PASS ] :: Command 'childpid=278133' (Expected 0, got 0) :: [ 00:30:12 ] :: [ PASS ] :: Command 'kill -s SIGINT 278133' (Expected 0, got 0) :: [ 00:30:13 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 00:30:18 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.host.pcap': :: [ 00:30:19 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 00:30:19 ] :: [ LOG ] :: reading from file tcpdump.host.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 00:30:19 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 00:30:19 ] :: [ LOG ] :: 00:29:38.814834 IP localhost.52252 > localhost.7811: Flags [S], seq 3606332018, win 65495, options [mss 65495,sackOK,TS val 310144341 ecr 0,nop,wscale 7], length 0 :: [ 00:30:19 ] :: [ LOG ] :: 00:29:38.815133 IP localhost.7811 > localhost.52252: Flags [S.], seq 2379755687, ack 3606332019, win 65483, options [mss 65495,sackOK,TS val 310144342 ecr 310144341,nop,wscale 7], length 0 :: [ 00:30:19 ] :: [ LOG ] :: 00:29:38.815308 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310144342 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:45.230254 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310150756 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:45.230698 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310150757 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:46.253709 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310151781 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:46.253915 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310151781 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:47.277677 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310152804 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:47.277875 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310152805 ecr 310144342], length 0 :: [ 00:30:20 ] :: [ LOG ] :: 00:29:48.301746 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310153828 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:48.301901 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310153829 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:49.325746 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310154852 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:49.325969 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310154853 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:50.349741 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310155876 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:50.349986 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310155877 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:51.373728 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310156900 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:51.373961 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310156901 ecr 310144342], length 0 :: [ 00:30:21 ] :: [ LOG ] :: 00:29:52.397704 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310157924 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:52.397904 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310157925 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:53.421741 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310158948 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:53.421970 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310158949 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:54.445706 IP localhost.7811 > localhost.52252: Flags [.], ack 1, win 512, options [nop,nop,TS val 310159972 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:54.445859 IP localhost.52252 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310159973 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: 00:29:55.469880 IP localhost.7811 > localhost.52252: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 310160997 ecr 310144342], length 0 :: [ 00:30:22 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 00:30:23 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.host.pcap' (Expected 0, got 0) :: [ 00:30:23 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 00:30:24 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 52s :: Assertions: 9 good, 0 bad :: RESULT: PASS (host) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: netns :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:30:33 ] :: [ PASS ] :: Command 'ip netns exec netns_ka tcpdump -nn -i lo port 7811 -w tcpdump.netns.pcap &' (Expected 0, got 0) :: [ 00:30:38 ] :: [ PASS ] :: Command 'ip netns exec netns_ka ./keepalive 127.0.0.1 7811 6 1 10 &' (Expected 0, got 0) :: [ 00:31:10 ] :: [ PASS ] :: Command 'sleep 31 ' (Expected 0, got 0) :: [ 00:31:11 ] :: [ PASS ] :: Command 'childpid=278754' (Expected 0, got 0) :: [ 00:31:12 ] :: [ PASS ] :: Command 'kill -s SIGINT 278754' (Expected 0, got 0) :: [ 00:31:12 ] :: [ PASS ] :: Command 'pkill tcpdump' (Expected 0, got 0) :: [ 00:31:18 ] :: [ LOG ] :: Output of 'tcpdump -r tcpdump.netns.pcap': :: [ 00:31:19 ] :: [ LOG ] :: --------------- OUTPUT START --------------- :: [ 00:31:19 ] :: [ LOG ] :: reading from file tcpdump.netns.pcap, link-type EN10MB (Ethernet), snapshot length 262144 :: [ 00:31:19 ] :: [ LOG ] :: dropped privs to tcpdump :: [ 00:31:19 ] :: [ LOG ] :: 00:30:38.813778 IP localhost.52124 > localhost.7811: Flags [S], seq 3621702313, win 65495, options [mss 65495,sackOK,TS val 310204340 ecr 0,nop,wscale 7], length 0 :: [ 00:31:19 ] :: [ LOG ] :: 00:30:38.814221 IP localhost.7811 > localhost.52124: Flags [S.], seq 4199865624, ack 3621702314, win 65483, options [mss 65495,sackOK,TS val 310204341 ecr 310204340,nop,wscale 7], length 0 :: [ 00:31:19 ] :: [ LOG ] :: 00:30:38.814485 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310204341 ecr 310204341], length 0 :: [ 00:31:19 ] :: [ LOG ] :: 00:30:45.133815 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310210660 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:45.134096 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310210661 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:46.157807 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310211685 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:46.158001 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310211685 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:47.181719 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310212708 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:47.181913 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310212709 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:48.205693 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310213732 ecr 310204341], length 0 :: [ 00:31:20 ] :: [ LOG ] :: 00:30:48.205892 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310213733 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:49.229765 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310214757 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:49.229958 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310214757 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:50.253736 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310215780 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:50.254023 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310215781 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:51.277760 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310216804 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:51.278104 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310216805 ecr 310204341], length 0 :: [ 00:31:21 ] :: [ LOG ] :: 00:30:52.301814 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310217828 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:52.301969 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310217829 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:53.325931 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310218853 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:53.326196 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310218853 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:54.349915 IP localhost.7811 > localhost.52124: Flags [.], ack 1, win 512, options [nop,nop,TS val 310219876 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:54.350113 IP localhost.52124 > localhost.7811: Flags [.], ack 1, win 512, options [nop,nop,TS val 310219877 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: 00:30:55.373852 IP localhost.7811 > localhost.52124: Flags [R.], seq 1, ack 1, win 512, options [nop,nop,TS val 310220901 ecr 310204341], length 0 :: [ 00:31:22 ] :: [ LOG ] :: --------------- OUTPUT END --------------- :: [ 00:31:23 ] :: [ PASS ] :: Command 'tcpdump -r tcpdump.netns.pcap' (Expected 0, got 0) :: [ 00:31:24 ] :: [ PASS ] :: Command 'kalive_pkts=10' (Expected 0, got 0) :: [ 00:31:24 ] :: [ PASS ] :: pass: kalive_pkts equals 10 :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 52s :: Assertions: 9 good, 0 bad :: RESULT: PASS (netns) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Cleanup :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:31:33 ] :: [ PASS ] :: Command 'ip netns del netns_ka' (Expected 0, got 0) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 1s :: Assertions: 1 good, 0 bad :: RESULT: PASS (Cleanup) :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: unknown :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: [ 00:31:41 ] :: [ LOG ] :: Phases fingerprint: 3TFH3dbq :: [ 00:31:41 ] :: [ LOG ] :: Asserts fingerprint: cDYg/isO Uploading journal.xml .done :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: :: Duration: 232s :: Phases: 4 good, 0 bad :: OVERALL RESULT: PASS (unknown)