Test case: tcptestsuite_test:client_handle_cookie_update_of_length_27
- Test program: /usr/tests/sys/tcptestsuite/tcptestsuite_test
- Result: failed: atf-check failed; see the output of the test for details
- Start time: 2019-06-11T15:44:09.805896Z
- End time: 2019-06-11T15:44:13.803235Z
- Duration: 3.997s
- Execution context
Metadata
- allowed_architectures =
- allowed_platforms =
- description =
- has_cleanup = false
- is_exclusive = false
- required_configs =
- required_disk_space = 0
- required_files =
- required_memory = 0
- required_programs =
- required_user =
- timeout = 300
Standard output
Executing command [ timeout 10 /usr/local/bin/packetdrill /usr/local/share/tcptestsuite/fast-open/client/client-handle-cookie-update-of-length-27.pkt ]
Standard error
Fail: incorrect exit status: 1, expected: 0
stdout:
stderr:
/usr/local/share/tcptestsuite/fast-open/client/client-handle-cookie-update-of-length-27.pkt:65: semantic error: TCP options are not padded correctly to ensure TCP header is a multiple of 4 bytes: 1 excess bytes