Test case: tcptestsuite_test:client_handle_cookie_update_of_length_32
- Test program: /usr/tests/sys/tcptestsuite/tcptestsuite_test
- Result: failed: atf-check failed; see the output of the test for details
- Start time: 2019-06-11T15:44:31.274120Z
- End time: 2019-06-11T15:44:35.851526Z
- Duration: 4.577s
- Execution context
Metadata
- allowed_architectures =
- allowed_platforms =
- description =
- has_cleanup = false
- is_exclusive = false
- required_configs =
- required_disk_space = 0
- required_files =
- required_memory = 0
- required_programs =
- required_user =
- timeout = 300
Standard output
Executing command [ timeout 10 /usr/local/bin/packetdrill /usr/local/share/tcptestsuite/fast-open/client/client-handle-cookie-update-of-length-32.pkt ]
Standard error
Fail: incorrect exit status: 1, expected: 0
stdout:
net.inet.tcp.rfc1323: 1 -> 1
net.inet.tcp.sack.enable: 1 -> 1
net.inet.tcp.ecn.enable: 2 -> 2
kern.ipc.maxsockbuf: 2097152 -> 2097152
net.inet.tcp.fastopen.client_enable: 1 -> 0
net.inet.tcp.fastopen.client_enable: 0 -> 1
stderr:
/usr/local/share/tcptestsuite/fast-open/client/client-handle-cookie-update-of-length-32.pkt:79: error handling packet: live packet field ipv4_total_length: expected: 172 (0xac) vs actual: 60 (0x3c)
script packet: 0.258751 S 0:100(100) win 65535
actual packet: 0.258746 S 0:0(0) win 65535