Title | Generation of error cause Protocol Violation (Invalid Parameter Length) |
CommandLine | ./GEN_InvalidParamLen.seq -pkt ./GEN_InvalidParamLen.def -log 12.html -ti Generation of error cause Protocol Violation (Invalid Parameter Length) |
TestVersion | REL_1_0_0 |
ToolVersion | REL_3_1_0 |
Start | 2009/02/12 16:24:59 |
Tn | .//../etc//tn.def |
Nu | .//../etc//nut.def |
Pkt | ./GEN_InvalidParamLen.def |
System | linux-v6 |
TargetName | RHEL5GA |
HostName | FNST |
Type | IPv6 |
16:25:00 | Start |
16:25:00 | Start Capturing Packets (Link0) |
=============== sctpCheckEnv =============== | |
16:25:00 |
vRemote(rcommand.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommand.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp" ''
Connected. [1]+ Exit 1 sleep 5 && sctp_test -H 3ffe:501:ffff:100:020c:29ff:fe0f:1734 -P 4109 -h 3ffe:501:ffff:100:0200:00ff:fe00:0100 -p 3109 -T -s -c -1352 -X 1 -x 1 -o 1 > /tmp/tstcmd.log 2>&1 [root@RHEL ~]# [root@RHEL ~]# killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_sta tus; checksctp sctp_test: no process killed sctp_darn: no process killed sctp_status: no process killed SCTP supported [root@RHEL ~]# sendMessagesSync: never got killall -9 sctp_test ; killall -9 sctp_darn ; killall -9 sctp_status; checksctp echo $? 0 [root@R~.~. ~. Disconnected. |
============= sctpPing6ToHost ============== | |
16:25:09 |
vSend(Link0,echo_request_on_link0) Send Echo Request on Link0 |
16:25:09 | vRecv(Link0,echo_reply_on_link0 ns_on_link0 ns_on_link0_gl) timeout:5 cntLimit:0 seektime:0 recv unexpect packet at 16:25:03 Recv Echo Reply on Link0 |
============== sctpStartServer ============= | |
16:25:09 |
vRemote(rcommandasync.rmt) ``/usr/local/v6eval//bin/linux-v6//rcommandasync.rmt -t linux-v6 -u root -p goodluck -d ttyS0 -o 1 cmd="sctp_test -H 3ffe:501:ffff:100:020c:29ff:fe0f:1734 -P 4110 -T -l -x 1 -X 1 > /tmp/tstcmd.log 2>&1 &" ''
Connected. [root@RHEL ~]# [root@RHEL ~]# sctp_test -H 3ffe:50~. Disconnected. |
================ Main Test ================= | |
16:25:13 |
vSend(Link0,sctp_chunk_init_invalid_param_len) !!! unable decode HeartbeatInfo size(800,0) ,in CHUNK_INIT at(20,0)/size(44) Send SCTP CHUNK_INIT (Invalid Parameter Length) |
16:25:13 | vRecv(Link0,sctp_chunk_abort_bad_len ns_on_link0 ns_on_link0_gl) timeout:10 cntLimit:0 seektime:0 Recv SCTP CHUNK_ABORT (Protocol Violation - Invalid Parameter Length) |
OK | |
16:25:13 | End |
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:100:200:ff:fe00:100 | | | DestinationAddress = 3ffe:501:ffff:100:20c:29ff:fe0f:1734 | | ICMPv6_EchoRequest (length:16) | | | Type = 128 | | | Code = 0 | | | Checksum = 41042 calc(41042) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:8) | | | | data = 01020304 05060708
Frame_Ether (length:74) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 34525 | Packet_IPv6 (length:60) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 2 | | | FlowLabel = 0 | | | PayloadLength = 20 | | | NextHeader = 132 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:100:20c:29ff:fe0f:1734 | | | DestinationAddress = 3ffe:501:ffff:100:200:ff:fe00:100 | | Upp_SCTP (length:20) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4108 | | | | DestinationPort = 3108 | | | | VerificationTag = 1 | | | | Checksum = 3930937710 calc(3930937710) | | | CHUNK_SHUTDOWN (length:8) | | | | Type = 7 | | | | Flags = 0 | | | | Length = 8 | | | | TSN = 99 ===echo_reply_on_link0================================= ng compare _HDR_IPV6_echo_reply_on_link0.NextHeader received:132 = 58 ng meta Packet_IPv6.ICMPv6_EchoReply != Packet_IPv6.Upp_SCTP ===ns_on_link0================================= ng compare _HDR_IPV6_ns_on_link0.NextHeader received:132 = 58 ng compare _HDR_IPV6_ns_on_link0.HopLimit received:64 = 255 ng compare _HDR_IPV6_ns_on_link0.SourceAddress received:3ffe:501:ffff:100:20c:29ff:fe0f:1734 = fe80::20c:29ff:fe0f:1734 ng compare _HDR_IPV6_ns_on_link0.DestinationAddress received:3ffe:501:ffff:100:200:ff:fe00:100 = oneof(tnv6(),v6merge("FF02:0:0:0:0:1:FF00:0000",104,tnv6())) ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.Upp_SCTP ===ns_on_link0_gl================================= ng compare _HDR_IPV6_ns_on_link0_gl.NextHeader received:132 = 58 ng compare _HDR_IPV6_ns_on_link0_gl.HopLimit received:64 = 255 ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.Upp_SCTP
Frame_Ether (length:70) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 34525 | Packet_IPv6 (length:56) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 16 | | | NextHeader = 58 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:100:20c:29ff:fe0f:1734 | | | DestinationAddress = 3ffe:501:ffff:100:200:ff:fe00:100 | | ICMPv6_EchoReply (length:16) | | | Type = 129 | | | Code = 0 | | | Checksum = 40786 calc(40786) | | | Identifier = 65535 | | | SequenceNumber = 1 | | | Payload (length:8) | | | | data = 01020304 05060708 ===echo_reply_on_link0=================================
Frame_Ether (length:110) | Hdr_Ether (length:14) | | DestinationAddress = 0:c:29:f:17:34 | | SourceAddress = 0:0:0:0:1:0 | | Type = 34525 | Packet_IPv6 (length:96) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 0 | | | FlowLabel = 0 | | | PayloadLength = 56 | | | NextHeader = 132 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:100:200:ff:fe00:100 | | | DestinationAddress = 3ffe:501:ffff:100:20c:29ff:fe0f:1734 | | Upp_SCTP (length:56) | | | Hdr_SCTP (length:12) | | | | SourcePort = 3110 | | | | DestinationPort = 4110 | | | | VerificationTag = 0 | | | | Checksum = 2627766387 calc() | | | CHUNK_INIT (length:44) | | | | Type = 1 | | | | Flags = 0 | | | | Length = 44 | | | | InitiateTag = 1 | | | | AdvRecvWindow = 54784 | | | | NumOfOutbound = 100 | | | | NumOfInbound = 65535 | | | | TSN = 100 | | | | [Needless] (length:24) | | | | | data = | | | | | 00010320 00000000 00000000 00000000 00000000 00000000
Frame_Ether (length:122) | Hdr_Ether (length:14) | | DestinationAddress = 0:0:0:0:1:0 | | SourceAddress = 0:c:29:f:17:34 | | Type = 34525 | Packet_IPv6 (length:108) | | Hdr_IPv6 (length:40) | | | Version = 6 | | | TrafficClass = 2 | | | FlowLabel = 0 | | | PayloadLength = 68 | | | NextHeader = 132 | | | HopLimit = 64 | | | SourceAddress = 3ffe:501:ffff:100:20c:29ff:fe0f:1734 | | | DestinationAddress = 3ffe:501:ffff:100:200:ff:fe00:100 | | Upp_SCTP (length:68) | | | Hdr_SCTP (length:12) | | | | SourcePort = 4110 | | | | DestinationPort = 3110 | | | | VerificationTag = 1 | | | | Checksum = 2013144039 calc(2013144039) | | | CHUNK_ABORT (length:56) | | | | Type = 6 | | | | Reserved = 0 | | | | TFlag = 0 | | | | Length = 56 | | | | ProtocolViolation (length:52) | | | | | Code = 13 | | | | | Length = 52 | | | | | Information = | | | | | 54686520 666f6c6c 6f77696e 67207061 72616d65 74657220 68616420 696e7661 | | | | | 6c696420 6c656e67 74683a00 00010320 ===sctp_chunk_abort_bad_len=================================