Bug 471531 - [TAHI]NUT receives invalid DAD NA (option length ==zero) test failure
[TAHI]NUT receives invalid DAD NA (option length ==zero) test failure
Status: CLOSED NOTABUG
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel (Show other bugs)
5.3
All Linux
urgent Severity medium
: rc
: ---
Assigned To: Red Hat Kernel Manager
Martin Jenner
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2008-11-14 01:03 EST by wang jiabo
Modified: 2008-11-14 06:51 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-11-14 05:41:47 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description wang jiabo 2008-11-14 01:03:03 EST
Description of problem:
TN wait DAD NS from NUT for 130, but NUT had not transmit DAD NS

Version-Release number of selected component (if applicable):
kernel-2.6.18-123.el5

How reproducible:
everytime

Steps to Reproduce:
1.
2.
3.
  
Actual results:
NUT had not transmit DAD NS

Expected results:
TN should receive DAD NS from NUT

Additional info:

failure tcpdump info:
[root@personal rhel53-install]# tcpdump -r 22.html.Link0.dump 
reading from file 22.html.Link0.dump, link-type EN10MB (Ethernet)
12:45:37.858574 IP6 fe80::21d:fff:fe0f:be4e > ff02::2: ICMP6, router solicitation, length 16
12:45:38.933305 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor solicitation, who has fe80::200:ff:fe00:100, length 32
12:45:39.932621 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor solicitation, who has fe80::200:ff:fe00:100, length 32
12:45:40.932856 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor solicitation, who has fe80::200:ff:fe00:100, length 32


pass tcpdump info:
[root@personal rhel53-install]# tcpdump -r 221.html.Link0.dump 
reading from file 221.html.Link0.dump, link-type EN10MB (Ethernet)
20:44:19.367034 IP6 fe80::21d:fff:fe0f:be4e > ff02::2: ICMP6, router solicitation, length 16
20:44:20.436751 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor solicitation, who has fe80::200:ff:fe00:100, length 32
20:44:21.436998 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor solicitation, who has fe80::200:ff:fe00:100, length 32
20:44:22.437297 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor solicitation, who has fe80::200:ff:fe00:100, length 32
20:45:52.243930 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
20:45:52.822199 IP6 :: > ff02::16: HBH ICMP6, multicast listener report v2, 1 group record(s), length 28
20:45:53.186527 IP6 :: > ff02::1:ff0f:be4e: ICMP6, neighbor solicitation, who has fe80::21d:fff:fe0f:be4e, length 24
20:45:53.219441 IP6 fe80::200:ff:fe00:100 > ff02::1: ICMP6, neighbor advertisement, tgt is fe80::21d:fff:fe0f:be4e, length 32
20:45:54.186150 IP6 fe80::21d:fff:fe0f:be4e > ff02::2: ICMP6, router solicitation, length 16
20:45:58.186216 IP6 fe80::21d:fff:fe0f:be4e > ff02::2: ICMP6, router solicitation, length 16
20:45:58.256809 IP6 fe80::200:ff:fe00:100 > ff02::1:ff0f:be4e: ICMP6, neighbor solicitation, who has fe80::21d:fff:fe0f:be4e, length 32
20:45:58.256894 IP6 fe80::21d:fff:fe0f:be4e > fe80::200:ff:fe00:100: ICMP6, neighbor advertisement, tgt is fe80::21d:fff:fe0f:be4e, length 32


failure log info:


12:47:52	Clear Captured Packets (Link0)

	

TN wait DAD NS(DADNS_from_NUT) from NUT for 130 [sec],

12:47:52 	vRecv(Link0,DADNS_from_NUT) timeout:130 cntLimit: seektime:0
vRecv() return status=1

	

TN wait DAD NS from NUT for 130, but NUT had not transmit DAD NS

NG

*** EOT ***

12:50:02	End






pass log info:



20:44:42	Clear Captured Packets (Link0)

	

TN wait DAD NS(DADNS_from_NUT) from NUT for 130 [sec],

20:44:43 	vRecv(Link0,DADNS_from_NUT) timeout:130 cntLimit: seektime:0
recv unexpect packet at 20:45:52
recv unexpect packet at 20:45:52
recv DADNS_from_NUT
20:45:53	vSend(Link0,DADNA_from_TN_invalidOptLen)
!!! unable decode Type size(1,0) ,in Opt_ICMPv6_TLL at(0,0)/size(0)
send DADNA_from_TN_invalidOptLen
20:45:53 	Wait 5 second

	

Check if NUT's address is configured

Send NS from TN to NUT: SOLNS_from_TN_SameTgt

20:45:58	Clear Captured Packets (Link0)
20:45:58	vSend(Link0,SOLNS_from_TN_SameTgt)
send SOLNS_from_TN_SameTgt

	

Wait NA from NUT: NA_from_NUT,NA_from_NUT_woTLL

20:45:58 	vRecv(Link0,NA_from_NUT NA_from_NUT_woTLL) timeout:5 cntLimit:0 seektime:0
recv NA_from_NUT

	

Received packet count=1

Received NA from NUT: NA_from_NUT

NUT assigned the address to the interface.

NUT assigned the address to the interface.

OK

*** EOT ***

20:45:58	End
Packet Reverse Log

      Recv at 20:45:52

      Frame_Ether                     (length:90)
      | Hdr_Ether                       (length:14)
      | | DestinationAddress               = 33:33:00:00:00:16
      | | SourceAddress                    = 00:1d:0f:0f:be:4e
      | | Type                             = 34525
      | Packet_IPv6                     (length:76)
      | | Hdr_IPv6                        (length:40)
      | | | Version                          = 6
      | | | TrafficClass                     = 0
      | | | FlowLabel                        = 0
      | | | PayloadLength                    = 36
      | | | NextHeader                       = 0
      | | | HopLimit                         = 1
      | | | SourceAddress                    = ::
      | | | DestinationAddress               = ff02::16
      | | Hdr_HopByHop                    (length:8)
      | | | NextHeader                       = 58
      | | | HeaderExtLength                  = 0
      | | | Opt_RouterAlert                 (length:4)
      | | | | OptionType                       = 5
      | | | | OptDataLength                    = 2
      | | | | Value                            = 0
      | | | Opt_PadN                        (length:2)
      | | | | OptionType                       = 1
      | | | | OptDataLength                    = 0
      | | ICMPv6_MLDv2Report              (length:28)
      | | | Type                             = 143
      | | | Code                             = 0
      | | | Checksum                         = 45356 calc(45356)
      | | | Reserved                         = 0
      | | | NumOfMcastAddrRecords            = 1
      | | | MLDv2_AddrRecord                (length:20)
      | | | | Type                             = 4
      | | | | AuxDataLen                       = 0
      | | | | NumOfSources                     = 0
      | | | | MulticastAddress                 = ff02::1:ff0f:be4e
      | | | | AuxData                          = 
      ===DADNS_from_NUT=================================
      ng compare hether_nut2tentsolnode.DestinationAddress received:33:33:00:00:00:16 = 33:33:ff:0f:be:4e
      ng compare _HDR_IPV6_DADNS_from_NUT.NextHeader received:0 = 58
      ng compare _HDR_IPV6_DADNS_from_NUT.HopLimit received:1 = 255
      ng compare _HDR_IPV6_DADNS_from_NUT.DestinationAddress received:ff02::16 = ff02::1:ff0f:be4e
      ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.Hdr_HopByHop
      ng count Frame_Ether.Packet_IPv6 != Frame_Ether.Packet_IPv6

      Recv at 20:45:52

      Frame_Ether                     (length:90)
      | Hdr_Ether                       (length:14)
      | | DestinationAddress               = 33:33:00:00:00:16
      | | SourceAddress                    = 00:1d:0f:0f:be:4e
      | | Type                             = 34525
      | Packet_IPv6                     (length:76)
      | | Hdr_IPv6                        (length:40)
      | | | Version                          = 6
      | | | TrafficClass                     = 0
      | | | FlowLabel                        = 0
      | | | PayloadLength                    = 36
      | | | NextHeader                       = 0
      | | | HopLimit                         = 1
      | | | SourceAddress                    = ::
      | | | DestinationAddress               = ff02::16
      | | Hdr_HopByHop                    (length:8)
      | | | NextHeader                       = 58
      | | | HeaderExtLength                  = 0
      | | | Opt_RouterAlert                 (length:4)
      | | | | OptionType                       = 5
      | | | | OptDataLength                    = 2
      | | | | Value                            = 0
      | | | Opt_PadN                        (length:2)
      | | | | OptionType                       = 1
      | | | | OptDataLength                    = 0
      | | ICMPv6_MLDv2Report              (length:28)
      | | | Type                             = 143
      | | | Code                             = 0
      | | | Checksum                         = 45356 calc(45356)
      | | | Reserved                         = 0
      | | | NumOfMcastAddrRecords            = 1
      | | | MLDv2_AddrRecord                (length:20)
      | | | | Type                             = 4
      | | | | AuxDataLen                       = 0
      | | | | NumOfSources                     = 0
      | | | | MulticastAddress                 = ff02::1:ff0f:be4e
      | | | | AuxData                          = 
      ===DADNS_from_NUT=================================
      ng compare hether_nut2tentsolnode.DestinationAddress received:33:33:00:00:00:16 = 33:33:ff:0f:be:4e
      ng compare _HDR_IPV6_DADNS_from_NUT.NextHeader received:0 = 58
      ng compare _HDR_IPV6_DADNS_from_NUT.HopLimit received:1 = 255
      ng compare _HDR_IPV6_DADNS_from_NUT.DestinationAddress received:ff02::16 = ff02::1:ff0f:be4e
      ng meta Packet_IPv6.ICMPv6_NS != Packet_IPv6.Hdr_HopByHop
      ng count Frame_Ether.Packet_IPv6 != Frame_Ether.Packet_IPv6

      Recv at 20:45:53

      Frame_Ether                     (length:78)
      | Hdr_Ether                       (length:14)
      | | DestinationAddress               = 33:33:ff:0f:be:4e
      | | SourceAddress                    = 00:1d:0f:0f:be:4e
      | | Type                             = 34525
      | Packet_IPv6                     (length:64)
      | | Hdr_IPv6                        (length:40)
      | | | Version                          = 6
      | | | TrafficClass                     = 0
      | | | FlowLabel                        = 0
      | | | PayloadLength                    = 24
      | | | NextHeader                       = 58
      | | | HopLimit                         = 255
      | | | SourceAddress                    = ::
      | | | DestinationAddress               = ff02::1:ff0f:be4e
      | | ICMPv6_NS                       (length:24)
      | | | Type                             = 135
      | | | Code                             = 0
      | | | Checksum                         = 61262 calc(61262)
      | | | Reserved                         = 0
      | | | TargetAddress                    = fe80::21d:fff:fe0f:be4e
      ===DADNS_from_NUT=================================

      send DADNA_from_TN_invalidOptLen at 20:45:53

      Frame_Ether                     (length:86)
      | Hdr_Ether                       (length:14)
      | | DestinationAddress               = 33:33:00:00:00:01
      | | SourceAddress                    = 00:00:00:00:01:00
      | | Type                             = 34525
      | Packet_IPv6                     (length:72)
      | | Hdr_IPv6                        (length:40)
      | | | Version                          = 6
      | | | TrafficClass                     = 0
      | | | FlowLabel                        = 0
      | | | PayloadLength                    = 32
      | | | NextHeader                       = 58
      | | | HopLimit                         = 255
      | | | SourceAddress                    = fe80::200:ff:fe00:100
      | | | DestinationAddress               = ff02::1
      | | ICMPv6_NA                       (length:32)
      | | | Type                             = 136
      | | | Code                             = 0
      | | | Checksum                         = 34852 calc()
      | | | RFlag                            = 0
      | | | SFlag                            = 0
      | | | OFlag                            = 1
      | | | Reserved                         = 0
      | | | TargetAddress                    = fe80::21d:fff:fe0f:be4e
      | | | Opt_ICMPv6_TLL                  (length:0)
      | | | [Needless]                      (length:8)
      | | | | data                             = 02000000 00000100

      send SOLNS_from_TN_SameTgt at 20:45:58

      Frame_Ether                     (length:86)
      | Hdr_Ether                       (length:14)
      | | DestinationAddress               = 33:33:ff:0f:be:4e
      | | SourceAddress                    = 00:00:00:00:01:00
      | | Type                             = 34525
      | Packet_IPv6                     (length:72)
      | | Hdr_IPv6                        (length:40)
      | | | Version                          = 6
      | | | TrafficClass                     = 0
      | | | FlowLabel                        = 0
      | | | PayloadLength                    = 32
      | | | NextHeader                       = 58
      | | | HopLimit                         = 255
      | | | SourceAddress                    = fe80::200:ff:fe00:100
      | | | DestinationAddress               = ff02::1:ff0f:be4e
      | | ICMPv6_NS                       (length:32)
      | | | Type                             = 135
      | | | Code                             = 0
      | | | Checksum                         = 60612 calc(60612)
      | | | Reserved                         = 0
      | | | TargetAddress                    = fe80::21d:fff:fe0f:be4e
      | | | Opt_ICMPv6_SLL                  (length:8)
      | | | | Type                             = 1
      | | | | Length                           = 1
      | | | | LinkLayerAddress                 = 00:00:00:00:01:00

      Recv at 20:45:58

      Frame_Ether                     (length:86)
      | Hdr_Ether                       (length:14)
      | | DestinationAddress               = 00:00:00:00:01:00
      | | SourceAddress                    = 00:1d:0f:0f:be:4e
      | | Type                             = 34525
      | Packet_IPv6                     (length:72)
      | | Hdr_IPv6                        (length:40)
      | | | Version                          = 6
      | | | TrafficClass                     = 0
      | | | FlowLabel                        = 0
      | | | PayloadLength                    = 32
      | | | NextHeader                       = 58
      | | | HopLimit                         = 255
      | | | SourceAddress                    = fe80::21d:fff:fe0f:be4e
      | | | DestinationAddress               = fe80::200:ff:fe00:100
      | | ICMPv6_NA                       (length:32)
      | | | Type                             = 136
      | | | Code                             = 0
      | | | Checksum                         = 44464 calc(44464)
      | | | RFlag                            = 0
      | | | SFlag                            = 1
      | | | OFlag                            = 1
      | | | Reserved                         = 0
      | | | TargetAddress                    = fe80::21d:fff:fe0f:be4e
      | | | Opt_ICMPv6_TLL                  (length:8)
      | | | | Type                             = 2
      | | | | Length                           = 1
      | | | | LinkLayerAddress                 = 00:1d:0f:0f:be:4e
      ===NA_from_NUT=================================
Comment 1 Lawrence Lim 2008-11-14 01:35:24 EST
This is a regression as up till kernel-2.6.18-122.el5, this test never fails.
Comment 2 Lawrence Lim 2008-11-14 01:45:49 EST
Running the whole Test Suite concurrently in another set of env to confirm the findings.

Note You need to log in before you can comment on or make changes to this bug.