none
WFP - Support power managed states RRS feed

  • Question

  • Hi,

    is anybody facing this error? I can't pass WFP tests because "WFP-based products must ensure network connectivity upon recovering from power managed states" test always fails - with 3 different drivers.

    Here is a log file:

    [Use Answer File:                                       TRUE]
    [Has a callout driver:                                  TRUE]
    [Is a firewall:                                         FALSE]
    [Layered on Microsoft Windows Firewall:                 FALSE]
    [Does MAC Filtering:                                    FALSE]
    [Does Virtual Switch Filtering:                         FALSE]
    [Does Packet Injection:                                 FALSE]
    [Does Stream Injection:                                 TRUE]
    [Does Proxying:                                         FALSE]
    [Supports Modern Applications:                          TRUE]
    [Uninstalls cleanly:                                    TRUE]
    [Proxies without deadlocking:                           TRUE]
    [Has an identifying Provider:                           TRUE]
    [Associates Provider with all objects:                  TRUE]
    [Has at least 1 filter:                                 TRUE]
    [Uses only built-in or their own private SubLayer:      TRUE]
    [Has an NDF Helper Class:                               TRUE]
    [Does not AV:                                           TRUE]
    [Does not alter other's WFP Objects:                    TRUE]
    [Injects without deadlocking:                           TRUE]
    [Injects at STREAM without starvation:                  TRUE]
    [Supports Power Managed States:                         TRUE]
    [ACLs objects so other's can enum them:                 TRUE]
    [Uses latest WinSock specifications:                    TRUE]
    [Properly disabled Windows Firewall:                    TRUE]
    [Uses granular filtering:                               TRUE]
    [Can filter by 5 tuples:                                TRUE]
    [Can filter by application name:                        TRUE]
    [Can filter by Physical Addresses:                      TRUE]
    [Uses WFP for filtering and packet maniplulation:       TRUE]
    [Supports IPv4 Address Resolution - ARP:                TRUE]
    [Supports IPv6 Address Resolution - Neighbor Discovery: TRUE]
    [Supports Dynamic IP Addressing:                        TRUE]
    [Supports IPv4:                                         TRUE]
    [Supports IPv6:                                         TRUE]
    [Supports Name Resolution:                              TRUE]
    [Supports 6TO4:                                         TRUE]
    [Supports Automatic Updates:                            TRUE]
    [Supports Basic Website Browsing:                       TRUE]
    [Supports File and Printer Sharing:                     TRUE]
    [Supports ICMP Error Messages:                          TRUE]
    [Supports Internet Streaming:                           TRUE]
    [Supports Media Extender Streaming:                     TRUE]
    [Supports MobileBroadband:                              TRUE]
    [Supports Peer Name Resolution Protocol:                TRUE]
    [Supports Remote Assistance:                            TRUE]
    [Supports Remote Desktop:                               TRUE]
    [Supports Teredo:                                       TRUE]
    [Supports Virtual Private Networking:                   TRUE]
    [Interops with other Virtual Switch Extensions:         TRUE]
    [Does not modify at Egress:                             TRUE]
    [Supports Live Migration:                               TRUE]
    [Supports Removal of Virtual Switch Extensions:         TRUE]
    [Supports Reordering of Virtual Switch Extension:       TRUE]

     [Configuration Timer:                 15 seconds]
    [Number of Packet Injection Commands: 0]
     Start Tests:WFP Logo:[[IGN-]Mon Aug 26 08:59:36 2013[-IGN]]
     
     Start Case:ArchitecturalDesign\SupportPowerManagedStates:[[IGN-]Mon Aug 26 08:59:36 2013[-IGN]]
     Priority: 0, Owner: WFP@Microsoft.com
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add    Rule Name="WFPLogo" Description="Permit Outbound IPv4 with Power States" Dir=Out Action=allow Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=17 Enable=Yes Profile=Any"
     +VAR+INFO+     0 : [IPVersion: IPv4][Direction: Outbound][Protocol: Raw UDP (17)][Source / Local  Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local  Port: 43533][Destination / Remote Port: 46935][Action: PERMIT]
        LocalRawUDP::SocketBind : bind() [Local Bound Address: 1.0.0.1][Local Bound Port: 0xaa0d] [status: 0]
        LocalRawUDP::SocketSendTo : sendto() [bytes sent: 1008] [status: 0]
     VirtualUDP::AnalyzePacket() [IP Version: 0x4][IP Protocol: 0x11][Source Address: 0x1000001][DestinationAddress: 0x10000fe][Source Port: 0xaa0d][Destination Port:0xb757]
     VirtualUDP::RxPackets() : Exit
        LocalRawUDP::SocketSendTo : sendto() [bytes sent: 1008] [status: 0]
     VirtualUDP::AnalyzePacket() [IP Version: 0x4][IP Protocol: 0x11][Source Address: 0x1000001][DestinationAddress: 0x10000fe][Source Port: 0xaa0d][Destination Port:0xb757]
     VirtualUDP::RxPackets() : Exit
     AnalyzeTrafficResults() [Analysis: Permitted][local Error: 0][peer Error: 0][packet(s) Rx'd: Yes][packet(s) Tx'd: Yes]
        LocalRawUDP::SocketShutdown : shutdown() [status: 0]
        LocalRawUDP::SocketClose : closesocket() [status: 0]
     +VAR+PASS     0 :  +SUB_VAR+     1 : [IPVersion: IPv4][Direction: Outbound][Protocol: Raw UDP (17)][Source / Local  Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local  Port: 43533][Destination / Remote Port: 46935][Action: PERMIT]
        PowerStates [status:0][IPv4][Outbound][From: 1.0.0.1][To: 1.0.0.254][PERMIT]
     Variation:  +SUB_VAR+     1 : [IPVersion: IPv4][Direction: Outbound][Protocol: Raw UDP (17)][Source / Local  Address: 1.0.0.1][Destination / Remote Address: 1.0.0.254][Source / Local  Port: 43533][Destination / Remote Port: 46935][Action: PERMIT]
        PowerStates [status:0][IPv4][Outbound][From: 1.0.0.1][To: 1.0.0.254][PERMIT]:PASS:[[IGN-]Mon Aug 26 09:03:42 2013[-IGN]]
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo"                                                      Dir=Out              Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=17            Profile=Any"
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add    Rule Name="WFPLogo" Description="Block Outbound IPv4 with Power States" Dir=Out Action=block Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=17 Enable=Yes Profile=Any"
     +VAR+INFO+     1 : [IPVersion: IPv4][Direction: Inbound][Protocol: UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local  Address: 1.0.0.1][Source / Remote Port: 44107][Destination / Local  Port: 46938][Action: PERMIT]
        LocalUDP::SocketBind : bind() [Local Bound Address: 1.0.0.1][Local Bound Port: 0xb75a] [status: 0]
        LocalUDP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
        LocalUDP::SocketRecv : recv() [bytes received: 0] [status: 0x274c]
        LocalUDP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
     AnalyzeTrafficResults() [Analysis: Blocked][local Error: 0x274c][peer Error: 0][packet(s) Rx'd: No][packet(s) Tx'd: Yes]
        LocalUDP::SocketClose : closesocket() [status: 0]
     +VAR+SEV1     1 :  +SUB_VAR+     1 : [IPVersion: IPv4][Direction: Inbound][Protocol: UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local  Address: 1.0.0.1][Source / Remote Port: 44107][Destination / Local  Port: 46938][Action: PERMIT]
        PowerStates [status: 0][IPv4][Inbound][From: 1.0.0.254][To: 1.0.0.1][PERMIT]
     Variation:  +SUB_VAR+     1 : [IPVersion: IPv4][Direction: Inbound][Protocol: UDP (17)][Source / Remote Address: 1.0.0.254][Destination / Local  Address: 1.0.0.1][Source / Remote Port: 44107][Destination / Local  Port: 46938][Action: PERMIT]
        PowerStates [status: 0][IPv4][Inbound][From: 1.0.0.254][To: 1.0.0.1][PERMIT]:FAIL:[[IGN-]Mon Aug 26 09:07:14 2013[-IGN]]
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo"                                                     Dir=Out              Program=%WinDir%\System32\WFPLogo.Exe LocalIP=1.0.0.1 RemoteIP=1.0.0.254 Protocol=17            Profile=Any"
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add    Rule Name="WFPLogo" Description="Permit Inbound IPv4 with Power States" Dir=In Action=allow Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::4e2:8a06:ada2:87c7 RemoteIP=fe80::1:0:0:FE Protocol=17 Enable=Yes Profile=Any"
     +VAR+INFO+     2 : [IPVersion: IPv6][Direction: Outbound][Protocol: Raw UDP (17)][Source / Local  Address: fe80::4e2:8a06:ada2:87c7][Destination / Remote Address: fe80::1:0:0:FE][Source / Local  Port: 43949][Destination / Remote Port: 45170][Action: PERMIT]
        LocalRawUDP::SocketBind : bind() [Local Bound Address: fe80::4e2:8a06:ada2:87c7][Local Bound Port: 0xabad] [status: 0]
        LocalRawUDP::SocketSendTo : sendto() [bytes sent: 1008] [status: 0]
     VirtualUDP::AnalyzePacket() [IP Version: 0x6][IP Protocol: 0x11][Source Address: fe80::4e2:8a06:ada2:87c7][DestinationAddress: fe80::1:0:0:fe][Source Port: 0xabad][Destination Port: 0xb072]
     VirtualUDP::RxPackets() : Exit
        LocalRawUDP::SocketSendTo : sendto() [bytes sent: 1008] [status: 0]
     VirtualUDP::AnalyzePacket() [IP Version: 0x6][IP Protocol: 0x11][Source Address: fe80::4e2:8a06:ada2:87c7][DestinationAddress: fe80::1:0:0:fe][Source Port: 0xabad][Destination Port: 0xb072]
     VirtualUDP::RxPackets() : Exit
     AnalyzeTrafficResults() [Analysis: Permitted][local Error: 0][peer Error: 0][packet(s) Rx'd: Yes][packet(s) Tx'd: Yes]
        LocalRawUDP::SocketShutdown : shutdown() [status: 0]
        LocalRawUDP::SocketClose : closesocket() [status: 0]
     +VAR+PASS     2 :  +SUB_VAR+     1 : [IPVersion: IPv6][Direction: Outbound][Protocol: Raw UDP (17)][Source / Local  Address: fe80::4e2:8a06:ada2:87c7][Destination / Remote Address: fe80::1:0:0:FE][Source / Local  Port: 43949][Destination / Remote Port: 45170][Action: PERMIT]
        PowerStates [status:0][IPv6][Outbound][From: fe80::4e2:8a06:ada2:87c7][To: fe80::1:0:0:FE][PERMIT]
     Variation:  +SUB_VAR+     1 : [IPVersion: IPv6][Direction: Outbound][Protocol: Raw UDP (17)][Source / Local  Address: fe80::4e2:8a06:ada2:87c7][Destination / Remote Address: fe80::1:0:0:FE][Source / Local  Port: 43949][Destination / Remote Port: 45170][Action: PERMIT]
        PowerStates [status:0][IPv6][Outbound][From: fe80::4e2:8a06:ada2:87c7][To: fe80::1:0:0:FE][PERMIT]:PASS:[[IGN-]Mon Aug 26 09:10:44 2013[-IGN]]
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo"                                                     Dir=In              Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::4e2:8a06:ada2:87c7 RemoteIP=fe80::1:0:0:FE Protocol=17            Profile=Any"
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Add    Rule Name="WFPLogo" Description="Block Inbound IPv4 with Power States" Dir=In Action=block Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::4e2:8a06:ada2:87c7 RemoteIP=fe80::1:0:0:FE Protocol=17 Enable=Yes Profile=Any"
     +VAR+INFO+     3 : [IPVersion: IPv6][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local  Address: fe80::4e2:8a06:ada2:87c7][Source / Remote Port: 41055][Destination / Local  Port: 48040][Action: PERMIT]
        LocalRawUDP::SocketBind : bind() [Local Bound Address: fe80::4e2:8a06:ada2:87c7][Local Bound Port: 0xbba8] [status: 0]
        LocalRawUDP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
        LocalRawUDP::SocketRecv : recv() [bytes received: 0] [status: 0x274c]
        LocalRawUDP::SocketSetToNonBlocking : ioctlsocket() [status: 0]
     AnalyzeTrafficResults() [Analysis: Blocked][local Error: 0x274c][peer Error: 0][packet(s) Rx'd: No][packet(s) Tx'd: Yes]
        LocalRawUDP::SocketClose : closesocket() [status: 0]
     +VAR+SEV1     3 :  +SUB_VAR+     1 : [IPVersion: IPv6][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local  Address: fe80::4e2:8a06:ada2:87c7][Source / Remote Port: 41055][Destination / Local  Port: 48040][Action: PERMIT]
        PowerStates [status: 0][IPv6][Inbound][From: fe80::1:0:0:FE][To: fe80::4e2:8a06:ada2:87c7][PERMIT]
     Variation:  +SUB_VAR+     1 : [IPVersion: IPv6][Direction: Inbound][Protocol: Raw UDP (17)][Source / Remote Address: fe80::1:0:0:FE][Destination / Local  Address: fe80::4e2:8a06:ada2:87c7][Source / Remote Port: 41055][Destination / Local  Port: 48040][Action: PERMIT]
        PowerStates [status: 0][IPv6][Inbound][From: fe80::1:0:0:FE][To: fe80::4e2:8a06:ada2:87c7][PERMIT]:FAIL:[[IGN-]Mon Aug 26 09:15:15 2013[-IGN]]
     Script Run: cmd.exe /C " %WinDir%\System32\NetSh.exe AdvFirewall Firewall Delete Rule Name="WFPLogo"                                                    Dir=In              Program=%WinDir%\System32\WFPLogo.Exe LocalIP=fe80::4e2:8a06:ada2:87c7 RemoteIP=fe80::1:0:0:FE Protocol=17            Profile=Any"
     +TEST+SEV1      : ArchitecturalDesign\SupportPowerManagedStates
     End Case:ArchitecturalDesign\SupportPowerManagedStates:FAIL:[[IGN-]Mon Aug 26 09:15:33 2013[-IGN]]
     
     ArchitecturalDesign:[FAIL:1]
      SupportPowerManagedStates:[FAIL:1]

    Can anybody please help?

    Regards,

    HK

    Wednesday, August 28, 2013 3:25 PM