NetBSD Problem Report #53848

From gson@gson.org  Wed Jan  9 15:41:28 2019
Return-Path: <gson@gson.org>
Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified))
	by mollari.NetBSD.org (Postfix) with ESMTPS id 3E2577A169
	for <gnats-bugs@gnats.NetBSD.org>; Wed,  9 Jan 2019 15:41:28 +0000 (UTC)
Message-Id: <20190109154123.9F9669892EB@guava.gson.org>
Date: Wed,  9 Jan 2019 17:41:23 +0200 (EET)
From: gson@gson.org (Andreas Gustafsson)
Reply-To: gson@gson.org (Andreas Gustafsson)
To: gnats-bugs@NetBSD.org
Subject: ipsecif_{basic,ioctl}_ipv6overipv6_esp_* test cases fail randomly
X-Send-Pr-Version: 3.95

>Number:         53848
>Category:       kern
>Synopsis:       ipsecif_{basic,ioctl}_ipv6overipv6_esp_* test cases fail randomly
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    kern-bug-people
>State:          closed
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Wed Jan 09 15:45:00 +0000 2019
>Closed-Date:    Thu Jan 17 14:15:32 +0000 2019
>Last-Modified:  Thu Jan 17 14:15:32 +0000 2019
>Originator:     Andreas Gustafsson
>Release:        NetBSD-current
>Organization:
>Environment:
System: NetBSD
Architecture: x86_64
Machine: amd64
>Description:

Four test cases of the net/if_ipsec/t_ipsec test, all involving
"ipv6overipv6_esp", are failing randomly.  They don't fail very often
on the qemu-based testbeds, but each one fails in about a third of the
runs on real hardware (tested on an 8-core HP DL360 G7).  Here is a
summary of the outcomes from my last 30 test runs, with each failure
marked by "X" and each success by "-":

---X---X--X-X---XX----XX--XXX--X--------   net/if_ipsec/t_ipsec:ipsecif_basic_ipv6overipv6_esp_null
X---X--------X-X---XX-XX-XX--------X---X   net/if_ipsec/t_ipsec:ipsecif_basic_ipv6overipv6_esp_rijndaelcbc
X------XX-----XX----------------X-----X-   net/if_ipsec/t_ipsec:ipsecif_ioctl_ipv6overipv6_esp_null
--X-----------X---X---------XXX-X-X---X-   net/if_ipsec/t_ipsec:ipsecif_ioctl_ipv6overipv6_esp_rijndaelcbc

The first failures were logged the day after the test was renamed to
its present name soon after being committed in January 2018, so it
seems likely that the problem has existed for at least as long as the
test.

Log output from the latest failure on my testbed is at:

  http://www.gson.org/netbsd/bugs/build/amd64-baremetal/2019/2019.01.09.10.51.23/test.html#net_if_ipsec_t_ipsec_ipsecif_basic_ipv6overipv6_esp_rijndaelcbc

>How-To-Repeat:

Run the ATF tests repatedly on real hardware.

>Fix:

>Release-Note:

>Audit-Trail:
From: "Kengo NAKAHARA" <knakahara@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc: 
Subject: PR/53848 CVS commit: src/tests/net/if_ipsec
Date: Thu, 10 Jan 2019 00:45:09 +0000

 Module Name:	src
 Committed By:	knakahara
 Date:		Thu Jan 10 00:45:08 UTC 2019

 Modified Files:
 	src/tests/net/if_ipsec: t_ipsec.sh

 Log Message:
 tests/net/if_ipsec/t_ipsec disable dad. This may fix PR kern/53848


 To generate a diff of this commit:
 cvs rdiff -u -r1.5 -r1.6 src/tests/net/if_ipsec/t_ipsec.sh

 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.

From: "Kengo NAKAHARA" <knakahara@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc: 
Subject: PR/53848 CVS commit: src/tests/net/if_ipsec
Date: Fri, 11 Jan 2019 08:05:53 +0000

 Module Name:	src
 Committed By:	knakahara
 Date:		Fri Jan 11 08:05:53 UTC 2019

 Modified Files:
 	src/tests/net/if_ipsec: t_ipsec.sh

 Log Message:
 workaround for PR kern/53848


 To generate a diff of this commit:
 cvs rdiff -u -r1.6 -r1.7 src/tests/net/if_ipsec/t_ipsec.sh

 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.

From: Andreas Gustafsson <gson@gson.org>
To: "Kengo NAKAHARA" <knakahara@netbsd.org>
Cc: gnats-bugs@NetBSD.org
Subject: Re: kern/53848: ipsecif_{basic,ioctl}_ipv6overipv6_esp_* test cases fail randomly
Date: Sat, 12 Jan 2019 13:28:59 +0200

 Kengo NAKAHARA wrote:
 >  workaround for PR kern/53848
 [...]
 >  cvs rdiff -u -r1.6 -r1.7 src/tests/net/if_ipsec/t_ipsec.sh

 There has been another failure even after this commit:

   http://www.gson.org/netbsd/bugs/build/amd64-baremetal/2019/2019.01.11.08.30.19/test.html#net_if_ipsec_t_ipsec_ipsecif_ioctl_ipv6overipv6_esp_rijndaelcbc

 -- 
 Andreas Gustafsson, gson@gson.org

From: "Kengo NAKAHARA" <knakahara@netbsd.org>
To: gnats-bugs@gnats.NetBSD.org
Cc: 
Subject: PR/53848 CVS commit: src/tests/net/if_ipsec
Date: Tue, 15 Jan 2019 05:34:38 +0000

 Module Name:	src
 Committed By:	knakahara
 Date:		Tue Jan 15 05:34:38 UTC 2019

 Modified Files:
 	src/tests/net/if_ipsec: t_ipsec.sh

 Log Message:
 Fix PR kern/53848. Add missing "ifconfig -w".


 To generate a diff of this commit:
 cvs rdiff -u -r1.8 -r1.9 src/tests/net/if_ipsec/t_ipsec.sh

 Please note that diffs are not public domain; they are subject to the
 copyright notices on the relevant files.

State-Changed-From-To: open->feedback
State-Changed-By: knakahara@NetBSD.org
State-Changed-When: Thu, 17 Jan 2019 03:31:33 +0000
State-Changed-Why:


State-Changed-From-To: feedback->closed
State-Changed-By: gson@NetBSD.org
State-Changed-When: Thu, 17 Jan 2019 14:15:32 +0000
State-Changed-Why:
No failures in the last 8 test runs.  Thank you knakahara!


>Unformatted:

NetBSD Home
NetBSD PR Database Search

(Contact us) $NetBSD: query-full-pr,v 1.43 2018/01/16 07:36:43 maya Exp $
$NetBSD: gnats_config.sh,v 1.9 2014/08/02 14:16:04 spz Exp $
Copyright © 1994-2017 The NetBSD Foundation, Inc. ALL RIGHTS RESERVED.