On Sun, Jan 7, 2018 at 6:29 AM, Martin Husemann <[email protected]> wrote: > We should have 0 unexpected failures, but the latest run got: > > Failed test cases: > lib/librumphijack/t_config:fdoff, lib/librumphijack/t_tcpip:http, > lib/librumphijack/t_tcpip:nfs, lib/librumphijack/t_tcpip:ssh, > lib/librumphijack/t_vfs:cpcopy, lib/librumphijack/t_vfs:mv_x, > lib/librumphijack/t_vfs:paxcopy, > net/net/t_forwarding:ipforwarding_fastforward_v4, > net/net/t_forwarding:ipforwarding_fastforward_v6, > net/net/t_forwarding:ipforwarding_fragment_v4, > net/net/t_forwarding:ipforwarding_misc, net/net/t_mtudisc6:mtudisc6_basic, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_aesxcbcmac, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_hmacmd5, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_hmacripemd160, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_hmacsha1, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_hmacsha256, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_hmacsha384, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_hmacsha512, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_keyedmd5, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_keyedsha1, > net/ipsec/t_ipsec_tunnel_odd:ipsec_tunnel_v6v4_ah_null, > net/npf/t_npf:npf_state, fs/nfs/t_rquotad:get_nfs_be_1_both, > fs/nfs/t_rquotad:get_nfs_be_1_group, fs/nfs/t_rquotad:get_nfs_be_1_user, > fs/nfs/t_rquotad:get_nfs_le_1_both, fs/nfs/t_rquotad:get_nfs_le_1_group, > fs/nfs/t_rquotad:get_nfs_le_1_user > > > See http://www.netbsd.org/~martin/sparc64-atf for details. > > Anyone recognize their latest changes as potential culprit?
My fixes of use-after-free of mbuf should fix ipsec failures, but I don't know about other failures. You may need to clean-build rump libraries (I needed). ozaki-r
