daily CVS update output

2018-03-10 Thread NetBSD source update

Updating src tree:
P src/lib/libm/src/e_atan2.c
P src/share/dict/propernames
P src/sys/arch/atari/atari/bus.c
P src/sys/dev/sdmmc/if_bwfm_sdio.c
P src/sys/dev/wscons/mra.c
P src/sys/netinet/tcp_output.c
P src/sys/netipsec/ipsec_mbuf.c
P src/sys/netipsec/xform_ipcomp.c

Updating xsrc tree:


Killing core files:




Updating file list:
-rw-rw-r--  1 srcmastr  netbsd  50487720 Mar 11 03:04 ls-lRA.gz


Re: ATF X86 race with Debug Registers

2018-03-10 Thread Andreas Gustafsson
Kamil Rytarowski wrote:
> Sometimes we catch a bug with Debug Registers in the ptrace(2) tests:
> 
> NetBSD/amd64
> http://releng.netbsd.org/b5reports/amd64/2018/2018.03.06.11.21.31/test.html#lib_libc_sys_t_ptrace_wait6_dbregs_dr3_trap_variable_readwrite_write_2bytes
> 
> NetBSD/i386
> http://releng.netbsd.org/b5reports/i386/2017/2017.12.06.17.54.58/test.html#lib_libc_sys_t_ptrace_wait3_dbregs_dr2_trap_variable_readwrite_read_2bytes
> 
> I was trying to reproduce this locally on a real hardware and in qemu
> (softemu), including concurrent execution, but after merely 100M
> attempts to reproduce the test-case, I've not encountered a single failure.
> 
> Are there some special properties of these releng machines? qemu+kvm?

Nothing special about it AFAIK, it's just qemu from pkgsrc running on
babylon5.netbsd.org, a dual Xeon L5630, under NetBSD 7.1_STABLE.
Typical load is 6-8 qemu processes and a niced -j 16 build.  There's
no kvm - that's only supported under Linux.

If you look at the test.log file corresponding to the test.html, you
can find the qemu version and full qemu command line near the top.
-- 
Andreas Gustafsson, g...@gson.org


ATF X86 race with Debug Registers

2018-03-10 Thread Kamil Rytarowski
Sometimes we catch a bug with Debug Registers in the ptrace(2) tests:

NetBSD/amd64
http://releng.netbsd.org/b5reports/amd64/2018/2018.03.06.11.21.31/test.html#lib_libc_sys_t_ptrace_wait6_dbregs_dr3_trap_variable_readwrite_write_2bytes

NetBSD/i386
http://releng.netbsd.org/b5reports/i386/2017/2017.12.06.17.54.58/test.html#lib_libc_sys_t_ptrace_wait3_dbregs_dr2_trap_variable_readwrite_read_2bytes

I was trying to reproduce this locally on a real hardware and in qemu
(softemu), including concurrent execution, but after merely 100M
attempts to reproduce the test-case, I've not encountered a single failure.

Are there some special properties of these releng machines? qemu+kvm?



signature.asc
Description: OpenPGP digital signature


Re: npf in -current amd64 (7 Mar 2018) now cannot use a "ruleset" multiple times

2018-03-10 Thread Frank Kardel

Hi!

It may be a fix/safeguard for a reload prolem I discussed with rmind@ 
and christos@ in May 2017:


To quote my analysis:

OK, I got the time to dig into it and found the cause.

Silly me has (now had) a configuration like this:

group "a" on if1 {
  ruleset "blacklistd"
  ...
}

group default {
  ruleset "blacklistd"
  ...
}

This leads to two group entries in the rs_dynamic list refencing the same named 
dynamic ruleset.
Dynamic rulesets are matched by name in a first found basis.
rs_dynamic[0] has the ruleset reference for the default group (last entry in 
the config file).
rs_dynamic[1] has the rulesat reference for the interface specific group
When reloading oldconfig->rs_dynamic[0] will be re-parented correctly to the new first 
group referencing the rule name "blacklistd".
For the second new interface specific group the old first group is looked up as 
parent (first match of old group list). That's when
the KASSERT fires as these dynamic rules have already been re-parented to the 
new configuration.

This also explains why I see no effect of the dynamic rules. dynamic rules are 
added by name and thus to the first matching entry. This is the ruleset 
reference from the default group - bummer: one name but two instances.

So we have a semantic issue here - following questions arise:
1) can groups only reference unique dynamic ruleset names? This needs to be 
enforced then.
2) If dynamic rulesets are to be shared then the parent notion needs to be 
reworked/redesigned.

Best regards,
  Frank 


Looks like solition 1) was choosen for now.

Seems you just didn't trip over the underlying issue. I have not closely 
followed NPF lately so I don't know the actual fix status of NPF. As in 
the example above I also had the idea of re-using dynamic rulesets - 
maybe this can be implemented as I still think it is useful. For now my 
workaround was to have several rulesets, but this is just good enough to 
work with blacklistd.


Frank

On 03/07/18 05:46, Geoff Wing wrote:

Hi,
npf previously had no issues using a "ruleset" in multiple groups, however
it now has a problem and fails with

npfctl: (re)load failed: some table has a duplicate entry?

The following is a minimal npf.conf to illustrate with it failing due to
the second ``ruleset "blacklistd"'' causing the issue:
-
$if1_if = inet4(vmx0)
$if2_if = inet4(vmx1)

alg "icmp"

group "foo" on $if1_if {
ruleset "blacklistd"
}
group "bar" on $if2_if {
ruleset "blacklistd"
}

group default {
pass final on lo0 all
block all
}
-

I haven't investigated further yet.  Ring any bells with anyone?

System is amd64 -current.

Regards,
Geoff



Automated report: NetBSD-current/i386 test failure

2018-03-10 Thread NetBSD Test Fixture
This is an automatically generated notice of new failures of the
NetBSD test suite.

The newly failing test cases are:

net/if_ipsec/t_ipsec:ipsecif_basic_ipv4overipv6_esp_null
net/if_ipsec/t_ipsec:ipsecif_basic_ipv4overipv6_esp_rijndaelcbc
net/if_ipsec/t_ipsec:ipsecif_basic_ipv6overipv6_esp_null
net/if_ipsec/t_ipsec:ipsecif_basic_ipv6overipv6_esp_rijndaelcbc
net/if_ipsec/t_ipsec:ipsecif_ioctl_ipv4overipv6_esp_null
net/if_ipsec/t_ipsec:ipsecif_ioctl_ipv4overipv6_esp_rijndaelcbc
net/if_ipsec/t_ipsec:ipsecif_ioctl_ipv6overipv6_esp_null
net/if_ipsec/t_ipsec:ipsecif_ioctl_ipv6overipv6_esp_rijndaelcbc
net/if_ipsec/t_ipsec:ipsecif_recursive_ipv4overipv6_esp_null
net/if_ipsec/t_ipsec:ipsecif_recursive_ipv4overipv6_esp_rijndaelcbc
net/if_ipsec/t_ipsec:ipsecif_recursive_ipv6overipv4_esp_null
net/if_ipsec/t_ipsec:ipsecif_recursive_ipv6overipv4_esp_rijndaelcbc
net/if_ipsec/t_ipsec:ipsecif_recursive_ipv6overipv6_esp_null
net/if_ipsec/t_ipsec:ipsecif_recursive_ipv6overipv6_esp_rijndaelcbc

The above tests failed in each of the last 3 test runs, and passed in
at least 27 consecutive runs before that.

The following commits were made between the last successful test and
the failed test:

2018.03.09.10.59.36 knakahara src/sys/net/if_ipsec.c,v 1.4
2018.03.09.11.01.41 knakahara src/sys/net/if_ipsec.c,v 1.5

Log files can be found at:


http://releng.NetBSD.org/b5reports/i386/commits-2018.03.html#2018.03.09.11.01.41