From nobody Thu Dec 15 18:46:21 2022 X-Original-To: testing@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4NY1R142gzz4V01S for ; Thu, 15 Dec 2022 18:46:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4NY1R132xFz40hP for ; Thu, 15 Dec 2022 18:46:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1671129981; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=HPSaSYbJd6aGyJjn58sA+miDa3xM0hOxSbC3L4bNR3s=; b=bp3GUardJMD8MJgGRVGLdjg51w0fBKbAJceU7E8hSIjuMT57p7StuUIah7vmUIW75QhZoo 6GIwOCl2Mu7WHnsYe88M/6481N1uUfv0VZywwto4zo/P6l0GsdaAL5tenIW9Ye4OgyM5c+ YNh9UBmTDXV87xwZI8ZvVyWg3mnCbQ9w4mqlrAKui4zFR8x4zXeomoCPDKAsc5dS8VMOrH /VwaZ4VOaxgruXzujAeDQCwGPMLP+8xjgdzM+bX6LcsB7yr+8UfhAvVDvHf+VWlY2qklU3 iSZPvPPryssy7vs6ZsdlMm7EJfltPF5F+ABv43VUQHomR4mVzXVid8aeJpJ3lQ== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1671129981; a=rsa-sha256; cv=none; b=omE4TlEEpg55mgyzo42HdX/z4IWwlKFeW+7O+saDSboTHSyuFIfDENGsJpRxUAoFTYx8jY +g6gXs2ZLXOjpet9cixalHkK2gInZdn+3A0y9yrCHFjKxmqJ4aG29kW9xDDPtNvxpS/wil VuK5zhnMWFH8eS9FdfqKrgO1yONPs9AigUN682iUF/+8PLgpc3FEdcx6D6I2/vvDRB+D4h ybsnShqqGeVb5eZNL3BW5qO55EfgjjLO27GFtv0uv6Y0epGjMrt1WQKi7yVeR6RInWA8hl Y8djCYY3tKzMUEYsHN3KXWIj25xOHxZ2YQctewDaigRxJw83Z4QUa5vHuZm5+Q== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4NY1R123WhzjjP for ; Thu, 15 Dec 2022 18:46:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 2BFIkLFR059295 for ; Thu, 15 Dec 2022 18:46:21 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 2BFIkLGR059294 for testing@FreeBSD.org; Thu, 15 Dec 2022 18:46:21 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: testing@FreeBSD.org Subject: [Bug 268390] Kyua KTLS tests (*bad_minor, *bad_major) fail randomly Date: Thu, 15 Dec 2022 18:46:21 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: tests X-Bugzilla-Version: CURRENT X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: jhb@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: testing@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Testing List-Archive: https://lists.freebsd.org/archives/freebsd-testing List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-testing@freebsd.org X-BeenThere: freebsd-testing@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D268390 --- Comment #1 from John Baldwin --- I have a series of reviews for this already. I haven't yet patched it to permit ECONNRESET errors from close(). However, it's curious that usleep() makes a difference. I would suspect that would not help as my understandin= g of the race is that the receiving end of the socket pair notices that the error and drops the connection before the sending end calls close() hence close() returning ECONNRESET. The usleep() should only make that worse as the error detection and drop is triggered by receiving the packets, not by the call to recvmsg(). https://github.com/CTSRD-CHERI/cheribsd/issues/1566 is the first review in = the series, though I haven't yet uploaded a workaround for spurious close() err= ors. The third patch deals with spurious errors from shutdown(). --=20 You are receiving this mail because: You are the assignee for the bug.=