NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/50588: ATF tests fail with "rump.ping6: failed to get receiving hop limit"



>Number:         50588
>Category:       kern
>Synopsis:       ATF tests fail with "rump.ping6: failed to get receiving hop limit"
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Thu Dec 24 08:45:00 +0000 2015
>Originator:     Ryota Ozaki
>Release:        NetBSD-current
>Organization:
>Environment:
NetBSD rangeley 7.99.24 NetBSD 7.99.24 (GENERIC) #216: Thu Dec 17 11:33:13 JST 2015  ozaki-r@rangeley:(hidden) amd6
>Description:
ATF tests using rump.ping6 fail with "rump.ping6: failed to get receiving hop limit".
The error means that rump.ping6 sets IPV6_RECVHOPLIMIT to a socket, however,
it cannot get a hop limit value from a packet being received on the socket via
ancillary data (CMSG_DATA(3)).

It rarely fails only on rump_server in ATF tests. I have never seen the error on
baremetal machines.
>How-To-Repeat:
Run ATF tests using rump.ping6, e.g., t_gif, many times.
Or see results of ATF tests on anita: http://releng.netbsd.org/test-results.html

It's known that if we limit rump_server's memory (e.g., -r 1m), we can reproduce it
in smaller number of trials.
>Fix:
N/A



Home | Main Index | Thread Index | Old Index