Date: Fri, 29 Jun 2018 00:12:23 +0200 From: Dave Cottlehuber <dch@skunkwerks.at> To: freebsd-net@freebsd.org Subject: Re: unloading pf causes desktop system to freeze since ~ r335651 [solved] Message-ID: <1530223943.3605310.1424040368.049B8A09@webmail.messagingengine.com> In-Reply-To: <1529999531.2330685.1420550472.409ED830@webmail.messagingengine.com> References: <1529960902.613046.1420067144.3B445531@webmail.messagingengine.com> <1529999531.2330685.1420550472.409ED830@webmail.messagingengine.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 26 Jun 2018, at 09:52, Dave Cottlehuber wrote: > > The HPET NMI watchdog patch was very timely - works a treat: > https://reviews.freebsd.org/D15630 > > > However each time there's no crashdump, & the usual ctrl-alt-esc does't > > work either. > > I bumped my /usr/src to latest HEAD, applied HPET NMI watchdog hack & > after freezing via `service pf stop`, I was rewarded with a coredump > on next reboot; full log: https://git.io/f4Q4P > > [1202] panic: Assertion !in_epoch() && ! > mtx_owned(&(&(*(__typeof(vnet_entry_tcbinfo)*) (((((__curthread())- > >td_vnet))->vnet_data_base) + (uintptr_t)&vnet_entry_tcbinfo)))- > >ipi_lock) failed at /usr/src/sys/netinet/tcp_input.c:802 I narrowed it down to setting this sysctl: net.inet.ip.process_options=0 # ignore IP options in the incoming packets (default 1) and it looks like it was fixed here: r335749 thanks glebius@ https://svnweb.freebsd.org/base/head/sys/netinet/tcp_subr.c?r1=335749&r2=335748&pathrev=335749 I've not had a repeat since building off this. A+ Dave
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1530223943.3605310.1424040368.049B8A09>