Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Jun 2018 00:12:23 +0200
From:      Dave Cottlehuber <dch@skunkwerks.at>
To:        freebsd-net@freebsd.org
Subject:   Re: unloading pf causes desktop system to freeze since ~ r335651 [solved]
Message-ID:  <1530223943.3605310.1424040368.049B8A09@webmail.messagingengine.com>
In-Reply-To: <1529999531.2330685.1420550472.409ED830@webmail.messagingengine.com>
References:  <1529960902.613046.1420067144.3B445531@webmail.messagingengine.com> <1529999531.2330685.1420550472.409ED830@webmail.messagingengine.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 26 Jun 2018, at 09:52, Dave Cottlehuber wrote:
>
> The HPET NMI watchdog patch was very timely - works a treat: 
> https://reviews.freebsd.org/D15630
> 
> > However each time there's no crashdump, & the usual ctrl-alt-esc does't 
> > work either.
> 
> I bumped my /usr/src to latest HEAD, applied HPET NMI watchdog hack &
> after freezing via `service pf stop`, I was rewarded with a coredump
> on next reboot; full log: https://git.io/f4Q4P
> 
> [1202] panic: Assertion !in_epoch() && !
> mtx_owned(&(&(*(__typeof(vnet_entry_tcbinfo)*) (((((__curthread())-
> >td_vnet))->vnet_data_base) + (uintptr_t)&vnet_entry_tcbinfo)))-
> >ipi_lock) failed at /usr/src/sys/netinet/tcp_input.c:802

I narrowed it down to setting this sysctl:

net.inet.ip.process_options=0           # ignore IP options in the incoming packets (default 1)

and it looks like it was fixed here: r335749 thanks glebius@

https://svnweb.freebsd.org/base/head/sys/netinet/tcp_subr.c?r1=335749&r2=335748&pathrev=335749

I've not had a repeat since building off this.

A+
Dave



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1530223943.3605310.1424040368.049B8A09>