On Fri, Aug 12, 2016 at 11:40:03AM -0700, Adrian Chadd wrote: > EIther stable/11 or head. Both are fine. > > > > -a > > > On 12 August 2016 at 11:05, David Wolfskill <da...@catwhisker.org> wrote: > > On Fri, Aug 12, 2016 at 11:01:25AM -0700, Adrian Chadd wrote: > >> David, > >> > >> Totally untested; will need manual application as I bet this patch is > >> mangled. > >> > >> Would you mind testing this? I have a feeling we need to add if_addr > >> lock calls in a few places. > > > > Sure; I'll test. Which branch? > > > > Please note that "lack of recurrence" of the panic isn't especially > > indiciative, as I hadn't seen it previously or since. (Then again, > > yestrday & today, I've been using the wired NIC on the laptop while I'm > > at work, as the laptop has been unable to get a DHCP lease here. (It > > worked OK at Hacker Dojo last night, and works OK at home.) > > > ...
OK; up & runing: FreeBSD localhost 11.0-PRERELEASE FreeBSD 11.0-PRERELEASE #72 r303979M/304004:1100500: Fri Aug 12 13:57:30 PDT 2016 root@localhost:/common/S2/obj/usr/src/sys/CANARY amd64 [Copy/paste...] localhost(11.0-P)[1] cd /usr/src/ localhost(11.0-P)[2] svn diff sys/net80211/ Index: sys/net80211/ieee80211_ioctl.c =================================================================== --- sys/net80211/ieee80211_ioctl.c (revision 304004) +++ sys/net80211/ieee80211_ioctl.c (working copy) @@ -3389,15 +3389,16 @@ /* Wait for parent ioctl handler if it was queued */ if (wait) { ieee80211_waitfor_parent(ic); - /* * Check if the MAC address was changed * via SIOCSIFLLADDR ioctl. */ + if_addr_rlock(ifp); if ((ifp->if_flags & IFF_UP) == 0 && !IEEE80211_ADDR_EQ(vap->iv_myaddr, IF_LLADDR(ifp))) IEEE80211_ADDR_COPY(vap->iv_myaddr, IF_LLADDR(ifp)); + if_addr_runlock(ifp); } break; case SIOCADDMULTI: localhost(11.0-P)[3] That said, I am unable to test use of wireless here at work at this time, as I am unable to obtain a DHCP lease now (I am presently connected via em0 NIC): ... Aug 12 21:04:15 console-kit-daemon[970]: WARNING: Error waiting for native console 1 activation: Inappropriate ioctl for device Aug 12 21:04:15 kernel: ACPI Warning: \_SB.PCI0.PEG0.PEGP._DSM: Argument #4 type mismatch - Found [Buffer], ACPI requires [Package] (20160527/nsarguments-97) Aug 12 21:04:15 last message repeated 11 times Aug 12 21:04:22 wpa_supplicant[373]: wlan0: CTRL-EVENT-SSID-REENABLED id=25 ssid="$work_SSID" Aug 12 21:04:22 wpa_supplicant[373]: wlan0: Trying to associate with 04:bd:88:18:18:82 (SSID='$work_SSID' freq=2462 MHz) Aug 12 21:04:22 wpa_supplicant[373]: wlan0: Associated with 04:bd:88:18:18:82 Aug 12 21:04:22 kernel: wlan0: link state changed to UP Aug 12 21:04:22 dhclient: /etc/dhclient-enter-hooks invoked with reason EXPIRE Aug 12 21:04:22 dhclient: Ignoring claimed EXPIRE dhclient invocation Aug 12 21:04:22 dhclient[393]: send_packet: No buffer space available Aug 12 21:04:22 dhclient[393]: send_packet: No buffer space available Aug 12 21:04:22 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started Aug 12 21:04:22 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13 -> NAK Aug 12 21:04:22 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 Aug 12 21:04:22 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected Aug 12 21:04:23 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5' hash=8420dfbe376f414bf4c0a81e6936d24ccc03f304835b86c7a39142fca723a689 Aug 12 21:04:23 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3' hash=64903546a58058d1e6f1bead1134ede66a6831d231f0df8d4e28535d7a300496 Aug 12 21:04:23 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=US/ST=California/L=Los Gatos/O=Netflix, Inc./OU=NetEng/CN=wifi.netflix.com' hash=27ffd334788bcee10fd242f99781c4d39eba66827096c52e551b6c627881f0fd Aug 12 21:04:23 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:wifi.netflix.com Aug 12 21:04:23 wpa_supplicant[373]: EAP-MSCHAPV2: Password not configured Aug 12 21:04:23 wpa_supplicant[373]: wlan0: CTRL-REQ-PASSWORD-25:Password needed for SSID $work_SSID Aug 12 21:04:28 dhclient[393]: send_packet: No buffer space available Aug 12 21:04:31 console-kit-daemon[970]: WARNING: Error waiting for native console 1 activation: Inappropriate ioctl for device Aug 12 21:04:31 console-kit-daemon[970]: WARNING: Error waiting for native console 9 activation: Inappropriate ioctl for device Aug 12 21:04:42 dhclient[393]: send_packet: No buffer space available Aug 12 21:04:43 devd: notify_clients: send() failed; dropping unresponsive client Aug 12 21:04:47 dhclient[393]: send_packet: No buffer space available Aug 12 21:05:17 last message repeated 3 times Aug 12 21:05:24 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed Aug 12 21:05:26 dhclient[393]: send_packet: No buffer space available Aug 12 21:05:26 wpa_supplicant[373]: wlan0: Authentication with 04:bd:88:18:18:82 timed out. Aug 12 21:05:26 wpa_supplicant[373]: wlan0: CTRL-EVENT-DISCONNECTED bssid=04:bd:88:18:18:82 reason=3 locally_generated=1 Aug 12 21:05:26 wpa_supplicant[373]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED id=25 ssid="$work_SSID" auth_failures=2 duration=31 reason=AUTH_FAILED Aug 12 21:05:26 kernel: wlan0: link state changed to DOWN Aug 12 21:05:29 kernel: ACPI Warning: \_SB.PCI0.PEG0.PEGP._DSM: Argument #4 type mismatch - Found [Buffer], ACPI requires [Package] (20160527/nsarguments-97) Aug 12 21:05:29 last message repeated 11 times Aug 12 21:05:38 dhclient[393]: send_packet: Network is down Aug 12 21:05:43 dhclient: /etc/dhclient-enter-hooks invoked with reason TIMEOUT Aug 12 21:05:43 dhclient: Ignoring claimed TIMEOUT dhclient invocation Aug 12 21:05:50 devd: notify_clients: send() failed; dropping unresponsive client Aug 12 21:05:50 kernel: GEOM_ELI: Device ada0s4j.eli created. Aug 12 21:05:50 kernel: GEOM_ELI: Encryption: AES-XTS 128 Aug 12 21:05:50 kernel: GEOM_ELI: Crypto: software Aug 12 21:06:01 wpa_supplicant[373]: wlan0: CTRL-EVENT-SSID-REENABLED id=25 ssid="$work_SSID" Aug 12 21:06:01 wpa_supplicant[373]: wlan0: Trying to associate with 04:bd:88:18:68:a2 (SSID='$work_SSID' freq=2412 MHz) Aug 12 21:06:01 kernel: wlan0: link state changed to UP Aug 12 21:06:01 wpa_supplicant[373]: wlan0: Associated with 04:bd:88:18:68:a2 Aug 12 21:06:01 dhclient: /etc/dhclient-enter-hooks invoked with reason EXPIRE Aug 12 21:06:01 dhclient: Ignoring claimed EXPIRE dhclient invocation Aug 12 21:06:01 dhclient[393]: send_packet: No buffer space available Aug 12 21:06:04 last message repeated 2 times Aug 12 21:06:06 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started Aug 12 21:06:10 dhclient[393]: send_packet: No buffer space available Aug 12 21:06:16 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started Aug 12 21:06:20 dhclient[393]: send_packet: No buffer space available Aug 12 21:06:27 dhclient[393]: send_packet: No buffer space available Aug 12 21:06:31 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started Aug 12 21:06:36 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=13 -> NAK Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5' hash=8420dfbe376f414bf4c0a81e6936d24ccc03f304835b86c7a39142fca723a689 Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3' hash=64903546a58058d1e6f1bead1134ede66a6831d231f0df8d4e28535d7a300496 Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=US/ST=California/L=Los Gatos/O=Netflix, Inc./OU=NetEng/CN=wifi.netflix.com' hash=27ffd334788bcee10fd242f99781c4d39eba66827096c52e551b6c627881f0fd Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 DNS:wifi.netflix.com Aug 12 21:06:41 wpa_supplicant[373]: EAP-MSCHAPV2: Password not configured Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-REQ-PASSWORD-25:Password needed for SSID $work_SSID Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-DISCONNECTED bssid=04:bd:88:18:68:a2 reason=3 locally_generated=1 Aug 12 21:06:41 kernel: wlan0: link state changed to DOWN Aug 12 21:06:41 devd: notify_clients: send() failed; dropping unresponsive client Aug 12 21:06:41 wpa_supplicant[373]: wlan0: CTRL-EVENT-TERMINATING Aug 12 21:06:53 david: /etc/rc.d/dhclient: WARNING: failed to start dhclient Aug 12 21:07:42 kernel: em0: Link is up 1000 Mbps Full Duplex Aug 12 21:07:42 kernel: em0: link state changed to UP .... [I hand-replaced ocuurences of the actual SSID iwth "$work_SSID" in the above.] Up to Tuesday (10 Aug), I was using wireless at work (though I would sometimes see authentication timeouts). As of yesterday, I've just been unable to get a DHCP lease at all (running stable/11). Peace, david -- David H. Wolfskill da...@catwhisker.org Those who would murder in the name of God or prophet are blasphemous cowards. See http://www.catwhisker.org/~david/publickey.gpg for my public key.
signature.asc
Description: PGP signature