On 20/12/16(Tue) 16:28, Kirill Miazine wrote:
> > Synopsis:   splassert ip_output
> > Category:   kernel amd64
> > Environment:
>       System      : OpenBSD 6.0
>       Details     : OpenBSD 6.0-current (GENERIC) #58: Mon Dec 19 19:57:52 
> MST 2016
>                        
> [email protected]:/usr/src/sys/arch/amd64/compile/GENERIC
> 
>       Architecture: OpenBSD.amd64
>       Machine     : amd64
> > Description:
> 
> Recently (i.e. less than a day ago), logs started getting entries like this:
> 
> splassert: ip_output: want 1 have 0
> Starting stack trace...
> ip_output() at ip_output+0x7d
> tcp_output() at tcp_output+0x87e
> tcp_ctloutput() at tcp_ctloutput+0x350
> sosetopt() at sosetopt+0x7e
> sys_setsockopt() at sys_setsockopt+0x12d
> syscall() at syscall+0x197

I just committed a fix for that.  It's temporary check to help us find
the places where the NET_LOCK() need to be held.  It's harmless but we
need to know when that happen.

Thanks for your report, it's much appreciated.

Reply via email to