On 20/12/16(Tue) 16:28, Kirill Miazine wrote: > > Synopsis: splassert ip_output > > Category: kernel amd64 > > Environment: > System : OpenBSD 6.0 > Details : OpenBSD 6.0-current (GENERIC) #58: Mon Dec 19 19:57:52 > MST 2016 > > [email protected]:/usr/src/sys/arch/amd64/compile/GENERIC > > Architecture: OpenBSD.amd64 > Machine : amd64 > > Description: > > Recently (i.e. less than a day ago), logs started getting entries like this: > > splassert: ip_output: want 1 have 0 > Starting stack trace... > ip_output() at ip_output+0x7d > tcp_output() at tcp_output+0x87e > tcp_ctloutput() at tcp_ctloutput+0x350 > sosetopt() at sosetopt+0x7e > sys_setsockopt() at sys_setsockopt+0x12d > syscall() at syscall+0x197
I just committed a fix for that. It's temporary check to help us find the places where the NET_LOCK() need to be held. It's harmless but we need to know when that happen. Thanks for your report, it's much appreciated.
