On Fri, Aug 12, 2016 at 11:40:03AM -0700, Adrian Chadd wrote:
> EIther stable/11 or head. Both are fine.
> 
> 
> 
> -a
> 
> 
> On 12 August 2016 at 11:05, David Wolfskill <da...@catwhisker.org> wrote:
> > On Fri, Aug 12, 2016 at 11:01:25AM -0700, Adrian Chadd wrote:
> >> David,
> >>
> >> Totally untested; will need manual application as I bet this patch is 
> >> mangled.
> >>
> >> Would you mind testing this? I have a feeling we need to add if_addr
> >> lock calls in a few places.
> >
> > Sure; I'll test.  Which branch?
> >
> > Please note that "lack of recurrence" of the panic isn't especially
> > indiciative, as I hadn't seen it previously or since.  (Then again,
> > yestrday & today, I've been using the wired NIC on the laptop while I'm
> > at work, as the laptop has been unable to get a DHCP lease here.  (It
> > worked OK at Hacker Dojo last night, and works OK at home.)
> >
> ...

OK; up & runing:

FreeBSD localhost 11.0-PRERELEASE FreeBSD 11.0-PRERELEASE #72  
r303979M/304004:1100500: Fri Aug 12 13:57:30 PDT 2016     
root@localhost:/common/S2/obj/usr/src/sys/CANARY  amd64

[Copy/paste...]
localhost(11.0-P)[1] cd /usr/src/
localhost(11.0-P)[2] svn diff sys/net80211/
Index: sys/net80211/ieee80211_ioctl.c
===================================================================
--- sys/net80211/ieee80211_ioctl.c      (revision 304004)
+++ sys/net80211/ieee80211_ioctl.c      (working copy)
@@ -3389,15 +3389,16 @@
                /* Wait for parent ioctl handler if it was queued */
                if (wait) {
                        ieee80211_waitfor_parent(ic);
-
                        /*
                         * Check if the MAC address was changed
                         * via SIOCSIFLLADDR ioctl.
                         */
+                       if_addr_rlock(ifp);
                        if ((ifp->if_flags & IFF_UP) == 0 &&
                            !IEEE80211_ADDR_EQ(vap->iv_myaddr, IF_LLADDR(ifp)))
                                IEEE80211_ADDR_COPY(vap->iv_myaddr,
                                    IF_LLADDR(ifp));
+                       if_addr_runlock(ifp);
                }
                break;
        case SIOCADDMULTI:
localhost(11.0-P)[3] 


That said, I am unable to test use of wireless here at work at this
time, as I am unable to obtain a DHCP lease now (I am presently
connected via em0 NIC):

...
Aug 12 21:04:15  console-kit-daemon[970]: WARNING: Error waiting for native 
console 1 activation: Inappropriate ioctl for device
Aug 12 21:04:15  kernel: ACPI Warning: \_SB.PCI0.PEG0.PEGP._DSM: Argument #4 
type mismatch - Found [Buffer], ACPI requires [Package] 
(20160527/nsarguments-97)
Aug 12 21:04:15  last message repeated 11 times
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: CTRL-EVENT-SSID-REENABLED id=25 
ssid="$work_SSID"
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: Trying to associate with 
04:bd:88:18:18:82 (SSID='$work_SSID' freq=2462 MHz)
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: Associated with 04:bd:88:18:18:82
Aug 12 21:04:22  kernel: wlan0: link state changed to UP
Aug 12 21:04:22  dhclient: /etc/dhclient-enter-hooks invoked with reason EXPIRE
Aug 12 21:04:22  dhclient: Ignoring claimed EXPIRE dhclient invocation
Aug 12 21:04:22  dhclient[393]: send_packet: No buffer space available
Aug 12 21:04:22  dhclient[393]: send_packet: No buffer space available
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP 
authentication started
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD 
vendor=0 method=13 -> NAK
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD 
vendor=0 method=25
Aug 12 21:04:22  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 
method 25 (PEAP) selected
Aug 12 21:04:23  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 
subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, 
Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification 
Authority - G5' 
hash=8420dfbe376f414bf4c0a81e6936d24ccc03f304835b86c7a39142fca723a689
Aug 12 21:04:23  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 
subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at 
https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3' 
hash=64903546a58058d1e6f1bead1134ede66a6831d231f0df8d4e28535d7a300496
Aug 12 21:04:23  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/C=US/ST=California/L=Los Gatos/O=Netflix, 
Inc./OU=NetEng/CN=wifi.netflix.com' 
hash=27ffd334788bcee10fd242f99781c4d39eba66827096c52e551b6c627881f0fd
Aug 12 21:04:23  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 
DNS:wifi.netflix.com
Aug 12 21:04:23  wpa_supplicant[373]: EAP-MSCHAPV2: Password not configured
Aug 12 21:04:23  wpa_supplicant[373]: wlan0: CTRL-REQ-PASSWORD-25:Password 
needed for SSID $work_SSID
Aug 12 21:04:28  dhclient[393]: send_packet: No buffer space available
Aug 12 21:04:31  console-kit-daemon[970]: WARNING: Error waiting for native 
console 1 activation: Inappropriate ioctl for device
Aug 12 21:04:31  console-kit-daemon[970]: WARNING: Error waiting for native 
console 9 activation: Inappropriate ioctl for device
Aug 12 21:04:42  dhclient[393]: send_packet: No buffer space available
Aug 12 21:04:43  devd: notify_clients: send() failed; dropping unresponsive 
client
Aug 12 21:04:47  dhclient[393]: send_packet: No buffer space available
Aug 12 21:05:17  last message repeated 3 times
Aug 12 21:05:24  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-FAILURE EAP 
authentication failed
Aug 12 21:05:26  dhclient[393]: send_packet: No buffer space available
Aug 12 21:05:26  wpa_supplicant[373]: wlan0: Authentication with 
04:bd:88:18:18:82 timed out.
Aug 12 21:05:26  wpa_supplicant[373]: wlan0: CTRL-EVENT-DISCONNECTED 
bssid=04:bd:88:18:18:82 reason=3 locally_generated=1
Aug 12 21:05:26  wpa_supplicant[373]: wlan0: CTRL-EVENT-SSID-TEMP-DISABLED 
id=25 ssid="$work_SSID" auth_failures=2 duration=31 reason=AUTH_FAILED
Aug 12 21:05:26  kernel: wlan0: link state changed to DOWN
Aug 12 21:05:29  kernel: ACPI Warning: \_SB.PCI0.PEG0.PEGP._DSM: Argument #4 
type mismatch - Found [Buffer], ACPI requires [Package] 
(20160527/nsarguments-97)
Aug 12 21:05:29  last message repeated 11 times
Aug 12 21:05:38  dhclient[393]: send_packet: Network is down
Aug 12 21:05:43  dhclient: /etc/dhclient-enter-hooks invoked with reason TIMEOUT
Aug 12 21:05:43  dhclient: Ignoring claimed TIMEOUT dhclient invocation
Aug 12 21:05:50  devd: notify_clients: send() failed; dropping unresponsive 
client
Aug 12 21:05:50  kernel: GEOM_ELI: Device ada0s4j.eli created.
Aug 12 21:05:50  kernel: GEOM_ELI: Encryption: AES-XTS 128
Aug 12 21:05:50  kernel: GEOM_ELI:     Crypto: software
Aug 12 21:06:01  wpa_supplicant[373]: wlan0: CTRL-EVENT-SSID-REENABLED id=25 
ssid="$work_SSID"
Aug 12 21:06:01  wpa_supplicant[373]: wlan0: Trying to associate with 
04:bd:88:18:68:a2 (SSID='$work_SSID' freq=2412 MHz)
Aug 12 21:06:01  kernel: wlan0: link state changed to UP
Aug 12 21:06:01  wpa_supplicant[373]: wlan0: Associated with 04:bd:88:18:68:a2
Aug 12 21:06:01  dhclient: /etc/dhclient-enter-hooks invoked with reason EXPIRE
Aug 12 21:06:01  dhclient: Ignoring claimed EXPIRE dhclient invocation
Aug 12 21:06:01  dhclient[393]: send_packet: No buffer space available
Aug 12 21:06:04  last message repeated 2 times
Aug 12 21:06:06  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP 
authentication started
Aug 12 21:06:10  dhclient[393]: send_packet: No buffer space available
Aug 12 21:06:16  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP 
authentication started
Aug 12 21:06:20  dhclient[393]: send_packet: No buffer space available
Aug 12 21:06:27  dhclient[393]: send_packet: No buffer space available
Aug 12 21:06:31  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-STARTED EAP 
authentication started
Aug 12 21:06:36  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD 
vendor=0 method=13 -> NAK
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD 
vendor=0 method=25
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 
method 25 (PEAP) selected
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 
subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, 
Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification 
Authority - G5' 
hash=8420dfbe376f414bf4c0a81e6936d24ccc03f304835b86c7a39142fca723a689
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 
subject='/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at 
https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3' 
hash=64903546a58058d1e6f1bead1134ede66a6831d231f0df8d4e28535d7a300496
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 
subject='/C=US/ST=California/L=Los Gatos/O=Netflix, 
Inc./OU=NetEng/CN=wifi.netflix.com' 
hash=27ffd334788bcee10fd242f99781c4d39eba66827096c52e551b6c627881f0fd
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-EAP-PEER-ALT depth=0 
DNS:wifi.netflix.com
Aug 12 21:06:41  wpa_supplicant[373]: EAP-MSCHAPV2: Password not configured
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-REQ-PASSWORD-25:Password 
needed for SSID $work_SSID
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-DISCONNECTED 
bssid=04:bd:88:18:68:a2 reason=3 locally_generated=1
Aug 12 21:06:41  kernel: wlan0: link state changed to DOWN
Aug 12 21:06:41  devd: notify_clients: send() failed; dropping unresponsive 
client
Aug 12 21:06:41  wpa_supplicant[373]: wlan0: CTRL-EVENT-TERMINATING 
Aug 12 21:06:53  david: /etc/rc.d/dhclient: WARNING: failed to start dhclient
Aug 12 21:07:42  kernel: em0: Link is up 1000 Mbps Full Duplex
Aug 12 21:07:42  kernel: em0: link state changed to UP
....


[I hand-replaced ocuurences of the actual SSID iwth "$work_SSID"
in the above.]

Up to Tuesday (10 Aug), I was using wireless at work (though I would
sometimes see authentication timeouts).  As of yesterday, I've just
been unable to get a DHCP lease at all (running stable/11).

Peace,
david
-- 
David H. Wolfskill                              da...@catwhisker.org
Those who would murder in the name of God or prophet are blasphemous cowards.

See http://www.catwhisker.org/~david/publickey.gpg for my public key.

Attachment: signature.asc
Description: PGP signature

Reply via email to