[Bug 294072] Lock order reversal WITNESS warnings while running HW ktls traffic
Date: Fri, 27 Mar 2026 12:31:46 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=294072
Bug ID: 294072
Summary: Lock order reversal WITNESS warnings while running HW
ktls traffic
Product: Base System
Version: CURRENT
Hardware: amd64
OS: Any
Status: New
Severity: Affects Only Me
Priority: ---
Component: kern
Assignee: bugs@FreeBSD.org
Reporter: sumit.saxena@broadcom.com
While running HW kTLS traffic on Broadcom's BCM576xx NIC(managed by if_bnxt
driver), I am seeing below traces occasionally on FreeBSD-current kernel tree:
lock order reversal:
1st 0xff0100820a0d51e0 so_rcv (so_rcv, sleep mutex) @
/usr/src/sys/kern/uipc_socket.c:1899
2nd 0xff01008208a10020 tcpinp (tcpinp, rw) @
/usr/src/sys/kern/uipc_ktls.c:1962
lock order tcpinp -> so_rcv established at:
#0 0xffffffff80c0e5e4 at witness_checkorder+0x364
#1 0xffffffff80b70c41 at __mtx_lock_flags+0x91
#2 0xffffffff80da2f6f at tcp_mss+0x15f
#3 0xffffffff80dbd2de at syncache_socket+0x6de
#4 0xffffffff80dbc2b9 at syncache_expand+0x6e9
#5 0xffffffff80d9de60 at tcp_input_with_port+0x9d0
#6 0xffffffff80d9f1ab at tcp_input+0xb
#7 0xffffffff80d8c03d at ip_input+0x28d
#8 0xffffffff80d01554 at netisr_dispatch_src+0xb4
#9 0xffffffff80ce36da at ether_demux+0x16a
#10 0xffffffff80ce4c4e at ether_nh_input+0x3ce
#11 0xffffffff80d01554 at netisr_dispatch_src+0xb4
#12 0xffffffff80ce3b25 at ether_input+0xd5
#13 0xffffffff83723154 at uether_rxflush+0xa4
#14 0xffffffff8371cc49 at axe_bulk_read_callback+0x229
#15 0xffffffff809982fe at usbd_callback_wrapper+0x87e
#16 0xffffffff809995c9 at usb_command_wrapper+0x99
#17 0xffffffff8099847e at usb_callback_proc+0x8e
lock order so_rcv -> tcpinp attempted at:
#0 0xffffffff80c0ee61 at witness_checkorder+0xbe1
#1 0xffffffff80b929f5 at _rw_wlock_cookie+0x65
#2 0xffffffff80c3bd1c at ktls_destroy+0x4dc
#3 0xffffffff80c4adfc at sbdestroy+0x4c
#4 0xffffffff80c4e2e2 at sorele_locked+0x162
#5 0xffffffff80db537f at tcp_close+0x17f
#6 0xffffffff837969e7 at ctf_process_rst+0xe7
#7 0xffffffff83776609 at rack_do_segment_nounlock+0x2469
#8 0xffffffff83774136 at rack_do_segment+0xe6
#9 0xffffffff80d9e5a2 at tcp_input_with_port+0x1112
#10 0xffffffff80d9f1ab at tcp_input+0xb
#11 0xffffffff80d8c03d at ip_input+0x28d
#12 0xffffffff80d01554 at netisr_dispatch_src+0xb4
#13 0xffffffff80ce36da at ether_demux+0x16a
#14 0xffffffff80ce4c4e at ether_nh_input+0x3ce
#15 0xffffffff80d01554 at netisr_dispatch_src+0xb4
#16 0xffffffff80ce3b25 at ether_input+0xd5
#17 0xffffffff80cfcfd9 at iflib_rxeof+0xbb9
--
You are receiving this mail because:
You are the assignee for the bug.