[Bug 271366] Invoking IPv6 network device address event may sleep with the following non-sleepable locks held

From: <bugzilla-noreply_at_freebsd.org>
Date: Sat, 04 May 2024 10:59:30 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=271366

Ricardo Branco <rbranco@suse.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |rbranco@suse.com

--- Comment #3 from Ricardo Branco <rbranco@suse.com> ---
Same here on QEMU VM:

Invoking IPv6 network device address event may sleep with the following
non-sleepable locks held:
exclusive sleep mutex vtnet0-rx0 (vtnet0-rx0) r = 0 (0xfffff80002988600) locked
@ /usr/src/sys/dev/virtio/network/if_vtnet.c:2212
stack backtrace:
#0 0xffffffff804a587c at witness_debugger+0x6c
#1 0xffffffff804a6a59 at witness_warn+0x3e9
#2 0xffffffff805d1f41 at in6_update_ifa+0xc81
#3 0xffffffff805fd6cf at in6_ifadd+0x1ef
#4 0xffffffff805f9db0 at nd6_ra_input+0x1030
#5 0xffffffff805cbbba at icmp6_input+0x5ea
#6 0xffffffff805e4241 at ip6_input+0xd41
#7 0xffffffff805618fd at netisr_dispatch_src+0xad
#8 0xffffffff8055bf9a at ether_demux+0x16a
#9 0xffffffff8055d67a at ether_nh_input+0x3ea
#10 0xffffffff805618fd at netisr_dispatch_src+0xad
#11 0xffffffff8055c3f5 at ether_input+0xe5
#12 0xffffffff8035b594 at vtnet_rx_vq_process+0x7b4
#13 0xffffffff803f5b16 at ithread_loop+0x266
#14 0xffffffff803f1f32 at fork_exit+0x82
#15 0xffffffff80724a4e at fork_trampoline+0xe
lock order reversal: (sleepable after non-sleepable)
 1st 0xfffff80002988600 vtnet0-rx0 (vtnet0-rx0, sleep mutex) @
/usr/src/sys/dev/virtio/network/if_vtnet.c:2212
 2nd 0xffffffff80faf7c8 in6_multi_sx (in6_multi_sx, sx) @
/usr/src/sys/netinet6/in6_mcast.c:1217
lock order vtnet0-rx0 -> in6_multi_sx attempted at:
#0 0xffffffff804a544b at witness_checkorder+0xb7b
#1 0xffffffff8043e2ed at _sx_xlock+0x5d
#2 0xffffffff805d9001 at in6_joingroup+0x31
#3 0xffffffff805d22f4 at in6_update_ifa+0x1034
#4 0xffffffff805fd6cf at in6_ifadd+0x1ef
#5 0xffffffff805f9db0 at nd6_ra_input+0x1030
#6 0xffffffff805cbbba at icmp6_input+0x5ea
#7 0xffffffff805e4241 at ip6_input+0xd41
#8 0xffffffff805618fd at netisr_dispatch_src+0xad
#9 0xffffffff8055bf9a at ether_demux+0x16a
#10 0xffffffff8055d67a at ether_nh_input+0x3ea
#11 0xffffffff805618fd at netisr_dispatch_src+0xad
#12 0xffffffff8055c3f5 at ether_input+0xe5
#13 0xffffffff8035b594 at vtnet_rx_vq_process+0x7b4
#14 0xffffffff803f5b16 at ithread_loop+0x266
#15 0xffffffff803f1f32 at fork_exit+0x82
#16 0xffffffff80724a4e at fork_trampoline+0xe
pflog0: promiscuous mode enabled

-- 
You are receiving this mail because:
You are the assignee for the bug.