[Bug 271366] Invoking IPv6 network device address event may sleep with the following non-sleepable locks held
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sat, 04 May 2024 10:59:30 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=271366 Ricardo Branco <rbranco@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |rbranco@suse.com --- Comment #3 from Ricardo Branco <rbranco@suse.com> --- Same here on QEMU VM: Invoking IPv6 network device address event may sleep with the following non-sleepable locks held: exclusive sleep mutex vtnet0-rx0 (vtnet0-rx0) r = 0 (0xfffff80002988600) locked @ /usr/src/sys/dev/virtio/network/if_vtnet.c:2212 stack backtrace: #0 0xffffffff804a587c at witness_debugger+0x6c #1 0xffffffff804a6a59 at witness_warn+0x3e9 #2 0xffffffff805d1f41 at in6_update_ifa+0xc81 #3 0xffffffff805fd6cf at in6_ifadd+0x1ef #4 0xffffffff805f9db0 at nd6_ra_input+0x1030 #5 0xffffffff805cbbba at icmp6_input+0x5ea #6 0xffffffff805e4241 at ip6_input+0xd41 #7 0xffffffff805618fd at netisr_dispatch_src+0xad #8 0xffffffff8055bf9a at ether_demux+0x16a #9 0xffffffff8055d67a at ether_nh_input+0x3ea #10 0xffffffff805618fd at netisr_dispatch_src+0xad #11 0xffffffff8055c3f5 at ether_input+0xe5 #12 0xffffffff8035b594 at vtnet_rx_vq_process+0x7b4 #13 0xffffffff803f5b16 at ithread_loop+0x266 #14 0xffffffff803f1f32 at fork_exit+0x82 #15 0xffffffff80724a4e at fork_trampoline+0xe lock order reversal: (sleepable after non-sleepable) 1st 0xfffff80002988600 vtnet0-rx0 (vtnet0-rx0, sleep mutex) @ /usr/src/sys/dev/virtio/network/if_vtnet.c:2212 2nd 0xffffffff80faf7c8 in6_multi_sx (in6_multi_sx, sx) @ /usr/src/sys/netinet6/in6_mcast.c:1217 lock order vtnet0-rx0 -> in6_multi_sx attempted at: #0 0xffffffff804a544b at witness_checkorder+0xb7b #1 0xffffffff8043e2ed at _sx_xlock+0x5d #2 0xffffffff805d9001 at in6_joingroup+0x31 #3 0xffffffff805d22f4 at in6_update_ifa+0x1034 #4 0xffffffff805fd6cf at in6_ifadd+0x1ef #5 0xffffffff805f9db0 at nd6_ra_input+0x1030 #6 0xffffffff805cbbba at icmp6_input+0x5ea #7 0xffffffff805e4241 at ip6_input+0xd41 #8 0xffffffff805618fd at netisr_dispatch_src+0xad #9 0xffffffff8055bf9a at ether_demux+0x16a #10 0xffffffff8055d67a at ether_nh_input+0x3ea #11 0xffffffff805618fd at netisr_dispatch_src+0xad #12 0xffffffff8055c3f5 at ether_input+0xe5 #13 0xffffffff8035b594 at vtnet_rx_vq_process+0x7b4 #14 0xffffffff803f5b16 at ithread_loop+0x266 #15 0xffffffff803f1f32 at fork_exit+0x82 #16 0xffffffff80724a4e at fork_trampoline+0xe pflog0: promiscuous mode enabled -- You are receiving this mail because: You are the assignee for the bug.