[Bug 269821] if_vtnet: Lock order reversal on LXD's Qemu profile (Q.35)

From: <bugzilla-noreply_at_freebsd.org>
Date: Sat, 25 Feb 2023 10:51:11 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=269821

            Bug ID: 269821
           Summary: if_vtnet: Lock order reversal on LXD's Qemu profile
                    (Q.35)
           Product: Base System
           Version: CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: kern
          Assignee: bugs@FreeBSD.org
          Reporter: freebsd@igalic.co

vtnet0: link state changed to UP
Invoking IPv6 network device address event may sleep with the following
non-sleepable locks held:
exclusive sleep mutex vtnet0-rx1 (vtnet0-rx1) r = 0 (0xfffff800019b6980) locked
@ /usr/src/sys/dev/virtio/network/if_vtnet.c:2189
stack backtrace:
#0 0xffffffff80c5f355 at witness_debugger+0x65
#1 0xffffffff80c604a9 at witness_warn+0x3f9
#2 0xffffffff80e079fa at in6_update_ifa+0xc1a
#3 0xffffffff80e33049 at in6_ifadd+0x1d9
#4 0xffffffff80e2f7cf at nd6_ra_input+0x103f
#5 0xffffffff80e02528 at icmp6_input+0x898
#6 0xffffffff80e1a309 at ip6_input+0xc79
#7 0xffffffff80d405bd at netisr_dispatch_src+0xad
#8 0xffffffff80d2282a at ether_demux+0x17a
#9 0xffffffff80d23dd6 at ether_nh_input+0x356
#10 0xffffffff80d405bd at netisr_dispatch_src+0xad
#11 0xffffffff80d22c39 at ether_input+0x99
#12 0xffffffff80a19713 at vtnet_rxq_eof+0x7c3
#13 0xffffffff80a18eaa at vtnet_rx_vq_process+0x9a
#14 0xffffffff80ba79e6 at ithread_loop+0x276
#15 0xffffffff80ba3e80 at fork_exit+0x80
#16 0xffffffff810b3e3e at fork_trampoline+0xe
lock order reversal: (sleepable after non-sleepable)
 1st 0xfffff800019b6980 vtnet0-rx1 (vtnet0-rx1, sleep mutex) @
/usr/src/sys/dev/virtio/network/if_vtnet.c:2189
 2nd 0xffffffff81fa7b40 in6_multi_sx (in6_multi_sx, sx) @
/usr/src/sys/netinet6/in6_mcast.c:1219
lock order vtnet0-rx1 -> in6_multi_sx attempted at:
#0 0xffffffff80c5ef13 at witness_checkorder+0xbb3
#1 0xffffffff80bf84d3 at _sx_xlock+0x63
#2 0xffffffff80e10381 at in6_joingroup+0x31
#3 0xffffffff80e07dbb at in6_update_ifa+0xfdb
#4 0xffffffff80e33049 at in6_ifadd+0x1d9
#5 0xffffffff80e2f7cf at nd6_ra_input+0x103f
#6 0xffffffff80e02528 at icmp6_input+0x898
#7 0xffffffff80e1a309 at ip6_input+0xc79
#8 0xffffffff80d405bd at netisr_dispatch_src+0xad
#9 0xffffffff80d2282a at ether_demux+0x17a
#10 0xffffffff80d23dd6 at ether_nh_input+0x356
#11 0xffffffff80d405bd at netisr_dispatch_src+0xad
#12 0xffffffff80d22c39 at ether_input+0x99
#13 0xffffffff80a19713 at vtnet_rxq_eof+0x7c3
#14 0xffffffff80a18eaa at vtnet_rx_vq_process+0x9a
#15 0xffffffff80ba79e6 at ithread_loop+0x276
#16 0xffffffff80ba3e80 at fork_exit+0x80
#17 0xffffffff810b3e3e at fork_trampoline+0xe

FreeBSD/amd64 (freebsd) (ttyu0)

-- 
You are receiving this mail because:
You are the assignee for the bug.