[Bug 269821] if_vtnet: Lock order reversal on LXD's Qemu profile (Q.35)
Date: Sat, 25 Feb 2023 10:51:11 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=269821 Bug ID: 269821 Summary: if_vtnet: Lock order reversal on LXD's Qemu profile (Q.35) Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: freebsd@igalic.co vtnet0: link state changed to UP Invoking IPv6 network device address event may sleep with the following non-sleepable locks held: exclusive sleep mutex vtnet0-rx1 (vtnet0-rx1) r = 0 (0xfffff800019b6980) locked @ /usr/src/sys/dev/virtio/network/if_vtnet.c:2189 stack backtrace: #0 0xffffffff80c5f355 at witness_debugger+0x65 #1 0xffffffff80c604a9 at witness_warn+0x3f9 #2 0xffffffff80e079fa at in6_update_ifa+0xc1a #3 0xffffffff80e33049 at in6_ifadd+0x1d9 #4 0xffffffff80e2f7cf at nd6_ra_input+0x103f #5 0xffffffff80e02528 at icmp6_input+0x898 #6 0xffffffff80e1a309 at ip6_input+0xc79 #7 0xffffffff80d405bd at netisr_dispatch_src+0xad #8 0xffffffff80d2282a at ether_demux+0x17a #9 0xffffffff80d23dd6 at ether_nh_input+0x356 #10 0xffffffff80d405bd at netisr_dispatch_src+0xad #11 0xffffffff80d22c39 at ether_input+0x99 #12 0xffffffff80a19713 at vtnet_rxq_eof+0x7c3 #13 0xffffffff80a18eaa at vtnet_rx_vq_process+0x9a #14 0xffffffff80ba79e6 at ithread_loop+0x276 #15 0xffffffff80ba3e80 at fork_exit+0x80 #16 0xffffffff810b3e3e at fork_trampoline+0xe lock order reversal: (sleepable after non-sleepable) 1st 0xfffff800019b6980 vtnet0-rx1 (vtnet0-rx1, sleep mutex) @ /usr/src/sys/dev/virtio/network/if_vtnet.c:2189 2nd 0xffffffff81fa7b40 in6_multi_sx (in6_multi_sx, sx) @ /usr/src/sys/netinet6/in6_mcast.c:1219 lock order vtnet0-rx1 -> in6_multi_sx attempted at: #0 0xffffffff80c5ef13 at witness_checkorder+0xbb3 #1 0xffffffff80bf84d3 at _sx_xlock+0x63 #2 0xffffffff80e10381 at in6_joingroup+0x31 #3 0xffffffff80e07dbb at in6_update_ifa+0xfdb #4 0xffffffff80e33049 at in6_ifadd+0x1d9 #5 0xffffffff80e2f7cf at nd6_ra_input+0x103f #6 0xffffffff80e02528 at icmp6_input+0x898 #7 0xffffffff80e1a309 at ip6_input+0xc79 #8 0xffffffff80d405bd at netisr_dispatch_src+0xad #9 0xffffffff80d2282a at ether_demux+0x17a #10 0xffffffff80d23dd6 at ether_nh_input+0x356 #11 0xffffffff80d405bd at netisr_dispatch_src+0xad #12 0xffffffff80d22c39 at ether_input+0x99 #13 0xffffffff80a19713 at vtnet_rxq_eof+0x7c3 #14 0xffffffff80a18eaa at vtnet_rx_vq_process+0x9a #15 0xffffffff80ba79e6 at ithread_loop+0x276 #16 0xffffffff80ba3e80 at fork_exit+0x80 #17 0xffffffff810b3e3e at fork_trampoline+0xe FreeBSD/amd64 (freebsd) (ttyu0) -- You are receiving this mail because: You are the assignee for the bug.