[Bug 271366] Invoking IPv6 network device address event may sleep with the following non-sleepable locks held
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Sun, 27 Aug 2023 15:43:30 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=271366 Christian Kujau <freebsd@nerdbynature.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |freebsd@nerdbynature.de --- Comment #2 from Christian Kujau <freebsd@nerdbynature.de> --- Same here on amd64, running as a Xen DomU virtual machine: $ uname -rv 15.0-CURRENT FreeBSD 15.0-CURRENT amd64 1500000 #0 main-n265049-8ed0ecf8024d: Sat Aug 26 14:44:23 UTC 2023 dummy@freebsd:/usr/obj/usr/src/amd64.amd64/sys/GENERIC $ grep if /etc/rc.conf ifconfig_DEFAULT="DHCP inet6 accept_rtadv" $ dmesg [...] lo0: link state changed to UP xn0: 2 link states coalesced xn0: link state changed to UP Invoking IPv6 network device address event may sleep with the following non-sleepable locks held: exclusive sleep mutex xnrx_2 (netfront receive lock) r = 0 (0xfffffe006a304a78) locked @ /usr/src/sys/dev/xen/netfront/netfront.c:677 stack backtrace: #0 0xffffffff80bcd5c5 at witness_debugger+0x65 #1 0xffffffff80bce75a at witness_warn+0x3fa #2 0xffffffff80d7b39c at in6_update_ifa+0xc0c #3 0xffffffff80da7109 at in6_ifadd+0x1d9 #4 0xffffffff80da3854 at nd6_ra_input+0x1034 #5 0xffffffff80d75c14 at icmp6_input+0x724 #6 0xffffffff80d8e5df at ip6_input+0xc9f #7 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #8 0xffffffff80c93caa at ether_demux+0x17a #9 0xffffffff80c95313 at ether_nh_input+0x393 #10 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #11 0xffffffff80c940e9 at ether_input+0xd9 #12 0xffffffff809cb78c at xn_rxeof+0x5ec #13 0xffffffff809ccad8 at xn_intr+0x48 #14 0xffffffff80b126f9 at ithread_loop+0x279 #15 0xffffffff80b0eab2 at fork_exit+0x82 #16 0xffffffff8102fede at fork_trampoline+0xe lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006a304a78 xnrx_2 (netfront receive lock, sleep mutex) @ /usr/src/sys/dev/xen/netfront/netfront.c:677 2nd 0xffffffff81aaaba0 in6_multi_sx (in6_multi_sx, sx) @ /usr/src/sys/netinet6/in6_mcast.c:1217 lock order netfront receive lock -> in6_multi_sx attempted at: #0 0xffffffff80bcd18d at witness_checkorder+0xbfd #1 0xffffffff80b645c2 at _sx_xlock+0x62 #2 0xffffffff80d83b61 at in6_joingroup+0x31 #3 0xffffffff80d7b765 at in6_update_ifa+0xfd5 #4 0xffffffff80da7109 at in6_ifadd+0x1d9 #5 0xffffffff80da3854 at nd6_ra_input+0x1034 #6 0xffffffff80d75c14 at icmp6_input+0x724 #7 0xffffffff80d8e5df at ip6_input+0xc9f #8 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #9 0xffffffff80c93caa at ether_demux+0x17a #10 0xffffffff80c95313 at ether_nh_input+0x393 #11 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #12 0xffffffff80c940e9 at ether_input+0xd9 #13 0xffffffff809cb78c at xn_rxeof+0x5ec #14 0xffffffff809ccad8 at xn_intr+0x48 #15 0xffffffff80b126f9 at ithread_loop+0x279 #16 0xffffffff80b0eab2 at fork_exit+0x82 #17 0xffffffff8102fede at fork_trampoline+0xe -- You are receiving this mail because: You are the assignee for the bug.