Date: Sun, 27 Aug 2023 15:43:30 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 271366] Invoking IPv6 network device address event may sleep with the following non-sleepable locks held Message-ID: <bug-271366-7501-Ns5EGFAzVV@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-271366-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-271366-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271366 Christian Kujau <freebsd@nerdbynature.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |freebsd@nerdbynature.de --- Comment #2 from Christian Kujau <freebsd@nerdbynature.de> --- Same here on amd64, running as a Xen DomU virtual machine: $ uname -rv 15.0-CURRENT FreeBSD 15.0-CURRENT amd64 1500000 #0 main-n265049-8ed0ecf8024= d: Sat Aug 26 14:44:23 UTC 2023=20=20=20=20 dummy@freebsd:/usr/obj/usr/src/amd64.amd64/sys/GENERIC $ grep if /etc/rc.conf ifconfig_DEFAULT=3D"DHCP inet6 accept_rtadv" $ dmesg [...] lo0: link state changed to UP xn0: 2 link states coalesced xn0: link state changed to UP Invoking IPv6 network device address event may sleep with the following non-sleepable locks held: exclusive sleep mutex xnrx_2 (netfront receive lock) r =3D 0 (0xfffffe006a3= 04a78) locked @ /usr/src/sys/dev/xen/netfront/netfront.c:677 stack backtrace: #0 0xffffffff80bcd5c5 at witness_debugger+0x65 #1 0xffffffff80bce75a at witness_warn+0x3fa #2 0xffffffff80d7b39c at in6_update_ifa+0xc0c #3 0xffffffff80da7109 at in6_ifadd+0x1d9 #4 0xffffffff80da3854 at nd6_ra_input+0x1034 #5 0xffffffff80d75c14 at icmp6_input+0x724 #6 0xffffffff80d8e5df at ip6_input+0xc9f #7 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #8 0xffffffff80c93caa at ether_demux+0x17a #9 0xffffffff80c95313 at ether_nh_input+0x393 #10 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #11 0xffffffff80c940e9 at ether_input+0xd9 #12 0xffffffff809cb78c at xn_rxeof+0x5ec #13 0xffffffff809ccad8 at xn_intr+0x48 #14 0xffffffff80b126f9 at ithread_loop+0x279 #15 0xffffffff80b0eab2 at fork_exit+0x82 #16 0xffffffff8102fede at fork_trampoline+0xe lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006a304a78 xnrx_2 (netfront receive lock, sleep mutex) @ /usr/src/sys/dev/xen/netfront/netfront.c:677 2nd 0xffffffff81aaaba0 in6_multi_sx (in6_multi_sx, sx) @ /usr/src/sys/netinet6/in6_mcast.c:1217 lock order netfront receive lock -> in6_multi_sx attempted at: #0 0xffffffff80bcd18d at witness_checkorder+0xbfd #1 0xffffffff80b645c2 at _sx_xlock+0x62 #2 0xffffffff80d83b61 at in6_joingroup+0x31 #3 0xffffffff80d7b765 at in6_update_ifa+0xfd5 #4 0xffffffff80da7109 at in6_ifadd+0x1d9 #5 0xffffffff80da3854 at nd6_ra_input+0x1034 #6 0xffffffff80d75c14 at icmp6_input+0x724 #7 0xffffffff80d8e5df at ip6_input+0xc9f #8 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #9 0xffffffff80c93caa at ether_demux+0x17a #10 0xffffffff80c95313 at ether_nh_input+0x393 #11 0xffffffff80cb14cf at netisr_dispatch_src+0xaf #12 0xffffffff80c940e9 at ether_input+0xd9 #13 0xffffffff809cb78c at xn_rxeof+0x5ec #14 0xffffffff809ccad8 at xn_intr+0x48 #15 0xffffffff80b126f9 at ithread_loop+0x279 #16 0xffffffff80b0eab2 at fork_exit+0x82 #17 0xffffffff8102fede at fork_trampoline+0xe --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-271366-7501-Ns5EGFAzVV>