Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 27 Aug 2023 15:43:30 +0000
From:      bugzilla-noreply@freebsd.org
To:        net@FreeBSD.org
Subject:   [Bug 271366] Invoking IPv6 network device address event may sleep with the following non-sleepable locks held
Message-ID:  <bug-271366-7501-Ns5EGFAzVV@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-271366-7501@https.bugs.freebsd.org/bugzilla/>
References:  <bug-271366-7501@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D271366

Christian Kujau <freebsd@nerdbynature.de> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |freebsd@nerdbynature.de

--- Comment #2 from Christian Kujau <freebsd@nerdbynature.de> ---
Same here on amd64, running as a Xen DomU virtual machine:

$ uname -rv
15.0-CURRENT FreeBSD 15.0-CURRENT amd64 1500000 #0 main-n265049-8ed0ecf8024=
d:
Sat Aug 26 14:44:23 UTC 2023=20=20=20=20
dummy@freebsd:/usr/obj/usr/src/amd64.amd64/sys/GENERIC

$ grep if /etc/rc.conf
ifconfig_DEFAULT=3D"DHCP inet6 accept_rtadv"

$ dmesg
[...]
lo0: link state changed to UP
xn0: 2 link states coalesced
xn0: link state changed to UP
Invoking IPv6 network device address event may sleep with the following
non-sleepable locks held:
exclusive sleep mutex xnrx_2 (netfront receive lock) r =3D 0 (0xfffffe006a3=
04a78)
locked @ /usr/src/sys/dev/xen/netfront/netfront.c:677
stack backtrace:
#0 0xffffffff80bcd5c5 at witness_debugger+0x65
#1 0xffffffff80bce75a at witness_warn+0x3fa
#2 0xffffffff80d7b39c at in6_update_ifa+0xc0c
#3 0xffffffff80da7109 at in6_ifadd+0x1d9
#4 0xffffffff80da3854 at nd6_ra_input+0x1034
#5 0xffffffff80d75c14 at icmp6_input+0x724
#6 0xffffffff80d8e5df at ip6_input+0xc9f
#7 0xffffffff80cb14cf at netisr_dispatch_src+0xaf
#8 0xffffffff80c93caa at ether_demux+0x17a
#9 0xffffffff80c95313 at ether_nh_input+0x393
#10 0xffffffff80cb14cf at netisr_dispatch_src+0xaf
#11 0xffffffff80c940e9 at ether_input+0xd9
#12 0xffffffff809cb78c at xn_rxeof+0x5ec
#13 0xffffffff809ccad8 at xn_intr+0x48
#14 0xffffffff80b126f9 at ithread_loop+0x279
#15 0xffffffff80b0eab2 at fork_exit+0x82
#16 0xffffffff8102fede at fork_trampoline+0xe
lock order reversal: (sleepable after non-sleepable)
 1st 0xfffffe006a304a78 xnrx_2 (netfront receive lock, sleep mutex) @
/usr/src/sys/dev/xen/netfront/netfront.c:677
 2nd 0xffffffff81aaaba0 in6_multi_sx (in6_multi_sx, sx) @
/usr/src/sys/netinet6/in6_mcast.c:1217
lock order netfront receive lock -> in6_multi_sx attempted at:
#0 0xffffffff80bcd18d at witness_checkorder+0xbfd
#1 0xffffffff80b645c2 at _sx_xlock+0x62
#2 0xffffffff80d83b61 at in6_joingroup+0x31
#3 0xffffffff80d7b765 at in6_update_ifa+0xfd5
#4 0xffffffff80da7109 at in6_ifadd+0x1d9
#5 0xffffffff80da3854 at nd6_ra_input+0x1034
#6 0xffffffff80d75c14 at icmp6_input+0x724
#7 0xffffffff80d8e5df at ip6_input+0xc9f
#8 0xffffffff80cb14cf at netisr_dispatch_src+0xaf
#9 0xffffffff80c93caa at ether_demux+0x17a
#10 0xffffffff80c95313 at ether_nh_input+0x393
#11 0xffffffff80cb14cf at netisr_dispatch_src+0xaf
#12 0xffffffff80c940e9 at ether_input+0xd9
#13 0xffffffff809cb78c at xn_rxeof+0x5ec
#14 0xffffffff809ccad8 at xn_intr+0x48
#15 0xffffffff80b126f9 at ithread_loop+0x279
#16 0xffffffff80b0eab2 at fork_exit+0x82
#17 0xffffffff8102fede at fork_trampoline+0xe

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-271366-7501-Ns5EGFAzVV>