make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests
make: Entering directory '/home/virtme/testing-4/tools/testing/selftests'
make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
make[1]: Nothing to be done for 'all'.
make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
TAP version 13
1..1
# timeout set to 10800
# selftests: net/forwarding: tc_actions.sh
# TEST: gact drop and ok (skip_hw) [ OK ]
# TEST: mirred egress flower redirect (skip_hw) [ OK ]
# TEST: mirred egress flower mirror (skip_hw) [ OK ]
# TEST: mirred egress matchall mirror (skip_hw) [ OK ]
[ 2428.284751][T19423] ping (19423) used greatest stack depth: 23352 bytes left
# TEST: mirred_egress_to_ingress (skip_hw) [ OK ]
# [ 2432.816200][ C2]
[ 2432.816363][ C2] ============================================
[ 2432.816679][ C2] WARNING: possible recursive locking detected
[ 2432.817007][ C2] 6.8.0-rc2-virtme #1 Not tainted
[ 2432.817273][ C2] --------------------------------------------
[ 2432.817601][ C2] ncat/19466 is trying to acquire lock:
[ 2432.817897][ C2] ffff8880106c0e30 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2161/0x29c0
[ 2432.818369][ C2]
[ 2432.818369][ C2] but task is already holding lock:
[ 2432.818755][ C2] ffff8880106c1b70 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2161/0x29c0
[ 2432.819214][ C2]
[ 2432.819214][ C2] other info that might help us debug this:
[ 2432.819616][ C2] Possible unsafe locking scenario:
[ 2432.819616][ C2]
[ 2432.819991][ C2] CPU0
[ 2432.820164][ C2] ----
[ 2432.820344][ C2] lock(slock-AF_INET/1);
[ 2432.820613][ C2] lock(slock-AF_INET/1);
[ 2432.820855][ C2]
[ 2432.820855][ C2] *** DEADLOCK ***
[ 2432.820855][ C2]
[ 2432.821291][ C2] May be due to missing lock nesting notation
[ 2432.821291][ C2]
[ 2432.821700][ C2] 8 locks held by ncat/19466:
[ 2432.821945][ C2] #0: ffffffffb3d447e0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x1ed/0x5e0
[ 2432.822450][ C2] #1: ffffffffb3d447e0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x1f5/0x450
[ 2432.822965][ C2] #2: ffff8880106c1b70 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2161/0x29c0
[ 2432.823469][ C2] #3: ffffffffb3d447e0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x65/0x1910
[ 2432.823956][ C2] #4: ffffffffb3d447e0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0x262/0x18e0
[ 2432.824467][ C2] #5: ffffffffb3d44780 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1c1/0x1ca0
[ 2432.824968][ C2] #6: ffffffffb3d447e0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb_internal+0x84/0x300
[ 2432.825498][ C2] #7: ffffffffb3d447e0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x1f5/0x450
[ 2432.826014][ C2]
[ 2432.826014][ C2] stack backtrace:
[ 2432.826324][ C2] CPU: 2 PID: 19466 Comm: ncat Not tainted 6.8.0-rc2-virtme #1
[ 2432.826719][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 2432.827342][ C2] Call Trace:
[ 2432.827527][ C2]
[ 2432.827685][ C2] dump_stack_lvl+0x64/0xb0
[ 2432.827937][ C2] validate_chain+0x525/0xa00
[ 2432.828193][ C2] ? __pfx_validate_chain+0x10/0x10
[ 2432.828470][ C2] ? hlock_class+0x4e/0x130
[ 2432.828702][ C2] ? mark_lock+0x38/0x3e0
[ 2432.828930][ C2] __lock_acquire+0xb67/0x1610
[ 2432.829178][ C2] ? lock_downgrade+0xa0/0x110
[ 2432.829451][ C2] ? mark_lock+0x38/0x3e0
[ 2432.829680][ C2] lock_acquire.part.0+0xe5/0x330
[ 2432.829950][ C2] ? tcp_v4_rcv+0x2161/0x29c0
[ 2432.830213][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 2432.830520][ C2] ? __pfx_sk_filter_trim_cap+0x10/0x10
[ 2432.830813][ C2] ? lock_acquire+0x1c1/0x220
[ 2432.831090][ C2] ? tcp_v4_rcv+0x2161/0x29c0
[ 2432.831334][ C2] _raw_spin_lock_nested+0x33/0x80
[ 2432.831598][ C2] ? tcp_v4_rcv+0x2161/0x29c0
[ 2432.831852][ C2] tcp_v4_rcv+0x2161/0x29c0
[ 2432.832096][ C2] ? __pfx_tcp_v4_rcv+0x10/0x10
[ 2432.832347][ C2] ? __pfx_raw_v4_input+0x10/0x10
[ 2432.832637][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 2432.832942][ C2] ip_protocol_deliver_rcu+0x93/0x360
[ 2432.833234][ C2] ip_local_deliver_finish+0x2ae/0x450
[ 2432.833527][ C2] ip_local_deliver+0x19d/0x480
[ 2432.833803][ C2] ? __pfx_ip_local_deliver+0x10/0x10
[ 2432.834083][ C2] ? ip_rcv_finish_core.constprop.0+0x522/0x1300
[ 2432.834413][ C2] ip_rcv+0x564/0x740
[ 2432.834639][ C2] ? __pfx_ip_rcv+0x10/0x10
[ 2432.834884][ C2] ? lock_acquire.part.0+0xe5/0x330
[ 2432.835168][ C2] ? netif_receive_skb_internal+0x84/0x300
[ 2432.835476][ C2] ? __pfx_ip_rcv+0x10/0x10
[ 2432.835719][ C2] __netif_receive_skb_one_core+0x166/0x1b0
[ 2432.836035][ C2] ? __pfx___netif_receive_skb_one_core+0x10/0x10
[ 2432.836366][ C2] ? mark_held_locks+0xa5/0xf0
[ 2432.836612][ C2] ? lock_acquire+0x1c1/0x220
[ 2432.836860][ C2] ? netif_receive_skb_internal+0x84/0x300
[ 2432.837195][ C2] netif_receive_skb_internal+0xb0/0x300
[ 2432.837482][ C2] ? __pfx_netif_receive_skb_internal+0x10/0x10
[ 2432.837806][ C2] ? __copy_skb_header+0xaf/0x490
[ 2432.838086][ C2] ? __skb_clone+0x57a/0x760
[ 2432.838328][ C2] netif_receive_skb+0x55/0x280
[ 2432.838585][ C2] tcf_mirred_to_dev+0x444/0xd70 [act_mirred]
[ 2432.838909][ C2] ? __pfx_tcf_skbedit_act+0x10/0x10 [act_skbedit]
[ 2432.839245][ C2] tcf_mirred_act+0x338/0x780 [act_mirred]
[ 2432.839559][ C2] tcf_action_exec.part.0+0x112/0x3d0
[ 2432.839833][ C2] fl_classify+0x4dc/0x650 [cls_flower]
[ 2432.840144][ C2] ? __pfx_fl_classify+0x10/0x10 [cls_flower]
[ 2432.840458][ C2] ? __pfx_usage_match+0x10/0x10
[ 2432.840730][ C2] ? check_irq_usage+0x27e/0x850
[ 2432.840998][ C2] ? __pfx_check_irq_usage+0x10/0x10
[ 2432.841286][ C2] ? __bfs+0x247/0x650
[ 2432.841492][ C2] ? __pfx_hlock_conflict+0x10/0x10
[ 2432.841763][ C2] ? hlock_class+0x4e/0x130
[ 2432.841998][ C2] ? check_path.constprop.0+0x24/0x50
[ 2432.842287][ C2] ? check_noncircular+0x14e/0x3e0
[ 2432.842559][ C2] ? __pfx_check_noncircular+0x10/0x10
[ 2432.842860][ C2] __tcf_classify+0x329/0x7d0
[ 2432.843113][ C2] tcf_classify+0x283/0x930
[ 2432.843365][ C2] ? __pfx_tcf_classify+0x10/0x10
[ 2432.843631][ C2] ? lock_acquire.part.0+0xe5/0x330
[ 2432.843902][ C2] ? __dev_queue_xmit+0x1c1/0x1ca0
[ 2432.844182][ C2] tc_run+0x2e4/0x5d0
[ 2432.844399][ C2] ? __pfx_tc_run+0x10/0x10
[ 2432.844644][ C2] ? lock_acquire+0x1c1/0x220
[ 2432.844900][ C2] ? __dev_queue_xmit+0x1c1/0x1ca0
[ 2432.845183][ C2] __dev_queue_xmit+0x8eb/0x1ca0
[ 2432.845441][ C2] ? hlock_class+0x4e/0x130
[ 2432.845683][ C2] ? mark_lock+0x38/0x3e0
[ 2432.845925][ C2] ? __pfx___dev_queue_xmit+0x10/0x10
[ 2432.846202][ C2] ? lockdep_hardirqs_on_prepare.part.0+0x151/0x370
[ 2432.846543][ C2] ? neigh_hh_output+0x348/0x590
[ 2432.846810][ C2] ip_finish_output2+0x786/0x18e0
[ 2432.847077][ C2] ? __pfx_ip_finish_output2+0x10/0x10
[ 2432.847374][ C2] ? __ip_finish_output+0x10f/0x770
[ 2432.847649][ C2] ip_output+0x16b/0x4f0
[ 2432.847865][ C2] ? __pfx_ip_output+0x10/0x10
[ 2432.848119][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 2432.848443][ C2] ? ip_local_out+0x114/0x3b0
[ 2432.848687][ C2] __ip_queue_xmit+0x672/0x1910
[ 2432.848953][ C2] ? __create_object+0x5e/0xb0
[ 2432.849203][ C2] __tcp_transmit_skb+0x22b1/0x2d20
[ 2432.849483][ C2] ? __pfx___tcp_transmit_skb+0x10/0x10
[ 2432.849777][ C2] ? __tcp_send_ack.part.0+0x66/0x6e0
[ 2432.850066][ C2] tcp_rcv_state_process+0x8a7/0x21c0
[ 2432.850345][ C2] ? __pfx_tcp_rcv_state_process+0x10/0x10
[ 2432.850648][ C2] ? find_held_lock+0x33/0x120
[ 2432.850904][ C2] ? tcp_v4_rcv+0x2161/0x29c0
[ 2432.851157][ C2] ? hlock_class+0x4e/0x130
[ 2432.851401][ C2] tcp_v4_do_rcv+0x1ac/0x8e0
[ 2432.851655][ C2] ? __pfx_tcp_v4_do_rcv+0x10/0x10
[ 2432.851922][ C2] tcp_v4_rcv+0x2362/0x29c0
[ 2432.852160][ C2] ? __pfx_tcp_v4_rcv+0x10/0x10
[ 2432.852428][ C2] ? __pfx_raw_v4_input+0x10/0x10
[ 2432.852681][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 2432.852972][ C2] ip_protocol_deliver_rcu+0x93/0x360
[ 2432.853255][ C2] ip_local_deliver_finish+0x2ae/0x450
[ 2432.853550][ C2] ip_local_deliver+0x19d/0x480
[ 2432.853812][ C2] ? __pfx_ip_local_deliver+0x10/0x10
[ 2432.854094][ C2] ? ip_rcv_finish_core.constprop.0+0x522/0x1300
[ 2432.854434][ C2] ip_rcv+0x564/0x740
[ 2432.854655][ C2] ? __pfx_ip_rcv+0x10/0x10
[ 2432.854912][ C2] ? lock_acquire.part.0+0xe5/0x330
[ 2432.855189][ C2] ? process_backlog+0x1ed/0x5e0
[ 2432.855461][ C2] ? __pfx_ip_rcv+0x10/0x10
[ 2432.855690][ C2] __netif_receive_skb_one_core+0x166/0x1b0
[ 2432.855999][ C2] ? __pfx___netif_receive_skb_one_core+0x10/0x10
[ 2432.856338][ C2] ? __pfx_do_raw_spin_trylock+0x10/0x10
[ 2432.856622][ C2] ? lock_acquire+0x1c1/0x220
[ 2432.856869][ C2] ? process_backlog+0x1ed/0x5e0
[ 2432.857129][ C2] process_backlog+0xd3/0x5e0
[ 2432.857395][ C2] __napi_poll.constprop.0+0xa2/0x450
[ 2432.857678][ C2] net_rx_action+0x440/0xb40
[ 2432.857939][ C2] ? __pfx_net_rx_action+0x10/0x10
[ 2432.858212][ C2] ? kvm_clock_get_cycles+0x18/0x30
[ 2432.858489][ C2] ? ktime_get+0xb3/0x190
[ 2432.858711][ C2] ? hrtimer_interrupt+0x30e/0x770
[ 2432.858978][ C2] ? hrtimer_interrupt+0x31a/0x770
[ 2432.859242][ C2] __do_softirq+0x1b9/0x7ff
[ 2432.859494][ C2] ? tcp_recvmsg+0xf8/0x4f0
[ 2432.859741][ C2] do_softirq+0x4d/0xa0
[ 2432.859970][ C2]
[ 2432.860141][ C2]
[ 2432.860311][ C2] __local_bh_enable_ip+0xf6/0x120
[ 2432.860588][ C2] tcp_recvmsg+0xf8/0x4f0
[ 2432.860828][ C2] ? __pfx_tcp_recvmsg+0x10/0x10
[ 2432.861097][ C2] ? core_sys_select+0x620/0x710
[ 2432.861376][ C2] ? __pfx_core_sys_select+0x10/0x10
[ 2432.861644][ C2] inet_recvmsg+0xf9/0x2c0
[ 2432.861876][ C2] ? __pfx_inet_recvmsg+0x10/0x10
[ 2432.862141][ C2] ? __fget_light+0x54/0x1e0
[ 2432.862399][ C2] ? sockfd_lookup_light+0x1a/0x160
[ 2432.862676][ C2] __sys_recvfrom+0x2fb/0x3b0
[ 2432.862921][ C2] ? __pfx___sys_recvfrom+0x10/0x10
[ 2432.863216][ C2] ? __pfx___lock_release+0x10/0x10
[ 2432.863481][ C2] ? do_pselect.constprop.0+0x12b/0x1e0
[ 2432.863772][ C2] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 2432.864088][ C2] ? restore_fpregs_from_fpstate+0x99/0x160
[ 2432.864394][ C2] ? __pfx_restore_fpregs_from_fpstate+0x10/0x10
[ 2432.864725][ C2] __x64_sys_recvfrom+0xe0/0x1c0
[ 2432.864992][ C2] ? lockdep_hardirqs_on_prepare.part.0+0x1b1/0x370
[ 2432.865329][ C2] do_syscall_64+0xc9/0x1e0
[ 2432.865567][ C2] entry_SYSCALL_64_after_hwframe+0x6f/0x77
[ 2432.865880][ C2] RIP: 0033:0x7f72770c14c0
[ 2432.866122][ C2] Code: 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 1d 45 31 c9 45 31 c0 b8 2d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 68 c3 0f 1f 80 00 00 00 00 41 54 48 83 ec 20
[ 2432.867112][ C2] RSP: 002b:00007ffdbdab0298 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
[ 2432.867543][ C2] RAX: ffffffffffffffda RBX: 0000559425a03a20 RCX: 00007f72770c14c0
[ 2432.867951][ C2] RDX: 0000000000002000 RSI: 00007ffdbdab0320 RDI: 0000000000000008
[ 2432.868373][ C2] RBP: 00007ffdbdab0320 R08: 0000000000000000 R09: 0000000000000000
[ 2432.868779][ C2] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008
[ 2432.869188][ C2] R13: 0000559425a03a20 R14: 0000000000000000 R15: 00007ffdbdab031c
[ 2432.869607][ C2]
[ 2438.325555][T19467] ncat (19467) used greatest stack depth: 21248 bytes left
TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ]
# INFO: Could not test offloaded functionality
ok 1 selftests: net/forwarding: tc_actions.sh
make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding'
make: Leaving directory '/home/virtme/testing-4/tools/testing/selftests'
xx__-> echo $?
0
xx__->