make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # timeout set to 10800 # selftests: net/forwarding: tc_actions.sh # TEST: gact drop and ok (skip_hw) [ OK ] # TEST: mirred egress flower redirect (skip_hw) [ OK ] # TEST: mirred egress flower mirror (skip_hw) [ OK ] # TEST: mirred egress matchall mirror (skip_hw) [ OK ] [ 2333.860068][ T7738] ping (7738) used greatest stack depth: 23352 bytes left # TEST: mirred_egress_to_ingress (skip_hw) [ OK ] # [ 2341.032685][ C2] [ 2341.032848][ C2] ============================================ [ 2341.033175][ C2] WARNING: possible recursive locking detected [ 2341.033492][ C2] 6.8.0-rc2-virtme #1 Not tainted [ 2341.033747][ C2] -------------------------------------------- [ 2341.034078][ C2] ksoftirqd/2/27 is trying to acquire lock: [ 2341.034385][ C2] ffff88800adc9b70 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2161/0x29c0 [ 2341.034850][ C2] [ 2341.034850][ C2] but task is already holding lock: [ 2341.035226][ C2] ffff88800adc8e30 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2161/0x29c0 [ 2341.035694][ C2] [ 2341.035694][ C2] other info that might help us debug this: [ 2341.036113][ C2] Possible unsafe locking scenario: [ 2341.036113][ C2] [ 2341.036503][ C2] CPU0 [ 2341.036681][ C2] ---- [ 2341.036854][ C2] lock(slock-AF_INET/1); [ 2341.037111][ C2] lock(slock-AF_INET/1); [ 2341.037348][ C2] [ 2341.037348][ C2] *** DEADLOCK *** [ 2341.037348][ C2] [ 2341.037860][ C2] May be due to missing lock nesting notation [ 2341.037860][ C2] [ 2341.038390][ C2] 8 locks held by ksoftirqd/2/27: [ 2341.038672][ C2] #0: ffffffffa2f447e0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x1ed/0x5e0 [ 2341.039159][ C2] #1: ffffffffa2f447e0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x1f5/0x450 [ 2341.039688][ C2] #2: ffff88800adc8e30 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x2161/0x29c0 [ 2341.040170][ C2] #3: ffffffffa2f447e0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x65/0x1910 [ 2341.040653][ C2] #4: ffffffffa2f447e0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0x262/0x18e0 [ 2341.041150][ C2] #5: ffffffffa2f44780 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1c1/0x1ca0 [ 2341.041653][ C2] #6: ffffffffa2f447e0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb_internal+0x84/0x300 [ 2341.042185][ C2] #7: ffffffffa2f447e0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x1f5/0x450 [ 2341.042699][ C2] [ 2341.042699][ C2] stack backtrace: [ 2341.043004][ C2] CPU: 2 PID: 27 Comm: ksoftirqd/2 Not tainted 6.8.0-rc2-virtme #1 [ 2341.043424][ C2] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 2341.044051][ C2] Call Trace: [ 2341.044227][ C2] [ 2341.044385][ C2] dump_stack_lvl+0x64/0xb0 [ 2341.044637][ C2] validate_chain+0x525/0xa00 [ 2341.044891][ C2] ? __pfx_validate_chain+0x10/0x10 [ 2341.045159][ C2] ? hlock_class+0x4e/0x130 [ 2341.045414][ C2] ? mark_lock+0x38/0x3e0 [ 2341.045642][ C2] __lock_acquire+0xb67/0x1610 [ 2341.045887][ C2] ? lock_downgrade+0xa0/0x110 [ 2341.046162][ C2] ? mark_lock+0x38/0x3e0 [ 2341.046396][ C2] lock_acquire.part.0+0xe5/0x330 [ 2341.046657][ C2] ? tcp_v4_rcv+0x2161/0x29c0 [ 2341.046899][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2341.047215][ C2] ? __pfx_sk_filter_trim_cap+0x10/0x10 [ 2341.047509][ C2] ? lock_acquire+0x1c1/0x220 [ 2341.047753][ C2] ? tcp_v4_rcv+0x2161/0x29c0 [ 2341.047995][ C2] _raw_spin_lock_nested+0x33/0x80 [ 2341.048292][ C2] ? tcp_v4_rcv+0x2161/0x29c0 [ 2341.048545][ C2] tcp_v4_rcv+0x2161/0x29c0 [ 2341.048785][ C2] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 2341.049052][ C2] ? __pfx_raw_v4_input+0x10/0x10 [ 2341.049312][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2341.049606][ C2] ip_protocol_deliver_rcu+0x93/0x360 [ 2341.049919][ C2] ip_local_deliver_finish+0x2ae/0x450 [ 2341.050204][ C2] ip_local_deliver+0x19d/0x480 [ 2341.050459][ C2] ? __pfx_ip_local_deliver+0x10/0x10 [ 2341.050756][ C2] ? ip_rcv_finish_core.constprop.0+0x522/0x1300 [ 2341.051085][ C2] ip_rcv+0x564/0x740 [ 2341.051303][ C2] ? __pfx_ip_rcv+0x10/0x10 [ 2341.051541][ C2] ? lock_acquire.part.0+0xe5/0x330 [ 2341.051825][ C2] ? netif_receive_skb_internal+0x84/0x300 [ 2341.052131][ C2] ? __pfx_ip_rcv+0x10/0x10 [ 2341.052378][ C2] __netif_receive_skb_one_core+0x166/0x1b0 [ 2341.052682][ C2] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 2341.053024][ C2] ? mark_held_locks+0xa5/0xf0 [ 2341.053276][ C2] ? lock_acquire+0x1c1/0x220 [ 2341.053517][ C2] ? netif_receive_skb_internal+0x84/0x300 [ 2341.053842][ C2] netif_receive_skb_internal+0xb0/0x300 [ 2341.054140][ C2] ? __pfx_netif_receive_skb_internal+0x10/0x10 [ 2341.054463][ C2] ? __copy_skb_header+0xaf/0x490 [ 2341.054741][ C2] ? __skb_clone+0x57a/0x760 [ 2341.054985][ C2] netif_receive_skb+0x55/0x280 [ 2341.055233][ C2] tcf_mirred_to_dev+0x444/0xd70 [act_mirred] [ 2341.055559][ C2] ? __pfx_tcf_skbedit_act+0x10/0x10 [act_skbedit] [ 2341.055896][ C2] tcf_mirred_act+0x338/0x780 [act_mirred] [ 2341.056219][ C2] tcf_action_exec.part.0+0x112/0x3d0 [ 2341.056504][ C2] fl_classify+0x4dc/0x650 [cls_flower] [ 2341.056821][ C2] ? __pfx_fl_classify+0x10/0x10 [cls_flower] [ 2341.057138][ C2] ? __pfx_usage_match+0x10/0x10 [ 2341.057419][ C2] ? check_irq_usage+0x27e/0x850 [ 2341.057680][ C2] ? __pfx_validate_chain+0x10/0x10 [ 2341.057951][ C2] ? hlock_class+0x4e/0x130 [ 2341.058204][ C2] ? __pfx_check_irq_usage+0x10/0x10 [ 2341.058479][ C2] ? __bfs+0x247/0x650 [ 2341.058716][ C2] ? __pfx_hlock_conflict+0x10/0x10 [ 2341.058993][ C2] ? check_path.constprop.0+0x24/0x50 [ 2341.059268][ C2] ? check_noncircular+0x14e/0x3e0 [ 2341.059533][ C2] ? __pfx_check_noncircular+0x10/0x10 [ 2341.059844][ C2] ? hlock_class+0x4e/0x130 [ 2341.060089][ C2] ? __lock_release+0x40f/0x880 [ 2341.060344][ C2] ? unwind_next_frame+0x1478/0x1d10 [ 2341.060628][ C2] __tcf_classify+0x329/0x7d0 [ 2341.060874][ C2] tcf_classify+0x283/0x930 [ 2341.061125][ C2] ? __pfx_tcf_classify+0x10/0x10 [ 2341.061385][ C2] ? lock_acquire.part.0+0xe5/0x330 [ 2341.061671][ C2] ? __dev_queue_xmit+0x1c1/0x1ca0 [ 2341.061944][ C2] tc_run+0x2e4/0x5d0 [ 2341.062167][ C2] ? __pfx_tc_run+0x10/0x10 [ 2341.062409][ C2] ? lock_acquire+0x1c1/0x220 [ 2341.062666][ C2] ? __dev_queue_xmit+0x1c1/0x1ca0 [ 2341.062933][ C2] __dev_queue_xmit+0x8eb/0x1ca0 [ 2341.063187][ C2] ? hlock_class+0x4e/0x130 [ 2341.063471][ C2] ? mark_lock+0x38/0x3e0 [ 2341.063706][ C2] ? __pfx___dev_queue_xmit+0x10/0x10 [ 2341.063984][ C2] ? lockdep_hardirqs_on_prepare.part.0+0x151/0x370 [ 2341.064337][ C2] ? neigh_hh_output+0x348/0x590 [ 2341.064595][ C2] ip_finish_output2+0x786/0x18e0 [ 2341.064871][ C2] ? __pfx_ip_finish_output2+0x10/0x10 [ 2341.065151][ C2] ? __ip_finish_output+0x3dd/0x770 [ 2341.065416][ C2] ip_output+0x16b/0x4f0 [ 2341.065653][ C2] ? tcp_clean_rtx_queue.constprop.0+0x9ae/0x2bd0 [ 2341.065989][ C2] ? __pfx_ip_output+0x10/0x10 [ 2341.066237][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2341.066524][ C2] ? ip_local_out+0x114/0x3b0 [ 2341.066792][ C2] __ip_queue_xmit+0x672/0x1910 [ 2341.067050][ C2] ? __skb_clone+0x57a/0x760 [ 2341.067295][ C2] __tcp_transmit_skb+0x22b1/0x2d20 [ 2341.067577][ C2] ? __pfx___tcp_transmit_skb+0x10/0x10 [ 2341.067862][ C2] ? tcp_small_queue_check.isra.0+0xe9/0x380 [ 2341.068187][ C2] tcp_write_xmit+0xe42/0x24c0 [ 2341.068540][ C2] ? ipv4_mtu+0x37/0x360 [ 2341.068882][ C2] ? __pfx_tcp_write_xmit+0x10/0x10 [ 2341.069288][ C2] ? __pfx_tcp_current_mss+0x10/0x10 [ 2341.069721][ C2] __tcp_push_pending_frames+0x96/0x320 [ 2341.070143][ C2] tcp_rcv_state_process+0x862/0x21c0 [ 2341.070427][ C2] ? __pfx_tcp_rcv_state_process+0x10/0x10 [ 2341.070726][ C2] ? find_held_lock+0x33/0x120 [ 2341.070993][ C2] ? tcp_v4_rcv+0x2161/0x29c0 [ 2341.071237][ C2] ? hlock_class+0x4e/0x130 [ 2341.071473][ C2] tcp_v4_do_rcv+0x1ac/0x8e0 [ 2341.071737][ C2] ? __pfx_tcp_v4_do_rcv+0x10/0x10 [ 2341.072010][ C2] tcp_v4_rcv+0x2362/0x29c0 [ 2341.072250][ C2] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 2341.072511][ C2] ? __pfx_raw_v4_input+0x10/0x10 [ 2341.072772][ C2] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2341.073057][ C2] ip_protocol_deliver_rcu+0x93/0x360 [ 2341.073361][ C2] ip_local_deliver_finish+0x2ae/0x450 [ 2341.073647][ C2] ip_local_deliver+0x19d/0x480 [ 2341.073899][ C2] ? __pfx_ip_local_deliver+0x10/0x10 [ 2341.074173][ C2] ? ip_rcv_finish_core.constprop.0+0x522/0x1300 [ 2341.074526][ C2] ip_rcv+0x564/0x740 [ 2341.074742][ C2] ? __pfx_ip_rcv+0x10/0x10 [ 2341.074979][ C2] ? lock_acquire.part.0+0xe5/0x330 [ 2341.075264][ C2] ? process_backlog+0x1ed/0x5e0 [ 2341.075520][ C2] ? __pfx_ip_rcv+0x10/0x10 [ 2341.075750][ C2] __netif_receive_skb_one_core+0x166/0x1b0 [ 2341.076069][ C2] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 2341.076397][ C2] ? __pfx_do_raw_spin_trylock+0x10/0x10 [ 2341.076681][ C2] ? lock_acquire+0x1c1/0x220 [ 2341.076941][ C2] ? process_backlog+0x1ed/0x5e0 [ 2341.077206][ C2] process_backlog+0xd3/0x5e0 [ 2341.077453][ C2] __napi_poll.constprop.0+0xa2/0x450 [ 2341.077747][ C2] net_rx_action+0x440/0xb40 [ 2341.077990][ C2] ? __pfx_net_rx_action+0x10/0x10 [ 2341.078265][ C2] ? __pfx___schedule+0x10/0x10 [ 2341.078518][ C2] ? __pfx___lock_release+0x10/0x10 [ 2341.078785][ C2] __do_softirq+0x1b9/0x7ff [ 2341.079035][ C2] ? __pfx_run_ksoftirqd+0x10/0x10 [ 2341.079302][ C2] run_ksoftirqd+0x2e/0x60 [ 2341.079528][ C2] smpboot_thread_fn+0x30b/0x840 [ 2341.079817][ C2] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 2341.080103][ C2] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 2341.080387][ C2] kthread+0x28f/0x360 [ 2341.080619][ C2] ? __pfx_kthread+0x10/0x10 [ 2341.080862][ C2] ret_from_fork+0x31/0x70 [ 2341.081088][ C2] ? __pfx_kthread+0x10/0x10 [ 2341.081355][ C2] ret_from_fork_asm+0x1b/0x30 [ 2341.081616][ C2] [ 2377.180307][ T7782] ncat (7782) used greatest stack depth: 20528 bytes left TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ] # INFO: Could not test offloaded functionality ok 1 selftests: net/forwarding: tc_actions.sh make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing-4/tools/testing/selftests' xx__-> echo $? 0 xx__->