make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-4/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # overriding timeout to 21600.0 # selftests: net/forwarding: tc_actions.sh # TEST: gact drop and ok (skip_hw) [ OK ] # TEST: mirred egress flower redirect (skip_hw) [ OK ] # TEST: mirred egress flower mirror (skip_hw) [ OK ] # TEST: mirred egress matchall mirror (skip_hw) [ OK ] [ 2360.343638][ T8220] ping (8220) used greatest stack depth: 23480 bytes left # TEST: mirred_egress_to_ingress (skip_hw) [ OK ] # [ 2364.967892][ T8264] ncat (8264) used greatest stack depth: 20784 bytes left [ 2366.733147][ C3] [ 2366.733325][ C3] ============================================ [ 2366.733647][ C3] WARNING: possible recursive locking detected [ 2366.733977][ C3] 6.8.0-rc3-virtme #1 Not tainted [ 2366.734245][ C3] -------------------------------------------- [ 2366.734581][ C3] ksoftirqd/3/32 is trying to acquire lock: [ 2366.734878][ C3] ffff88800bc79b70 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x221e/0x2ac0 [ 2366.735381][ C3] [ 2366.735381][ C3] but task is already holding lock: [ 2366.735757][ C3] ffff88800bc78e30 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x221e/0x2ac0 [ 2366.736222][ C3] [ 2366.736222][ C3] other info that might help us debug this: [ 2366.736652][ C3] Possible unsafe locking scenario: [ 2366.736652][ C3] [ 2366.737042][ C3] CPU0 [ 2366.737227][ C3] ---- [ 2366.737417][ C3] lock(slock-AF_INET/1); [ 2366.737651][ C3] lock(slock-AF_INET/1); [ 2366.737881][ C3] [ 2366.737881][ C3] *** DEADLOCK *** [ 2366.737881][ C3] [ 2366.738311][ C3] May be due to missing lock nesting notation [ 2366.738311][ C3] [ 2366.738724][ C3] 8 locks held by ksoftirqd/3/32: [ 2366.738988][ C3] #0: ffffffff9bf467e0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x1ed/0x5e0 [ 2366.739502][ C3] #1: ffffffff9bf467e0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x1f5/0x480 [ 2366.740022][ C3] #2: ffff88800bc78e30 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0x221e/0x2ac0 [ 2366.740513][ C3] #3: ffffffff9bf467e0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x65/0x1910 [ 2366.741006][ C3] #4: ffffffff9bf467e0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0x262/0x18e0 [ 2366.741522][ C3] #5: ffffffff9bf46780 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x1da/0x17e0 [ 2366.742032][ C3] #6: ffffffff9bf467e0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb_internal+0x84/0x300 [ 2366.742566][ C3] #7: ffffffff9bf467e0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x1f5/0x480 [ 2366.743076][ C3] [ 2366.743076][ C3] stack backtrace: [ 2366.743389][ C3] CPU: 3 PID: 32 Comm: ksoftirqd/3 Not tainted 6.8.0-rc3-virtme #1 [ 2366.743825][ C3] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 2366.744475][ C3] Call Trace: [ 2366.744675][ C3] [ 2366.744835][ DETECTED CRASH, lowering timeout C3] dump_stack_lvl+0x64/0xb0 [ 2366.745102][ C3] validate_chain+0x525/0xa00 [ 2366.745365][ C3] ? __pfx_validate_chain+0x10/0x10 [ 2366.745654][ C3] ? hlock_class+0x4e/0x130 [ 2366.745896][ C3] ? mark_lock+0x38/0x3e0 [ 2366.746124][ C3] __lock_acquire+0xb67/0x1610 [ 2366.746405][ C3] ? lock_downgrade+0xa0/0x110 [ 2366.746645][ C3] ? mark_lock+0x38/0x3e0 [ 2366.746874][ C3] lock_acquire.part.0+0xe5/0x330 [ 2366.747149][ C3] ? tcp_v4_rcv+0x221e/0x2ac0 [ 2366.747421][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2366.747704][ C3] ? __pfx_sk_filter_trim_cap+0x10/0x10 [ 2366.747996][ C3] ? lock_acquire+0x1c1/0x220 [ 2366.748240][ C3] ? tcp_v4_rcv+0x221e/0x2ac0 [ 2366.748514][ C3] _raw_spin_lock_nested+0x33/0x80 [ 2366.748801][ C3] ? tcp_v4_rcv+0x221e/0x2ac0 [ 2366.749045][ C3] tcp_v4_rcv+0x221e/0x2ac0 [ 2366.749308][ C3] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 2366.749560][ C3] ? __pfx_raw_v4_input+0x10/0x10 [ 2366.749832][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2366.750123][ C3] ip_protocol_deliver_rcu+0x93/0x360 [ 2366.750417][ C3] ip_local_deliver_finish+0x2ae/0x480 [ 2366.750719][ C3] ip_local_deliver+0x19d/0x480 [ 2366.750997][ C3] ? __pfx_ip_local_deliver+0x10/0x10 [ 2366.751274][ C3] ? tcp_v4_early_demux+0x59a/0x9d0 [ 2366.751571][ C3] ? ip_rcv_finish_core.constprop.0+0x522/0x1300 [ 2366.751915][ C3] ip_rcv+0x564/0x740 [ 2366.752125][ C3] ? __pfx_ip_rcv+0x10/0x10 [ 2366.752385][ C3] ? lock_acquire.part.0+0xe5/0x330 [ 2366.752675][ C3] ? netif_receive_skb_internal+0x84/0x300 [ 2366.752984][ C3] ? __pfx_ip_rcv+0x10/0x10 [ 2366.753240][ C3] __netif_receive_skb_one_core+0x166/0x1b0 [ 2366.753557][ C3] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 2366.753891][ C3] ? mark_held_locks+0xa5/0xf0 [ 2366.754152][ C3] ? lock_acquire+0x1c1/0x220 [ 2366.754408][ C3] ? netif_receive_skb_internal+0x84/0x300 [ 2366.754716][ C3] netif_receive_skb_internal+0xb0/0x300 [ 2366.755017][ C3] ? __pfx_netif_receive_skb_internal+0x10/0x10 [ 2366.755344][ C3] ? __copy_skb_header+0xaf/0x490 [ 2366.755604][ C3] ? __skb_clone+0x57a/0x760 [ 2366.755873][ C3] netif_receive_skb+0x55/0x280 [ 2366.756131][ C3] tcf_mirred_to_dev+0x444/0xd70 [act_mirred] [ 2366.756477][ C3] ? __pfx_tcf_skbedit_act+0x10/0x10 [act_skbedit] [ 2366.756825][ C3] tcf_mirred_act+0x338/0x780 [act_mirred] [ 2366.757146][ C3] tcf_action_exec.part.0+0x112/0x3d0 [ 2366.757429][ C3] fl_classify+0x4dc/0x650 [cls_flower] [ 2366.757747][ C3] ? __pfx_fl_classify+0x10/0x10 [cls_flower] [ 2366.758075][ C3] ? __pfx_check_irq_usage+0x10/0x10 [ 2366.758366][ C3] ? __bfs+0x247/0x650 [ 2366.758579][ C3] ? __pfx_hlock_conflict+0x10/0x10 [ 2366.758850][ C3] ? check_path.constprop.0+0x24/0x50 [ 2366.759152][ C3] ? check_noncircular+0x14e/0x3e0 [ 2366.759428][ C3] ? hlock_class+0x4e/0x130 [ 2366.759677][ C3] ? __pfx_check_noncircular+0x10/0x10 [ 2366.759952][ C3] ? __pfx_hlock_conflict+0x10/0x10 [ 2366.760231][ C3] ? __pfx_validate_chain+0x10/0x10 [ 2366.760513][ C3] ? hlock_class+0x4e/0x130 [ 2366.760745][ C3] ? hlock_class+0x4e/0x130 [ 2366.760992][ C3] ? check_prev_add+0x773/0xce0 [ 2366.761253][ C3] __tcf_classify+0x329/0x7d0 [ 2366.761533][ C3] tcf_classify+0x283/0x930 [ 2366.761765][ C3] ? __pfx_tcf_classify+0x10/0x10 [ 2366.762024][ C3] ? __dev_queue_xmit+0x1da/0x17e0 [ 2366.762288][ C3] ? __dev_queue_xmit+0x1da/0x17e0 [ 2366.762599][ C3] tc_run+0x2e4/0x5d0 [ 2366.762811][ C3] ? __pfx_tc_run+0x10/0x10 [ 2366.763046][ C3] ? lock_acquire+0x1c1/0x220 [ 2366.763305][ C3] ? __dev_queue_xmit+0x1da/0x17e0 [ 2366.763583][ C3] __dev_queue_xmit+0x686/0x17e0 [ 2366.763839][ C3] ? mark_held_locks+0xa5/0xf0 [ 2366.764103][ C3] ? lockdep_hardirqs_on_prepare.part.0+0x151/0x370 [ 2366.764445][ C3] ? __pfx___dev_queue_xmit+0x10/0x10 [ 2366.764739][ C3] ? __pfx_vrf_output_direct_finish+0x1/0x10 [vrf] [ 2366.765100][ C3] ip_finish_output2+0x786/0x18e0 [ 2366.765368][ C3] ? __pfx_ip_finish_output2+0x10/0x10 [ 2366.765670][ C3] ? __ip_finish_output+0x3dd/0x770 [ 2366.765940][ C3] ip_output+0x16b/0x4f0 [ 2366.766167][ C3] ? __pfx_ip_output+0x10/0x10 [ 2366.766454][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2366.766753][ C3] ? lockdep_hardirqs_on_prepare.part.0+0x151/0x370 [ 2366.767100][ C3] ? ip_local_out+0x114/0x3b0 [ 2366.767372][ C3] __ip_queue_xmit+0x672/0x1910 [ 2366.767641][ C3] ? __skb_clone+0x57a/0x760 [ 2366.767881][ C3] __tcp_transmit_skb+0x22b1/0x2d20 [ 2366.768172][ C3] ? __pfx___tcp_transmit_skb+0x10/0x10 [ 2366.768467][ C3] ? tcp_small_queue_check.isra.0+0xe9/0x380 [ 2366.768782][ C3] tcp_write_xmit+0x94f/0x1cb0 [ 2366.769050][ C3] ? ipv4_mtu+0x37/0x360 [ 2366.769278][ C3] ? __pfx_tcp_write_xmit+0x10/0x10 [ 2366.769567][ C3] ? __pfx_tcp_current_mss+0x10/0x10 [ 2366.769852][ C3] __tcp_push_pending_frames+0x96/0x320 [ 2366.770164][ C3] tcp_rcv_state_process+0x786/0x1fe0 [ 2366.770445][ C3] ? tcp_v4_rcv+0x221e/0x2ac0 [ 2366.770695][ C3] ? hlock_class+0x4e/0x130 [ 2366.770967][ C3] ? __lock_acquired+0x18a/0x6b0 [ 2366.771232][ C3] ? __pfx_tcp_rcv_state_process+0x10/0x10 [ 2366.771530][ C3] ? __pfx___lock_acquired+0x10/0x10 [ 2366.771830][ C3] ? __pfx_do_raw_spin_trylock+0x10/0x10 [ 2366.772122][ C3] tcp_v4_do_rcv+0x154/0x860 [ 2366.772364][ C3] tcp_v4_rcv+0x2449/0x2ac0 [ 2366.772627][ C3] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 2366.772888][ C3] ? __pfx_raw_v4_input+0x10/0x10 [ 2366.773150][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 2366.773465][ C3] ip_protocol_deliver_rcu+0x93/0x360 [ 2366.773747][ C3] ip_local_deliver_finish+0x2ae/0x480 [ 2366.774035][ C3] ip_local_deliver+0x19d/0x480 [ 2366.774317][ C3] ? __pfx_ip_local_deliver+0x10/0x10 [ 2366.774607][ C3] ? tcp_v4_early_demux+0x59a/0x9d0 [ 2366.774897][ C3] ? ip_rcv_finish_core.constprop.0+0x522/0x1300 [ 2366.775223][ C3] ip_rcv+0x564/0x740 [ 2366.775441][ C3] ? __pfx_ip_rcv+0x10/0x10 [ 2366.775699][ C3] ? lock_acquire.part.0+0xe5/0x330 [ 2366.775977][ C3] ? process_backlog+0x1ed/0x5e0 [ 2366.776257][ C3] ? __pfx_ip_rcv+0x10/0x10 [ 2366.776498][ C3] __netif_receive_skb_one_core+0x166/0x1b0 [ 2366.776804][ C3] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 2366.777149][ C3] ? __pfx_do_raw_spin_trylock+0x10/0x10 [ 2366.777452][ C3] ? lock_acquire+0x1c1/0x220 [ 2366.777698][ C3] ? process_backlog+0x1ed/0x5e0 [ 2366.777973][ C3] process_backlog+0xd3/0x5e0 [ 2366.778224][ C3] __napi_poll.constprop.0+0xa2/0x460 [ 2366.778523][ C3] net_rx_action+0x440/0xb40 [ 2366.778764][ C3] ? __pfx_net_rx_action+0x10/0x10 [ 2366.779040][ C3] ? __pfx___schedule+0x10/0x10 [ 2366.779302][ C3] ? __pfx___lock_release+0x10/0x10 [ 2366.779599][ C3] __do_softirq+0x1b9/0x7ff [ 2366.779855][ C3] ? __pfx_run_ksoftirqd+0x10/0x10 [ 2366.780129][ C3] run_ksoftirqd+0x2e/0x60 [ 2366.780375][ C3] smpboot_thread_fn+0x30b/0x840 [ 2366.780635][ C3] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 2366.780932][ C3] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 2366.781241][ C3] kthread+0x28f/0x360 [ 2366.781452][ C3] ? __pfx_kthread+0x10/0x10 [ 2366.781687][ C3] ret_from_fork+0x31/0x70 [ 2366.781944][ C3] ? __pfx_kthread+0x10/0x10 [ 2366.782197][ C3] ret_from_fork_asm+0x1b/0x30 [ 2366.782446][ C3] TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ] # INFO: Could not test offloaded functionality ok 1 selftests: net/forwarding: tc_actions.sh make[1]: Leaving directory '/home/virtme/testing-4/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing-4/tools/testing/selftests' xx__-> echo $? 0 xx__->