make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests
make: Entering directory '/home/virtme/testing-2/tools/testing/selftests'
make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding'
make[1]: Nothing to be done for 'all'.
make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding'
make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding'
TAP version 13
1..1
# timeout set to 0
# selftests: net/forwarding: tc_actions.sh
# TEST: gact drop and ok (skip_hw) [ OK ]
# TEST: mirred egress flower redirect (skip_hw) [ OK ]
# TEST: mirred egress flower mirror (skip_hw) [ OK ]
# TEST: mirred egress matchall mirror (skip_hw) [ OK ]
[ 859.193234] tc (2903) used greatest stack depth: 11536 bytes left
[ 861.341866] ping (3053) used greatest stack depth: 11512 bytes left
# TEST: mirred_egress_to_ingress (skip_hw) [ OK ]
# [ 864.271560]
[ 864.271679] ============================================
[ 864.271981] WARNING: possible recursive locking detected
[ 864.272264] 6.8.0-rc1-virtme #1 Not tainted
[ 864.272496] --------------------------------------------
[ 864.272786] ncat/3204 is trying to acquire lock:
[ 864.273059] ffff958cc3ea00b0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0
[ 864.273489]
[ 864.273489] but task is already holding lock:
[ 864.273828] ffff958cc3ea0cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0
[ 864.274250]
[ 864.274250] other info that might help us debug this:
[ 864.274602] Possible unsafe locking scenario:
[ 864.274602]
[ 864.274936] CPU0
[ 864.275073] ----
[ 864.275220] lock(slock-AF_INET/1);
[ 864.275422] lock(slock-AF_INET/1);
[ 864.275634]
[ 864.275634] *** DEADLOCK ***
[ 864.275634]
[ 864.275962] May be due to missing lock nesting notation
[ 864.275962]
[ 864.276340] 8 locks held by ncat/3204:
[ 864.276554] #0: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x6f/0x260
[ 864.277017] #1: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180
[ 864.277505] #2: ffff958cc3ea0cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0
[ 864.277951] #3: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x3f/0x6f0
[ 864.278422] #4: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0xc6/0xa20
[ 864.278890] #5: ffffffffb5367880 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x6e/0x1180
[ 864.279359] #6: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb+0x58/0x2c0
[ 864.279826] #7: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180
[ 864.280319]
[ 864.280319] stack backtrace:
[ 864.280557] CPU: 0 PID: 3204 Comm: ncat Not tainted 6.8.0-rc1-virtme #1
[ 864.280909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 864.281525] Call Trace:
[ 864.281679]
[ 864.281795] dump_stack_lvl+0x4b/0x80
[ 864.282009] __lock_acquire+0x1215/0x1750
[ 864.282245] ? sk_filter_trim_cap+0x53/0x360
[ 864.282487] lock_acquire+0xc1/0x2b0
[ 864.282696] ? tcp_v4_rcv+0xdb5/0xef0
[ 864.282906] ? sk_filter_trim_cap+0x11a/0x360
[ 864.283154] _raw_spin_lock_nested+0x2e/0x40
[ 864.283395] ? tcp_v4_rcv+0xdb5/0xef0
[ 864.283621] tcp_v4_rcv+0xdb5/0xef0
[ 864.283830] ip_protocol_deliver_rcu+0x4b/0x1e0
[ 864.284090] ip_local_deliver_finish+0xaf/0x180
[ 864.284349] __netif_receive_skb_one_core+0x8b/0xa0
[ 864.284622] netif_receive_skb+0x87/0x2c0
[ 864.284858] tcf_mirred_to_dev+0x1f6/0x410 [act_mirred]
[ 864.285151] tcf_mirred_act+0xee/0x560 [act_mirred]
[ 864.285427] ? tcf_skbedit_act+0x1d6/0x410 [act_skbedit]
[ 864.285719] tcf_action_exec+0xaf/0x230
[ 864.285945] fl_classify+0x20e/0x260 [cls_flower]
[ 864.286211] ? __pfx_usage_match+0x10/0x10
[ 864.286453] ? __bfs+0xf6/0x240
[ 864.286639] ? check_irq_usage+0x19c/0xc40
[ 864.286874] ? __skb_flow_dissect+0xc9/0x2d60
[ 864.287129] ? check_path.constprop.0+0x24/0x50
[ 864.287387] ? check_noncircular+0x81/0x150
[ 864.287621] ? __skb_flow_dissect+0x2fb/0x2d60
[ 864.287874] ? __lock_acquire+0xa6e/0x1750
[ 864.288100] tcf_classify+0x17d/0x540
[ 864.288306] tc_run+0x9f/0x150
[ 864.288498] __dev_queue_xmit+0x311/0x1180
[ 864.288728] ? mark_held_locks+0x49/0x80
[ 864.288956] ? eth_header+0x2a/0xc0
[ 864.289147] ip_finish_output2+0x230/0xa20
[ 864.289376] ? ip_skb_dst_mtu+0x51/0x1c0
[ 864.289605] ? __ip_queue_xmit+0x1d5/0x6f0
[ 864.289826] __ip_queue_xmit+0x1d5/0x6f0
[ 864.290044] __tcp_transmit_skb+0xb65/0xd30
[ 864.290275] ? __alloc_skb+0xdc/0x1a0
[ 864.290480] tcp_rcv_state_process+0x4f3/0x11f0
[ 864.290743] ? tcp_v4_rcv+0xdb5/0xef0
[ 864.290950] ? tcp_v4_do_rcv+0x64/0x360
[ 864.291179] tcp_v4_do_rcv+0x64/0x360
[ 864.291393] tcp_v4_rcv+0xe4f/0xef0
[ 864.291596] ? process_backlog+0x6f/0x260
[ 864.291829] ip_protocol_deliver_rcu+0x4b/0x1e0
[ 864.292079] ip_local_deliver_finish+0xaf/0x180
[ 864.292333] __netif_receive_skb_one_core+0x8b/0xa0
[ 864.292608] process_backlog+0x7c/0x260
[ 864.292824] __napi_poll.constprop.0+0x2a/0x1e0
[ 864.293085] net_rx_action+0x2be/0x340
[ 864.293299] __do_softirq+0xcb/0x37a
[ 864.293510] ? tcp_recvmsg+0x80/0x200
[ 864.293718] do_softirq+0x4d/0x90
[ 864.293924]
[ 864.294044]
[ 864.294175] __local_bh_enable_ip+0xbf/0xe0
[ 864.294418] tcp_recvmsg+0x80/0x200
[ 864.294618] inet_recvmsg+0x70/0x260
[ 864.294829] __sys_recvfrom+0x168/0x1a0
[ 864.295045] ? do_pselect.constprop.0+0xde/0x170
[ 864.295304] ? task_mm_cid_work+0x18b/0x3c0
[ 864.295535] __x64_sys_recvfrom+0x24/0x30
[ 864.295760] do_syscall_64+0xcc/0x1e0
[ 864.295986] entry_SYSCALL_64_after_hwframe+0x6f/0x77
[ 864.296283] RIP: 0033:0x7fd7a48d84c0
[ 864.296502] Code: 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 1d 45 31 c9 45 31 c0 b8 2d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 68 c3 0f 1f 80 00 00 00 00 41 54 48 83 ec 20
[ 864.297468] RSP: 002b:00007ffeacb237a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
[ 864.297885] RAX: ffffffffffffffda RBX: 000056158081ba20 RCX: 00007fd7a48d84c0
[ 864.298273] RDX: 0000000000002000 RSI: 00007ffeacb23830 RDI: 0000000000000008
[ 864.298648] RBP: 00007ffeacb23830 R08: 0000000000000000 R09: 0000000000000000
[ 864.299034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008
[ 864.299430] R13: 000056158081ba20 R14: 0000000000000000 R15: 00007ffeacb2382c
[ 864.299825]
[ 895.084508] ncat (3205) used greatest stack depth: 10672 bytes left
TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ]
# INFO: Could not test offloaded functionality
ok 1 selftests: net/forwarding: tc_actions.sh
make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding'
make: Leaving directory '/home/virtme/testing-2/tools/testing/selftests'
xx__-> echo $?
0
xx__->