make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-2/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # timeout set to 0 # selftests: net/forwarding: tc_actions.sh # TEST: gact drop and ok (skip_hw) [ OK ] # TEST: mirred egress flower redirect (skip_hw) [ OK ] # TEST: mirred egress flower mirror (skip_hw) [ OK ] # TEST: mirred egress matchall mirror (skip_hw) [ OK ] [ 859.193234] tc (2903) used greatest stack depth: 11536 bytes left [ 861.341866] ping (3053) used greatest stack depth: 11512 bytes left # TEST: mirred_egress_to_ingress (skip_hw) [ OK ] # [ 864.271560] [ 864.271679] ============================================ [ 864.271981] WARNING: possible recursive locking detected [ 864.272264] 6.8.0-rc1-virtme #1 Not tainted [ 864.272496] -------------------------------------------- [ 864.272786] ncat/3204 is trying to acquire lock: [ 864.273059] ffff958cc3ea00b0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 864.273489] [ 864.273489] but task is already holding lock: [ 864.273828] ffff958cc3ea0cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 864.274250] [ 864.274250] other info that might help us debug this: [ 864.274602] Possible unsafe locking scenario: [ 864.274602] [ 864.274936] CPU0 [ 864.275073] ---- [ 864.275220] lock(slock-AF_INET/1); [ 864.275422] lock(slock-AF_INET/1); [ 864.275634] [ 864.275634] *** DEADLOCK *** [ 864.275634] [ 864.275962] May be due to missing lock nesting notation [ 864.275962] [ 864.276340] 8 locks held by ncat/3204: [ 864.276554] #0: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x6f/0x260 [ 864.277017] #1: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180 [ 864.277505] #2: ffff958cc3ea0cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 864.277951] #3: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x3f/0x6f0 [ 864.278422] #4: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0xc6/0xa20 [ 864.278890] #5: ffffffffb5367880 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x6e/0x1180 [ 864.279359] #6: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb+0x58/0x2c0 [ 864.279826] #7: ffffffffb53678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180 [ 864.280319] [ 864.280319] stack backtrace: [ 864.280557] CPU: 0 PID: 3204 Comm: ncat Not tainted 6.8.0-rc1-virtme #1 [ 864.280909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 864.281525] Call Trace: [ 864.281679] [ 864.281795] dump_stack_lvl+0x4b/0x80 [ 864.282009] __lock_acquire+0x1215/0x1750 [ 864.282245] ? sk_filter_trim_cap+0x53/0x360 [ 864.282487] lock_acquire+0xc1/0x2b0 [ 864.282696] ? tcp_v4_rcv+0xdb5/0xef0 [ 864.282906] ? sk_filter_trim_cap+0x11a/0x360 [ 864.283154] _raw_spin_lock_nested+0x2e/0x40 [ 864.283395] ? tcp_v4_rcv+0xdb5/0xef0 [ 864.283621] tcp_v4_rcv+0xdb5/0xef0 [ 864.283830] ip_protocol_deliver_rcu+0x4b/0x1e0 [ 864.284090] ip_local_deliver_finish+0xaf/0x180 [ 864.284349] __netif_receive_skb_one_core+0x8b/0xa0 [ 864.284622] netif_receive_skb+0x87/0x2c0 [ 864.284858] tcf_mirred_to_dev+0x1f6/0x410 [act_mirred] [ 864.285151] tcf_mirred_act+0xee/0x560 [act_mirred] [ 864.285427] ? tcf_skbedit_act+0x1d6/0x410 [act_skbedit] [ 864.285719] tcf_action_exec+0xaf/0x230 [ 864.285945] fl_classify+0x20e/0x260 [cls_flower] [ 864.286211] ? __pfx_usage_match+0x10/0x10 [ 864.286453] ? __bfs+0xf6/0x240 [ 864.286639] ? check_irq_usage+0x19c/0xc40 [ 864.286874] ? __skb_flow_dissect+0xc9/0x2d60 [ 864.287129] ? check_path.constprop.0+0x24/0x50 [ 864.287387] ? check_noncircular+0x81/0x150 [ 864.287621] ? __skb_flow_dissect+0x2fb/0x2d60 [ 864.287874] ? __lock_acquire+0xa6e/0x1750 [ 864.288100] tcf_classify+0x17d/0x540 [ 864.288306] tc_run+0x9f/0x150 [ 864.288498] __dev_queue_xmit+0x311/0x1180 [ 864.288728] ? mark_held_locks+0x49/0x80 [ 864.288956] ? eth_header+0x2a/0xc0 [ 864.289147] ip_finish_output2+0x230/0xa20 [ 864.289376] ? ip_skb_dst_mtu+0x51/0x1c0 [ 864.289605] ? __ip_queue_xmit+0x1d5/0x6f0 [ 864.289826] __ip_queue_xmit+0x1d5/0x6f0 [ 864.290044] __tcp_transmit_skb+0xb65/0xd30 [ 864.290275] ? __alloc_skb+0xdc/0x1a0 [ 864.290480] tcp_rcv_state_process+0x4f3/0x11f0 [ 864.290743] ? tcp_v4_rcv+0xdb5/0xef0 [ 864.290950] ? tcp_v4_do_rcv+0x64/0x360 [ 864.291179] tcp_v4_do_rcv+0x64/0x360 [ 864.291393] tcp_v4_rcv+0xe4f/0xef0 [ 864.291596] ? process_backlog+0x6f/0x260 [ 864.291829] ip_protocol_deliver_rcu+0x4b/0x1e0 [ 864.292079] ip_local_deliver_finish+0xaf/0x180 [ 864.292333] __netif_receive_skb_one_core+0x8b/0xa0 [ 864.292608] process_backlog+0x7c/0x260 [ 864.292824] __napi_poll.constprop.0+0x2a/0x1e0 [ 864.293085] net_rx_action+0x2be/0x340 [ 864.293299] __do_softirq+0xcb/0x37a [ 864.293510] ? tcp_recvmsg+0x80/0x200 [ 864.293718] do_softirq+0x4d/0x90 [ 864.293924] [ 864.294044] [ 864.294175] __local_bh_enable_ip+0xbf/0xe0 [ 864.294418] tcp_recvmsg+0x80/0x200 [ 864.294618] inet_recvmsg+0x70/0x260 [ 864.294829] __sys_recvfrom+0x168/0x1a0 [ 864.295045] ? do_pselect.constprop.0+0xde/0x170 [ 864.295304] ? task_mm_cid_work+0x18b/0x3c0 [ 864.295535] __x64_sys_recvfrom+0x24/0x30 [ 864.295760] do_syscall_64+0xcc/0x1e0 [ 864.295986] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 864.296283] RIP: 0033:0x7fd7a48d84c0 [ 864.296502] Code: 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 1d 45 31 c9 45 31 c0 b8 2d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 68 c3 0f 1f 80 00 00 00 00 41 54 48 83 ec 20 [ 864.297468] RSP: 002b:00007ffeacb237a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 864.297885] RAX: ffffffffffffffda RBX: 000056158081ba20 RCX: 00007fd7a48d84c0 [ 864.298273] RDX: 0000000000002000 RSI: 00007ffeacb23830 RDI: 0000000000000008 [ 864.298648] RBP: 00007ffeacb23830 R08: 0000000000000000 R09: 0000000000000000 [ 864.299034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 864.299430] R13: 000056158081ba20 R14: 0000000000000000 R15: 00007ffeacb2382c [ 864.299825] [ 895.084508] ncat (3205) used greatest stack depth: 10672 bytes left TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ] # INFO: Could not test offloaded functionality ok 1 selftests: net/forwarding: tc_actions.sh make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing-2/tools/testing/selftests' xx__-> echo $? 0 xx__->