make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-2/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # timeout set to 0 # selftests: net/forwarding: tc_actions.sh # TEST: gact drop and ok (skip_hw) [ OK ] # TEST: mirred egress flower redirect (skip_hw) [ OK ] # TEST: mirred egress flower mirror (skip_hw) [ OK ] # TEST: mirred egress matchall mirror (skip_hw) [ OK ] [ 859.794987] tc (2898) used greatest stack depth: 11552 bytes left [ 861.951483] ping (3044) used greatest stack depth: 11512 bytes left # TEST: mirred_egress_to_ingress (skip_hw) [ OK ] # [ 866.349872] [ 866.349992] ============================================ [ 866.350307] WARNING: possible recursive locking detected [ 866.350589] 6.8.0-rc1-virtme #1 Not tainted [ 866.350839] -------------------------------------------- [ 866.351124] ksoftirqd/0/16 is trying to acquire lock: [ 866.351434] ffff9f7705208cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 866.351873] [ 866.351873] but task is already holding lock: [ 866.352187] ffff9f77052080b0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 866.352639] [ 866.352639] other info that might help us debug this: [ 866.352981] Possible unsafe locking scenario: [ 866.352981] [ 866.353300] CPU0 [ 866.353468] ---- [ 866.353603] lock(slock-AF_INET/1); [ 866.353819] lock(slock-AF_INET/1); [ 866.354016] [ 866.354016] *** DEADLOCK *** [ 866.354016] [ 866.354370] May be due to missing lock nesting notation [ 866.354370] [ 866.354756] 8 locks held by ksoftirqd/0/16: [ 866.354983] #0: ffffffff9a1678c0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x6f/0x260 [ 866.355468] #1: ffffffff9a1678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180 [ 866.355981] #2: ffff9f77052080b0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 866.356442] #3: ffffffff9a1678c0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x3f/0x6f0 [ 866.356898] #4: ffffffff9a1678c0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0xc6/0xa20 [ 866.357354] #5: ffffffff9a167880 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x6e/0x1180 [ 866.357838] #6: ffffffff9a1678c0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb+0x58/0x2c0 [ 866.358340] #7: ffffffff9a1678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180 [ 866.358843] [ 866.358843] stack backtrace: [ 866.359082] CPU: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.8.0-rc1-virtme #1 [ 866.359494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 866.360112] Call Trace: [ 866.360254] [ 866.360377] dump_stack_lvl+0x4b/0x80 [ 866.360599] __lock_acquire+0x1215/0x1750 [ 866.360843] ? sk_filter_trim_cap+0x53/0x360 [ 866.361079] lock_acquire+0xc1/0x2b0 [ 866.361303] ? tcp_v4_rcv+0xdb5/0xef0 [ 866.361507] ? sk_filter_trim_cap+0x11a/0x360 [ 866.361767] _raw_spin_lock_nested+0x2e/0x40 [ 866.361999] ? tcp_v4_rcv+0xdb5/0xef0 [ 866.362221] tcp_v4_rcv+0xdb5/0xef0 [ 866.362411] ip_protocol_deliver_rcu+0x4b/0x1e0 [ 866.362715] ip_local_deliver_finish+0xaf/0x180 [ 866.362995] __netif_receive_skb_one_core+0x8b/0xa0 [ 866.363329] netif_receive_skb+0x87/0x2c0 [ 866.363586] tcf_mirred_to_dev+0x1f6/0x410 [act_mirred] [ 866.363898] tcf_mirred_act+0xee/0x560 [act_mirred] [ 866.364160] ? tcf_skbedit_act+0x1d6/0x410 [act_skbedit] [ 866.364470] tcf_action_exec+0xaf/0x230 [ 866.364684] fl_classify+0x20e/0x260 [cls_flower] [ 866.364980] ? fl_mask_lookup+0x17e/0x5a0 [cls_flower] [ 866.365259] ? __pfx_usage_match+0x10/0x10 [ 866.365508] ? __bfs+0xf6/0x240 [ 866.365684] ? check_irq_usage+0x19c/0xc40 [ 866.365932] ? __lock_acquire+0xa6e/0x1750 [ 866.366154] ? check_path.constprop.0+0x24/0x50 [ 866.366430] ? check_noncircular+0x81/0x150 [ 866.366656] ? __lock_acquire+0xa6e/0x1750 [ 866.366916] tcf_classify+0x17d/0x540 [ 866.367115] tc_run+0x9f/0x150 [ 866.367303] __dev_queue_xmit+0x311/0x1180 [ 866.367529] ? mark_held_locks+0x49/0x80 [ 866.367772] ip_finish_output2+0x39f/0xa20 [ 866.367991] ? __ip_queue_xmit+0x1d5/0x6f0 [ 866.368244] __ip_queue_xmit+0x1d5/0x6f0 [ 866.368484] __tcp_transmit_skb+0xb65/0xd30 [ 866.368752] ? mark_held_locks+0x49/0x80 [ 866.368965] tcp_write_xmit+0x492/0x1400 [ 866.369205] __tcp_push_pending_frames+0x36/0xc0 [ 866.369489] tcp_rcv_state_process+0x4d3/0x11f0 [ 866.369754] ? tcp_v4_rcv+0xdb5/0xef0 [ 866.369957] ? tcp_v4_do_rcv+0x64/0x360 [ 866.370161] tcp_v4_do_rcv+0x64/0x360 [ 866.370385] tcp_v4_rcv+0xe4f/0xef0 [ 866.370610] ? process_backlog+0x6f/0x260 [ 866.370848] ip_protocol_deliver_rcu+0x4b/0x1e0 [ 866.371103] ip_local_deliver_finish+0xaf/0x180 [ 866.371370] __netif_receive_skb_one_core+0x8b/0xa0 [ 866.371672] process_backlog+0x7c/0x260 [ 866.371904] __napi_poll.constprop.0+0x2a/0x1e0 [ 866.372148] net_rx_action+0x2be/0x340 [ 866.372392] __do_softirq+0xcb/0x37a [ 866.372618] ? __pfx_smpboot_thread_fn+0x10/0x10 [ 866.372906] run_ksoftirqd+0x2e/0x40 [ 866.373103] smpboot_thread_fn+0xdc/0x1d0 [ 866.373353] kthread+0xdd/0x110 [ 866.373547] ? __pfx_kthread+0x10/0x10 [ 866.373763] ret_from_fork+0x34/0x50 [ 866.373979] ? __pfx_kthread+0x10/0x10 [ 866.374183] ret_from_fork_asm+0x1b/0x30 [ 866.374439] [ 910.511132] ncat (3196) used greatest stack depth: 10672 bytes left TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ] # INFO: Could not test offloaded functionality ok 1 selftests: net/forwarding: tc_actions.sh make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing-2/tools/testing/selftests' xx__-> echo $? 0 xx__->