make -C tools/testing/selftests TARGETS=net/forwarding TEST_PROGS=tc_actioons.sh TEST_GEN_PROGS="" run_tests make: Entering directory '/home/virtme/testing-2/tools/testing/selftests' make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make[1]: Nothing to be done for 'all'. make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make[1]: Entering directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' TAP version 13 1..1 # timeout set to 10800 # selftests: net/forwarding: tc_actions.sh # TEST: gact drop and ok (skip_hw) [ OK ] # TEST: mirred egress flower redirect (skip_hw) [ OK ] # TEST: mirred egress flower mirror (skip_hw) [ OK ] # TEST: mirred egress matchall mirror (skip_hw) [ OK ] [ 864.605679] ping (3051) used greatest stack depth: 11512 bytes left # TEST: mirred_egress_to_ingress (skip_hw) [ OK ] # [ 867.299717] [ 867.299817] ============================================ [ 867.300113] WARNING: possible recursive locking detected [ 867.300399] 6.8.0-rc2-virtme #1 Not tainted [ 867.300623] -------------------------------------------- [ 867.300907] ncat/3202 is trying to acquire lock: [ 867.301158] ffff8d13c57c80b0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 867.301584] [ 867.301584] but task is already holding lock: [ 867.301896] ffff8d13c57c8cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 867.302323] [ 867.302323] other info that might help us debug this: [ 867.302672] Possible unsafe locking scenario: [ 867.302672] [ 867.302984] CPU0 [ 867.303120] ---- [ 867.303255] lock(slock-AF_INET/1); [ 867.303449] lock(slock-AF_INET/1); [ 867.303647] [ 867.303647] *** DEADLOCK *** [ 867.303647] [ 867.303961] May be due to missing lock nesting notation [ 867.303961] [ 867.304320] 8 locks held by ncat/3202: [ 867.304523] #0: ffffffff98f678c0 (rcu_read_lock){....}-{1:2}, at: process_backlog+0x6f/0x260 [ 867.304978] #1: ffffffff98f678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180 [ 867.305465] #2: ffff8d13c57c8cb0 (slock-AF_INET/1){+.-.}-{2:2}, at: tcp_v4_rcv+0xdb5/0xef0 [ 867.305907] #3: ffffffff98f678c0 (rcu_read_lock){....}-{1:2}, at: __ip_queue_xmit+0x3f/0x6f0 [ 867.306359] #4: ffffffff98f678c0 (rcu_read_lock){....}-{1:2}, at: ip_finish_output2+0xc6/0xa20 [ 867.306818] #5: ffffffff98f67880 (rcu_read_lock_bh){....}-{1:2}, at: __dev_queue_xmit+0x6e/0x1180 [ 867.307295] #6: ffffffff98f678c0 (rcu_read_lock){....}-{1:2}, at: netif_receive_skb+0x58/0x2c0 [ 867.307751] #7: ffffffff98f678c0 (rcu_read_lock){....}-{1:2}, at: ip_local_deliver_finish+0x6f/0x180 [ 867.308233] [ 867.308233] stack backtrace: [ 867.308469] CPU: 1 PID: 3202 Comm: ncat Not tainted 6.8.0-rc2-virtme #1 [ 867.308818] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 867.309419] Call Trace: [ 867.309559] [ 867.309677] dump_stack_lvl+0x4b/0x80 [ 867.309876] __lock_acquire+0x1215/0x1750 [ 867.310099] ? sk_filter_trim_cap+0x53/0x360 [ 867.310332] lock_acquire+0xc1/0x2b0 [ 867.310531] ? tcp_v4_rcv+0xdb5/0xef0 [ 867.310729] ? sk_filter_trim_cap+0x11a/0x360 [ 867.310964] _raw_spin_lock_nested+0x2e/0x40 [ 867.311199] ? tcp_v4_rcv+0xdb5/0xef0 [ 867.311401] tcp_v4_rcv+0xdb5/0xef0 [ 867.311596] ip_protocol_deliver_rcu+0x4b/0x1e0 [ 867.311844] ip_local_deliver_finish+0xaf/0x180 [ 867.312097] __netif_receive_skb_one_core+0x8b/0xa0 [ 867.312363] netif_receive_skb+0x87/0x2c0 [ 867.312580] tcf_mirred_to_dev+0x1f6/0x410 [act_mirred] [ 867.312860] tcf_mirred_act+0xee/0x560 [act_mirred] [ 867.313124] ? tcf_skbedit_act+0x1d6/0x410 [act_skbedit] [ 867.313417] tcf_action_exec+0xaf/0x230 [ 867.313627] fl_classify+0x20e/0x260 [cls_flower] [ 867.313892] ? __lock_acquire+0xa6e/0x1750 [ 867.314117] ? __pfx___var_waitqueue+0x7/0x10 [ 867.314357] ? __lock_acquire+0xa6e/0x1750 [ 867.314577] ? print_shortest_lock_dependencies_backwards+0xc9/0xd0 [ 867.314913] ? find_held_lock+0x2b/0x80 [ 867.315128] ? lock_acquire+0xc1/0x2b0 [ 867.315335] ? handle_irq_event+0x51/0x80 [ 867.315552] ? __lock_acquire+0xa6e/0x1750 [ 867.315773] ? handle_irq_event+0x51/0x80 [ 867.315992] tcf_classify+0x17d/0x540 [ 867.316198] tc_run+0x9f/0x150 [ 867.316377] __dev_queue_xmit+0x311/0x1180 [ 867.316598] ? eth_header+0x2a/0xc0 [ 867.316794] ip_finish_output2+0x230/0xa20 [ 867.317017] ? ip_skb_dst_mtu+0x51/0x1c0 [ 867.317232] ? __ip_queue_xmit+0x1d5/0x6f0 [ 867.317455] __ip_queue_xmit+0x1d5/0x6f0 [ 867.317670] __tcp_transmit_skb+0xb65/0xd30 [ 867.317902] ? __alloc_skb+0xdc/0x1a0 [ 867.318109] tcp_rcv_state_process+0x4f3/0x11f0 [ 867.318360] ? tcp_v4_rcv+0xdb5/0xef0 [ 867.318564] ? tcp_v4_do_rcv+0x64/0x360 [ 867.318774] tcp_v4_do_rcv+0x64/0x360 [ 867.318976] tcp_v4_rcv+0xe4f/0xef0 [ 867.319170] ? process_backlog+0x6f/0x260 [ 867.319388] ip_protocol_deliver_rcu+0x4b/0x1e0 [ 867.319635] ip_local_deliver_finish+0xaf/0x180 [ 867.319883] __netif_receive_skb_one_core+0x8b/0xa0 [ 867.320151] process_backlog+0x7c/0x260 [ 867.320363] __napi_poll.constprop.0+0x2a/0x1e0 [ 867.320610] net_rx_action+0x2be/0x340 [ 867.320817] __do_softirq+0xcb/0x37a [ 867.321013] ? tcp_recvmsg+0x80/0x200 [ 867.321217] do_softirq+0x4d/0x90 [ 867.321402] [ 867.321524] [ 867.321647] __local_bh_enable_ip+0xbf/0xe0 [ 867.321876] tcp_recvmsg+0x80/0x200 [ 867.322078] inet_recvmsg+0x70/0x260 [ 867.322276] __sys_recvfrom+0x168/0x1a0 [ 867.322491] ? do_pselect.constprop.0+0xde/0x170 [ 867.322748] ? __common_interrupt+0x4e/0x100 [ 867.322982] ? lock_release+0xbe/0x270 [ 867.323192] __x64_sys_recvfrom+0x24/0x30 [ 867.323408] do_syscall_64+0xcc/0x1e0 [ 867.323608] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 867.323880] RIP: 0033:0x7f7a460154c0 [ 867.324076] Code: 84 00 00 00 00 00 0f 1f 40 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 1d 45 31 c9 45 31 c0 b8 2d 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 68 c3 0f 1f 80 00 00 00 00 41 54 48 83 ec 20 [ 867.325049] RSP: 002b:00007fffa6bff9c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 867.325450] RAX: ffffffffffffffda RBX: 000055ad6c37ca20 RCX: 00007f7a460154c0 [ 867.325833] RDX: 0000000000002000 RSI: 00007fffa6bffa50 RDI: 0000000000000008 [ 867.326211] RBP: 00007fffa6bffa50 R08: 0000000000000000 R09: 0000000000000000 [ 867.326589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 867.326970] R13: 000055ad6c37ca20 R14: 0000000000000000 R15: 00007fffa6bffa4c [ 867.327354] [ 899.404161] ncat (3203) used greatest stack depth: 10672 bytes left TEST: mirred_egress_to_ingress_tcp (skip_hw) [ OK ] # INFO: Could not test offloaded functionality ok 1 selftests: net/forwarding: tc_actions.sh make[1]: Leaving directory '/home/virtme/testing-2/tools/testing/selftests/net/forwarding' make: Leaving directory '/home/virtme/testing-2/tools/testing/selftests' xx__-> echo $? 0 xx__->