https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=271366
Bug ID: 271366 Summary: Invoking IPv6 network device address event may sleep with the following non-sleepable locks held Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: b...@freebsd.org Reporter: pku...@freebsd.org During booting of a CURRENT VM (rev. 74192f9b2d24) on powerpc64le, when starting vtnet0 NIC, there are following lock warnings: Invoking IPv6 network device address event may sleep with the following non-sleepable locks held: exclusive sleep mutex vtnet0-rx0 (vtnet0-rx0) r = 0 (0xc0000000081c0480) locked @ /usr/src/sys/dev/virtio/network/if_vtnet.c:2188 stack backtrace: #0 0xc00000000091bb38 at witness_debugger+0x98 #1 0xc00000000091d300 at witness_warn+0x4b0 #2 0xc000000000b3ad38 at in6_update_ifa+0xc08 #3 0xc000000000b717b8 at in6_ifadd+0x268 #4 0xc000000000b6ce94 at nd6_ra_input+0x10e4 #5 0xc000000000b34bb8 at icmp6_input+0x8a8 #6 0xc000000000b53dfc at ip6_input+0xdac #7 0xc000000000a432ac at netisr_dispatch_src+0x11c #8 0xc000000000a43754 at netisr_dispatch+0x24 #9 0xc000000000a1b8c4 at ether_demux+0x1c4 #10 0xc000000000a1d6b4 at ether_nh_input+0x454 #11 0xc000000000a432ac at netisr_dispatch_src+0x11c #12 0xc000000000a43754 at netisr_dispatch+0x24 #13 0xc000000000a1bec8 at ether_input+0x118 #14 0xc000000000a14a48 at if_input+0x28 #15 0xc0000000006c011c at vtnet_rxq_eof+0x83c #16 0xc0000000006bf7f4 at vtnet_rx_vq_process+0xf4 #17 0xc0000000006b3cfc at virtqueue_intr+0x2c lock order reversal: (sleepable after non-sleepable) 1st 0xc0000000081c0480 vtnet0-rx0 (vtnet0-rx0, sleep mutex) @ /usr/src/sys/dev/virtio/network/if_vtnet.c:2188 2nd 0xc0000000019f48c0 in6_multi_sx (in6_multi_sx, sx) @ /usr/src/sys/netinet6/in6_mcast.c:1219 lock order vtnet0-rx0 -> in6_multi_sx attempted at: #0 0xc00000000091b570 at witness_checkorder+0xc60 #1 0xc00000000088e000 at _sx_xlock+0x90 #2 0xc000000000b46e64 at in6_joingroup+0x64 #3 0xc000000000b3b0e0 at in6_update_ifa+0xfb0 #4 0xc000000000b717b8 at in6_ifadd+0x268 #5 0xc000000000b6ce94 at nd6_ra_input+0x10e4 #6 0xc000000000b34bb8 at icmp6_input+0x8a8 #7 0xc000000000b53dfc at ip6_input+0xdac #8 0xc000000000a432ac at netisr_dispatch_src+0x11c #9 0xc000000000a43754 at netisr_dispatch+0x24 #10 0xc000000000a1b8c4 at ether_demux+0x1c4 #11 0xc000000000a1d6b4 at ether_nh_input+0x454 #12 0xc000000000a432ac at netisr_dispatch_src+0x11c #13 0xc000000000a43754 at netisr_dispatch+0x24 #14 0xc000000000a1bec8 at ether_input+0x118 #15 0xc000000000a14a48 at if_input+0x28 #16 0xc0000000006c011c at vtnet_rxq_eof+0x83c #17 0xc0000000006bf7f4 at vtnet_rx_vq_process+0xf4 I have in /etc/rc.conf: ifconfig_vtnet0="DHCP" ifconfig_vtnet0_ipv6="inet6 accept_rtadv" -- You are receiving this mail because: You are the assignee for the bug.