Warning: Permanently added '10.128.0.251' (ED25519) to the list of known hosts. executing program [ 38.287050][ T4219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor660'. [ 38.289759][ T4219] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 38.292286][ T4219] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4219, name: syz-executor660 [ 38.294765][ T4219] preempt_count: 201, expected: 0 [ 38.296059][ T4219] RCU nest depth: 0, expected: 0 [ 38.297326][ T4219] 2 locks held by syz-executor660/4219: [ 38.298704][ T4219] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 38.301196][ T4219] #1: ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 38.303619][ T4219] Preemption disabled at: [ 38.303630][ T4219] [] sch_tree_lock+0x120/0x1d4 [ 38.306328][ T4219] CPU: 1 PID: 4219 Comm: syz-executor660 Not tainted 6.1.45-syzkaller #0 [ 38.308469][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 38.311096][ T4219] Call trace: [ 38.311923][ T4219] dump_backtrace+0x1c8/0x1f4 [ 38.313149][ T4219] show_stack+0x2c/0x3c [ 38.314227][ T4219] dump_stack_lvl+0x108/0x170 [ 38.315549][ T4219] dump_stack+0x1c/0x58 [ 38.316647][ T4219] __might_resched+0x37c/0x4d8 [ 38.317906][ T4219] __might_sleep+0x90/0xe4 [ 38.319097][ T4219] __kmem_cache_alloc_node+0x74/0x388 [ 38.320551][ T4219] __kmalloc_node+0xcc/0x1d0 [ 38.321802][ T4219] kvmalloc_node+0x84/0x1e4 [ 38.323002][ T4219] get_dist_table+0xa0/0x354 [ 38.324212][ T4219] netem_change+0x7a4/0x1900 [ 38.325427][ T4219] netem_init+0x54/0xb8 [ 38.326579][ T4219] qdisc_create+0x70c/0xe64 [ 38.327742][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 38.329088][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 38.330431][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 38.331688][ T4219] rtnetlink_rcv+0x28/0x38 [ 38.332911][ T4219] netlink_unicast+0x660/0x8d4 [ 38.334152][ T4219] netlink_sendmsg+0x834/0xb18 [ 38.335399][ T4219] ____sys_sendmsg+0x558/0x844 [ 38.336666][ T4219] __sys_sendmsg+0x26c/0x33c [ 38.337876][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 38.339262][ T4219] invoke_syscall+0x98/0x2c0 [ 38.340479][ T4219] el0_svc_common+0x138/0x258 [ 38.341759][ T4219] do_el0_svc+0x64/0x218 [ 38.342921][ T4219] el0_svc+0x58/0x168 [ 38.344001][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 38.345325][ T4219] el0t_64_sync+0x18c/0x190 [ 38.346730][ T4219] [ 38.347349][ T4219] ============================================ [ 38.348904][ T4219] WARNING: possible recursive locking detected [ 38.350519][ T4219] 6.1.45-syzkaller #0 Tainted: G W [ 38.352231][ T4219] -------------------------------------------- [ 38.353800][ T4219] syz-executor660/4219 is trying to acquire lock: [ 38.355520][ T4219] ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 38.357890][ T4219] [ 38.357890][ T4219] but task is already holding lock: [ 38.359881][ T4219] ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 38.362256][ T4219] [ 38.362256][ T4219] other info that might help us debug this: [ 38.364385][ T4219] Possible unsafe locking scenario: [ 38.364385][ T4219] [ 38.366406][ T4219] CPU0 [ 38.367277][ T4219] ---- [ 38.368118][ T4219] lock(&sch->q.lock); [ 38.369234][ T4219] lock(&sch->q.lock); [ 38.370357][ T4219] [ 38.370357][ T4219] *** DEADLOCK *** [ 38.370357][ T4219] [ 38.372595][ T4219] May be due to missing lock nesting notation [ 38.372595][ T4219] [ 38.374851][ T4219] 2 locks held by syz-executor660/4219: [ 38.376352][ T4219] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 38.378985][ T4219] #1: ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 38.381502][ T4219] [ 38.381502][ T4219] stack backtrace: [ 38.382998][ T4219] CPU: 1 PID: 4219 Comm: syz-executor660 Tainted: G W 6.1.45-syzkaller #0 [ 38.385601][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 38.388218][ T4219] Call trace: [ 38.389066][ T4219] dump_backtrace+0x1c8/0x1f4 [ 38.390348][ T4219] show_stack+0x2c/0x3c [ 38.391414][ T4219] dump_stack_lvl+0x108/0x170 [ 38.392643][ T4219] dump_stack+0x1c/0x58 [ 38.393752][ T4219] __lock_acquire+0x6310/0x764c [ 38.395090][ T4219] lock_acquire+0x26c/0x7cc [ 38.396251][ T4219] _raw_spin_lock_bh+0x54/0x6c [ 38.397452][ T4219] get_dist_table+0x240/0x354 [ 38.398702][ T4219] netem_change+0x7a4/0x1900 [ 38.399960][ T4219] netem_init+0x54/0xb8 [ 38.401074][ T4219] qdisc_create+0x70c/0xe64 [ 38.402244][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 38.403649][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 38.405016][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 38.406283][ T4219] rtnetlink_rcv+0x28/0x38 [ 38.407482][ T4219] netlink_unicast+0x660/0x8d4 [ 38.408756][ T4219] netlink_sendmsg+0x834/0xb18 [ 38.410028][ T4219] ____sys_sendmsg+0x558/0x844 [ 38.411283][ T4219] __sys_sendmsg+0x26c/0x33c [ 38.412519][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 38.413846][ T4219] invoke_syscall+0x98/0x2c0 [ 38.415077][ T4219] el0_svc_common+0x138/0x258 [ 38.416346][ T4219] do_el0_svc+0x64/0x218 [ 38.417484][ T4219] el0_svc+0x58/0x168 [ 38.418544][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 38.419905][ T4219] el0t_64_sync+0x18c/0x190