Warning: Permanently added '10.128.0.28' (ED25519) to the list of known hosts. executing program [ 34.273627][ T4216] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 34.276268][ T4216] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4216, name: syz-executor186 [ 34.278742][ T4216] preempt_count: 201, expected: 0 [ 34.280078][ T4216] RCU nest depth: 0, expected: 0 [ 34.281386][ T4216] 2 locks held by syz-executor186/4216: [ 34.282890][ T4216] #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 34.285436][ T4216] #1: ffff0000d49fc108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.287924][ T4216] Preemption disabled at: [ 34.287934][ T4216] [] sch_tree_lock+0x120/0x1d4 [ 34.290787][ T4216] CPU: 0 PID: 4216 Comm: syz-executor186 Not tainted 6.1.42-syzkaller #0 [ 34.293018][ T4216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 34.295688][ T4216] Call trace: [ 34.296561][ T4216] dump_backtrace+0x1c8/0x1f4 [ 34.297799][ T4216] show_stack+0x2c/0x3c [ 34.298921][ T4216] dump_stack_lvl+0x108/0x170 [ 34.300155][ T4216] dump_stack+0x1c/0x58 [ 34.301261][ T4216] __might_resched+0x37c/0x4d8 [ 34.302513][ T4216] __might_sleep+0x90/0xe4 [ 34.303718][ T4216] __kmem_cache_alloc_node+0x74/0x388 [ 34.305220][ T4216] __kmalloc_node+0xcc/0x1d0 [ 34.306412][ T4216] kvmalloc_node+0x84/0x1e4 [ 34.307628][ T4216] get_dist_table+0xa0/0x354 [ 34.308866][ T4216] netem_change+0x754/0x1900 [ 34.310093][ T4216] netem_init+0x54/0xb8 [ 34.311190][ T4216] qdisc_create+0x70c/0xe64 [ 34.312367][ T4216] tc_modify_qdisc+0x9f0/0x1840 [ 34.313645][ T4216] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.314956][ T4216] netlink_rcv_skb+0x20c/0x3b8 [ 34.316250][ T4216] rtnetlink_rcv+0x28/0x38 [ 34.317473][ T4216] netlink_unicast+0x660/0x8d4 [ 34.318747][ T4216] netlink_sendmsg+0x834/0xb18 [ 34.320012][ T4216] ____sys_sendmsg+0x558/0x844 [ 34.321336][ T4216] __sys_sendmsg+0x26c/0x33c [ 34.322567][ T4216] __arm64_sys_sendmsg+0x80/0x94 [ 34.323904][ T4216] invoke_syscall+0x98/0x2c0 [ 34.325150][ T4216] el0_svc_common+0x138/0x258 [ 34.326431][ T4216] do_el0_svc+0x64/0x218 [ 34.327625][ T4216] el0_svc+0x58/0x168 [ 34.328680][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 34.330013][ T4216] el0t_64_sync+0x18c/0x190 [ 34.331315][ T4216] [ 34.331907][ T4216] ============================================ [ 34.333537][ T4216] WARNING: possible recursive locking detected [ 34.335119][ T4216] 6.1.42-syzkaller #0 Tainted: G W [ 34.336852][ T4216] -------------------------------------------- [ 34.338467][ T4216] syz-executor186/4216 is trying to acquire lock: [ 34.340161][ T4216] ffff0000d49fc108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 34.342537][ T4216] [ 34.342537][ T4216] but task is already holding lock: [ 34.344535][ T4216] ffff0000d49fc108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.346896][ T4216] [ 34.346896][ T4216] other info that might help us debug this: [ 34.349024][ T4216] Possible unsafe locking scenario: [ 34.349024][ T4216] [ 34.350968][ T4216] CPU0 [ 34.351823][ T4216] ---- [ 34.352681][ T4216] lock(&sch->q.lock); [ 34.353796][ T4216] lock(&sch->q.lock); [ 34.354884][ T4216] [ 34.354884][ T4216] *** DEADLOCK *** [ 34.354884][ T4216] [ 34.357017][ T4216] May be due to missing lock nesting notation [ 34.357017][ T4216] [ 34.359206][ T4216] 2 locks held by syz-executor186/4216: [ 34.360678][ T4216] #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 34.363128][ T4216] #1: ffff0000d49fc108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.365516][ T4216] [ 34.365516][ T4216] stack backtrace: [ 34.367076][ T4216] CPU: 0 PID: 4216 Comm: syz-executor186 Tainted: G W 6.1.42-syzkaller #0 [ 34.369699][ T4216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 34.372331][ T4216] Call trace: [ 34.373220][ T4216] dump_backtrace+0x1c8/0x1f4 [ 34.374451][ T4216] show_stack+0x2c/0x3c [ 34.375544][ T4216] dump_stack_lvl+0x108/0x170 [ 34.376763][ T4216] dump_stack+0x1c/0x58 [ 34.377837][ T4216] __lock_acquire+0x6310/0x764c [ 34.379127][ T4216] lock_acquire+0x26c/0x7cc [ 34.380310][ T4216] _raw_spin_lock_bh+0x54/0x6c [ 34.381577][ T4216] get_dist_table+0x240/0x354 [ 34.382822][ T4216] netem_change+0x754/0x1900 [ 34.384012][ T4216] netem_init+0x54/0xb8 [ 34.385084][ T4216] qdisc_create+0x70c/0xe64 [ 34.386297][ T4216] tc_modify_qdisc+0x9f0/0x1840 [ 34.387576][ T4216] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.388868][ T4216] netlink_rcv_skb+0x20c/0x3b8 [ 34.390181][ T4216] rtnetlink_rcv+0x28/0x38 [ 34.391357][ T4216] netlink_unicast+0x660/0x8d4 [ 34.392593][ T4216] netlink_sendmsg+0x834/0xb18 [ 34.393830][ T4216] ____sys_sendmsg+0x558/0x844 [ 34.395054][ T4216] __sys_sendmsg+0x26c/0x33c [ 34.396244][ T4216] __arm64_sys_sendmsg+0x80/0x94 [ 34.397548][ T4216] invoke_syscall+0x98/0x2c0 [ 34.398753][ T4216] el0_svc_common+0x138/0x258 [ 34.400010][ T4216] do_el0_svc+0x64/0x218 [ 34.401143][ T4216] el0_svc+0x58/0x168 [ 34.402153][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 34.403444][ T4216] el0t_64_sync+0x18c/0x190