Warning: Permanently added '10.128.0.156' (ED25519) to the list of known hosts. executing program [ 37.365711][ T4216] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 37.368433][ T4216] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4216, name: syz-executor257 [ 37.370977][ T4216] preempt_count: 201, expected: 0 [ 37.372272][ T4216] RCU nest depth: 0, expected: 0 [ 37.373657][ T4216] 2 locks held by syz-executor257/4216: [ 37.375200][ T4216] #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 37.377888][ T4216] #1: ffff0000da34a108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 37.380404][ T4216] Preemption disabled at: [ 37.380414][ T4216] [] sch_tree_lock+0x120/0x1d4 [ 37.383289][ T4216] CPU: 1 PID: 4216 Comm: syz-executor257 Not tainted 6.1.42-syzkaller #0 [ 37.385443][ T4216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 37.388173][ T4216] Call trace: [ 37.389064][ T4216] dump_backtrace+0x1c8/0x1f4 [ 37.390326][ T4216] show_stack+0x2c/0x3c [ 37.391458][ T4216] dump_stack_lvl+0x108/0x170 [ 37.392748][ T4216] dump_stack+0x1c/0x58 [ 37.393860][ T4216] __might_resched+0x37c/0x4d8 [ 37.395138][ T4216] __might_sleep+0x90/0xe4 [ 37.396328][ T4216] __kmem_cache_alloc_node+0x74/0x388 [ 37.397821][ T4216] __kmalloc_node+0xcc/0x1d0 [ 37.399072][ T4216] kvmalloc_node+0x84/0x1e4 [ 37.400282][ T4216] get_dist_table+0xa0/0x354 [ 37.401545][ T4216] netem_change+0x754/0x1900 [ 37.402821][ T4216] netem_init+0x54/0xb8 [ 37.403925][ T4216] qdisc_create+0x70c/0xe64 [ 37.405132][ T4216] tc_modify_qdisc+0x9f0/0x1840 [ 37.406438][ T4216] rtnetlink_rcv_msg+0x72c/0xd94 [ 37.407787][ T4216] netlink_rcv_skb+0x20c/0x3b8 [ 37.409084][ T4216] rtnetlink_rcv+0x28/0x38 [ 37.410285][ T4216] netlink_unicast+0x660/0x8d4 [ 37.411588][ T4216] netlink_sendmsg+0x834/0xb18 [ 37.412908][ T4216] ____sys_sendmsg+0x558/0x844 [ 37.414193][ T4216] __sys_sendmsg+0x26c/0x33c [ 37.415465][ T4216] __arm64_sys_sendmsg+0x80/0x94 [ 37.416778][ T4216] invoke_syscall+0x98/0x2c0 [ 37.418026][ T4216] el0_svc_common+0x138/0x258 [ 37.419304][ T4216] do_el0_svc+0x64/0x218 [ 37.420475][ T4216] el0_svc+0x58/0x168 [ 37.421588][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 37.422934][ T4216] el0t_64_sync+0x18c/0x190 [ 37.424235][ T4216] [ 37.424838][ T4216] ============================================ [ 37.426449][ T4216] WARNING: possible recursive locking detected [ 37.428099][ T4216] 6.1.42-syzkaller #0 Tainted: G W [ 37.429870][ T4216] -------------------------------------------- [ 37.431568][ T4216] syz-executor257/4216 is trying to acquire lock: [ 37.433252][ T4216] ffff0000da34a108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 37.435696][ T4216] [ 37.435696][ T4216] but task is already holding lock: [ 37.437698][ T4216] ffff0000da34a108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 37.440137][ T4216] [ 37.440137][ T4216] other info that might help us debug this: [ 37.442369][ T4216] Possible unsafe locking scenario: [ 37.442369][ T4216] [ 37.444401][ T4216] CPU0 [ 37.445285][ T4216] ---- [ 37.446160][ T4216] lock(&sch->q.lock); [ 37.447286][ T4216] lock(&sch->q.lock); [ 37.448363][ T4216] [ 37.448363][ T4216] *** DEADLOCK *** [ 37.448363][ T4216] [ 37.450546][ T4216] May be due to missing lock nesting notation [ 37.450546][ T4216] [ 37.452782][ T4216] 2 locks held by syz-executor257/4216: [ 37.454287][ T4216] #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 37.456832][ T4216] #1: ffff0000da34a108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 37.459312][ T4216] [ 37.459312][ T4216] stack backtrace: [ 37.460880][ T4216] CPU: 1 PID: 4216 Comm: syz-executor257 Tainted: G W 6.1.42-syzkaller #0 [ 37.463605][ T4216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 37.466265][ T4216] Call trace: [ 37.467129][ T4216] dump_backtrace+0x1c8/0x1f4 [ 37.468421][ T4216] show_stack+0x2c/0x3c [ 37.469544][ T4216] dump_stack_lvl+0x108/0x170 [ 37.470793][ T4216] dump_stack+0x1c/0x58 [ 37.471897][ T4216] __lock_acquire+0x6310/0x764c [ 37.473198][ T4216] lock_acquire+0x26c/0x7cc [ 37.474397][ T4216] _raw_spin_lock_bh+0x54/0x6c [ 37.475718][ T4216] get_dist_table+0x240/0x354 [ 37.476984][ T4216] netem_change+0x754/0x1900 [ 37.478217][ T4216] netem_init+0x54/0xb8 [ 37.479396][ T4216] qdisc_create+0x70c/0xe64 [ 37.480636][ T4216] tc_modify_qdisc+0x9f0/0x1840 [ 37.481973][ T4216] rtnetlink_rcv_msg+0x72c/0xd94 [ 37.483341][ T4216] netlink_rcv_skb+0x20c/0x3b8 [ 37.484632][ T4216] rtnetlink_rcv+0x28/0x38 [ 37.485850][ T4216] netlink_unicast+0x660/0x8d4 [ 37.487139][ T4216] netlink_sendmsg+0x834/0xb18 [ 37.488403][ T4216] ____sys_sendmsg+0x558/0x844 [ 37.489695][ T4216] __sys_sendmsg+0x26c/0x33c [ 37.490930][ T4216] __arm64_sys_sendmsg+0x80/0x94 [ 37.492265][ T4216] invoke_syscall+0x98/0x2c0 [ 37.493545][ T4216] el0_svc_common+0x138/0x258 [ 37.494787][ T4216] do_el0_svc+0x64/0x218 [ 37.495927][ T4216] el0_svc+0x58/0x168 [ 37.496978][ T4216] el0t_64_sync_handler+0x84/0xf0 [ 37.498358][ T4216] el0t_64_sync+0x18c/0x190