Warning: Permanently added '10.128.10.19' (ED25519) to the list of known hosts. executing program [ 34.863902][ T4218] netlink: 56 bytes leftover after parsing attributes in process `syz-executor381'. [ 34.865999][ T4218] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 34.867901][ T4218] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4218, name: syz-executor381 [ 34.869861][ T4218] preempt_count: 201, expected: 0 [ 34.870903][ T4218] RCU nest depth: 0, expected: 0 [ 34.871833][ T4218] 2 locks held by syz-executor381/4218: [ 34.872884][ T4218] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 34.874829][ T4218] #1: ffff0000de4a4908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.876715][ T4218] Preemption disabled at: [ 34.876736][ T4218] [] sch_tree_lock+0x120/0x1d4 [ 34.878938][ T4218] CPU: 1 PID: 4218 Comm: syz-executor381 Not tainted 6.1.45-syzkaller #0 [ 34.880578][ T4218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 34.882399][ T4218] Call trace: [ 34.883047][ T4218] dump_backtrace+0x1c8/0x1f4 [ 34.883989][ T4218] show_stack+0x2c/0x3c [ 34.884804][ T4218] dump_stack_lvl+0x108/0x170 [ 34.885796][ T4218] dump_stack+0x1c/0x58 [ 34.886610][ T4218] __might_resched+0x37c/0x4d8 [ 34.887488][ T4218] __might_sleep+0x90/0xe4 [ 34.888386][ T4218] __kmem_cache_alloc_node+0x74/0x388 [ 34.889581][ T4218] __kmalloc_node+0xcc/0x1d0 [ 34.890529][ T4218] kvmalloc_node+0x84/0x1e4 [ 34.891479][ T4218] get_dist_table+0xa0/0x354 [ 34.892435][ T4218] netem_change+0x754/0x1900 [ 34.893400][ T4218] netem_init+0x54/0xb8 [ 34.894245][ T4218] qdisc_create+0x70c/0xe64 [ 34.895138][ T4218] tc_modify_qdisc+0x9f0/0x1840 [ 34.896062][ T4218] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.897062][ T4218] netlink_rcv_skb+0x20c/0x3b8 [ 34.898072][ T4218] rtnetlink_rcv+0x28/0x38 [ 34.898999][ T4218] netlink_unicast+0x660/0x8d4 [ 34.899935][ T4218] netlink_sendmsg+0x834/0xb18 [ 34.900924][ T4218] ____sys_sendmsg+0x558/0x844 [ 34.901920][ T4218] __sys_sendmsg+0x26c/0x33c [ 34.902884][ T4218] __arm64_sys_sendmsg+0x80/0x94 [ 34.903941][ T4218] invoke_syscall+0x98/0x2c0 [ 34.904886][ T4218] el0_svc_common+0x138/0x258 [ 34.905863][ T4218] do_el0_svc+0x64/0x218 [ 34.906698][ T4218] el0_svc+0x58/0x168 [ 34.907519][ T4218] el0t_64_sync_handler+0x84/0xf0 [ 34.908521][ T4218] el0t_64_sync+0x18c/0x190 [ 34.909518][ T4218] [ 34.909970][ T4218] ============================================ [ 34.911149][ T4218] WARNING: possible recursive locking detected [ 34.912345][ T4218] 6.1.45-syzkaller #0 Tainted: G W [ 34.913639][ T4218] -------------------------------------------- [ 34.914912][ T4218] syz-executor381/4218 is trying to acquire lock: [ 34.916121][ T4218] ffff0000de4a4908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 34.917920][ T4218] [ 34.917920][ T4218] but task is already holding lock: [ 34.919385][ T4218] ffff0000de4a4908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.921192][ T4218] [ 34.921192][ T4218] other info that might help us debug this: [ 34.922867][ T4218] Possible unsafe locking scenario: [ 34.922867][ T4218] [ 34.924353][ T4218] CPU0 [ 34.925025][ T4218] ---- [ 34.925678][ T4218] lock(&sch->q.lock); [ 34.926575][ T4218] lock(&sch->q.lock); [ 34.927463][ T4218] [ 34.927463][ T4218] *** DEADLOCK *** [ 34.927463][ T4218] [ 34.929160][ T4218] May be due to missing lock nesting notation [ 34.929160][ T4218] [ 34.930853][ T4218] 2 locks held by syz-executor381/4218: [ 34.931993][ T4218] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 34.933958][ T4218] #1: ffff0000de4a4908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.935975][ T4218] [ 34.935975][ T4218] stack backtrace: [ 34.937236][ T4218] CPU: 1 PID: 4218 Comm: syz-executor381 Tainted: G W 6.1.45-syzkaller #0 [ 34.939389][ T4218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 34.941572][ T4218] Call trace: [ 34.942275][ T4218] dump_backtrace+0x1c8/0x1f4 [ 34.943252][ T4218] show_stack+0x2c/0x3c [ 34.944092][ T4218] dump_stack_lvl+0x108/0x170 [ 34.945093][ T4218] dump_stack+0x1c/0x58 [ 34.945925][ T4218] __lock_acquire+0x6310/0x764c [ 34.946964][ T4218] lock_acquire+0x26c/0x7cc [ 34.947846][ T4218] _raw_spin_lock_bh+0x54/0x6c [ 34.948845][ T4218] get_dist_table+0x240/0x354 [ 34.949825][ T4218] netem_change+0x754/0x1900 [ 34.950813][ T4218] netem_init+0x54/0xb8 [ 34.951737][ T4218] qdisc_create+0x70c/0xe64 [ 34.952627][ T4218] tc_modify_qdisc+0x9f0/0x1840 [ 34.953635][ T4218] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.954614][ T4218] netlink_rcv_skb+0x20c/0x3b8 [ 34.955617][ T4218] rtnetlink_rcv+0x28/0x38 [ 34.956576][ T4218] netlink_unicast+0x660/0x8d4 [ 34.957521][ T4218] netlink_sendmsg+0x834/0xb18 [ 34.958503][ T4218] ____sys_sendmsg+0x558/0x844 [ 34.959509][ T4218] __sys_sendmsg+0x26c/0x33c [ 34.960447][ T4218] __arm64_sys_sendmsg+0x80/0x94 [ 34.961501][ T4218] invoke_syscall+0x98/0x2c0 [ 34.962456][ T4218] el0_svc_common+0x138/0x258 [ 34.963369][ T4218] do_el0_svc+0x64/0x218 [ 34.964200][ T4218] el0_svc+0x58/0x168 [ 34.965025][ T4218] el0t_64_sync_handler+0x84/0xf0 [ 34.966009][ T4218] el0t_64_sync+0x18c/0x190