[ 76.165705][ T14] cfg80211: failed to load regulatory.db Warning: Permanently added '10.128.10.1' (ED25519) to the list of known hosts. executing program [ 81.317795][ T3512] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 81.327427][ T3512] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3512, name: syz-executor173 [ 81.336972][ T3512] preempt_count: 201, expected: 0 [ 81.342010][ T3512] RCU nest depth: 0, expected: 0 [ 81.346988][ T3512] 2 locks held by syz-executor173/3512: [ 81.352543][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 81.362076][ T3512] #1: ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 81.371379][ T3512] Preemption disabled at: [ 81.371388][ T3512] [<0000000000000000>] 0x0 [ 81.380176][ T3512] CPU: 0 PID: 3512 Comm: syz-executor173 Not tainted 6.1.45-syzkaller #0 [ 81.388607][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 81.398658][ T3512] Call Trace: [ 81.401934][ T3512] [ 81.404862][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 81.409557][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 81.415026][ T3512] ? panic+0x75d/0x75d [ 81.419106][ T3512] __might_resched+0x5cb/0x780 [ 81.423880][ T3512] ? __might_sleep+0xb0/0xb0 [ 81.428494][ T3512] slab_pre_alloc_hook+0x4a/0x2a0 [ 81.433538][ T3512] ? kvmalloc_node+0x6e/0x180 [ 81.438218][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 81.443603][ T3512] ? kvmalloc_node+0x6e/0x180 [ 81.448289][ T3512] __kmalloc_node+0xa2/0x230 [ 81.452890][ T3512] kvmalloc_node+0x6e/0x180 [ 81.457403][ T3512] get_dist_table+0x91/0x380 [ 81.462092][ T3512] netem_change+0x947/0x1ea0 [ 81.466698][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 81.472701][ T3512] ? netem_destroy+0xb0/0xb0 [ 81.477393][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 81.482602][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 81.488509][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 81.493732][ T3512] ? memset+0x1f/0x40 [ 81.497748][ T3512] ? __hrtimer_init+0x181/0x260 [ 81.502629][ T3512] netem_init+0x58/0xb0 [ 81.506898][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 81.512206][ T3512] qdisc_create+0x8a1/0x1220 [ 81.516830][ T3512] ? qdisc_notify+0x390/0x390 [ 81.521539][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 81.526415][ T3512] ? rcu_lock_release+0x20/0x20 [ 81.531304][ T3512] ? rcu_lock_release+0x20/0x20 [ 81.536160][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 81.541112][ T3512] ? rtnetlink_bind+0x80/0x80 [ 81.545810][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 81.550842][ T3512] ? kernel_text_address+0x9f/0xd0 [ 81.555973][ T3512] ? __kernel_text_address+0x9/0x40 [ 81.561180][ T3512] ? unwind_get_return_address+0x49/0x80 [ 81.566820][ T3512] ? arch_stack_walk+0xf3/0x140 [ 81.571687][ T3512] ? mark_lock+0x9a/0x340 [ 81.576026][ T3512] ? mark_lock+0x9a/0x340 [ 81.580363][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 81.585418][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 81.590191][ T3512] ? rtnetlink_bind+0x80/0x80 [ 81.594882][ T3512] ? netlink_ack+0xe60/0xe60 [ 81.599507][ T3512] netlink_unicast+0x7bf/0x990 [ 81.604285][ T3512] ? netlink_detachskb+0x90/0x90 [ 81.609229][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 81.614356][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 81.619393][ T3512] ? __check_object_size+0x4dd/0xa30 [ 81.624688][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 81.629823][ T3512] netlink_sendmsg+0xa26/0xd60 [ 81.634609][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 81.639831][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 81.644793][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 81.650084][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 81.655550][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 81.660751][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 81.665540][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 81.670575][ T3512] __sys_sendmsg+0x2a9/0x390 [ 81.675170][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 81.680148][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 81.686145][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 81.692256][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 81.697550][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 81.703538][ T3512] do_syscall_64+0x3d/0xb0 [ 81.707966][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 81.713874][ T3512] RIP: 0033:0x7ff3462945a9 [ 81.718295][ T3512] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 81.737903][ T3512] RSP: 002b:00007ffd1761a798 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 81.746322][ T3512] RAX: ffffffffffffffda RBX: 00007ffd1761a968 RCX: 00007ff3462945a9 [ 81.754400][ T3512] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 81.762376][ T3512] RBP: 00007ff346307610 R08: 000000000000000a R09: 00007ffd1761a968 [ 81.770350][ T3512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 81.778323][ T3512] R13: 00007ffd1761a958 R14: 0000000000000001 R15: 0000000000000001 [ 81.786311][ T3512] [ 81.789534][ T3512] [ 81.791886][ T3512] ============================================ [ 81.798042][ T3512] WARNING: possible recursive locking detected [ 81.804191][ T3512] 6.1.45-syzkaller #0 Tainted: G W [ 81.810701][ T3512] -------------------------------------------- [ 81.816855][ T3512] syz-executor173/3512 is trying to acquire lock: [ 81.823268][ T3512] ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x254/0x380 [ 81.832202][ T3512] [ 81.832202][ T3512] but task is already holding lock: [ 81.839569][ T3512] ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 81.848368][ T3512] [ 81.848368][ T3512] other info that might help us debug this: [ 81.856427][ T3512] Possible unsafe locking scenario: [ 81.856427][ T3512] [ 81.863868][ T3512] CPU0 [ 81.867141][ T3512] ---- [ 81.870415][ T3512] lock(&sch->q.lock); [ 81.874570][ T3512] lock(&sch->q.lock); [ 81.878722][ T3512] [ 81.878722][ T3512] *** DEADLOCK *** [ 81.878722][ T3512] [ 81.886857][ T3512] May be due to missing lock nesting notation [ 81.886857][ T3512] [ 81.895170][ T3512] 2 locks held by syz-executor173/3512: [ 81.900706][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 81.910113][ T3512] #1: ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 81.919359][ T3512] [ 81.919359][ T3512] stack backtrace: [ 81.925259][ T3512] CPU: 0 PID: 3512 Comm: syz-executor173 Tainted: G W 6.1.45-syzkaller #0 [ 81.935162][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 81.945222][ T3512] Call Trace: [ 81.948501][ T3512] [ 81.951434][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 81.956135][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 81.961656][ T3512] ? panic+0x75d/0x75d [ 81.965735][ T3512] validate_chain+0x4726/0x58e0 [ 81.970594][ T3512] ? kfence_guarded_alloc+0x98c/0xe40 [ 81.975982][ T3512] ? reacquire_held_locks+0x660/0x660 [ 81.981360][ T3512] ? get_alloc_stack_hash+0x2cd/0x6e0 [ 81.986736][ T3512] ? __kfence_alloc+0x340/0x370 [ 81.991593][ T3512] ? kfence_guarded_free+0x7f0/0x7f0 [ 81.996892][ T3512] ? __kfence_alloc+0x261/0x370 [ 82.001744][ T3512] ? __kmem_cache_alloc_node+0x1fa/0x260 [ 82.007378][ T3512] ? __kmalloc_node+0xa2/0x230 [ 82.012142][ T3512] ? kvmalloc_node+0x6e/0x180 [ 82.016835][ T3512] ? get_dist_table+0x91/0x380 [ 82.021623][ T3512] ? netem_change+0x947/0x1ea0 [ 82.026401][ T3512] ? netem_init+0x58/0xb0 [ 82.030742][ T3512] ? qdisc_create+0x8a1/0x1220 [ 82.035518][ T3512] ? tc_modify_qdisc+0x9e0/0x1da0 [ 82.040555][ T3512] ? rtnetlink_rcv_msg+0x776/0xf00 [ 82.045669][ T3512] ? netlink_rcv_skb+0x1cd/0x410 [ 82.050607][ T3512] ? netlink_unicast+0x7bf/0x990 [ 82.055565][ T3512] ? netlink_sendmsg+0xa26/0xd60 [ 82.060503][ T3512] ? ____sys_sendmsg+0x59e/0x8f0 [ 82.065437][ T3512] ? __sys_sendmsg+0x2a9/0x390 [ 82.070197][ T3512] ? do_syscall_64+0x3d/0xb0 [ 82.074796][ T3512] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 82.080900][ T3512] ? mark_lock+0x9a/0x340 [ 82.085242][ T3512] __lock_acquire+0x125b/0x1f80 [ 82.090101][ T3512] lock_acquire+0x1f8/0x5a0 [ 82.094602][ T3512] ? get_dist_table+0x254/0x380 [ 82.099463][ T3512] ? read_lock_is_recursive+0x10/0x10 [ 82.104840][ T3512] ? kvmalloc_node+0x6e/0x180 [ 82.109516][ T3512] ? get_dist_table+0x254/0x380 [ 82.114392][ T3512] ? __bpf_trace_softirq+0x10/0x10 [ 82.119508][ T3512] ? kvmalloc_node+0x6e/0x180 [ 82.124184][ T3512] ? get_dist_table+0x254/0x380 [ 82.129039][ T3512] _raw_spin_lock_bh+0x31/0x40 [ 82.133819][ T3512] ? get_dist_table+0x254/0x380 [ 82.138688][ T3512] get_dist_table+0x254/0x380 [ 82.143464][ T3512] netem_change+0x947/0x1ea0 [ 82.148073][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 82.154058][ T3512] ? netem_destroy+0xb0/0xb0 [ 82.158656][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 82.163855][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 82.169752][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 82.174959][ T3512] ? memset+0x1f/0x40 [ 82.178946][ T3512] ? __hrtimer_init+0x181/0x260 [ 82.183817][ T3512] netem_init+0x58/0xb0 [ 82.187977][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 82.193272][ T3512] qdisc_create+0x8a1/0x1220 [ 82.197881][ T3512] ? qdisc_notify+0x390/0x390 [ 82.202584][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 82.207457][ T3512] ? rcu_lock_release+0x20/0x20 [ 82.212330][ T3512] ? rcu_lock_release+0x20/0x20 [ 82.217198][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 82.222143][ T3512] ? rtnetlink_bind+0x80/0x80 [ 82.226826][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 82.231854][ T3512] ? kernel_text_address+0x9f/0xd0 [ 82.236985][ T3512] ? __kernel_text_address+0x9/0x40 [ 82.242193][ T3512] ? unwind_get_return_address+0x49/0x80 [ 82.247827][ T3512] ? arch_stack_walk+0xf3/0x140 [ 82.252681][ T3512] ? mark_lock+0x9a/0x340 [ 82.257016][ T3512] ? mark_lock+0x9a/0x340 [ 82.261349][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 82.266385][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 82.271145][ T3512] ? rtnetlink_bind+0x80/0x80 [ 82.275822][ T3512] ? netlink_ack+0xe60/0xe60 [ 82.280418][ T3512] netlink_unicast+0x7bf/0x990 [ 82.285188][ T3512] ? netlink_detachskb+0x90/0x90 [ 82.290135][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 82.295253][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 82.300287][ T3512] ? __check_object_size+0x4dd/0xa30 [ 82.305576][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 82.310692][ T3512] netlink_sendmsg+0xa26/0xd60 [ 82.315461][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 82.320660][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 82.325600][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 82.330885][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 82.336349][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 82.341547][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 82.346316][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 82.351349][ T3512] __sys_sendmsg+0x2a9/0x390 [ 82.355938][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 82.360888][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 82.366873][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 82.372857][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 82.378060][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 82.384054][ T3512] do_syscall_64+0x3d/0xb0 [ 82.388480][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 82.394382][ T3512] RIP: 0033:0x7ff3462945a9 [ 82.398801][ T3512] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 82.418406][ T3512] RSP: 002b:00007ffd1761a798 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 82.426819][ T3512] RAX: ffffffffffffffda RBX: 00007ffd1761a968 RCX: 00007ff3462945a9 [ 82.434804][ T3512] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 82.442781][ T3512] RBP: 00007ff346307610 R08: 000000000000000a R09: 00007ffd1761a968 [ 82.450752][ T3512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 82.458722][ T3512] R13: 00007ffd1761a958 R14: 0000000000000001 R15: 0000000000000001 [ 82.466789][ T3512]