[ 76.165705][ T14] cfg80211: failed to load regulatory.db
Warning: Permanently added '10.128.10.1' (ED25519) to the list of known hosts.
executing program
[ 81.317795][ T3512] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[ 81.327427][ T3512] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3512, name: syz-executor173
[ 81.336972][ T3512] preempt_count: 201, expected: 0
[ 81.342010][ T3512] RCU nest depth: 0, expected: 0
[ 81.346988][ T3512] 2 locks held by syz-executor173/3512:
[ 81.352543][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00
[ 81.362076][ T3512] #1: ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0
[ 81.371379][ T3512] Preemption disabled at:
[ 81.371388][ T3512] [<0000000000000000>] 0x0
[ 81.380176][ T3512] CPU: 0 PID: 3512 Comm: syz-executor173 Not tainted 6.1.45-syzkaller #0
[ 81.388607][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[ 81.398658][ T3512] Call Trace:
[ 81.401934][ T3512]
[ 81.404862][ T3512] dump_stack_lvl+0x1e3/0x2cb
[ 81.409557][ T3512] ? nf_tcp_handle_invalid+0x642/0x642
[ 81.415026][ T3512] ? panic+0x75d/0x75d
[ 81.419106][ T3512] __might_resched+0x5cb/0x780
[ 81.423880][ T3512] ? __might_sleep+0xb0/0xb0
[ 81.428494][ T3512] slab_pre_alloc_hook+0x4a/0x2a0
[ 81.433538][ T3512] ? kvmalloc_node+0x6e/0x180
[ 81.438218][ T3512] __kmem_cache_alloc_node+0x47/0x260
[ 81.443603][ T3512] ? kvmalloc_node+0x6e/0x180
[ 81.448289][ T3512] __kmalloc_node+0xa2/0x230
[ 81.452890][ T3512] kvmalloc_node+0x6e/0x180
[ 81.457403][ T3512] get_dist_table+0x91/0x380
[ 81.462092][ T3512] netem_change+0x947/0x1ea0
[ 81.466698][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 81.472701][ T3512] ? netem_destroy+0xb0/0xb0
[ 81.477393][ T3512] ? do_raw_spin_unlock+0x137/0x8a0
[ 81.482602][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 81.488509][ T3512] ? lockdep_hardirqs_on+0x94/0x130
[ 81.493732][ T3512] ? memset+0x1f/0x40
[ 81.497748][ T3512] ? __hrtimer_init+0x181/0x260
[ 81.502629][ T3512] netem_init+0x58/0xb0
[ 81.506898][ T3512] ? qdisc_peek_dequeued+0x220/0x220
[ 81.512206][ T3512] qdisc_create+0x8a1/0x1220
[ 81.516830][ T3512] ? qdisc_notify+0x390/0x390
[ 81.521539][ T3512] tc_modify_qdisc+0x9e0/0x1da0
[ 81.526415][ T3512] ? rcu_lock_release+0x20/0x20
[ 81.531304][ T3512] ? rcu_lock_release+0x20/0x20
[ 81.536160][ T3512] rtnetlink_rcv_msg+0x776/0xf00
[ 81.541112][ T3512] ? rtnetlink_bind+0x80/0x80
[ 81.545810][ T3512] ? stack_trace_save+0x1c0/0x1c0
[ 81.550842][ T3512] ? kernel_text_address+0x9f/0xd0
[ 81.555973][ T3512] ? __kernel_text_address+0x9/0x40
[ 81.561180][ T3512] ? unwind_get_return_address+0x49/0x80
[ 81.566820][ T3512] ? arch_stack_walk+0xf3/0x140
[ 81.571687][ T3512] ? mark_lock+0x9a/0x340
[ 81.576026][ T3512] ? mark_lock+0x9a/0x340
[ 81.580363][ T3512] ? __lock_acquire+0x125b/0x1f80
[ 81.585418][ T3512] netlink_rcv_skb+0x1cd/0x410
[ 81.590191][ T3512] ? rtnetlink_bind+0x80/0x80
[ 81.594882][ T3512] ? netlink_ack+0xe60/0xe60
[ 81.599507][ T3512] netlink_unicast+0x7bf/0x990
[ 81.604285][ T3512] ? netlink_detachskb+0x90/0x90
[ 81.609229][ T3512] ? __virt_addr_valid+0x22b/0x2e0
[ 81.614356][ T3512] ? __phys_addr_symbol+0x2b/0x70
[ 81.619393][ T3512] ? __check_object_size+0x4dd/0xa30
[ 81.624688][ T3512] ? bpf_lsm_netlink_send+0x5/0x10
[ 81.629823][ T3512] netlink_sendmsg+0xa26/0xd60
[ 81.634609][ T3512] ? netlink_getsockopt+0x5b0/0x5b0
[ 81.639831][ T3512] ? aa_sock_msg_perm+0x91/0x150
[ 81.644793][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10
[ 81.650084][ T3512] ? security_socket_sendmsg+0x7d/0xa0
[ 81.655550][ T3512] ? netlink_getsockopt+0x5b0/0x5b0
[ 81.660751][ T3512] ____sys_sendmsg+0x59e/0x8f0
[ 81.665540][ T3512] ? __sys_sendmsg_sock+0x30/0x30
[ 81.670575][ T3512] __sys_sendmsg+0x2a9/0x390
[ 81.675170][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0
[ 81.680148][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 81.686145][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220
[ 81.692256][ T3512] ? lockdep_hardirqs_on+0x94/0x130
[ 81.697550][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220
[ 81.703538][ T3512] do_syscall_64+0x3d/0xb0
[ 81.707966][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 81.713874][ T3512] RIP: 0033:0x7ff3462945a9
[ 81.718295][ T3512] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 81.737903][ T3512] RSP: 002b:00007ffd1761a798 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 81.746322][ T3512] RAX: ffffffffffffffda RBX: 00007ffd1761a968 RCX: 00007ff3462945a9
[ 81.754400][ T3512] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 81.762376][ T3512] RBP: 00007ff346307610 R08: 000000000000000a R09: 00007ffd1761a968
[ 81.770350][ T3512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 81.778323][ T3512] R13: 00007ffd1761a958 R14: 0000000000000001 R15: 0000000000000001
[ 81.786311][ T3512]
[ 81.789534][ T3512]
[ 81.791886][ T3512] ============================================
[ 81.798042][ T3512] WARNING: possible recursive locking detected
[ 81.804191][ T3512] 6.1.45-syzkaller #0 Tainted: G W
[ 81.810701][ T3512] --------------------------------------------
[ 81.816855][ T3512] syz-executor173/3512 is trying to acquire lock:
[ 81.823268][ T3512] ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x254/0x380
[ 81.832202][ T3512]
[ 81.832202][ T3512] but task is already holding lock:
[ 81.839569][ T3512] ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0
[ 81.848368][ T3512]
[ 81.848368][ T3512] other info that might help us debug this:
[ 81.856427][ T3512] Possible unsafe locking scenario:
[ 81.856427][ T3512]
[ 81.863868][ T3512] CPU0
[ 81.867141][ T3512] ----
[ 81.870415][ T3512] lock(&sch->q.lock);
[ 81.874570][ T3512] lock(&sch->q.lock);
[ 81.878722][ T3512]
[ 81.878722][ T3512] *** DEADLOCK ***
[ 81.878722][ T3512]
[ 81.886857][ T3512] May be due to missing lock nesting notation
[ 81.886857][ T3512]
[ 81.895170][ T3512] 2 locks held by syz-executor173/3512:
[ 81.900706][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00
[ 81.910113][ T3512] #1: ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0
[ 81.919359][ T3512]
[ 81.919359][ T3512] stack backtrace:
[ 81.925259][ T3512] CPU: 0 PID: 3512 Comm: syz-executor173 Tainted: G W 6.1.45-syzkaller #0
[ 81.935162][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[ 81.945222][ T3512] Call Trace:
[ 81.948501][ T3512]
[ 81.951434][ T3512] dump_stack_lvl+0x1e3/0x2cb
[ 81.956135][ T3512] ? nf_tcp_handle_invalid+0x642/0x642
[ 81.961656][ T3512] ? panic+0x75d/0x75d
[ 81.965735][ T3512] validate_chain+0x4726/0x58e0
[ 81.970594][ T3512] ? kfence_guarded_alloc+0x98c/0xe40
[ 81.975982][ T3512] ? reacquire_held_locks+0x660/0x660
[ 81.981360][ T3512] ? get_alloc_stack_hash+0x2cd/0x6e0
[ 81.986736][ T3512] ? __kfence_alloc+0x340/0x370
[ 81.991593][ T3512] ? kfence_guarded_free+0x7f0/0x7f0
[ 81.996892][ T3512] ? __kfence_alloc+0x261/0x370
[ 82.001744][ T3512] ? __kmem_cache_alloc_node+0x1fa/0x260
[ 82.007378][ T3512] ? __kmalloc_node+0xa2/0x230
[ 82.012142][ T3512] ? kvmalloc_node+0x6e/0x180
[ 82.016835][ T3512] ? get_dist_table+0x91/0x380
[ 82.021623][ T3512] ? netem_change+0x947/0x1ea0
[ 82.026401][ T3512] ? netem_init+0x58/0xb0
[ 82.030742][ T3512] ? qdisc_create+0x8a1/0x1220
[ 82.035518][ T3512] ? tc_modify_qdisc+0x9e0/0x1da0
[ 82.040555][ T3512] ? rtnetlink_rcv_msg+0x776/0xf00
[ 82.045669][ T3512] ? netlink_rcv_skb+0x1cd/0x410
[ 82.050607][ T3512] ? netlink_unicast+0x7bf/0x990
[ 82.055565][ T3512] ? netlink_sendmsg+0xa26/0xd60
[ 82.060503][ T3512] ? ____sys_sendmsg+0x59e/0x8f0
[ 82.065437][ T3512] ? __sys_sendmsg+0x2a9/0x390
[ 82.070197][ T3512] ? do_syscall_64+0x3d/0xb0
[ 82.074796][ T3512] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 82.080900][ T3512] ? mark_lock+0x9a/0x340
[ 82.085242][ T3512] __lock_acquire+0x125b/0x1f80
[ 82.090101][ T3512] lock_acquire+0x1f8/0x5a0
[ 82.094602][ T3512] ? get_dist_table+0x254/0x380
[ 82.099463][ T3512] ? read_lock_is_recursive+0x10/0x10
[ 82.104840][ T3512] ? kvmalloc_node+0x6e/0x180
[ 82.109516][ T3512] ? get_dist_table+0x254/0x380
[ 82.114392][ T3512] ? __bpf_trace_softirq+0x10/0x10
[ 82.119508][ T3512] ? kvmalloc_node+0x6e/0x180
[ 82.124184][ T3512] ? get_dist_table+0x254/0x380
[ 82.129039][ T3512] _raw_spin_lock_bh+0x31/0x40
[ 82.133819][ T3512] ? get_dist_table+0x254/0x380
[ 82.138688][ T3512] get_dist_table+0x254/0x380
[ 82.143464][ T3512] netem_change+0x947/0x1ea0
[ 82.148073][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 82.154058][ T3512] ? netem_destroy+0xb0/0xb0
[ 82.158656][ T3512] ? do_raw_spin_unlock+0x137/0x8a0
[ 82.163855][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130
[ 82.169752][ T3512] ? lockdep_hardirqs_on+0x94/0x130
[ 82.174959][ T3512] ? memset+0x1f/0x40
[ 82.178946][ T3512] ? __hrtimer_init+0x181/0x260
[ 82.183817][ T3512] netem_init+0x58/0xb0
[ 82.187977][ T3512] ? qdisc_peek_dequeued+0x220/0x220
[ 82.193272][ T3512] qdisc_create+0x8a1/0x1220
[ 82.197881][ T3512] ? qdisc_notify+0x390/0x390
[ 82.202584][ T3512] tc_modify_qdisc+0x9e0/0x1da0
[ 82.207457][ T3512] ? rcu_lock_release+0x20/0x20
[ 82.212330][ T3512] ? rcu_lock_release+0x20/0x20
[ 82.217198][ T3512] rtnetlink_rcv_msg+0x776/0xf00
[ 82.222143][ T3512] ? rtnetlink_bind+0x80/0x80
[ 82.226826][ T3512] ? stack_trace_save+0x1c0/0x1c0
[ 82.231854][ T3512] ? kernel_text_address+0x9f/0xd0
[ 82.236985][ T3512] ? __kernel_text_address+0x9/0x40
[ 82.242193][ T3512] ? unwind_get_return_address+0x49/0x80
[ 82.247827][ T3512] ? arch_stack_walk+0xf3/0x140
[ 82.252681][ T3512] ? mark_lock+0x9a/0x340
[ 82.257016][ T3512] ? mark_lock+0x9a/0x340
[ 82.261349][ T3512] ? __lock_acquire+0x125b/0x1f80
[ 82.266385][ T3512] netlink_rcv_skb+0x1cd/0x410
[ 82.271145][ T3512] ? rtnetlink_bind+0x80/0x80
[ 82.275822][ T3512] ? netlink_ack+0xe60/0xe60
[ 82.280418][ T3512] netlink_unicast+0x7bf/0x990
[ 82.285188][ T3512] ? netlink_detachskb+0x90/0x90
[ 82.290135][ T3512] ? __virt_addr_valid+0x22b/0x2e0
[ 82.295253][ T3512] ? __phys_addr_symbol+0x2b/0x70
[ 82.300287][ T3512] ? __check_object_size+0x4dd/0xa30
[ 82.305576][ T3512] ? bpf_lsm_netlink_send+0x5/0x10
[ 82.310692][ T3512] netlink_sendmsg+0xa26/0xd60
[ 82.315461][ T3512] ? netlink_getsockopt+0x5b0/0x5b0
[ 82.320660][ T3512] ? aa_sock_msg_perm+0x91/0x150
[ 82.325600][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10
[ 82.330885][ T3512] ? security_socket_sendmsg+0x7d/0xa0
[ 82.336349][ T3512] ? netlink_getsockopt+0x5b0/0x5b0
[ 82.341547][ T3512] ____sys_sendmsg+0x59e/0x8f0
[ 82.346316][ T3512] ? __sys_sendmsg_sock+0x30/0x30
[ 82.351349][ T3512] __sys_sendmsg+0x2a9/0x390
[ 82.355938][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0
[ 82.360888][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[ 82.366873][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220
[ 82.372857][ T3512] ? lockdep_hardirqs_on+0x94/0x130
[ 82.378060][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220
[ 82.384054][ T3512] do_syscall_64+0x3d/0xb0
[ 82.388480][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 82.394382][ T3512] RIP: 0033:0x7ff3462945a9
[ 82.398801][ T3512] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 82.418406][ T3512] RSP: 002b:00007ffd1761a798 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 82.426819][ T3512] RAX: ffffffffffffffda RBX: 00007ffd1761a968 RCX: 00007ff3462945a9
[ 82.434804][ T3512] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[ 82.442781][ T3512] RBP: 00007ff346307610 R08: 000000000000000a R09: 00007ffd1761a968
[ 82.450752][ T3512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 82.458722][ T3512] R13: 00007ffd1761a958 R14: 0000000000000001 R15: 0000000000000001
[ 82.466789][ T3512]