[ 18.389801][ T3636] 8021q: adding VLAN 0 to HW filter on device bond0 [ 18.394268][ T3636] eql: remember to turn off Van-Jacobson compression on your slave devices [ 18.434967][ T413] gvnic 0000:00:00.0 enp0s0: Device link is up. [ 18.438164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): enp0s0: link becomes ready Starting sshd: OK syzkaller Warning: Permanently added '10.128.10.20' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 38.768069][ T3960] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 38.770155][ T3960] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3960, name: syz-executor633 [ 38.772190][ T3960] 2 locks held by syz-executor633/3960: [ 38.773278][ T3960] #0: ffff8000169d6ea8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac [ 38.775287][ T3960] #1: ffff0000c120e108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 38.777093][ T3960] Preemption disabled at: [ 38.777105][ T3960] [] netem_change+0x22c/0x1a90 [ 38.779351][ T3960] CPU: 1 PID: 3960 Comm: syz-executor633 Not tainted 5.15.119-syzkaller #0 [ 38.781101][ T3960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 38.783291][ T3960] Call trace: [ 38.783964][ T3960] dump_backtrace+0x0/0x530 [ 38.784878][ T3960] show_stack+0x2c/0x3c [ 38.785692][ T3960] dump_stack_lvl+0x108/0x170 [ 38.786626][ T3960] dump_stack+0x1c/0x58 [ 38.787514][ T3960] ___might_sleep+0x380/0x4dc [ 38.788479][ T3960] __might_sleep+0x98/0xf0 [ 38.789485][ T3960] slab_pre_alloc_hook+0x58/0xe8 [ 38.790493][ T3960] __kmalloc_node+0xbc/0x5b8 [ 38.791417][ T3960] kvmalloc_node+0x88/0x204 [ 38.792370][ T3960] get_dist_table+0x9c/0x2a4 [ 38.793313][ T3960] netem_change+0x7cc/0x1a90 [ 38.794220][ T3960] netem_init+0x54/0xb8 [ 38.795085][ T3960] qdisc_create+0x6fc/0xf44 [ 38.796038][ T3960] tc_modify_qdisc+0x8dc/0x1344 [ 38.796981][ T3960] rtnetlink_rcv_msg+0xa74/0xdac [ 38.797982][ T3960] netlink_rcv_skb+0x20c/0x3b8 [ 38.799043][ T3960] rtnetlink_rcv+0x28/0x38 [ 38.799953][ T3960] netlink_unicast+0x664/0x938 [ 38.800937][ T3960] netlink_sendmsg+0x844/0xb38 [ 38.801900][ T3960] ____sys_sendmsg+0x584/0x870 [ 38.802899][ T3960] ___sys_sendmsg+0x214/0x294 [ 38.803824][ T3960] __arm64_sys_sendmsg+0x1ac/0x25c [ 38.804886][ T3960] invoke_syscall+0x98/0x2b8 [ 38.805785][ T3960] el0_svc_common+0x138/0x258 [ 38.806745][ T3960] do_el0_svc+0x58/0x14c [ 38.807634][ T3960] el0_svc+0x7c/0x1f0 [ 38.808463][ T3960] el0t_64_sync_handler+0x84/0xe4 [ 38.809488][ T3960] el0t_64_sync+0x1a0/0x1a4 [ 38.810433][ T3960] [ 38.810881][ T3960] ============================================ [ 38.812143][ T3960] WARNING: possible recursive locking detected [ 38.813424][ T3960] 5.15.119-syzkaller #0 Tainted: G W [ 38.814772][ T3960] -------------------------------------------- [ 38.816072][ T3960] syz-executor633/3960 is trying to acquire lock: [ 38.817361][ T3960] ffff0000c120e108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1f0/0x2a4 [ 38.819131][ T3960] [ 38.819131][ T3960] but task is already holding lock: [ 38.820601][ T3960] ffff0000c120e108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 38.822493][ T3960] [ 38.822493][ T3960] other info that might help us debug this: [ 38.824106][ T3960] Possible unsafe locking scenario: [ 38.824106][ T3960] [ 38.825624][ T3960] CPU0 [ 38.826281][ T3960] ---- [ 38.826980][ T3960] lock(&sch->q.lock); [ 38.827833][ T3960] lock(&sch->q.lock); [ 38.828721][ T3960] [ 38.828721][ T3960] *** DEADLOCK *** [ 38.828721][ T3960] [ 38.830391][ T3960] May be due to missing lock nesting notation [ 38.830391][ T3960] [ 38.832078][ T3960] 2 locks held by syz-executor633/3960: [ 38.833173][ T3960] #0: ffff8000169d6ea8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac [ 38.835005][ T3960] #1: ffff0000c120e108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 38.836884][ T3960] [ 38.836884][ T3960] stack backtrace: [ 38.838149][ T3960] CPU: 1 PID: 3960 Comm: syz-executor633 Tainted: G W 5.15.119-syzkaller #0 [ 38.840130][ T3960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 38.842152][ T3960] Call trace: [ 38.842791][ T3960] dump_backtrace+0x0/0x530 [ 38.843699][ T3960] show_stack+0x2c/0x3c [ 38.844574][ T3960] dump_stack_lvl+0x108/0x170 [ 38.845592][ T3960] dump_stack+0x1c/0x58 [ 38.846386][ T3960] __lock_acquire+0x62b4/0x7620 [ 38.847410][ T3960] lock_acquire+0x240/0x77c [ 38.848295][ T3960] _raw_spin_lock_bh+0x124/0x1c4 [ 38.849335][ T3960] get_dist_table+0x1f0/0x2a4 [ 38.850294][ T3960] netem_change+0x7cc/0x1a90 [ 38.851289][ T3960] netem_init+0x54/0xb8 [ 38.852205][ T3960] qdisc_create+0x6fc/0xf44 [ 38.853138][ T3960] tc_modify_qdisc+0x8dc/0x1344 [ 38.854173][ T3960] rtnetlink_rcv_msg+0xa74/0xdac [ 38.855171][ T3960] netlink_rcv_skb+0x20c/0x3b8 [ 38.856150][ T3960] rtnetlink_rcv+0x28/0x38 [ 38.857107][ T3960] netlink_unicast+0x664/0x938 [ 38.858149][ T3960] netlink_sendmsg+0x844/0xb38 [ 38.859250][ T3960] ____sys_sendmsg+0x584/0x870 [ 38.860166][ T3960] ___sys_sendmsg+0x214/0x294 [ 38.861094][ T3960] __arm64_sys_sendmsg+0x1ac/0x25c [ 38.862184][ T3960] invoke_syscall+0x98/0x2b8 [ 38.863112][ T3960] el0_svc_common+0x138/0x258 [ 38.864052][ T3960] do_el0_svc+0x58/0x14c [ 38.864911][ T3960] el0_svc+0x7c/0x1f0 [ 38.865697][ T3960] el0t_64_sync_handler+0x84/0xe4 [ 38.866692][ T3960] el0t_64_sync+0x1a0/0x1a4