Warning: Permanently added '10.128.0.230' (ED25519) to the list of known hosts. executing program [ 35.900426][ T4219] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 35.903009][ T4219] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4219, name: syz-executor129 [ 35.905585][ T4219] preempt_count: 201, expected: 0 [ 35.906871][ T4219] RCU nest depth: 0, expected: 0 [ 35.908119][ T4219] 2 locks held by syz-executor129/4219: [ 35.909612][ T4219] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 35.912107][ T4219] #1: ffff0000d5e06108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 35.914613][ T4219] Preemption disabled at: [ 35.914624][ T4219] [] sch_tree_lock+0x120/0x1d4 [ 35.917500][ T4219] CPU: 1 PID: 4219 Comm: syz-executor129 Not tainted 6.1.45-syzkaller #0 [ 35.919670][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 35.922308][ T4219] Call trace: [ 35.923149][ T4219] dump_backtrace+0x1c8/0x1f4 [ 35.924354][ T4219] show_stack+0x2c/0x3c [ 35.925437][ T4219] dump_stack_lvl+0x108/0x170 [ 35.926757][ T4219] dump_stack+0x1c/0x58 [ 35.927899][ T4219] __might_resched+0x37c/0x4d8 [ 35.929183][ T4219] __might_sleep+0x90/0xe4 [ 35.930398][ T4219] __kmem_cache_alloc_node+0x74/0x388 [ 35.931878][ T4219] __kmalloc_node+0xcc/0x1d0 [ 35.933125][ T4219] kvmalloc_node+0x84/0x1e4 [ 35.934361][ T4219] get_dist_table+0xa0/0x354 [ 35.935628][ T4219] netem_change+0x7a4/0x1900 [ 35.936880][ T4219] netem_init+0x54/0xb8 [ 35.938009][ T4219] qdisc_create+0x70c/0xe64 [ 35.939262][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 35.940591][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 35.941927][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 35.943212][ T4219] rtnetlink_rcv+0x28/0x38 [ 35.944413][ T4219] netlink_unicast+0x660/0x8d4 [ 35.945726][ T4219] netlink_sendmsg+0x834/0xb18 [ 35.947030][ T4219] ____sys_sendmsg+0x558/0x844 [ 35.948338][ T4219] __sys_sendmsg+0x26c/0x33c [ 35.949578][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 35.950907][ T4219] invoke_syscall+0x98/0x2c0 [ 35.952167][ T4219] el0_svc_common+0x138/0x258 [ 35.953433][ T4219] do_el0_svc+0x64/0x218 [ 35.954581][ T4219] el0_svc+0x58/0x168 [ 35.955648][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 35.957008][ T4219] el0t_64_sync+0x18c/0x190 [ 35.958273][ T4219] [ 35.958862][ T4219] ============================================ [ 35.960486][ T4219] WARNING: possible recursive locking detected [ 35.962072][ T4219] 6.1.45-syzkaller #0 Tainted: G W [ 35.963780][ T4219] -------------------------------------------- [ 35.965388][ T4219] syz-executor129/4219 is trying to acquire lock: [ 35.967132][ T4219] ffff0000d5e06108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 35.969623][ T4219] [ 35.969623][ T4219] but task is already holding lock: [ 35.971624][ T4219] ffff0000d5e06108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 35.973989][ T4219] [ 35.973989][ T4219] other info that might help us debug this: [ 35.976171][ T4219] Possible unsafe locking scenario: [ 35.976171][ T4219] [ 35.978146][ T4219] CPU0 [ 35.979032][ T4219] ---- [ 35.979925][ T4219] lock(&sch->q.lock); [ 35.981024][ T4219] lock(&sch->q.lock); [ 35.982151][ T4219] [ 35.982151][ T4219] *** DEADLOCK *** [ 35.982151][ T4219] [ 35.984394][ T4219] May be due to missing lock nesting notation [ 35.984394][ T4219] [ 35.986698][ T4219] 2 locks held by syz-executor129/4219: [ 35.988215][ T4219] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 35.990777][ T4219] #1: ffff0000d5e06108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 35.993283][ T4219] [ 35.993283][ T4219] stack backtrace: [ 35.994867][ T4219] CPU: 1 PID: 4219 Comm: syz-executor129 Tainted: G W 6.1.45-syzkaller #0 [ 35.997529][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 36.000226][ T4219] Call trace: [ 36.001100][ T4219] dump_backtrace+0x1c8/0x1f4 [ 36.002334][ T4219] show_stack+0x2c/0x3c [ 36.003422][ T4219] dump_stack_lvl+0x108/0x170 [ 36.004690][ T4219] dump_stack+0x1c/0x58 [ 36.005824][ T4219] __lock_acquire+0x6310/0x764c [ 36.007110][ T4219] lock_acquire+0x26c/0x7cc [ 36.008363][ T4219] _raw_spin_lock_bh+0x54/0x6c [ 36.009644][ T4219] get_dist_table+0x240/0x354 [ 36.010902][ T4219] netem_change+0x7a4/0x1900 [ 36.012124][ T4219] netem_init+0x54/0xb8 [ 36.013248][ T4219] qdisc_create+0x70c/0xe64 [ 36.014464][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 36.015769][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 36.017102][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 36.018422][ T4219] rtnetlink_rcv+0x28/0x38 [ 36.019604][ T4219] netlink_unicast+0x660/0x8d4 [ 36.020893][ T4219] netlink_sendmsg+0x834/0xb18 [ 36.022195][ T4219] ____sys_sendmsg+0x558/0x844 [ 36.023504][ T4219] __sys_sendmsg+0x26c/0x33c [ 36.024735][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 36.026046][ T4219] invoke_syscall+0x98/0x2c0 [ 36.027270][ T4219] el0_svc_common+0x138/0x258 [ 36.028536][ T4219] do_el0_svc+0x64/0x218 [ 36.029699][ T4219] el0_svc+0x58/0x168 [ 36.030759][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 36.032131][ T4219] el0t_64_sync+0x18c/0x190