Warning: Permanently added '10.128.0.235' (ED25519) to the list of known hosts. executing program [ 44.106519][ T3967] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 44.109084][ T3967] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3967, name: syz-executor366 [ 44.111482][ T3967] 2 locks held by syz-executor366/3967: [ 44.112850][ T3967] #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac [ 44.115229][ T3967] #1: ffff0000c9526108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 44.117600][ T3967] Preemption disabled at: [ 44.117613][ T3967] [] netem_change+0x22c/0x1a90 [ 44.120630][ T3967] CPU: 1 PID: 3967 Comm: syz-executor366 Not tainted 5.15.126-syzkaller-00092-g24c4de4069cb #0 [ 44.123129][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 44.125567][ T3967] Call trace: [ 44.126354][ T3967] dump_backtrace+0x0/0x530 [ 44.127477][ T3967] show_stack+0x2c/0x3c [ 44.128515][ T3967] dump_stack_lvl+0x108/0x170 [ 44.129683][ T3967] dump_stack+0x1c/0x58 [ 44.130705][ T3967] ___might_sleep+0x380/0x4dc [ 44.131889][ T3967] __might_sleep+0x98/0xf0 [ 44.132999][ T3967] slab_pre_alloc_hook+0x58/0xe8 [ 44.134299][ T3967] __kmalloc_node+0xbc/0x5b8 [ 44.135455][ T3967] kvmalloc_node+0x88/0x204 [ 44.136606][ T3967] get_dist_table+0x9c/0x2a4 [ 44.137844][ T3967] netem_change+0x7cc/0x1a90 [ 44.139003][ T3967] netem_init+0x54/0xb8 [ 44.140021][ T3967] qdisc_create+0x6fc/0xf44 [ 44.141170][ T3967] tc_modify_qdisc+0x8dc/0x1344 [ 44.142366][ T3967] rtnetlink_rcv_msg+0xa74/0xdac [ 44.143633][ T3967] netlink_rcv_skb+0x20c/0x3b8 [ 44.144817][ T3967] rtnetlink_rcv+0x28/0x38 [ 44.145892][ T3967] netlink_unicast+0x664/0x938 [ 44.147138][ T3967] netlink_sendmsg+0x844/0xb38 [ 44.148427][ T3967] ____sys_sendmsg+0x584/0x870 [ 44.149654][ T3967] ___sys_sendmsg+0x214/0x294 [ 44.150913][ T3967] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.152223][ T3967] invoke_syscall+0x98/0x2b8 [ 44.153408][ T3967] el0_svc_common+0x138/0x258 [ 44.154608][ T3967] do_el0_svc+0x58/0x14c [ 44.155662][ T3967] el0_svc+0x7c/0x1f0 [ 44.156654][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 44.157900][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 44.158783][ T3967] [ 44.159168][ T3967] ============================================ [ 44.160432][ T3967] WARNING: possible recursive locking detected [ 44.161922][ T3967] 5.15.126-syzkaller-00092-g24c4de4069cb #0 Tainted: G W [ 44.163923][ T3967] -------------------------------------------- [ 44.165429][ T3967] syz-executor366/3967 is trying to acquire lock: [ 44.166956][ T3967] ffff0000c9526108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1f0/0x2a4 [ 44.168840][ T3967] [ 44.168840][ T3967] but task is already holding lock: [ 44.170107][ T3967] ffff0000c9526108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 44.172241][ T3967] [ 44.172241][ T3967] other info that might help us debug this: [ 44.174247][ T3967] Possible unsafe locking scenario: [ 44.174247][ T3967] [ 44.176184][ T3967] CPU0 [ 44.177038][ T3967] ---- [ 44.177870][ T3967] lock(&sch->q.lock); [ 44.178909][ T3967] lock(&sch->q.lock); [ 44.179954][ T3967] [ 44.179954][ T3967] *** DEADLOCK *** [ 44.179954][ T3967] [ 44.181954][ T3967] May be due to missing lock nesting notation [ 44.181954][ T3967] [ 44.184073][ T3967] 2 locks held by syz-executor366/3967: [ 44.185448][ T3967] #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac [ 44.187852][ T3967] #1: ffff0000c9526108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 44.190187][ T3967] [ 44.190187][ T3967] stack backtrace: [ 44.191545][ T3967] CPU: 1 PID: 3967 Comm: syz-executor366 Tainted: G W 5.15.126-syzkaller-00092-g24c4de4069cb #0 [ 44.194467][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 44.196975][ T3967] Call trace: [ 44.197792][ T3967] dump_backtrace+0x0/0x530 [ 44.198898][ T3967] show_stack+0x2c/0x3c [ 44.199942][ T3967] dump_stack_lvl+0x108/0x170 [ 44.201133][ T3967] dump_stack+0x1c/0x58 [ 44.202129][ T3967] __lock_acquire+0x62b4/0x7620 [ 44.203341][ T3967] lock_acquire+0x240/0x77c [ 44.204478][ T3967] _raw_spin_lock_bh+0x124/0x1c4 [ 44.205732][ T3967] get_dist_table+0x1f0/0x2a4 [ 44.206970][ T3967] netem_change+0x7cc/0x1a90 [ 44.208106][ T3967] netem_init+0x54/0xb8 [ 44.209156][ T3967] qdisc_create+0x6fc/0xf44 [ 44.210258][ T3967] tc_modify_qdisc+0x8dc/0x1344 [ 44.211474][ T3967] rtnetlink_rcv_msg+0xa74/0xdac [ 44.212716][ T3967] netlink_rcv_skb+0x20c/0x3b8 [ 44.213894][ T3967] rtnetlink_rcv+0x28/0x38 [ 44.215011][ T3967] netlink_unicast+0x664/0x938 [ 44.216247][ T3967] netlink_sendmsg+0x844/0xb38 [ 44.217498][ T3967] ____sys_sendmsg+0x584/0x870 [ 44.218722][ T3967] ___sys_sendmsg+0x214/0x294 [ 44.219870][ T3967] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.221182][ T3967] invoke_syscall+0x98/0x2b8 [ 44.222335][ T3967] el0_svc_common+0x138/0x258 [ 44.223492][ T3967] do_el0_svc+0x58/0x14c [ 44.224594][ T3967] el0_svc+0x7c/0x1f0 [ 44.225643][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 44.226914][ T3967] el0t_64_sync+0x1a0/0x1a4