Warning: Permanently added '10.128.0.99' (ED25519) to the list of known hosts. executing program [ 49.422761][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 49.432349][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor162 [ 49.441812][ T3486] 2 locks held by syz-executor162/3486: [ 49.447334][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 49.456740][ T3486] #1: ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x257/0x20c0 [ 49.465977][ T3486] Preemption disabled at: [ 49.465986][ T3486] [<0000000000000000>] 0x0 [ 49.474714][ T3486] CPU: 1 PID: 3486 Comm: syz-executor162 Not tainted 5.15.126-syzkaller #0 [ 49.483282][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 49.493319][ T3486] Call Trace: [ 49.496579][ T3486] [ 49.499490][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 49.504153][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 49.509772][ T3486] ? panic+0x84d/0x84d [ 49.513833][ T3486] ___might_sleep+0x547/0x6a0 [ 49.518493][ T3486] ? __might_sleep+0xc0/0xc0 [ 49.523089][ T3486] slab_pre_alloc_hook+0x44/0xc0 [ 49.528022][ T3486] __kmalloc_node+0x71/0x390 [ 49.532614][ T3486] ? kvmalloc_node+0x80/0x140 [ 49.537270][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 49.542366][ T3486] kvmalloc_node+0x80/0x140 [ 49.546855][ T3486] get_dist_table+0x83/0x2c0 [ 49.551427][ T3486] netem_change+0xa05/0x20c0 [ 49.556005][ T3486] ? netem_destroy+0xb0/0xb0 [ 49.560577][ T3486] ? debug_object_init+0x10/0x10 [ 49.565503][ T3486] ? memset+0x1f/0x40 [ 49.569463][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 49.574826][ T3486] ? memset+0x1f/0x40 [ 49.578789][ T3486] ? __hrtimer_init+0x181/0x260 [ 49.583626][ T3486] netem_init+0x58/0xb0 [ 49.587770][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 49.593042][ T3486] qdisc_create+0x8ae/0x1390 [ 49.597616][ T3486] ? qdisc_notify+0x380/0x380 [ 49.602270][ T3486] ? apparmor_capable+0x12e/0x190 [ 49.607281][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 49.612123][ T3486] ? rcu_lock_release+0x20/0x20 [ 49.616985][ T3486] ? rcu_lock_release+0x20/0x20 [ 49.621819][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 49.626737][ T3486] ? reacquire_held_locks+0x660/0x660 [ 49.632096][ T3486] ? rtnetlink_bind+0x80/0x80 [ 49.636750][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 49.642017][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 49.647021][ T3486] ? __kernel_text_address+0x94/0x100 [ 49.652374][ T3486] ? unwind_get_return_address+0x49/0x80 [ 49.657988][ T3486] ? arch_stack_walk+0xf3/0x140 [ 49.662820][ T3486] ? mark_lock+0x98/0x340 [ 49.667130][ T3486] ? mark_lock+0x98/0x340 [ 49.671439][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 49.676460][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 49.681205][ T3486] ? rtnetlink_bind+0x80/0x80 [ 49.685862][ T3486] ? netlink_ack+0xb10/0xb10 [ 49.690442][ T3486] netlink_unicast+0x7b6/0x980 [ 49.695203][ T3486] ? netlink_detachskb+0x90/0x90 [ 49.700125][ T3486] ? 0xffffffff81000000 [ 49.704266][ T3486] ? __check_object_size+0x300/0x410 [ 49.709531][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 49.714628][ T3486] netlink_sendmsg+0xa30/0xd60 [ 49.719381][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 49.724562][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 49.729481][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 49.734744][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 49.740189][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 49.745370][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 49.750118][ T3486] ? iovec_from_user+0x300/0x390 [ 49.755051][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 49.760063][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 49.764723][ T3486] ? __might_fault+0xb8/0x110 [ 49.769385][ T3486] ? __sys_sendmsg+0x260/0x260 [ 49.774128][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 49.779151][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 49.784505][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 49.789942][ T3486] ? __fdget+0x158/0x220 [ 49.794170][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 49.799004][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 49.803925][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 49.809885][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 49.815083][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 49.821049][ T3486] do_syscall_64+0x3d/0xb0 [ 49.825446][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 49.831318][ T3486] RIP: 0033:0x7fd2575965a9 [ 49.835712][ T3486] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 49.855299][ T3486] RSP: 002b:00007ffe6ce5f4a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 49.863690][ T3486] RAX: ffffffffffffffda RBX: 00007ffe6ce5f678 RCX: 00007fd2575965a9 [ 49.871641][ T3486] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 49.879590][ T3486] RBP: 00007fd257609610 R08: 00000000ffffffff R09: 00007ffe6ce5f678 [ 49.887539][ T3486] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 49.895499][ T3486] R13: 00007ffe6ce5f668 R14: 0000000000000001 R15: 0000000000000001 [ 49.903459][ T3486] [ 49.906581][ T3486] [ 49.908896][ T3486] ============================================ [ 49.915029][ T3486] WARNING: possible recursive locking detected [ 49.921152][ T3486] 5.15.126-syzkaller #0 Tainted: G W [ 49.927721][ T3486] -------------------------------------------- [ 49.933860][ T3486] syz-executor162/3486 is trying to acquire lock: [ 49.940253][ T3486] ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1fa/0x2c0 [ 49.949110][ T3486] [ 49.949110][ T3486] but task is already holding lock: [ 49.956453][ T3486] ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x257/0x20c0 [ 49.965217][ T3486] [ 49.965217][ T3486] other info that might help us debug this: [ 49.973255][ T3486] Possible unsafe locking scenario: [ 49.973255][ T3486] [ 49.980692][ T3486] CPU0 [ 49.983953][ T3486] ---- [ 49.987226][ T3486] lock(&sch->q.lock); [ 49.991359][ T3486] lock(&sch->q.lock); [ 49.995491][ T3486] [ 49.995491][ T3486] *** DEADLOCK *** [ 49.995491][ T3486] [ 50.003607][ T3486] May be due to missing lock nesting notation [ 50.003607][ T3486] [ 50.011912][ T3486] 2 locks held by syz-executor162/3486: [ 50.017442][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 50.026821][ T3486] #1: ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x257/0x20c0 [ 50.036031][ T3486] [ 50.036031][ T3486] stack backtrace: [ 50.041896][ T3486] CPU: 1 PID: 3486 Comm: syz-executor162 Tainted: G W 5.15.126-syzkaller #0 [ 50.051846][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 50.061879][ T3486] Call Trace: [ 50.065139][ T3486] [ 50.068057][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 50.072715][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 50.078330][ T3486] ? panic+0x84d/0x84d [ 50.082381][ T3486] validate_chain+0x46cf/0x58b0 [ 50.087216][ T3486] ? do_raw_spin_unlock+0x137/0x8b0 [ 50.092392][ T3486] ? reacquire_held_locks+0x660/0x660 [ 50.097759][ T3486] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 50.103631][ T3486] ? _raw_spin_unlock+0x40/0x40 [ 50.108460][ T3486] ? stack_trace_save+0x113/0x1c0 [ 50.113459][ T3486] ? asm_common_interrupt+0x22/0x40 [ 50.118634][ T3486] ? stack_trace_snprint+0xe0/0xe0 [ 50.123725][ T3486] ? stack_depot_save+0x3db/0x440 [ 50.128730][ T3486] ? ____kasan_kmalloc+0xd1/0xf0 [ 50.133646][ T3486] ? mark_lock+0x98/0x340 [ 50.137952][ T3486] ? qdisc_create+0x8ae/0x1390 [ 50.142694][ T3486] __lock_acquire+0x1295/0x1ff0 [ 50.147527][ T3486] lock_acquire+0x1db/0x4f0 [ 50.152010][ T3486] ? get_dist_table+0x1fa/0x2c0 [ 50.156838][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 50.162188][ T3486] ? get_dist_table+0x1fa/0x2c0 [ 50.167030][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 50.172117][ T3486] ? __kmalloc_node+0x199/0x390 [ 50.176949][ T3486] ? kvmalloc_node+0x80/0x140 [ 50.181608][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 50.186708][ T3486] ? get_dist_table+0x1fa/0x2c0 [ 50.191543][ T3486] _raw_spin_lock_bh+0x31/0x40 [ 50.196293][ T3486] ? get_dist_table+0x1fa/0x2c0 [ 50.201132][ T3486] get_dist_table+0x1fa/0x2c0 [ 50.205793][ T3486] netem_change+0xa05/0x20c0 [ 50.210365][ T3486] ? netem_destroy+0xb0/0xb0 [ 50.214931][ T3486] ? debug_object_init+0x10/0x10 [ 50.219844][ T3486] ? memset+0x1f/0x40 [ 50.223819][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 50.229186][ T3486] ? memset+0x1f/0x40 [ 50.233144][ T3486] ? __hrtimer_init+0x181/0x260 [ 50.238003][ T3486] netem_init+0x58/0xb0 [ 50.242135][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 50.247402][ T3486] qdisc_create+0x8ae/0x1390 [ 50.251972][ T3486] ? qdisc_notify+0x380/0x380 [ 50.256624][ T3486] ? apparmor_capable+0x12e/0x190 [ 50.261629][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 50.266465][ T3486] ? rcu_lock_release+0x20/0x20 [ 50.271300][ T3486] ? rcu_lock_release+0x20/0x20 [ 50.276129][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 50.281049][ T3486] ? reacquire_held_locks+0x660/0x660 [ 50.286398][ T3486] ? rtnetlink_bind+0x80/0x80 [ 50.291052][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 50.296322][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 50.301324][ T3486] ? __kernel_text_address+0x94/0x100 [ 50.306674][ T3486] ? unwind_get_return_address+0x49/0x80 [ 50.312286][ T3486] ? arch_stack_walk+0xf3/0x140 [ 50.317117][ T3486] ? mark_lock+0x98/0x340 [ 50.321423][ T3486] ? mark_lock+0x98/0x340 [ 50.325729][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 50.330742][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 50.335485][ T3486] ? rtnetlink_bind+0x80/0x80 [ 50.340138][ T3486] ? netlink_ack+0xb10/0xb10 [ 50.344714][ T3486] netlink_unicast+0x7b6/0x980 [ 50.349459][ T3486] ? netlink_detachskb+0x90/0x90 [ 50.354838][ T3486] ? 0xffffffff81000000 [ 50.358976][ T3486] ? __check_object_size+0x300/0x410 [ 50.364247][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 50.369358][ T3486] netlink_sendmsg+0xa30/0xd60 [ 50.374115][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 50.379299][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 50.384217][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 50.389485][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 50.394924][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 50.400109][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 50.404859][ T3486] ? iovec_from_user+0x300/0x390 [ 50.409778][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 50.414784][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 50.419443][ T3486] ? __might_fault+0xb8/0x110 [ 50.424097][ T3486] ? __sys_sendmsg+0x260/0x260 [ 50.428838][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 50.433849][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 50.439199][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 50.444638][ T3486] ? __fdget+0x158/0x220 [ 50.448859][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 50.453687][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 50.458603][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 50.464558][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 50.469732][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 50.475692][ T3486] do_syscall_64+0x3d/0xb0 [ 50.480095][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.485981][ T3486] RIP: 0033:0x7fd2575965a9 [ 50.490378][ T3486] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 50.509962][ T3486] RSP: 002b:00007ffe6ce5f4a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 50.518356][ T3486] RAX: ffffffffffffffda RBX: 00007ffe6ce5f678 RCX: 00007fd2575965a9 [ 50.526307][ T3486] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 50.534263][ T3486] RBP: 00007fd257609610 R08: 00000000ffffffff R09: 00007ffe6ce5f678 [ 50.542221][ T3486] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 50.550169][ T3486] R13: 00007ffe6ce5f668 R14: 0000000000000001 R15: 0000000000000001 [ 50.558122][ T3486]