Warning: Permanently added '10.128.10.39' (ED25519) to the list of known hosts. executing program [ 34.595677][ T4219] [ 34.596307][ T4219] ===================================================== [ 34.598194][ T4219] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 34.600135][ T4219] 6.1.45-syzkaller #0 Not tainted [ 34.601493][ T4219] ----------------------------------------------------- [ 34.603301][ T4219] syz-executor325/4219 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 34.605375][ T4219] ffff800015b3c360 (fs_reclaim){+.+.}-{0:0}, at: __kmem_cache_alloc_node+0x58/0x388 [ 34.607870][ T4219] [ 34.607870][ T4219] and this task is already holding: [ 34.609875][ T4219] ffff800017eb4848 (noop_qdisc.q.lock){+.-.}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.612256][ T4219] which would create a new lock dependency: [ 34.613811][ T4219] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 34.615785][ T4219] [ 34.615785][ T4219] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 34.618328][ T4219] (noop_qdisc.q.lock){+.-.}-{2:2} [ 34.618346][ T4219] [ 34.618346][ T4219] ... which became SOFTIRQ-irq-safe at: [ 34.621697][ T4219] lock_acquire+0x26c/0x7cc [ 34.622875][ T4219] _raw_spin_lock+0x54/0x6c [ 34.624108][ T4219] net_tx_action+0x6ec/0x94c [ 34.625338][ T4219] __do_softirq+0x30c/0xea0 [ 34.626550][ T4219] ____do_softirq+0x14/0x20 [ 34.627767][ T4219] call_on_irq_stack+0x24/0x4c [ 34.629053][ T4219] do_softirq_own_stack+0x20/0x2c [ 34.630452][ T4219] do_softirq+0x120/0x20c [ 34.631626][ T4219] __local_bh_enable_ip+0x2c0/0x4d0 [ 34.633041][ T4219] local_bh_enable+0x28/0x34 [ 34.634230][ T4219] dev_deactivate_many+0x3d4/0xa8c [ 34.635640][ T4219] dev_deactivate+0x13c/0x1fc [ 34.636905][ T4219] linkwatch_do_dev+0x29c/0x3a4 [ 34.638257][ T4219] __linkwatch_run_queue+0x3a0/0x700 [ 34.639679][ T4219] linkwatch_event+0x58/0x68 [ 34.640972][ T4219] process_one_work+0x7ac/0x1404 [ 34.642304][ T4219] worker_thread+0x8e4/0xfec [ 34.643499][ T4219] kthread+0x250/0x2d8 [ 34.644621][ T4219] ret_from_fork+0x10/0x20 [ 34.645817][ T4219] [ 34.645817][ T4219] to a SOFTIRQ-irq-unsafe lock: [ 34.647675][ T4219] (fs_reclaim){+.+.}-{0:0} [ 34.647692][ T4219] [ 34.647692][ T4219] ... which became SOFTIRQ-irq-unsafe at: [ 34.650976][ T4219] ... [ 34.650982][ T4219] lock_acquire+0x26c/0x7cc [ 34.652909][ T4219] fs_reclaim_acquire+0x90/0x12c [ 34.654214][ T4219] __kmem_cache_alloc_node+0x58/0x388 [ 34.655659][ T4219] kmalloc_node_trace+0x44/0x90 [ 34.656976][ T4219] init_rescuer+0xa4/0x264 [ 34.658124][ T4219] workqueue_init+0x298/0x5b4 [ 34.659396][ T4219] kernel_init_freeable+0x33c/0x528 [ 34.660914][ T4219] kernel_init+0x24/0x29c [ 34.662092][ T4219] ret_from_fork+0x10/0x20 [ 34.663253][ T4219] [ 34.663253][ T4219] other info that might help us debug this: [ 34.663253][ T4219] [ 34.666099][ T4219] Possible interrupt unsafe locking scenario: [ 34.666099][ T4219] [ 34.668266][ T4219] CPU0 CPU1 [ 34.669679][ T4219] ---- ---- [ 34.671053][ T4219] lock(fs_reclaim); [ 34.672015][ T4219] local_irq_disable(); [ 34.673792][ T4219] lock(noop_qdisc.q.lock); [ 34.675703][ T4219] lock(fs_reclaim); [ 34.677447][ T4219] [ 34.678328][ T4219] lock(noop_qdisc.q.lock); [ 34.679584][ T4219] [ 34.679584][ T4219] *** DEADLOCK *** [ 34.679584][ T4219] [ 34.681711][ T4219] 2 locks held by syz-executor325/4219: [ 34.683221][ T4219] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 34.685619][ T4219] #1: ffff800017eb4848 (noop_qdisc.q.lock){+.-.}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 34.688190][ T4219] [ 34.688190][ T4219] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 34.690946][ T4219] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 34.692381][ T4219] HARDIRQ-ON-W at: [ 34.693434][ T4219] lock_acquire+0x26c/0x7cc [ 34.695056][ T4219] _raw_spin_lock+0x54/0x6c [ 34.696663][ T4219] __dev_queue_xmit+0xb14/0x38d8 [ 34.698466][ T4219] tx+0x90/0x134 [ 34.699810][ T4219] kthread+0x1ac/0x374 [ 34.701565][ T4219] kthread+0x250/0x2d8 [ 34.703099][ T4219] ret_from_fork+0x10/0x20 [ 34.704771][ T4219] IN-SOFTIRQ-W at: [ 34.705880][ T4219] lock_acquire+0x26c/0x7cc [ 34.707504][ T4219] _raw_spin_lock+0x54/0x6c [ 34.709182][ T4219] net_tx_action+0x6ec/0x94c [ 34.710899][ T4219] __do_softirq+0x30c/0xea0 [ 34.712565][ T4219] ____do_softirq+0x14/0x20 [ 34.714179][ T4219] call_on_irq_stack+0x24/0x4c [ 34.715911][ T4219] do_softirq_own_stack+0x20/0x2c [ 34.717676][ T4219] do_softirq+0x120/0x20c [ 34.719317][ T4219] __local_bh_enable_ip+0x2c0/0x4d0 [ 34.721113][ T4219] local_bh_enable+0x28/0x34 [ 34.722832][ T4219] dev_deactivate_many+0x3d4/0xa8c [ 34.724675][ T4219] dev_deactivate+0x13c/0x1fc [ 34.726385][ T4219] linkwatch_do_dev+0x29c/0x3a4 [ 34.728138][ T4219] __linkwatch_run_queue+0x3a0/0x700 [ 34.729977][ T4219] linkwatch_event+0x58/0x68 [ 34.731567][ T4219] process_one_work+0x7ac/0x1404 [ 34.733227][ T4219] worker_thread+0x8e4/0xfec [ 34.734899][ T4219] kthread+0x250/0x2d8 [ 34.736406][ T4219] ret_from_fork+0x10/0x20 [ 34.738027][ T4219] INITIAL USE at: [ 34.739050][ T4219] lock_acquire+0x26c/0x7cc [ 34.740713][ T4219] _raw_spin_lock+0x54/0x6c [ 34.742331][ T4219] __dev_queue_xmit+0xb14/0x38d8 [ 34.744141][ T4219] tx+0x90/0x134 [ 34.745490][ T4219] kthread+0x1ac/0x374 [ 34.746998][ T4219] kthread+0x250/0x2d8 [ 34.748525][ T4219] ret_from_fork+0x10/0x20 [ 34.750148][ T4219] } [ 34.750820][ T4219] ... key at: [] noop_qdisc+0x108/0x320 [ 34.752906][ T4219] [ 34.752906][ T4219] the dependencies between the lock to be acquired [ 34.752913][ T4219] and SOFTIRQ-irq-unsafe lock: [ 34.756530][ T4219] -> (fs_reclaim){+.+.}-{0:0} { [ 34.757808][ T4219] HARDIRQ-ON-W at: [ 34.758884][ T4219] lock_acquire+0x26c/0x7cc [ 34.760577][ T4219] fs_reclaim_acquire+0x90/0x12c [ 34.762387][ T4219] __kmem_cache_alloc_node+0x58/0x388 [ 34.764266][ T4219] kmalloc_node_trace+0x44/0x90 [ 34.766112][ T4219] init_rescuer+0xa4/0x264 [ 34.767708][ T4219] workqueue_init+0x298/0x5b4 [ 34.769514][ T4219] kernel_init_freeable+0x33c/0x528 [ 34.771329][ T4219] kernel_init+0x24/0x29c [ 34.772938][ T4219] ret_from_fork+0x10/0x20 [ 34.774607][ T4219] SOFTIRQ-ON-W at: [ 34.775708][ T4219] lock_acquire+0x26c/0x7cc [ 34.777328][ T4219] fs_reclaim_acquire+0x90/0x12c [ 34.779008][ T4219] __kmem_cache_alloc_node+0x58/0x388 [ 34.780943][ T4219] kmalloc_node_trace+0x44/0x90 [ 34.782660][ T4219] init_rescuer+0xa4/0x264 [ 34.784270][ T4219] workqueue_init+0x298/0x5b4 [ 34.785987][ T4219] kernel_init_freeable+0x33c/0x528 [ 34.787805][ T4219] kernel_init+0x24/0x29c [ 34.789384][ T4219] ret_from_fork+0x10/0x20 [ 34.791023][ T4219] INITIAL USE at: [ 34.792126][ T4219] lock_acquire+0x26c/0x7cc [ 34.793753][ T4219] fs_reclaim_acquire+0x90/0x12c [ 34.795550][ T4219] __kmem_cache_alloc_node+0x58/0x388 [ 34.797451][ T4219] kmalloc_node_trace+0x44/0x90 [ 34.799147][ T4219] init_rescuer+0xa4/0x264 [ 34.800716][ T4219] workqueue_init+0x298/0x5b4 [ 34.802379][ T4219] kernel_init_freeable+0x33c/0x528 [ 34.804216][ T4219] kernel_init+0x24/0x29c [ 34.805812][ T4219] ret_from_fork+0x10/0x20 [ 34.807398][ T4219] } [ 34.808130][ T4219] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 34.810247][ T4219] ... acquired at: [ 34.811249][ T4219] fs_reclaim_acquire+0x90/0x12c [ 34.812594][ T4219] __kmem_cache_alloc_node+0x58/0x388 [ 34.814136][ T4219] __kmalloc_node+0xcc/0x1d0 [ 34.815470][ T4219] kvmalloc_node+0x84/0x1e4 [ 34.816742][ T4219] get_dist_table+0xa0/0x354 [ 34.818077][ T4219] netem_change+0x754/0x1900 [ 34.819384][ T4219] netem_init+0x54/0xb8 [ 34.820492][ T4219] qdisc_create+0x70c/0xe64 [ 34.821810][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 34.823128][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.824583][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 34.825984][ T4219] rtnetlink_rcv+0x28/0x38 [ 34.827242][ T4219] netlink_unicast+0x660/0x8d4 [ 34.828548][ T4219] netlink_sendmsg+0x834/0xb18 [ 34.829856][ T4219] ____sys_sendmsg+0x558/0x844 [ 34.831182][ T4219] __sys_sendmsg+0x26c/0x33c [ 34.832473][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 34.833891][ T4219] invoke_syscall+0x98/0x2c0 [ 34.835183][ T4219] el0_svc_common+0x138/0x258 [ 34.836482][ T4219] do_el0_svc+0x64/0x218 [ 34.837728][ T4219] el0_svc+0x58/0x168 [ 34.838852][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 34.840244][ T4219] el0t_64_sync+0x18c/0x190 [ 34.841498][ T4219] [ 34.842115][ T4219] [ 34.842115][ T4219] stack backtrace: [ 34.843709][ T4219] CPU: 0 PID: 4219 Comm: syz-executor325 Not tainted 6.1.45-syzkaller #0 [ 34.845901][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 34.848561][ T4219] Call trace: [ 34.849448][ T4219] dump_backtrace+0x1c8/0x1f4 [ 34.850715][ T4219] show_stack+0x2c/0x3c [ 34.851852][ T4219] dump_stack_lvl+0x108/0x170 [ 34.853092][ T4219] dump_stack+0x1c/0x58 [ 34.854155][ T4219] __lock_acquire+0x6310/0x764c [ 34.855407][ T4219] lock_acquire+0x26c/0x7cc [ 34.856653][ T4219] fs_reclaim_acquire+0x90/0x12c [ 34.857964][ T4219] __kmem_cache_alloc_node+0x58/0x388 [ 34.859384][ T4219] __kmalloc_node+0xcc/0x1d0 [ 34.860625][ T4219] kvmalloc_node+0x84/0x1e4 [ 34.861843][ T4219] get_dist_table+0xa0/0x354 [ 34.863100][ T4219] netem_change+0x754/0x1900 [ 34.864317][ T4219] netem_init+0x54/0xb8 [ 34.865445][ T4219] qdisc_create+0x70c/0xe64 [ 34.866638][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 34.867928][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.869200][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 34.870497][ T4219] rtnetlink_rcv+0x28/0x38 [ 34.871638][ T4219] netlink_unicast+0x660/0x8d4 [ 34.872935][ T4219] netlink_sendmsg+0x834/0xb18 [ 34.874244][ T4219] ____sys_sendmsg+0x558/0x844 [ 34.875467][ T4219] __sys_sendmsg+0x26c/0x33c [ 34.876681][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 34.878035][ T4219] invoke_syscall+0x98/0x2c0 [ 34.879283][ T4219] el0_svc_common+0x138/0x258 [ 34.880537][ T4219] do_el0_svc+0x64/0x218 [ 34.881688][ T4219] el0_svc+0x58/0x168 [ 34.882795][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 34.884160][ T4219] el0t_64_sync+0x18c/0x190 [ 34.885423][ T4219] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 34.887855][ T4219] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4219, name: syz-executor325 [ 34.890253][ T4219] preempt_count: 201, expected: 0 [ 34.891557][ T4219] RCU nest depth: 0, expected: 0 [ 34.892868][ T4219] INFO: lockdep is turned off. [ 34.894112][ T4219] Preemption disabled at: [ 34.894121][ T4219] [] sch_tree_lock+0x120/0x1d4 [ 34.896948][ T4219] CPU: 0 PID: 4219 Comm: syz-executor325 Not tainted 6.1.45-syzkaller #0 [ 34.899080][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 34.901707][ T4219] Call trace: [ 34.902581][ T4219] dump_backtrace+0x1c8/0x1f4 [ 34.903873][ T4219] show_stack+0x2c/0x3c [ 34.904952][ T4219] dump_stack_lvl+0x108/0x170 [ 34.906172][ T4219] dump_stack+0x1c/0x58 [ 34.907306][ T4219] __might_resched+0x37c/0x4d8 [ 34.908619][ T4219] __might_sleep+0x90/0xe4 [ 34.909804][ T4219] __kmem_cache_alloc_node+0x74/0x388 [ 34.911229][ T4219] __kmalloc_node+0xcc/0x1d0 [ 34.912469][ T4219] kvmalloc_node+0x84/0x1e4 [ 34.913683][ T4219] get_dist_table+0xa0/0x354 [ 34.914922][ T4219] netem_change+0x754/0x1900 [ 34.916081][ T4219] netem_init+0x54/0xb8 [ 34.917245][ T4219] qdisc_create+0x70c/0xe64 [ 34.918382][ T4219] tc_modify_qdisc+0x9f0/0x1840 [ 34.919731][ T4219] rtnetlink_rcv_msg+0x72c/0xd94 [ 34.921111][ T4219] netlink_rcv_skb+0x20c/0x3b8 [ 34.922298][ T4219] rtnetlink_rcv+0x28/0x38 [ 34.923482][ T4219] netlink_unicast+0x660/0x8d4 [ 34.924713][ T4219] netlink_sendmsg+0x834/0xb18 [ 34.925991][ T4219] ____sys_sendmsg+0x558/0x844 [ 34.927251][ T4219] __sys_sendmsg+0x26c/0x33c [ 34.928415][ T4219] __arm64_sys_sendmsg+0x80/0x94 [ 34.929735][ T4219] invoke_syscall+0x98/0x2c0 [ 34.931010][ T4219] el0_svc_common+0x138/0x258 [ 34.932246][ T4219] do_el0_svc+0x64/0x218 [ 34.933413][ T4219] el0_svc+0x58/0x168 [ 34.934461][ T4219] el0t_64_sync_handler+0x84/0xf0 [ 34.935784][ T4219] el0t_64_sync+0x18c/0x190