Warning: Permanently added '10.128.0.224' (ED25519) to the list of known hosts. executing program [ 37.735689][ T4217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor893'. [ 37.738324][ T4217] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 37.740962][ T4217] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4217, name: syz-executor893 [ 37.743378][ T4217] preempt_count: 201, expected: 0 [ 37.744661][ T4217] RCU nest depth: 0, expected: 0 [ 37.745870][ T4217] 2 locks held by syz-executor893/4217: [ 37.747271][ T4217] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 37.749848][ T4217] #1: ffff0000d2db9108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 37.752171][ T4217] Preemption disabled at: [ 37.752181][ T4217] [] sch_tree_lock+0x120/0x1d4 [ 37.754878][ T4217] CPU: 1 PID: 4217 Comm: syz-executor893 Not tainted 6.1.45-syzkaller #0 [ 37.757036][ T4217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 37.759592][ T4217] Call trace: [ 37.760435][ T4217] dump_backtrace+0x1c8/0x1f4 [ 37.761647][ T4217] show_stack+0x2c/0x3c [ 37.762698][ T4217] dump_stack_lvl+0x108/0x170 [ 37.763974][ T4217] dump_stack+0x1c/0x58 [ 37.765045][ T4217] __might_resched+0x37c/0x4d8 [ 37.766248][ T4217] __might_sleep+0x90/0xe4 [ 37.767372][ T4217] __kmem_cache_alloc_node+0x74/0x388 [ 37.768805][ T4217] __kmalloc_node+0xcc/0x1d0 [ 37.769964][ T4217] kvmalloc_node+0x84/0x1e4 [ 37.771116][ T4217] get_dist_table+0xa0/0x354 [ 37.772301][ T4217] netem_change+0x7a4/0x1900 [ 37.773491][ T4217] netem_init+0x54/0xb8 [ 37.774588][ T4217] qdisc_create+0x70c/0xe64 [ 37.775746][ T4217] tc_modify_qdisc+0x9f0/0x1840 [ 37.777015][ T4217] rtnetlink_rcv_msg+0x72c/0xd94 [ 37.778269][ T4217] netlink_rcv_skb+0x20c/0x3b8 [ 37.779489][ T4217] rtnetlink_rcv+0x28/0x38 [ 37.780615][ T4217] netlink_unicast+0x660/0x8d4 [ 37.781883][ T4217] netlink_sendmsg+0x834/0xb18 [ 37.783110][ T4217] ____sys_sendmsg+0x558/0x844 [ 37.784357][ T4217] __sys_sendmsg+0x26c/0x33c [ 37.785536][ T4217] __arm64_sys_sendmsg+0x80/0x94 [ 37.786834][ T4217] invoke_syscall+0x98/0x2c0 [ 37.787996][ T4217] el0_svc_common+0x138/0x258 [ 37.789223][ T4217] do_el0_svc+0x64/0x218 [ 37.790332][ T4217] el0_svc+0x58/0x168 [ 37.791369][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 37.792702][ T4217] el0t_64_sync+0x18c/0x190 [ 37.793966][ T4217] [ 37.794562][ T4217] ============================================ [ 37.796132][ T4217] WARNING: possible recursive locking detected [ 37.797676][ T4217] 6.1.45-syzkaller #0 Tainted: G W [ 37.799280][ T4217] -------------------------------------------- [ 37.800842][ T4217] syz-executor893/4217 is trying to acquire lock: [ 37.802474][ T4217] ffff0000d2db9108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 37.804808][ T4217] [ 37.804808][ T4217] but task is already holding lock: [ 37.806678][ T4217] ffff0000d2db9108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 37.808933][ T4217] [ 37.808933][ T4217] other info that might help us debug this: [ 37.811048][ T4217] Possible unsafe locking scenario: [ 37.811048][ T4217] [ 37.812967][ T4217] CPU0 [ 37.813797][ T4217] ---- [ 37.814612][ T4217] lock(&sch->q.lock); [ 37.815667][ T4217] lock(&sch->q.lock); [ 37.816737][ T4217] [ 37.816737][ T4217] *** DEADLOCK *** [ 37.816737][ T4217] [ 37.818778][ T4217] May be due to missing lock nesting notation [ 37.818778][ T4217] [ 37.820873][ T4217] 2 locks held by syz-executor893/4217: [ 37.822294][ T4217] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 37.824789][ T4217] #1: ffff0000d2db9108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 37.827231][ T4217] [ 37.827231][ T4217] stack backtrace: [ 37.828769][ T4217] CPU: 1 PID: 4217 Comm: syz-executor893 Tainted: G W 6.1.45-syzkaller #0 [ 37.831339][ T4217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 37.833900][ T4217] Call trace: [ 37.834764][ T4217] dump_backtrace+0x1c8/0x1f4 [ 37.835934][ T4217] show_stack+0x2c/0x3c [ 37.837005][ T4217] dump_stack_lvl+0x108/0x170 [ 37.838223][ T4217] dump_stack+0x1c/0x58 [ 37.839298][ T4217] __lock_acquire+0x6310/0x764c [ 37.840541][ T4217] lock_acquire+0x26c/0x7cc [ 37.841705][ T4217] _raw_spin_lock_bh+0x54/0x6c [ 37.842930][ T4217] get_dist_table+0x240/0x354 [ 37.844145][ T4217] netem_change+0x7a4/0x1900 [ 37.845329][ T4217] netem_init+0x54/0xb8 [ 37.846387][ T4217] qdisc_create+0x70c/0xe64 [ 37.847545][ T4217] tc_modify_qdisc+0x9f0/0x1840 [ 37.848823][ T4217] rtnetlink_rcv_msg+0x72c/0xd94 [ 37.850056][ T4217] netlink_rcv_skb+0x20c/0x3b8 [ 37.851216][ T4217] rtnetlink_rcv+0x28/0x38 [ 37.852357][ T4217] netlink_unicast+0x660/0x8d4 [ 37.853556][ T4217] netlink_sendmsg+0x834/0xb18 [ 37.854806][ T4217] ____sys_sendmsg+0x558/0x844 [ 37.856020][ T4217] __sys_sendmsg+0x26c/0x33c [ 37.857191][ T4217] __arm64_sys_sendmsg+0x80/0x94 [ 37.858533][ T4217] invoke_syscall+0x98/0x2c0 [ 37.859747][ T4217] el0_svc_common+0x138/0x258 [ 37.860967][ T4217] do_el0_svc+0x64/0x218 [ 37.862042][ T4217] el0_svc+0x58/0x168 [ 37.863065][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 37.864358][ T4217] el0t_64_sync+0x18c/0x190