Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts. executing program [ 35.163432][ T4223] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 35.166143][ T4223] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4223, name: syz-executor425 [ 35.168650][ T4223] preempt_count: 201, expected: 0 [ 35.169994][ T4223] RCU nest depth: 0, expected: 0 [ 35.171274][ T4223] 2 locks held by syz-executor425/4223: [ 35.172810][ T4223] #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 35.175452][ T4223] #1: ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 35.177932][ T4223] Preemption disabled at: [ 35.177942][ T4223] [] sch_tree_lock+0x120/0x1d4 [ 35.180744][ T4223] CPU: 1 PID: 4223 Comm: syz-executor425 Not tainted 6.1.42-syzkaller #0 [ 35.182942][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 35.185655][ T4223] Call trace: [ 35.186519][ T4223] dump_backtrace+0x1c8/0x1f4 [ 35.187771][ T4223] show_stack+0x2c/0x3c [ 35.188937][ T4223] dump_stack_lvl+0x108/0x170 [ 35.190220][ T4223] dump_stack+0x1c/0x58 [ 35.191347][ T4223] __might_resched+0x37c/0x4d8 [ 35.192648][ T4223] __might_sleep+0x90/0xe4 [ 35.193795][ T4223] __kmem_cache_alloc_node+0x74/0x388 [ 35.195223][ T4223] __kmalloc_node+0xcc/0x1d0 [ 35.196496][ T4223] kvmalloc_node+0x84/0x1e4 [ 35.197745][ T4223] get_dist_table+0xa0/0x354 [ 35.198974][ T4223] netem_change+0x754/0x1900 [ 35.200231][ T4223] netem_init+0x54/0xb8 [ 35.201418][ T4223] qdisc_create+0x70c/0xe64 [ 35.202613][ T4223] tc_modify_qdisc+0x9f0/0x1840 [ 35.203892][ T4223] rtnetlink_rcv_msg+0x72c/0xd94 [ 35.205214][ T4223] netlink_rcv_skb+0x20c/0x3b8 [ 35.206512][ T4223] rtnetlink_rcv+0x28/0x38 [ 35.207752][ T4223] netlink_unicast+0x660/0x8d4 [ 35.209036][ T4223] netlink_sendmsg+0x834/0xb18 [ 35.210315][ T4223] ____sys_sendmsg+0x558/0x844 [ 35.211627][ T4223] __sys_sendmsg+0x26c/0x33c [ 35.212849][ T4223] __arm64_sys_sendmsg+0x80/0x94 [ 35.214196][ T4223] invoke_syscall+0x98/0x2c0 [ 35.215519][ T4223] el0_svc_common+0x138/0x258 [ 35.216819][ T4223] do_el0_svc+0x64/0x218 [ 35.217941][ T4223] el0_svc+0x58/0x168 [ 35.219023][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 35.220385][ T4223] el0t_64_sync+0x18c/0x190 [ 35.221774][ T4223] [ 35.222413][ T4223] ============================================ [ 35.224047][ T4223] WARNING: possible recursive locking detected [ 35.225750][ T4223] 6.1.42-syzkaller #0 Tainted: G W [ 35.227532][ T4223] -------------------------------------------- [ 35.229174][ T4223] syz-executor425/4223 is trying to acquire lock: [ 35.230858][ T4223] ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 35.233277][ T4223] [ 35.233277][ T4223] but task is already holding lock: [ 35.235255][ T4223] ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 35.237628][ T4223] [ 35.237628][ T4223] other info that might help us debug this: [ 35.239793][ T4223] Possible unsafe locking scenario: [ 35.239793][ T4223] [ 35.241814][ T4223] CPU0 [ 35.242666][ T4223] ---- [ 35.243552][ T4223] lock(&sch->q.lock); [ 35.244664][ T4223] lock(&sch->q.lock); [ 35.245785][ T4223] [ 35.245785][ T4223] *** DEADLOCK *** [ 35.245785][ T4223] [ 35.247922][ T4223] May be due to missing lock nesting notation [ 35.247922][ T4223] [ 35.250183][ T4223] 2 locks held by syz-executor425/4223: [ 35.251660][ T4223] #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 35.254203][ T4223] #1: ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 35.256746][ T4223] [ 35.256746][ T4223] stack backtrace: [ 35.258393][ T4223] CPU: 1 PID: 4223 Comm: syz-executor425 Tainted: G W 6.1.42-syzkaller #0 [ 35.261170][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 35.263973][ T4223] Call trace: [ 35.264844][ T4223] dump_backtrace+0x1c8/0x1f4 [ 35.266013][ T4223] show_stack+0x2c/0x3c [ 35.267048][ T4223] dump_stack_lvl+0x108/0x170 [ 35.268201][ T4223] dump_stack+0x1c/0x58 [ 35.269247][ T4223] __lock_acquire+0x6310/0x764c [ 35.270643][ T4223] lock_acquire+0x26c/0x7cc [ 35.271847][ T4223] _raw_spin_lock_bh+0x54/0x6c [ 35.273122][ T4223] get_dist_table+0x240/0x354 [ 35.274451][ T4223] netem_change+0x754/0x1900 [ 35.275706][ T4223] netem_init+0x54/0xb8 [ 35.276839][ T4223] qdisc_create+0x70c/0xe64 [ 35.278073][ T4223] tc_modify_qdisc+0x9f0/0x1840 [ 35.279380][ T4223] rtnetlink_rcv_msg+0x72c/0xd94 [ 35.280698][ T4223] netlink_rcv_skb+0x20c/0x3b8 [ 35.281970][ T4223] rtnetlink_rcv+0x28/0x38 [ 35.283172][ T4223] netlink_unicast+0x660/0x8d4 [ 35.284423][ T4223] netlink_sendmsg+0x834/0xb18 [ 35.285710][ T4223] ____sys_sendmsg+0x558/0x844 [ 35.286963][ T4223] __sys_sendmsg+0x26c/0x33c [ 35.288177][ T4223] __arm64_sys_sendmsg+0x80/0x94 [ 35.289501][ T4223] invoke_syscall+0x98/0x2c0 [ 35.290705][ T4223] el0_svc_common+0x138/0x258 [ 35.291951][ T4223] do_el0_svc+0x64/0x218 [ 35.293087][ T4223] el0_svc+0x58/0x168 [ 35.294128][ T4223] el0t_64_sync_handler+0x84/0xf0 [ 35.295509][ T4223] el0t_64_sync+0x18c/0x190