Warning: Permanently added '10.128.10.4' (ED25519) to the list of known hosts. executing program [ 42.298491][ T4228] netlink: 8 bytes leftover after parsing attributes in process `syz-executor128'. [ 42.300498][ T4228] netlink: 4 bytes leftover after parsing attributes in process `syz-executor128'. [ 42.306636][ T4228] device wireguard0 entered promiscuous mode [ 42.309108][ T4228] netlink: 44 bytes leftover after parsing attributes in process `syz-executor128'. [ 42.311518][ T4228] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 42.313561][ T4228] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4228, name: syz-executor128 [ 42.315573][ T4228] preempt_count: 201, expected: 0 [ 42.316557][ T4228] RCU nest depth: 0, expected: 0 [ 42.317693][ T4228] 2 locks held by syz-executor128/4228: [ 42.318806][ T4228] #0: ffff800017b9f548 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 42.320826][ T4228] #1: ffff0000d621d108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 42.322795][ T4228] Preemption disabled at: [ 42.322805][ T4228] [] sch_tree_lock+0x120/0x1d4 [ 42.324929][ T4228] CPU: 1 PID: 4228 Comm: syz-executor128 Not tainted 6.1.39-syzkaller #0 [ 42.326655][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 42.328764][ T4228] Call trace: [ 42.329496][ T4228] dump_backtrace+0x1c8/0x1f4 [ 42.330552][ T4228] show_stack+0x2c/0x3c [ 42.331395][ T4228] dump_stack_lvl+0x108/0x170 [ 42.332344][ T4228] dump_stack+0x1c/0x58 [ 42.333167][ T4228] __might_resched+0x37c/0x4d8 [ 42.334148][ T4228] __might_sleep+0x90/0xe4 [ 42.335105][ T4228] __kmem_cache_alloc_node+0x74/0x388 [ 42.336250][ T4228] __kmalloc_node+0xcc/0x1d0 [ 42.337194][ T4228] kvmalloc_node+0x84/0x1e4 [ 42.338025][ T4228] get_dist_table+0xa0/0x354 [ 42.338967][ T4228] netem_change+0x754/0x1900 [ 42.339910][ T4228] netem_init+0x54/0xb8 [ 42.340731][ T4228] qdisc_create+0x70c/0xe64 [ 42.341644][ T4228] tc_modify_qdisc+0x9f0/0x1840 [ 42.342653][ T4228] rtnetlink_rcv_msg+0x72c/0xd94 [ 42.343674][ T4228] netlink_rcv_skb+0x20c/0x3b8 [ 42.344652][ T4228] rtnetlink_rcv+0x28/0x38 [ 42.345647][ T4228] netlink_unicast+0x660/0x8d4 [ 42.346725][ T4228] netlink_sendmsg+0x834/0xb18 [ 42.347837][ T4228] ____sys_sendmsg+0x558/0x844 [ 42.348792][ T4228] __sys_sendmsg+0x26c/0x33c [ 42.349718][ T4228] __arm64_sys_sendmsg+0x80/0x94 [ 42.350740][ T4228] invoke_syscall+0x98/0x2c0 [ 42.351736][ T4228] el0_svc_common+0x138/0x258 [ 42.352787][ T4228] do_el0_svc+0x64/0x218 [ 42.353681][ T4228] el0_svc+0x58/0x168 [ 42.354467][ T4228] el0t_64_sync_handler+0x84/0xf0 [ 42.355521][ T4228] el0t_64_sync+0x18c/0x190 [ 42.356561][ T4228] [ 42.357043][ T4228] ============================================ [ 42.358279][ T4228] WARNING: possible recursive locking detected [ 42.359745][ T4228] 6.1.39-syzkaller #0 Tainted: G W [ 42.360945][ T4228] -------------------------------------------- [ 42.361930][ T4228] syz-executor128/4228 is trying to acquire lock: [ 42.362953][ T4228] ffff0000d621d108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 42.364418][ T4228] [ 42.364418][ T4228] but task is already holding lock: [ 42.365655][ T4228] ffff0000d621d108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 42.367500][ T4228] [ 42.367500][ T4228] other info that might help us debug this: [ 42.369211][ T4228] Possible unsafe locking scenario: [ 42.369211][ T4228] [ 42.370782][ T4228] CPU0 [ 42.371446][ T4228] ---- [ 42.372086][ T4228] lock(&sch->q.lock); [ 42.372889][ T4228] lock(&sch->q.lock); [ 42.373734][ T4228] [ 42.373734][ T4228] *** DEADLOCK *** [ 42.373734][ T4228] [ 42.375399][ T4228] May be due to missing lock nesting notation [ 42.375399][ T4228] [ 42.377136][ T4228] 2 locks held by syz-executor128/4228: [ 42.378174][ T4228] #0: ffff800017b9f548 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 42.380051][ T4228] #1: ffff0000d621d108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 42.381970][ T4228] [ 42.381970][ T4228] stack backtrace: [ 42.383152][ T4228] CPU: 1 PID: 4228 Comm: syz-executor128 Tainted: G W 6.1.39-syzkaller #0 [ 42.385162][ T4228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023 [ 42.387245][ T4228] Call trace: [ 42.387934][ T4228] dump_backtrace+0x1c8/0x1f4 [ 42.388955][ T4228] show_stack+0x2c/0x3c [ 42.389777][ T4228] dump_stack_lvl+0x108/0x170 [ 42.390749][ T4228] dump_stack+0x1c/0x58 [ 42.391569][ T4228] __lock_acquire+0x6310/0x764c [ 42.392511][ T4228] lock_acquire+0x26c/0x7cc [ 42.393484][ T4228] _raw_spin_lock_bh+0x54/0x6c [ 42.394420][ T4228] get_dist_table+0x240/0x354 [ 42.395297][ T4228] netem_change+0x754/0x1900 [ 42.396266][ T4228] netem_init+0x54/0xb8 [ 42.397192][ T4228] qdisc_create+0x70c/0xe64 [ 42.398110][ T4228] tc_modify_qdisc+0x9f0/0x1840 [ 42.399066][ T4228] rtnetlink_rcv_msg+0x72c/0xd94 [ 42.400068][ T4228] netlink_rcv_skb+0x20c/0x3b8 [ 42.401044][ T4228] rtnetlink_rcv+0x28/0x38 [ 42.401956][ T4228] netlink_unicast+0x660/0x8d4 [ 42.402989][ T4228] netlink_sendmsg+0x834/0xb18 [ 42.404008][ T4228] ____sys_sendmsg+0x558/0x844 [ 42.404991][ T4228] __sys_sendmsg+0x26c/0x33c [ 42.405875][ T4228] __arm64_sys_sendmsg+0x80/0x94 [ 42.406903][ T4228] invoke_syscall+0x98/0x2c0 [ 42.407902][ T4228] el0_svc_common+0x138/0x258 [ 42.408857][ T4228] do_el0_svc+0x64/0x218 [ 42.409744][ T4228] el0_svc+0x58/0x168 [ 42.410552][ T4228] el0t_64_sync_handler+0x84/0xf0 [ 42.411594][ T4228] el0t_64_sync+0x18c/0x190