Warning: Permanently added '10.128.0.114' (ED25519) to the list of known hosts. executing program [ 36.430410][ T4217] netlink: 4 bytes leftover after parsing attributes in process `syz-executor753'. [ 36.433283][ T4217] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 36.435777][ T4217] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4217, name: syz-executor753 [ 36.438168][ T4217] preempt_count: 201, expected: 0 [ 36.439432][ T4217] RCU nest depth: 0, expected: 0 [ 36.440661][ T4217] 2 locks held by syz-executor753/4217: [ 36.442106][ T4217] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 36.444672][ T4217] #1: ffff0000dba03108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 36.447117][ T4217] Preemption disabled at: [ 36.447128][ T4217] [] sch_tree_lock+0x120/0x1d4 [ 36.449827][ T4217] CPU: 0 PID: 4217 Comm: syz-executor753 Not tainted 6.1.45-syzkaller #0 [ 36.452038][ T4217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 36.454662][ T4217] Call trace: [ 36.455511][ T4217] dump_backtrace+0x1c8/0x1f4 [ 36.456770][ T4217] show_stack+0x2c/0x3c [ 36.457898][ T4217] dump_stack_lvl+0x108/0x170 [ 36.459170][ T4217] dump_stack+0x1c/0x58 [ 36.460283][ T4217] __might_resched+0x37c/0x4d8 [ 36.461575][ T4217] __might_sleep+0x90/0xe4 [ 36.462719][ T4217] __kmem_cache_alloc_node+0x74/0x388 [ 36.464120][ T4217] __kmalloc_node+0xcc/0x1d0 [ 36.465332][ T4217] kvmalloc_node+0x84/0x1e4 [ 36.466518][ T4217] get_dist_table+0xa0/0x354 [ 36.467781][ T4217] netem_change+0x7a4/0x1900 [ 36.468962][ T4217] netem_init+0x54/0xb8 [ 36.470098][ T4217] qdisc_create+0x70c/0xe64 [ 36.471264][ T4217] tc_modify_qdisc+0x9f0/0x1840 [ 36.472560][ T4217] rtnetlink_rcv_msg+0x72c/0xd94 [ 36.473833][ T4217] netlink_rcv_skb+0x20c/0x3b8 [ 36.475119][ T4217] rtnetlink_rcv+0x28/0x38 [ 36.476282][ T4217] netlink_unicast+0x660/0x8d4 [ 36.477598][ T4217] netlink_sendmsg+0x834/0xb18 [ 36.478877][ T4217] ____sys_sendmsg+0x558/0x844 [ 36.480175][ T4217] __sys_sendmsg+0x26c/0x33c [ 36.481447][ T4217] __arm64_sys_sendmsg+0x80/0x94 [ 36.482798][ T4217] invoke_syscall+0x98/0x2c0 [ 36.484056][ T4217] el0_svc_common+0x138/0x258 [ 36.485247][ T4217] do_el0_svc+0x64/0x218 [ 36.486370][ T4217] el0_svc+0x58/0x168 [ 36.487476][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 36.488880][ T4217] el0t_64_sync+0x18c/0x190 [ 36.490281][ T4217] [ 36.490914][ T4217] ============================================ [ 36.492435][ T4217] WARNING: possible recursive locking detected [ 36.494045][ T4217] 6.1.45-syzkaller #0 Tainted: G W [ 36.495727][ T4217] -------------------------------------------- [ 36.497321][ T4217] syz-executor753/4217 is trying to acquire lock: [ 36.499006][ T4217] ffff0000dba03108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354 [ 36.501440][ T4217] [ 36.501440][ T4217] but task is already holding lock: [ 36.503321][ T4217] ffff0000dba03108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 36.505643][ T4217] [ 36.505643][ T4217] other info that might help us debug this: [ 36.507739][ T4217] Possible unsafe locking scenario: [ 36.507739][ T4217] [ 36.509762][ T4217] CPU0 [ 36.510700][ T4217] ---- [ 36.511566][ T4217] lock(&sch->q.lock); [ 36.512622][ T4217] lock(&sch->q.lock); [ 36.513695][ T4217] [ 36.513695][ T4217] *** DEADLOCK *** [ 36.513695][ T4217] [ 36.515911][ T4217] May be due to missing lock nesting notation [ 36.515911][ T4217] [ 36.518129][ T4217] 2 locks held by syz-executor753/4217: [ 36.519653][ T4217] #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 [ 36.522132][ T4217] #1: ffff0000dba03108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4 [ 36.524537][ T4217] [ 36.524537][ T4217] stack backtrace: [ 36.526099][ T4217] CPU: 0 PID: 4217 Comm: syz-executor753 Tainted: G W 6.1.45-syzkaller #0 [ 36.528721][ T4217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 36.531318][ T4217] Call trace: [ 36.532182][ T4217] dump_backtrace+0x1c8/0x1f4 [ 36.533455][ T4217] show_stack+0x2c/0x3c [ 36.534605][ T4217] dump_stack_lvl+0x108/0x170 [ 36.535847][ T4217] dump_stack+0x1c/0x58 [ 36.536949][ T4217] __lock_acquire+0x6310/0x764c [ 36.538271][ T4217] lock_acquire+0x26c/0x7cc [ 36.539492][ T4217] _raw_spin_lock_bh+0x54/0x6c [ 36.540786][ T4217] get_dist_table+0x240/0x354 [ 36.542041][ T4217] netem_change+0x7a4/0x1900 [ 36.543226][ T4217] netem_init+0x54/0xb8 [ 36.544317][ T4217] qdisc_create+0x70c/0xe64 [ 36.545529][ T4217] tc_modify_qdisc+0x9f0/0x1840 [ 36.546850][ T4217] rtnetlink_rcv_msg+0x72c/0xd94 [ 36.548099][ T4217] netlink_rcv_skb+0x20c/0x3b8 [ 36.549311][ T4217] rtnetlink_rcv+0x28/0x38 [ 36.550484][ T4217] netlink_unicast+0x660/0x8d4 [ 36.551734][ T4217] netlink_sendmsg+0x834/0xb18 [ 36.552976][ T4217] ____sys_sendmsg+0x558/0x844 [ 36.554199][ T4217] __sys_sendmsg+0x26c/0x33c [ 36.555425][ T4217] __arm64_sys_sendmsg+0x80/0x94 [ 36.556769][ T4217] invoke_syscall+0x98/0x2c0 [ 36.557964][ T4217] el0_svc_common+0x138/0x258 [ 36.559213][ T4217] do_el0_svc+0x64/0x218 [ 36.560346][ T4217] el0_svc+0x58/0x168 [ 36.561420][ T4217] el0t_64_sync_handler+0x84/0xf0 [ 36.562746][ T4217] el0t_64_sync+0x18c/0x190