Warning: Permanently added '10.128.0.213' (ED25519) to the list of known hosts. executing program [ 44.093434][ T3967] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 44.096169][ T3967] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3967, name: syz-executor215 [ 44.098569][ T3967] 2 locks held by syz-executor215/3967: [ 44.100067][ T3967] #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac [ 44.102535][ T3967] #1: ffff0000c2b81908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 44.104948][ T3967] Preemption disabled at: [ 44.104960][ T3967] [] netem_change+0x22c/0x1a90 [ 44.107641][ T3967] CPU: 0 PID: 3967 Comm: syz-executor215 Not tainted 5.15.126-syzkaller-00092-g24c4de4069cb #0 [ 44.110256][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 44.112834][ T3967] Call trace: [ 44.113684][ T3967] dump_backtrace+0x0/0x530 [ 44.114845][ T3967] show_stack+0x2c/0x3c [ 44.115920][ T3967] dump_stack_lvl+0x108/0x170 [ 44.117111][ T3967] dump_stack+0x1c/0x58 [ 44.118212][ T3967] ___might_sleep+0x380/0x4dc [ 44.119385][ T3967] __might_sleep+0x98/0xf0 [ 44.120526][ T3967] slab_pre_alloc_hook+0x58/0xe8 [ 44.121794][ T3967] __kmalloc_node+0xbc/0x5b8 [ 44.122970][ T3967] kvmalloc_node+0x88/0x204 [ 44.124161][ T3967] get_dist_table+0x9c/0x2a4 [ 44.125358][ T3967] netem_change+0x7cc/0x1a90 [ 44.126527][ T3967] netem_init+0x54/0xb8 [ 44.127610][ T3967] qdisc_create+0x6fc/0xf44 [ 44.128754][ T3967] tc_modify_qdisc+0x8dc/0x1344 [ 44.130001][ T3967] rtnetlink_rcv_msg+0xa74/0xdac [ 44.131321][ T3967] netlink_rcv_skb+0x20c/0x3b8 [ 44.132525][ T3967] rtnetlink_rcv+0x28/0x38 [ 44.133632][ T3967] netlink_unicast+0x664/0x938 [ 44.134894][ T3967] netlink_sendmsg+0x844/0xb38 [ 44.136112][ T3967] ____sys_sendmsg+0x584/0x870 [ 44.137338][ T3967] ___sys_sendmsg+0x214/0x294 [ 44.138554][ T3967] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.139921][ T3967] invoke_syscall+0x98/0x2b8 [ 44.141095][ T3967] el0_svc_common+0x138/0x258 [ 44.142302][ T3967] do_el0_svc+0x58/0x14c [ 44.143411][ T3967] el0_svc+0x7c/0x1f0 [ 44.144411][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 44.145674][ T3967] el0t_64_sync+0x1a0/0x1a4 [ 44.146926][ T3967] [ 44.147495][ T3967] ============================================ [ 44.149019][ T3967] WARNING: possible recursive locking detected [ 44.150549][ T3967] 5.15.126-syzkaller-00092-g24c4de4069cb #0 Tainted: G W [ 44.152645][ T3967] -------------------------------------------- [ 44.154360][ T3967] syz-executor215/3967 is trying to acquire lock: [ 44.155997][ T3967] ffff0000c2b81908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1f0/0x2a4 [ 44.158248][ T3967] [ 44.158248][ T3967] but task is already holding lock: [ 44.160152][ T3967] ffff0000c2b81908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 44.162422][ T3967] [ 44.162422][ T3967] other info that might help us debug this: [ 44.164435][ T3967] Possible unsafe locking scenario: [ 44.164435][ T3967] [ 44.166364][ T3967] CPU0 [ 44.167186][ T3967] ---- [ 44.168020][ T3967] lock(&sch->q.lock); [ 44.169102][ T3967] lock(&sch->q.lock); [ 44.170166][ T3967] [ 44.170166][ T3967] *** DEADLOCK *** [ 44.170166][ T3967] [ 44.172195][ T3967] May be due to missing lock nesting notation [ 44.172195][ T3967] [ 44.174316][ T3967] 2 locks held by syz-executor215/3967: [ 44.175741][ T3967] #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac [ 44.178113][ T3967] #1: ffff0000c2b81908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90 [ 44.180489][ T3967] [ 44.180489][ T3967] stack backtrace: [ 44.181976][ T3967] CPU: 0 PID: 3967 Comm: syz-executor215 Tainted: G W 5.15.126-syzkaller-00092-g24c4de4069cb #0 [ 44.185011][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 [ 44.187536][ T3967] Call trace: [ 44.188350][ T3967] dump_backtrace+0x0/0x530 [ 44.189516][ T3967] show_stack+0x2c/0x3c [ 44.190587][ T3967] dump_stack_lvl+0x108/0x170 [ 44.191812][ T3967] dump_stack+0x1c/0x58 [ 44.192855][ T3967] __lock_acquire+0x62b4/0x7620 [ 44.194107][ T3967] lock_acquire+0x240/0x77c [ 44.195239][ T3967] _raw_spin_lock_bh+0x124/0x1c4 [ 44.196553][ T3967] get_dist_table+0x1f0/0x2a4 [ 44.197797][ T3967] netem_change+0x7cc/0x1a90 [ 44.198965][ T3967] netem_init+0x54/0xb8 [ 44.200081][ T3967] qdisc_create+0x6fc/0xf44 [ 44.201180][ T3967] tc_modify_qdisc+0x8dc/0x1344 [ 44.202456][ T3967] rtnetlink_rcv_msg+0xa74/0xdac [ 44.203734][ T3967] netlink_rcv_skb+0x20c/0x3b8 [ 44.204947][ T3967] rtnetlink_rcv+0x28/0x38 [ 44.206110][ T3967] netlink_unicast+0x664/0x938 [ 44.207354][ T3967] netlink_sendmsg+0x844/0xb38 [ 44.208602][ T3967] ____sys_sendmsg+0x584/0x870 [ 44.209829][ T3967] ___sys_sendmsg+0x214/0x294 [ 44.211025][ T3967] __arm64_sys_sendmsg+0x1ac/0x25c [ 44.212353][ T3967] invoke_syscall+0x98/0x2b8 [ 44.213568][ T3967] el0_svc_common+0x138/0x258 [ 44.214819][ T3967] do_el0_svc+0x58/0x14c [ 44.215922][ T3967] el0_svc+0x7c/0x1f0 [ 44.216944][ T3967] el0t_64_sync_handler+0x84/0xe4 [ 44.218236][ T3967] el0t_64_sync+0x1a0/0x1a4