===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected 6.1.36-syzkaller #0 Not tainted ----------------------------------------------------- syz-executor.2/10126 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: ffff80001585bd40 (fs_reclaim){+.+.}-{0:0}, at: might_alloc include/linux/sched/mm.h:271 [inline] ffff80001585bd40 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook mm/slab.h:710 [inline] ffff80001585bd40 (fs_reclaim){+.+.}-{0:0}, at: slab_alloc_node mm/slub.c:3318 [inline] ffff80001585bd40 (fs_reclaim){+.+.}-{0:0}, at: __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 and this task is already holding: ffff800017bd3208 (noop_qdisc.q.lock){+.-.}-{2:2}, at: sch_tree_lock+0x120/0x1d4 which would create a new lock dependency: (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} but this new dependency connects a SOFTIRQ-irq-safe lock: (noop_qdisc.q.lock){+.-.}-{2:2} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] net_tx_action+0x6ec/0x94c net/core/dev.c:5077 __do_softirq+0x30c/0xea0 kernel/softirq.c:571 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84 do_softirq+0x120/0x20c kernel/softirq.c:472 __local_bh_enable_ip+0x2c0/0x4d0 kernel/softirq.c:396 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 netif_tx_unlock_bh include/linux/netdevice.h:4396 [inline] dev_watchdog_down net/sched/sch_generic.c:566 [inline] dev_deactivate_many+0x3d4/0xa8c net/sched/sch_generic.c:1348 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1382 linkwatch_do_dev+0x29c/0x3a4 net/core/link_watch.c:166 __linkwatch_run_queue+0x3a0/0x700 net/core/link_watch.c:221 linkwatch_event+0x58/0x68 net/core/link_watch.c:264 process_one_work+0x7ac/0x1404 kernel/workqueue.c:2289 worker_thread+0x8e4/0xfec kernel/workqueue.c:2436 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 to a SOFTIRQ-irq-unsafe lock: (fs_reclaim){+.+.}-{0:0} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(fs_reclaim); local_irq_disable(); lock(noop_qdisc.q.lock); lock(fs_reclaim); lock(noop_qdisc.q.lock); *** DEADLOCK *** 2 locks held by syz-executor.2/10126: #0: ffff800017b8e848 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:74 [inline] #0: ffff800017b8e848 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 net/core/rtnetlink.c:6094 #1: ffff800017bd3208 (noop_qdisc.q.lock){+.-.}-{2:2}, at: sch_tree_lock+0x120/0x1d4 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (noop_qdisc.q.lock){+.-.}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] __dev_xmit_skb net/core/dev.c:3854 [inline] __dev_queue_xmit+0xb14/0x38d8 net/core/dev.c:4227 dev_queue_xmit include/linux/netdevice.h:3021 [inline] tx+0x90/0x134 drivers/block/aoe/aoenet.c:63 kthread+0x1ac/0x374 drivers/block/aoe/aoecmd.c:1229 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 IN-SOFTIRQ-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] net_tx_action+0x6ec/0x94c net/core/dev.c:5077 __do_softirq+0x30c/0xea0 kernel/softirq.c:571 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84 do_softirq+0x120/0x20c kernel/softirq.c:472 __local_bh_enable_ip+0x2c0/0x4d0 kernel/softirq.c:396 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 netif_tx_unlock_bh include/linux/netdevice.h:4396 [inline] dev_watchdog_down net/sched/sch_generic.c:566 [inline] dev_deactivate_many+0x3d4/0xa8c net/sched/sch_generic.c:1348 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1382 linkwatch_do_dev+0x29c/0x3a4 net/core/link_watch.c:166 __linkwatch_run_queue+0x3a0/0x700 net/core/link_watch.c:221 linkwatch_event+0x58/0x68 net/core/link_watch.c:264 process_one_work+0x7ac/0x1404 kernel/workqueue.c:2289 worker_thread+0x8e4/0xfec kernel/workqueue.c:2436 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 INITIAL USE at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] __dev_xmit_skb net/core/dev.c:3854 [inline] __dev_queue_xmit+0xb14/0x38d8 net/core/dev.c:4227 dev_queue_xmit include/linux/netdevice.h:3021 [inline] tx+0x90/0x134 drivers/block/aoe/aoenet.c:63 kthread+0x1ac/0x374 drivers/block/aoe/aoecmd.c:1229 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 } ... key at: [] noop_qdisc+0x108/0x320 the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (fs_reclaim){+.+.}-{0:0} { HARDIRQ-ON-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 SOFTIRQ-ON-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 INITIAL USE at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 } ... key at: [] __fs_reclaim_map+0x0/0xe0 ... acquired at: __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc_node+0xcc/0x1d0 mm/slab_common.c:962 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x84/0x1e4 mm/util.c:581 kvmalloc include/linux/slab.h:706 [inline] get_dist_table+0xa0/0x354 net/sched/sch_netem.c:788 netem_change+0x754/0x1900 net/sched/sch_netem.c:985 netem_init+0x54/0xb8 net/sched/sch_netem.c:1072 qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314 tc_modify_qdisc+0x9f0/0x1840 rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6097 netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2524 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6115 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1354 netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x558/0x844 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2565 __do_sys_sendmsg net/socket.c:2574 [inline] __se_sys_sendmsg net/socket.c:2572 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2572 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 stack backtrace: CPU: 0 PID: 10126 Comm: syz-executor.2 Not tainted 6.1.36-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 __lock_acquire+0x6310/0x764c kernel/locking/lockdep.c:5056 lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc_node+0xcc/0x1d0 mm/slab_common.c:962 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x84/0x1e4 mm/util.c:581 kvmalloc include/linux/slab.h:706 [inline] get_dist_table+0xa0/0x354 net/sched/sch_netem.c:788 netem_change+0x754/0x1900 net/sched/sch_netem.c:985 netem_init+0x54/0xb8 net/sched/sch_netem.c:1072 qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314 tc_modify_qdisc+0x9f0/0x1840 rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6097 netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2524 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6115 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1354 netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x558/0x844 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2565 __do_sys_sendmsg net/socket.c:2574 [inline] __se_sys_sendmsg net/socket.c:2572 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2572 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 10126, name: syz-executor.2 preempt_count: 201, expected: 0 RCU nest depth: 0, expected: 0 INFO: lockdep is turned off. Preemption disabled at: [] sch_tree_lock+0x120/0x1d4 CPU: 0 PID: 10126 Comm: syz-executor.2 Not tainted 6.1.36-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x58 lib/dump_stack.c:113 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9941 __might_sleep+0x90/0xe4 kernel/sched/core.c:9870 might_alloc include/linux/sched/mm.h:274 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x74/0x388 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc_node+0xcc/0x1d0 mm/slab_common.c:962 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x84/0x1e4 mm/util.c:581 kvmalloc include/linux/slab.h:706 [inline] get_dist_table+0xa0/0x354 net/sched/sch_netem.c:788 netem_change+0x754/0x1900 net/sched/sch_netem.c:985 netem_init+0x54/0xb8 net/sched/sch_netem.c:1072 qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314 tc_modify_qdisc+0x9f0/0x1840 rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6097 netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2524 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6115 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1354 netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x558/0x844 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2565 __do_sys_sendmsg net/socket.c:2574 [inline] __se_sys_sendmsg net/socket.c:2572 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2572 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581