===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected 6.1.38-syzkaller #0 Not tainted ----------------------------------------------------- syz-executor.4/5637 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: ffff80001586bd40 (fs_reclaim){+.+.}-{0:0}, at: might_alloc include/linux/sched/mm.h:271 [inline] ffff80001586bd40 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook mm/slab.h:710 [inline] ffff80001586bd40 (fs_reclaim){+.+.}-{0:0}, at: slab_alloc_node mm/slub.c:3318 [inline] ffff80001586bd40 (fs_reclaim){+.+.}-{0:0}, at: __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 and this task is already holding: ffff0000c3612908 (&sch->q.lock){+.-.}-{2:2}, at: sch_tree_lock+0x120/0x1d4 which would create a new lock dependency: (&sch->q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} but this new dependency connects a SOFTIRQ-irq-safe lock: (&sch->q.lock){+.-.}-{2:2} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] dequeue_skb net/sched/sch_generic.c:240 [inline] qdisc_restart net/sched/sch_generic.c:397 [inline] __qdisc_run+0x9cc/0x239c net/sched/sch_generic.c:415 qdisc_run+0xc4/0x23c include/net/pkt_sched.h:126 net_tx_action+0x748/0x94c net/core/dev.c:5093 __do_softirq+0x30c/0xea0 kernel/softirq.c:571 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84 invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0x28c/0x534 kernel/softirq.c:650 irq_exit_rcu+0x14/0x84 kernel/softirq.c:662 __el1_irq arch/arm64/kernel/entry-common.c:472 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:486 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:577 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_release+0x528/0xa50 kernel/locking/lockdep.c:5692 rcu_lock_release+0x2c/0x38 include/linux/rcupdate.h:311 rcu_read_unlock include/linux/rcupdate.h:780 [inline] page_ext_put+0xb0/0xc8 mm/page_ext.c:182 page_table_check_set+0x51c/0x5c4 mm/page_table_check.c:126 __page_table_check_pte_set+0x110/0x134 mm/page_table_check.c:199 page_table_check_pte_set include/linux/page_table_check.h:83 [inline] set_pte_at arch/arm64/include/asm/pgtable.h:357 [inline] copy_present_pte mm/memory.c:990 [inline] copy_pte_range mm/memory.c:1081 [inline] copy_pmd_range mm/memory.c:1167 [inline] copy_pud_range mm/memory.c:1204 [inline] copy_p4d_range mm/memory.c:1228 [inline] copy_page_range+0x28b0/0x38d0 mm/memory.c:1326 dup_mmap kernel/fork.c:696 [inline] dup_mm+0xdac/0x1340 kernel/fork.c:1532 copy_mm+0xc0/0x17c kernel/fork.c:1581 copy_process+0x1798/0x38d0 kernel/fork.c:2259 kernel_clone+0x1d8/0x98c kernel/fork.c:2679 __do_sys_clone kernel/fork.c:2820 [inline] __se_sys_clone kernel/fork.c:2788 [inline] __arm64_sys_clone+0x1e0/0x234 kernel/fork.c:2788 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 to a SOFTIRQ-irq-unsafe lock: (fs_reclaim){+.+.}-{0:0} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(fs_reclaim); local_irq_disable(); lock(&sch->q.lock); lock(fs_reclaim); lock(&sch->q.lock); *** DEADLOCK *** 2 locks held by syz-executor.4/5637: #0: ffff800017b9e948 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:74 [inline] #0: ffff800017b9e948 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94 net/core/rtnetlink.c:6094 #1: ffff0000c3612908 (&sch->q.lock){+.-.}-{2:2}, at: sch_tree_lock+0x120/0x1d4 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&sch->q.lock){+.-.}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x54/0x6c kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:355 [inline] dev_reset_queue+0x130/0x1fc net/sched/sch_generic.c:1291 netdev_for_each_tx_queue include/linux/netdevice.h:2453 [inline] dev_deactivate_many+0x540/0xa8c net/sched/sch_generic.c:1359 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1382 linkwatch_do_dev+0x29c/0x3a4 net/core/link_watch.c:166 __linkwatch_run_queue+0x3a0/0x700 net/core/link_watch.c:221 linkwatch_event+0x58/0x68 net/core/link_watch.c:264 process_one_work+0x7ac/0x1404 kernel/workqueue.c:2289 worker_thread+0x8e4/0xfec kernel/workqueue.c:2436 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 IN-SOFTIRQ-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline] _raw_spin_lock+0x54/0x6c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:350 [inline] dequeue_skb net/sched/sch_generic.c:240 [inline] qdisc_restart net/sched/sch_generic.c:397 [inline] __qdisc_run+0x9cc/0x239c net/sched/sch_generic.c:415 qdisc_run+0xc4/0x23c include/net/pkt_sched.h:126 net_tx_action+0x748/0x94c net/core/dev.c:5093 __do_softirq+0x30c/0xea0 kernel/softirq.c:571 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:79 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:84 invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0x28c/0x534 kernel/softirq.c:650 irq_exit_rcu+0x14/0x84 kernel/softirq.c:662 __el1_irq arch/arm64/kernel/entry-common.c:472 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:486 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:491 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:577 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_release+0x528/0xa50 kernel/locking/lockdep.c:5692 rcu_lock_release+0x2c/0x38 include/linux/rcupdate.h:311 rcu_read_unlock include/linux/rcupdate.h:780 [inline] page_ext_put+0xb0/0xc8 mm/page_ext.c:182 page_table_check_set+0x51c/0x5c4 mm/page_table_check.c:126 __page_table_check_pte_set+0x110/0x134 mm/page_table_check.c:199 page_table_check_pte_set include/linux/page_table_check.h:83 [inline] set_pte_at arch/arm64/include/asm/pgtable.h:357 [inline] copy_present_pte mm/memory.c:990 [inline] copy_pte_range mm/memory.c:1081 [inline] copy_pmd_range mm/memory.c:1167 [inline] copy_pud_range mm/memory.c:1204 [inline] copy_p4d_range mm/memory.c:1228 [inline] copy_page_range+0x28b0/0x38d0 mm/memory.c:1326 dup_mmap kernel/fork.c:696 [inline] dup_mm+0xdac/0x1340 kernel/fork.c:1532 copy_mm+0xc0/0x17c kernel/fork.c:1581 copy_process+0x1798/0x38d0 kernel/fork.c:2259 kernel_clone+0x1d8/0x98c kernel/fork.c:2679 __do_sys_clone kernel/fork.c:2820 [inline] __se_sys_clone kernel/fork.c:2788 [inline] __arm64_sys_clone+0x1e0/0x234 kernel/fork.c:2788 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 INITIAL USE at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline] _raw_spin_lock_bh+0x54/0x6c kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:355 [inline] dev_reset_queue+0x130/0x1fc net/sched/sch_generic.c:1291 netdev_for_each_tx_queue include/linux/netdevice.h:2453 [inline] dev_deactivate_many+0x540/0xa8c net/sched/sch_generic.c:1359 dev_deactivate+0x13c/0x1fc net/sched/sch_generic.c:1382 linkwatch_do_dev+0x29c/0x3a4 net/core/link_watch.c:166 __linkwatch_run_queue+0x3a0/0x700 net/core/link_watch.c:221 linkwatch_event+0x58/0x68 net/core/link_watch.c:264 process_one_work+0x7ac/0x1404 kernel/workqueue.c:2289 worker_thread+0x8e4/0xfec kernel/workqueue.c:2436 kthread+0x250/0x2d8 kernel/kthread.c:376 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 } ... key at: [] qdisc_alloc.__key+0x0/0x20 the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (fs_reclaim){+.+.}-{0:0} { HARDIRQ-ON-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 SOFTIRQ-ON-W at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 INITIAL USE at: lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 kmalloc_node_trace+0x44/0x90 mm/slab_common.c:1058 kmalloc_node include/linux/slab.h:575 [inline] kzalloc_node include/linux/slab.h:700 [inline] alloc_worker kernel/workqueue.c:1840 [inline] init_rescuer+0xa4/0x264 kernel/workqueue.c:4269 workqueue_init+0x298/0x5b4 kernel/workqueue.c:6098 kernel_init_freeable+0x33c/0x528 init/main.c:1614 kernel_init+0x24/0x29c init/main.c:1519 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860 } ... key at: [] __fs_reclaim_map+0x0/0xe0 ... acquired at: __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc_node+0xcc/0x1d0 mm/slab_common.c:962 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x84/0x1e4 mm/util.c:581 kvmalloc include/linux/slab.h:706 [inline] get_dist_table+0xa0/0x354 net/sched/sch_netem.c:788 netem_change+0x754/0x1900 net/sched/sch_netem.c:985 netem_init+0x54/0xb8 net/sched/sch_netem.c:1072 qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314 tc_modify_qdisc+0x9f0/0x1840 rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6097 netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2524 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6115 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1354 netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x558/0x844 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2565 __do_sys_sendmsg net/socket.c:2574 [inline] __se_sys_sendmsg net/socket.c:2572 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2572 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 stack backtrace: CPU: 0 PID: 5637 Comm: syz-executor.4 Not tainted 6.1.38-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x5c lib/dump_stack.c:113 __lock_acquire+0x6310/0x764c kernel/locking/lockdep.c:5056 lock_acquire+0x26c/0x7cc kernel/locking/lockdep.c:5669 __fs_reclaim_acquire mm/page_alloc.c:4683 [inline] fs_reclaim_acquire+0x90/0x12c mm/page_alloc.c:4697 might_alloc include/linux/sched/mm.h:271 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x58/0x388 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc_node+0xcc/0x1d0 mm/slab_common.c:962 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x84/0x1e4 mm/util.c:581 kvmalloc include/linux/slab.h:706 [inline] get_dist_table+0xa0/0x354 net/sched/sch_netem.c:788 netem_change+0x754/0x1900 net/sched/sch_netem.c:985 netem_init+0x54/0xb8 net/sched/sch_netem.c:1072 qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314 tc_modify_qdisc+0x9f0/0x1840 rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6097 netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2524 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6115 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1354 netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x558/0x844 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2565 __do_sys_sendmsg net/socket.c:2574 [inline] __se_sys_sendmsg net/socket.c:2572 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2572 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581 BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 5637, name: syz-executor.4 preempt_count: 201, expected: 0 RCU nest depth: 0, expected: 0 INFO: lockdep is turned off. Preemption disabled at: [] sch_tree_lock+0x120/0x1d4 CPU: 0 PID: 5637 Comm: syz-executor.4 Not tainted 6.1.38-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call trace: dump_backtrace+0x1c8/0x1f4 arch/arm64/kernel/stacktrace.c:158 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:165 __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x108/0x170 lib/dump_stack.c:106 dump_stack+0x1c/0x5c lib/dump_stack.c:113 __might_resched+0x37c/0x4d8 kernel/sched/core.c:9941 __might_sleep+0x90/0xe4 kernel/sched/core.c:9870 might_alloc include/linux/sched/mm.h:274 [inline] slab_pre_alloc_hook mm/slab.h:710 [inline] slab_alloc_node mm/slub.c:3318 [inline] __kmem_cache_alloc_node+0x74/0x388 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:954 [inline] __kmalloc_node+0xcc/0x1d0 mm/slab_common.c:962 kmalloc_node include/linux/slab.h:579 [inline] kvmalloc_node+0x84/0x1e4 mm/util.c:581 kvmalloc include/linux/slab.h:706 [inline] get_dist_table+0xa0/0x354 net/sched/sch_netem.c:788 netem_change+0x754/0x1900 net/sched/sch_netem.c:985 netem_init+0x54/0xb8 net/sched/sch_netem.c:1072 qdisc_create+0x70c/0xe64 net/sched/sch_api.c:1314 tc_modify_qdisc+0x9f0/0x1840 rtnetlink_rcv_msg+0x72c/0xd94 net/core/rtnetlink.c:6097 netlink_rcv_skb+0x20c/0x3b8 net/netlink/af_netlink.c:2524 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6115 netlink_unicast_kernel net/netlink/af_netlink.c:1328 [inline] netlink_unicast+0x660/0x8d4 net/netlink/af_netlink.c:1354 netlink_sendmsg+0x834/0xb18 net/netlink/af_netlink.c:1902 sock_sendmsg_nosec net/socket.c:716 [inline] sock_sendmsg net/socket.c:736 [inline] ____sys_sendmsg+0x558/0x844 net/socket.c:2482 ___sys_sendmsg net/socket.c:2536 [inline] __sys_sendmsg+0x26c/0x33c net/socket.c:2565 __do_sys_sendmsg net/socket.c:2574 [inline] __se_sys_sendmsg net/socket.c:2572 [inline] __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2572 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x218 arch/arm64/kernel/syscall.c:206 el0_svc+0x58/0x168 arch/arm64/kernel/entry-common.c:637 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655 el0t_64_sync+0x18c/0x190 arch/arm64/kernel/entry.S:581