BUG: sleeping function called from invalid context at mm/slab.h:565 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 8436, name: syz-executor.2 2 locks held by syz-executor.2/8436: #0: ffffffff896cca20 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff896cca20 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x2f8/0x8c0 net/core/rtnetlink.c:5437 #1: ffffffff89710758 (zones_lock){+...}, at: spin_lock_bh include/linux/spinlock.h:343 [inline] #1: ffffffff89710758 (zones_lock){+...}, at: tcf_ct_flow_table_get+0x9b/0x1240 net/sched/act_ct.c:67 Preemption disabled at: [<0000000000000000>] 0x0 CPU: 0 PID: 8436 Comm: syz-executor.2 Not tainted 5.6.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x128/0x182 lib/dump_stack.c:118 ___might_sleep.cold.99+0x1fa/0x243 kernel/sched/core.c:6798 slab_pre_alloc_hook mm/slab.h:565 [inline] slab_alloc_node mm/slab.c:3227 [inline] kmem_cache_alloc_node_trace+0x276/0x790 mm/slab.c:3593 __do_kmalloc_node mm/slab.c:3615 [inline] __kmalloc_node+0x35/0x60 mm/slab.c:3623 kvmalloc include/linux/mm.h:645 [inline] kvzalloc include/linux/mm.h:653 [inline] bucket_table_alloc+0x52/0x3c0 lib/rhashtable.c:175 rhashtable_init+0x352/0x6d0 lib/rhashtable.c:1054 nf_flow_table_init+0x167/0x2d0 net/netfilter/nf_flow_table_core.c:498 tcf_ct_flow_table_get+0xb86/0x1240 net/sched/act_ct.c:82 tcf_ct_init+0x92f/0x13c9 net/sched/act_ct.c:839 tcf_action_init_1+0x607/0x920 net/sched/act_api.c:945 tcf_action_init+0x152/0x290 net/sched/act_api.c:1001 tcf_action_add+0xd4/0x2e0 net/sched/act_api.c:1411 tc_ctl_action+0x29e/0x398 net/sched/act_api.c:1466 rtnetlink_rcv_msg+0x346/0x8c0 net/core/rtnetlink.c:5440 netlink_rcv_skb+0x119/0x340 net/netlink/af_netlink.c:2478 netlink_unicast_kernel net/netlink/af_netlink.c:1303 [inline] netlink_unicast+0x434/0x630 net/netlink/af_netlink.c:1329 netlink_sendmsg+0x714/0xc60 net/netlink/af_netlink.c:1918 sock_sendmsg_nosec net/socket.c:652 [inline] sock_sendmsg+0xac/0xe0 net/socket.c:672 ____sys_sendmsg+0x54e/0x750 net/socket.c:2343 ___sys_sendmsg+0xe4/0x160 net/socket.c:2397 __sys_sendmsg+0xce/0x170 net/socket.c:2430 do_syscall_64+0xc6/0x5e0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45c4a9 Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f800506fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f80050706d4 RCX: 000000000045c4a9 RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000003 RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff R13: 00000000000009fa R14: 00000000004cc777 R15: 000000000076bf2c