Warning: Permanently added '10.128.0.251' (ED25519) to the list of known hosts.
executing program
[   38.287050][ T4219] netlink: 4 bytes leftover after parsing attributes in process `syz-executor660'.
[   38.289759][ T4219] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[   38.292286][ T4219] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4219, name: syz-executor660
[   38.294765][ T4219] preempt_count: 201, expected: 0
[   38.296059][ T4219] RCU nest depth: 0, expected: 0
[   38.297326][ T4219] 2 locks held by syz-executor660/4219:
[   38.298704][ T4219]  #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94
[   38.301196][ T4219]  #1: ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   38.303619][ T4219] Preemption disabled at:
[   38.303630][ T4219] [<ffff8000106c9e9c>] sch_tree_lock+0x120/0x1d4
[   38.306328][ T4219] CPU: 1 PID: 4219 Comm: syz-executor660 Not tainted 6.1.45-syzkaller #0
[   38.308469][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   38.311096][ T4219] Call trace:
[   38.311923][ T4219]  dump_backtrace+0x1c8/0x1f4
[   38.313149][ T4219]  show_stack+0x2c/0x3c
[   38.314227][ T4219]  dump_stack_lvl+0x108/0x170
[   38.315549][ T4219]  dump_stack+0x1c/0x58
[   38.316647][ T4219]  __might_resched+0x37c/0x4d8
[   38.317906][ T4219]  __might_sleep+0x90/0xe4
[   38.319097][ T4219]  __kmem_cache_alloc_node+0x74/0x388
[   38.320551][ T4219]  __kmalloc_node+0xcc/0x1d0
[   38.321802][ T4219]  kvmalloc_node+0x84/0x1e4
[   38.323002][ T4219]  get_dist_table+0xa0/0x354
[   38.324212][ T4219]  netem_change+0x7a4/0x1900
[   38.325427][ T4219]  netem_init+0x54/0xb8
[   38.326579][ T4219]  qdisc_create+0x70c/0xe64
[   38.327742][ T4219]  tc_modify_qdisc+0x9f0/0x1840
[   38.329088][ T4219]  rtnetlink_rcv_msg+0x72c/0xd94
[   38.330431][ T4219]  netlink_rcv_skb+0x20c/0x3b8
[   38.331688][ T4219]  rtnetlink_rcv+0x28/0x38
[   38.332911][ T4219]  netlink_unicast+0x660/0x8d4
[   38.334152][ T4219]  netlink_sendmsg+0x834/0xb18
[   38.335399][ T4219]  ____sys_sendmsg+0x558/0x844
[   38.336666][ T4219]  __sys_sendmsg+0x26c/0x33c
[   38.337876][ T4219]  __arm64_sys_sendmsg+0x80/0x94
[   38.339262][ T4219]  invoke_syscall+0x98/0x2c0
[   38.340479][ T4219]  el0_svc_common+0x138/0x258
[   38.341759][ T4219]  do_el0_svc+0x64/0x218
[   38.342921][ T4219]  el0_svc+0x58/0x168
[   38.344001][ T4219]  el0t_64_sync_handler+0x84/0xf0
[   38.345325][ T4219]  el0t_64_sync+0x18c/0x190
[   38.346730][ T4219] 
[   38.347349][ T4219] ============================================
[   38.348904][ T4219] WARNING: possible recursive locking detected
[   38.350519][ T4219] 6.1.45-syzkaller #0 Tainted: G        W         
[   38.352231][ T4219] --------------------------------------------
[   38.353800][ T4219] syz-executor660/4219 is trying to acquire lock:
[   38.355520][ T4219] ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354
[   38.357890][ T4219] 
[   38.357890][ T4219] but task is already holding lock:
[   38.359881][ T4219] ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   38.362256][ T4219] 
[   38.362256][ T4219] other info that might help us debug this:
[   38.364385][ T4219]  Possible unsafe locking scenario:
[   38.364385][ T4219] 
[   38.366406][ T4219]        CPU0
[   38.367277][ T4219]        ----
[   38.368118][ T4219]   lock(&sch->q.lock);
[   38.369234][ T4219]   lock(&sch->q.lock);
[   38.370357][ T4219] 
[   38.370357][ T4219]  *** DEADLOCK ***
[   38.370357][ T4219] 
[   38.372595][ T4219]  May be due to missing lock nesting notation
[   38.372595][ T4219] 
[   38.374851][ T4219] 2 locks held by syz-executor660/4219:
[   38.376352][ T4219]  #0: ffff800017e6fdc8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94
[   38.378985][ T4219]  #1: ffff0000d4f8c108 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   38.381502][ T4219] 
[   38.381502][ T4219] stack backtrace:
[   38.382998][ T4219] CPU: 1 PID: 4219 Comm: syz-executor660 Tainted: G        W          6.1.45-syzkaller #0
[   38.385601][ T4219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   38.388218][ T4219] Call trace:
[   38.389066][ T4219]  dump_backtrace+0x1c8/0x1f4
[   38.390348][ T4219]  show_stack+0x2c/0x3c
[   38.391414][ T4219]  dump_stack_lvl+0x108/0x170
[   38.392643][ T4219]  dump_stack+0x1c/0x58
[   38.393752][ T4219]  __lock_acquire+0x6310/0x764c
[   38.395090][ T4219]  lock_acquire+0x26c/0x7cc
[   38.396251][ T4219]  _raw_spin_lock_bh+0x54/0x6c
[   38.397452][ T4219]  get_dist_table+0x240/0x354
[   38.398702][ T4219]  netem_change+0x7a4/0x1900
[   38.399960][ T4219]  netem_init+0x54/0xb8
[   38.401074][ T4219]  qdisc_create+0x70c/0xe64
[   38.402244][ T4219]  tc_modify_qdisc+0x9f0/0x1840
[   38.403649][ T4219]  rtnetlink_rcv_msg+0x72c/0xd94
[   38.405016][ T4219]  netlink_rcv_skb+0x20c/0x3b8
[   38.406283][ T4219]  rtnetlink_rcv+0x28/0x38
[   38.407482][ T4219]  netlink_unicast+0x660/0x8d4
[   38.408756][ T4219]  netlink_sendmsg+0x834/0xb18
[   38.410028][ T4219]  ____sys_sendmsg+0x558/0x844
[   38.411283][ T4219]  __sys_sendmsg+0x26c/0x33c
[   38.412519][ T4219]  __arm64_sys_sendmsg+0x80/0x94
[   38.413846][ T4219]  invoke_syscall+0x98/0x2c0
[   38.415077][ T4219]  el0_svc_common+0x138/0x258
[   38.416346][ T4219]  do_el0_svc+0x64/0x218
[   38.417484][ T4219]  el0_svc+0x58/0x168
[   38.418544][ T4219]  el0t_64_sync_handler+0x84/0xf0
[   38.419905][ T4219]  el0t_64_sync+0x18c/0x190