Warning: Permanently added '10.128.0.245' (ED25519) to the list of known hosts.
executing program
[   37.518508][ T3962] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   37.520675][ T3962] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3962, name: syz-executor301
[   37.522603][ T3962] 2 locks held by syz-executor301/3962:
[   37.523787][ T3962]  #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac
[   37.526080][ T3962]  #1: ffff0000cb3f7908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   37.528188][ T3962] Preemption disabled at:
[   37.528201][ T3962] [<ffff800010045e3c>] netem_change+0x22c/0x1a90
[   37.530427][ T3962] CPU: 1 PID: 3962 Comm: syz-executor301 Not tainted 5.15.126-syzkaller-00092-g24c4de4069cb #0
[   37.532518][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   37.534674][ T3962] Call trace:
[   37.535346][ T3962]  dump_backtrace+0x0/0x530
[   37.536407][ T3962]  show_stack+0x2c/0x3c
[   37.537354][ T3962]  dump_stack_lvl+0x108/0x170
[   37.538304][ T3962]  dump_stack+0x1c/0x58
[   37.539188][ T3962]  ___might_sleep+0x380/0x4dc
[   37.540197][ T3962]  __might_sleep+0x98/0xf0
[   37.541187][ T3962]  slab_pre_alloc_hook+0x58/0xe8
[   37.542239][ T3962]  __kmalloc_node+0xbc/0x5b8
[   37.543210][ T3962]  kvmalloc_node+0x88/0x204
[   37.544230][ T3962]  get_dist_table+0x9c/0x2a4
[   37.545183][ T3962]  netem_change+0x7cc/0x1a90
[   37.546190][ T3962]  netem_init+0x54/0xb8
[   37.547076][ T3962]  qdisc_create+0x6fc/0xf44
[   37.548058][ T3962]  tc_modify_qdisc+0x8dc/0x1344
[   37.549056][ T3962]  rtnetlink_rcv_msg+0xa74/0xdac
[   37.550123][ T3962]  netlink_rcv_skb+0x20c/0x3b8
[   37.551171][ T3962]  rtnetlink_rcv+0x28/0x38
[   37.552068][ T3962]  netlink_unicast+0x664/0x938
[   37.553137][ T3962]  netlink_sendmsg+0x844/0xb38
[   37.554083][ T3962]  ____sys_sendmsg+0x584/0x870
[   37.555026][ T3962]  ___sys_sendmsg+0x214/0x294
[   37.556090][ T3962]  __arm64_sys_sendmsg+0x1ac/0x25c
[   37.557173][ T3962]  invoke_syscall+0x98/0x2b8
[   37.558231][ T3962]  el0_svc_common+0x138/0x258
[   37.559202][ T3962]  do_el0_svc+0x58/0x14c
[   37.560119][ T3962]  el0_svc+0x7c/0x1f0
[   37.561027][ T3962]  el0t_64_sync_handler+0x84/0xe4
[   37.562054][ T3962]  el0t_64_sync+0x1a0/0x1a4
[   37.563075][ T3962] 
[   37.563540][ T3962] ============================================
[   37.564849][ T3962] WARNING: possible recursive locking detected
[   37.566181][ T3962] 5.15.126-syzkaller-00092-g24c4de4069cb #0 Tainted: G        W        
[   37.568038][ T3962] --------------------------------------------
[   37.569253][ T3962] syz-executor301/3962 is trying to acquire lock:
[   37.570637][ T3962] ffff0000cb3f7908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1f0/0x2a4
[   37.572532][ T3962] 
[   37.572532][ T3962] but task is already holding lock:
[   37.574134][ T3962] ffff0000cb3f7908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   37.575975][ T3962] 
[   37.575975][ T3962] other info that might help us debug this:
[   37.577676][ T3962]  Possible unsafe locking scenario:
[   37.577676][ T3962] 
[   37.579266][ T3962]        CPU0
[   37.579931][ T3962]        ----
[   37.580698][ T3962]   lock(&sch->q.lock);
[   37.581577][ T3962]   lock(&sch->q.lock);
[   37.582472][ T3962] 
[   37.582472][ T3962]  *** DEADLOCK ***
[   37.582472][ T3962] 
[   37.584201][ T3962]  May be due to missing lock nesting notation
[   37.584201][ T3962] 
[   37.586051][ T3962] 2 locks held by syz-executor301/3962:
[   37.587305][ T3962]  #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac
[   37.589379][ T3962]  #1: ffff0000cb3f7908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   37.591229][ T3962] 
[   37.591229][ T3962] stack backtrace:
[   37.592429][ T3962] CPU: 1 PID: 3962 Comm: syz-executor301 Tainted: G        W         5.15.126-syzkaller-00092-g24c4de4069cb #0
[   37.594900][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   37.597008][ T3962] Call trace:
[   37.597682][ T3962]  dump_backtrace+0x0/0x530
[   37.598618][ T3962]  show_stack+0x2c/0x3c
[   37.599457][ T3962]  dump_stack_lvl+0x108/0x170
[   37.600463][ T3962]  dump_stack+0x1c/0x58
[   37.601354][ T3962]  __lock_acquire+0x62b4/0x7620
[   37.602451][ T3962]  lock_acquire+0x240/0x77c
[   37.603405][ T3962]  _raw_spin_lock_bh+0x124/0x1c4
[   37.604450][ T3962]  get_dist_table+0x1f0/0x2a4
[   37.605436][ T3962]  netem_change+0x7cc/0x1a90
[   37.606425][ T3962]  netem_init+0x54/0xb8
[   37.607271][ T3962]  qdisc_create+0x6fc/0xf44
[   37.608287][ T3962]  tc_modify_qdisc+0x8dc/0x1344
[   37.609304][ T3962]  rtnetlink_rcv_msg+0xa74/0xdac
[   37.610393][ T3962]  netlink_rcv_skb+0x20c/0x3b8
[   37.611372][ T3962]  rtnetlink_rcv+0x28/0x38
[   37.612308][ T3962]  netlink_unicast+0x664/0x938
[   37.613294][ T3962]  netlink_sendmsg+0x844/0xb38
[   37.614342][ T3962]  ____sys_sendmsg+0x584/0x870
[   37.615290][ T3962]  ___sys_sendmsg+0x214/0x294
[   37.616280][ T3962]  __arm64_sys_sendmsg+0x1ac/0x25c
[   37.617380][ T3962]  invoke_syscall+0x98/0x2b8
[   37.618369][ T3962]  el0_svc_common+0x138/0x258
[   37.619338][ T3962]  do_el0_svc+0x58/0x14c
[   37.620266][ T3962]  el0_svc+0x7c/0x1f0
[   37.621083][ T3962]  el0t_64_sync_handler+0x84/0xe4
[   37.622122][ T3962]  el0t_64_sync+0x1a0/0x1a4