Warning: Permanently added '10.128.0.179' (ED25519) to the list of known hosts.
executing program
[   47.544379][ T3968] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   47.546939][ T3968] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3968, name: syz-executor134
[   47.549364][ T3968] 2 locks held by syz-executor134/3968:
[   47.550863][ T3968]  #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac
[   47.553368][ T3968]  #1: ffff0000caede108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   47.555747][ T3968] Preemption disabled at:
[   47.555760][ T3968] [<ffff800010045e3c>] netem_change+0x22c/0x1a90
[   47.558592][ T3968] CPU: 0 PID: 3968 Comm: syz-executor134 Not tainted 5.15.126-syzkaller-00092-g24c4de4069cb #0
[   47.561361][ T3968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   47.564085][ T3968] Call trace:
[   47.564932][ T3968]  dump_backtrace+0x0/0x530
[   47.566142][ T3968]  show_stack+0x2c/0x3c
[   47.567291][ T3968]  dump_stack_lvl+0x108/0x170
[   47.568573][ T3968]  dump_stack+0x1c/0x58
[   47.569685][ T3968]  ___might_sleep+0x380/0x4dc
[   47.570927][ T3968]  __might_sleep+0x98/0xf0
[   47.572108][ T3968]  slab_pre_alloc_hook+0x58/0xe8
[   47.573431][ T3968]  __kmalloc_node+0xbc/0x5b8
[   47.574664][ T3968]  kvmalloc_node+0x88/0x204
[   47.575894][ T3968]  get_dist_table+0x9c/0x2a4
[   47.577152][ T3968]  netem_change+0x7cc/0x1a90
[   47.578372][ T3968]  netem_init+0x54/0xb8
[   47.579460][ T3968]  qdisc_create+0x6fc/0xf44
[   47.580693][ T3968]  tc_modify_qdisc+0x8dc/0x1344
[   47.582031][ T3968]  rtnetlink_rcv_msg+0xa74/0xdac
[   47.583384][ T3968]  netlink_rcv_skb+0x20c/0x3b8
[   47.584721][ T3968]  rtnetlink_rcv+0x28/0x38
[   47.585910][ T3968]  netlink_unicast+0x664/0x938
[   47.587272][ T3968]  netlink_sendmsg+0x844/0xb38
[   47.588621][ T3968]  ____sys_sendmsg+0x584/0x870
[   47.589897][ T3968]  ___sys_sendmsg+0x214/0x294
[   47.591204][ T3968]  __arm64_sys_sendmsg+0x1ac/0x25c
[   47.592656][ T3968]  invoke_syscall+0x98/0x2b8
[   47.593916][ T3968]  el0_svc_common+0x138/0x258
[   47.595225][ T3968]  do_el0_svc+0x58/0x14c
[   47.596430][ T3968]  el0_svc+0x7c/0x1f0
[   47.597530][ T3968]  el0t_64_sync_handler+0x84/0xe4
[   47.598955][ T3968]  el0t_64_sync+0x1a0/0x1a4
[   47.600339][ T3968] 
[   47.600961][ T3968] ============================================
[   47.602647][ T3968] WARNING: possible recursive locking detected
[   47.604342][ T3968] 5.15.126-syzkaller-00092-g24c4de4069cb #0 Tainted: G        W        
[   47.606567][ T3968] --------------------------------------------
[   47.608235][ T3968] syz-executor134/3968 is trying to acquire lock:
[   47.609929][ T3968] ffff0000caede108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1f0/0x2a4
[   47.612237][ T3968] 
[   47.612237][ T3968] but task is already holding lock:
[   47.614248][ T3968] ffff0000caede108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   47.616614][ T3968] 
[   47.616614][ T3968] other info that might help us debug this:
[   47.618735][ T3968]  Possible unsafe locking scenario:
[   47.618735][ T3968] 
[   47.620757][ T3968]        CPU0
[   47.621617][ T3968]        ----
[   47.622503][ T3968]   lock(&sch->q.lock);
[   47.623615][ T3968]   lock(&sch->q.lock);
[   47.624700][ T3968] 
[   47.624700][ T3968]  *** DEADLOCK ***
[   47.624700][ T3968] 
[   47.626840][ T3968]  May be due to missing lock nesting notation
[   47.626840][ T3968] 
[   47.629086][ T3968] 2 locks held by syz-executor134/3968:
[   47.630576][ T3968]  #0: ffff8000169e74a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac
[   47.633121][ T3968]  #1: ffff0000caede108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   47.635556][ T3968] 
[   47.635556][ T3968] stack backtrace:
[   47.637110][ T3968] CPU: 0 PID: 3968 Comm: syz-executor134 Tainted: G        W         5.15.126-syzkaller-00092-g24c4de4069cb #0
[   47.640221][ T3968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   47.642843][ T3968] Call trace:
[   47.643675][ T3968]  dump_backtrace+0x0/0x530
[   47.644864][ T3968]  show_stack+0x2c/0x3c
[   47.645927][ T3968]  dump_stack_lvl+0x108/0x170
[   47.647162][ T3968]  dump_stack+0x1c/0x58
[   47.648260][ T3968]  __lock_acquire+0x62b4/0x7620
[   47.649538][ T3968]  lock_acquire+0x240/0x77c
[   47.650734][ T3968]  _raw_spin_lock_bh+0x124/0x1c4
[   47.652003][ T3968]  get_dist_table+0x1f0/0x2a4
[   47.653259][ T3968]  netem_change+0x7cc/0x1a90
[   47.654459][ T3968]  netem_init+0x54/0xb8
[   47.655585][ T3968]  qdisc_create+0x6fc/0xf44
[   47.656791][ T3968]  tc_modify_qdisc+0x8dc/0x1344
[   47.658083][ T3968]  rtnetlink_rcv_msg+0xa74/0xdac
[   47.659388][ T3968]  netlink_rcv_skb+0x20c/0x3b8
[   47.660620][ T3968]  rtnetlink_rcv+0x28/0x38
[   47.661752][ T3968]  netlink_unicast+0x664/0x938
[   47.663008][ T3968]  netlink_sendmsg+0x844/0xb38
[   47.664323][ T3968]  ____sys_sendmsg+0x584/0x870
[   47.665616][ T3968]  ___sys_sendmsg+0x214/0x294
[   47.666827][ T3968]  __arm64_sys_sendmsg+0x1ac/0x25c
[   47.668178][ T3968]  invoke_syscall+0x98/0x2b8
[   47.669392][ T3968]  el0_svc_common+0x138/0x258
[   47.670635][ T3968]  do_el0_svc+0x58/0x14c
[   47.671801][ T3968]  el0_svc+0x7c/0x1f0
[   47.672852][ T3968]  el0t_64_sync_handler+0x84/0xe4
[   47.674195][ T3968]  el0t_64_sync+0x1a0/0x1a4