[   76.165705][   T14] cfg80211: failed to load regulatory.db
Warning: Permanently added '10.128.10.1' (ED25519) to the list of known hosts.
executing program
[   81.317795][ T3512] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[   81.327427][ T3512] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3512, name: syz-executor173
[   81.336972][ T3512] preempt_count: 201, expected: 0
[   81.342010][ T3512] RCU nest depth: 0, expected: 0
[   81.346988][ T3512] 2 locks held by syz-executor173/3512:
[   81.352543][ T3512]  #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00
[   81.362076][ T3512]  #1: ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0
[   81.371379][ T3512] Preemption disabled at:
[   81.371388][ T3512] [<0000000000000000>] 0x0
[   81.380176][ T3512] CPU: 0 PID: 3512 Comm: syz-executor173 Not tainted 6.1.45-syzkaller #0
[   81.388607][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   81.398658][ T3512] Call Trace:
[   81.401934][ T3512]  <TASK>
[   81.404862][ T3512]  dump_stack_lvl+0x1e3/0x2cb
[   81.409557][ T3512]  ? nf_tcp_handle_invalid+0x642/0x642
[   81.415026][ T3512]  ? panic+0x75d/0x75d
[   81.419106][ T3512]  __might_resched+0x5cb/0x780
[   81.423880][ T3512]  ? __might_sleep+0xb0/0xb0
[   81.428494][ T3512]  slab_pre_alloc_hook+0x4a/0x2a0
[   81.433538][ T3512]  ? kvmalloc_node+0x6e/0x180
[   81.438218][ T3512]  __kmem_cache_alloc_node+0x47/0x260
[   81.443603][ T3512]  ? kvmalloc_node+0x6e/0x180
[   81.448289][ T3512]  __kmalloc_node+0xa2/0x230
[   81.452890][ T3512]  kvmalloc_node+0x6e/0x180
[   81.457403][ T3512]  get_dist_table+0x91/0x380
[   81.462092][ T3512]  netem_change+0x947/0x1ea0
[   81.466698][ T3512]  ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[   81.472701][ T3512]  ? netem_destroy+0xb0/0xb0
[   81.477393][ T3512]  ? do_raw_spin_unlock+0x137/0x8a0
[   81.482602][ T3512]  ? _raw_spin_unlock_irqrestore+0x8b/0x130
[   81.488509][ T3512]  ? lockdep_hardirqs_on+0x94/0x130
[   81.493732][ T3512]  ? memset+0x1f/0x40
[   81.497748][ T3512]  ? __hrtimer_init+0x181/0x260
[   81.502629][ T3512]  netem_init+0x58/0xb0
[   81.506898][ T3512]  ? qdisc_peek_dequeued+0x220/0x220
[   81.512206][ T3512]  qdisc_create+0x8a1/0x1220
[   81.516830][ T3512]  ? qdisc_notify+0x390/0x390
[   81.521539][ T3512]  tc_modify_qdisc+0x9e0/0x1da0
[   81.526415][ T3512]  ? rcu_lock_release+0x20/0x20
[   81.531304][ T3512]  ? rcu_lock_release+0x20/0x20
[   81.536160][ T3512]  rtnetlink_rcv_msg+0x776/0xf00
[   81.541112][ T3512]  ? rtnetlink_bind+0x80/0x80
[   81.545810][ T3512]  ? stack_trace_save+0x1c0/0x1c0
[   81.550842][ T3512]  ? kernel_text_address+0x9f/0xd0
[   81.555973][ T3512]  ? __kernel_text_address+0x9/0x40
[   81.561180][ T3512]  ? unwind_get_return_address+0x49/0x80
[   81.566820][ T3512]  ? arch_stack_walk+0xf3/0x140
[   81.571687][ T3512]  ? mark_lock+0x9a/0x340
[   81.576026][ T3512]  ? mark_lock+0x9a/0x340
[   81.580363][ T3512]  ? __lock_acquire+0x125b/0x1f80
[   81.585418][ T3512]  netlink_rcv_skb+0x1cd/0x410
[   81.590191][ T3512]  ? rtnetlink_bind+0x80/0x80
[   81.594882][ T3512]  ? netlink_ack+0xe60/0xe60
[   81.599507][ T3512]  netlink_unicast+0x7bf/0x990
[   81.604285][ T3512]  ? netlink_detachskb+0x90/0x90
[   81.609229][ T3512]  ? __virt_addr_valid+0x22b/0x2e0
[   81.614356][ T3512]  ? __phys_addr_symbol+0x2b/0x70
[   81.619393][ T3512]  ? __check_object_size+0x4dd/0xa30
[   81.624688][ T3512]  ? bpf_lsm_netlink_send+0x5/0x10
[   81.629823][ T3512]  netlink_sendmsg+0xa26/0xd60
[   81.634609][ T3512]  ? netlink_getsockopt+0x5b0/0x5b0
[   81.639831][ T3512]  ? aa_sock_msg_perm+0x91/0x150
[   81.644793][ T3512]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   81.650084][ T3512]  ? security_socket_sendmsg+0x7d/0xa0
[   81.655550][ T3512]  ? netlink_getsockopt+0x5b0/0x5b0
[   81.660751][ T3512]  ____sys_sendmsg+0x59e/0x8f0
[   81.665540][ T3512]  ? __sys_sendmsg_sock+0x30/0x30
[   81.670575][ T3512]  __sys_sendmsg+0x2a9/0x390
[   81.675170][ T3512]  ? ____sys_sendmsg+0x8f0/0x8f0
[   81.680148][ T3512]  ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[   81.686145][ T3512]  ? syscall_enter_from_user_mode+0x2e/0x220
[   81.692256][ T3512]  ? lockdep_hardirqs_on+0x94/0x130
[   81.697550][ T3512]  ? syscall_enter_from_user_mode+0x2e/0x220
[   81.703538][ T3512]  do_syscall_64+0x3d/0xb0
[   81.707966][ T3512]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   81.713874][ T3512] RIP: 0033:0x7ff3462945a9
[   81.718295][ T3512] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   81.737903][ T3512] RSP: 002b:00007ffd1761a798 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   81.746322][ T3512] RAX: ffffffffffffffda RBX: 00007ffd1761a968 RCX: 00007ff3462945a9
[   81.754400][ T3512] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[   81.762376][ T3512] RBP: 00007ff346307610 R08: 000000000000000a R09: 00007ffd1761a968
[   81.770350][ T3512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[   81.778323][ T3512] R13: 00007ffd1761a958 R14: 0000000000000001 R15: 0000000000000001
[   81.786311][ T3512]  </TASK>
[   81.789534][ T3512] 
[   81.791886][ T3512] ============================================
[   81.798042][ T3512] WARNING: possible recursive locking detected
[   81.804191][ T3512] 6.1.45-syzkaller #0 Tainted: G        W         
[   81.810701][ T3512] --------------------------------------------
[   81.816855][ T3512] syz-executor173/3512 is trying to acquire lock:
[   81.823268][ T3512] ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x254/0x380
[   81.832202][ T3512] 
[   81.832202][ T3512] but task is already holding lock:
[   81.839569][ T3512] ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0
[   81.848368][ T3512] 
[   81.848368][ T3512] other info that might help us debug this:
[   81.856427][ T3512]  Possible unsafe locking scenario:
[   81.856427][ T3512] 
[   81.863868][ T3512]        CPU0
[   81.867141][ T3512]        ----
[   81.870415][ T3512]   lock(&sch->q.lock);
[   81.874570][ T3512]   lock(&sch->q.lock);
[   81.878722][ T3512] 
[   81.878722][ T3512]  *** DEADLOCK ***
[   81.878722][ T3512] 
[   81.886857][ T3512]  May be due to missing lock nesting notation
[   81.886857][ T3512] 
[   81.895170][ T3512] 2 locks held by syz-executor173/3512:
[   81.900706][ T3512]  #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00
[   81.910113][ T3512]  #1: ffff88814b198908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x17e/0x1ea0
[   81.919359][ T3512] 
[   81.919359][ T3512] stack backtrace:
[   81.925259][ T3512] CPU: 0 PID: 3512 Comm: syz-executor173 Tainted: G        W          6.1.45-syzkaller #0
[   81.935162][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   81.945222][ T3512] Call Trace:
[   81.948501][ T3512]  <TASK>
[   81.951434][ T3512]  dump_stack_lvl+0x1e3/0x2cb
[   81.956135][ T3512]  ? nf_tcp_handle_invalid+0x642/0x642
[   81.961656][ T3512]  ? panic+0x75d/0x75d
[   81.965735][ T3512]  validate_chain+0x4726/0x58e0
[   81.970594][ T3512]  ? kfence_guarded_alloc+0x98c/0xe40
[   81.975982][ T3512]  ? reacquire_held_locks+0x660/0x660
[   81.981360][ T3512]  ? get_alloc_stack_hash+0x2cd/0x6e0
[   81.986736][ T3512]  ? __kfence_alloc+0x340/0x370
[   81.991593][ T3512]  ? kfence_guarded_free+0x7f0/0x7f0
[   81.996892][ T3512]  ? __kfence_alloc+0x261/0x370
[   82.001744][ T3512]  ? __kmem_cache_alloc_node+0x1fa/0x260
[   82.007378][ T3512]  ? __kmalloc_node+0xa2/0x230
[   82.012142][ T3512]  ? kvmalloc_node+0x6e/0x180
[   82.016835][ T3512]  ? get_dist_table+0x91/0x380
[   82.021623][ T3512]  ? netem_change+0x947/0x1ea0
[   82.026401][ T3512]  ? netem_init+0x58/0xb0
[   82.030742][ T3512]  ? qdisc_create+0x8a1/0x1220
[   82.035518][ T3512]  ? tc_modify_qdisc+0x9e0/0x1da0
[   82.040555][ T3512]  ? rtnetlink_rcv_msg+0x776/0xf00
[   82.045669][ T3512]  ? netlink_rcv_skb+0x1cd/0x410
[   82.050607][ T3512]  ? netlink_unicast+0x7bf/0x990
[   82.055565][ T3512]  ? netlink_sendmsg+0xa26/0xd60
[   82.060503][ T3512]  ? ____sys_sendmsg+0x59e/0x8f0
[   82.065437][ T3512]  ? __sys_sendmsg+0x2a9/0x390
[   82.070197][ T3512]  ? do_syscall_64+0x3d/0xb0
[   82.074796][ T3512]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   82.080900][ T3512]  ? mark_lock+0x9a/0x340
[   82.085242][ T3512]  __lock_acquire+0x125b/0x1f80
[   82.090101][ T3512]  lock_acquire+0x1f8/0x5a0
[   82.094602][ T3512]  ? get_dist_table+0x254/0x380
[   82.099463][ T3512]  ? read_lock_is_recursive+0x10/0x10
[   82.104840][ T3512]  ? kvmalloc_node+0x6e/0x180
[   82.109516][ T3512]  ? get_dist_table+0x254/0x380
[   82.114392][ T3512]  ? __bpf_trace_softirq+0x10/0x10
[   82.119508][ T3512]  ? kvmalloc_node+0x6e/0x180
[   82.124184][ T3512]  ? get_dist_table+0x254/0x380
[   82.129039][ T3512]  _raw_spin_lock_bh+0x31/0x40
[   82.133819][ T3512]  ? get_dist_table+0x254/0x380
[   82.138688][ T3512]  get_dist_table+0x254/0x380
[   82.143464][ T3512]  netem_change+0x947/0x1ea0
[   82.148073][ T3512]  ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[   82.154058][ T3512]  ? netem_destroy+0xb0/0xb0
[   82.158656][ T3512]  ? do_raw_spin_unlock+0x137/0x8a0
[   82.163855][ T3512]  ? _raw_spin_unlock_irqrestore+0x8b/0x130
[   82.169752][ T3512]  ? lockdep_hardirqs_on+0x94/0x130
[   82.174959][ T3512]  ? memset+0x1f/0x40
[   82.178946][ T3512]  ? __hrtimer_init+0x181/0x260
[   82.183817][ T3512]  netem_init+0x58/0xb0
[   82.187977][ T3512]  ? qdisc_peek_dequeued+0x220/0x220
[   82.193272][ T3512]  qdisc_create+0x8a1/0x1220
[   82.197881][ T3512]  ? qdisc_notify+0x390/0x390
[   82.202584][ T3512]  tc_modify_qdisc+0x9e0/0x1da0
[   82.207457][ T3512]  ? rcu_lock_release+0x20/0x20
[   82.212330][ T3512]  ? rcu_lock_release+0x20/0x20
[   82.217198][ T3512]  rtnetlink_rcv_msg+0x776/0xf00
[   82.222143][ T3512]  ? rtnetlink_bind+0x80/0x80
[   82.226826][ T3512]  ? stack_trace_save+0x1c0/0x1c0
[   82.231854][ T3512]  ? kernel_text_address+0x9f/0xd0
[   82.236985][ T3512]  ? __kernel_text_address+0x9/0x40
[   82.242193][ T3512]  ? unwind_get_return_address+0x49/0x80
[   82.247827][ T3512]  ? arch_stack_walk+0xf3/0x140
[   82.252681][ T3512]  ? mark_lock+0x9a/0x340
[   82.257016][ T3512]  ? mark_lock+0x9a/0x340
[   82.261349][ T3512]  ? __lock_acquire+0x125b/0x1f80
[   82.266385][ T3512]  netlink_rcv_skb+0x1cd/0x410
[   82.271145][ T3512]  ? rtnetlink_bind+0x80/0x80
[   82.275822][ T3512]  ? netlink_ack+0xe60/0xe60
[   82.280418][ T3512]  netlink_unicast+0x7bf/0x990
[   82.285188][ T3512]  ? netlink_detachskb+0x90/0x90
[   82.290135][ T3512]  ? __virt_addr_valid+0x22b/0x2e0
[   82.295253][ T3512]  ? __phys_addr_symbol+0x2b/0x70
[   82.300287][ T3512]  ? __check_object_size+0x4dd/0xa30
[   82.305576][ T3512]  ? bpf_lsm_netlink_send+0x5/0x10
[   82.310692][ T3512]  netlink_sendmsg+0xa26/0xd60
[   82.315461][ T3512]  ? netlink_getsockopt+0x5b0/0x5b0
[   82.320660][ T3512]  ? aa_sock_msg_perm+0x91/0x150
[   82.325600][ T3512]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   82.330885][ T3512]  ? security_socket_sendmsg+0x7d/0xa0
[   82.336349][ T3512]  ? netlink_getsockopt+0x5b0/0x5b0
[   82.341547][ T3512]  ____sys_sendmsg+0x59e/0x8f0
[   82.346316][ T3512]  ? __sys_sendmsg_sock+0x30/0x30
[   82.351349][ T3512]  __sys_sendmsg+0x2a9/0x390
[   82.355938][ T3512]  ? ____sys_sendmsg+0x8f0/0x8f0
[   82.360888][ T3512]  ? lockdep_hardirqs_on_prepare+0x438/0x7a0
[   82.366873][ T3512]  ? syscall_enter_from_user_mode+0x2e/0x220
[   82.372857][ T3512]  ? lockdep_hardirqs_on+0x94/0x130
[   82.378060][ T3512]  ? syscall_enter_from_user_mode+0x2e/0x220
[   82.384054][ T3512]  do_syscall_64+0x3d/0xb0
[   82.388480][ T3512]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   82.394382][ T3512] RIP: 0033:0x7ff3462945a9
[   82.398801][ T3512] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   82.418406][ T3512] RSP: 002b:00007ffd1761a798 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   82.426819][ T3512] RAX: ffffffffffffffda RBX: 00007ffd1761a968 RCX: 00007ff3462945a9
[   82.434804][ T3512] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003
[   82.442781][ T3512] RBP: 00007ff346307610 R08: 000000000000000a R09: 00007ffd1761a968
[   82.450752][ T3512] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[   82.458722][ T3512] R13: 00007ffd1761a958 R14: 0000000000000001 R15: 0000000000000001
[   82.466789][ T3512]  </TASK>