Warning: Permanently added '10.128.1.135' (ED25519) to the list of known hosts.
executing program
[   42.930019][ T3962] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   42.932476][ T3962] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3962, name: syz-executor192
[   42.934859][ T3962] 2 locks held by syz-executor192/3962:
[   42.936271][ T3962]  #0: ffff8000169e7428 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac
[   42.938635][ T3962]  #1: ffff0000c120d108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   42.940907][ T3962] Preemption disabled at:
[   42.940920][ T3962] [<ffff800010048d44>] netem_change+0x22c/0x1a90
[   42.943590][ T3962] CPU: 1 PID: 3962 Comm: syz-executor192 Not tainted 5.15.125-syzkaller #0
[   42.945670][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   42.948165][ T3962] Call trace:
[   42.948994][ T3962]  dump_backtrace+0x0/0x530
[   42.950131][ T3962]  show_stack+0x2c/0x3c
[   42.951141][ T3962]  dump_stack_lvl+0x108/0x170
[   42.952279][ T3962]  dump_stack+0x1c/0x58
[   42.953310][ T3962]  ___might_sleep+0x380/0x4dc
[   42.954481][ T3962]  __might_sleep+0x98/0xf0
[   42.955591][ T3962]  slab_pre_alloc_hook+0x58/0xe8
[   42.956797][ T3962]  __kmalloc_node+0xbc/0x5b8
[   42.957968][ T3962]  kvmalloc_node+0x88/0x204
[   42.959125][ T3962]  get_dist_table+0x9c/0x2a4
[   42.960259][ T3962]  netem_change+0x7cc/0x1a90
[   42.961367][ T3962]  netem_init+0x54/0xb8
[   42.962415][ T3962]  qdisc_create+0x6fc/0xf44
[   42.963519][ T3962]  tc_modify_qdisc+0x8dc/0x1344
[   42.964734][ T3962]  rtnetlink_rcv_msg+0xa74/0xdac
[   42.965936][ T3962]  netlink_rcv_skb+0x20c/0x3b8
[   42.967102][ T3962]  rtnetlink_rcv+0x28/0x38
[   42.968229][ T3962]  netlink_unicast+0x664/0x938
[   42.969419][ T3962]  netlink_sendmsg+0x844/0xb38
[   42.970600][ T3962]  ____sys_sendmsg+0x584/0x870
[   42.971800][ T3962]  ___sys_sendmsg+0x214/0x294
[   42.972952][ T3962]  __arm64_sys_sendmsg+0x1ac/0x25c
[   42.974244][ T3962]  invoke_syscall+0x98/0x2b8
[   42.975346][ T3962]  el0_svc_common+0x138/0x258
[   42.976501][ T3962]  do_el0_svc+0x58/0x14c
[   42.977537][ T3962]  el0_svc+0x7c/0x1f0
[   42.978455][ T3962]  el0t_64_sync_handler+0x84/0xe4
[   42.979718][ T3962]  el0t_64_sync+0x1a0/0x1a4
[   42.981031][ T3962] 
[   42.981582][ T3962] ============================================
[   42.983077][ T3962] WARNING: possible recursive locking detected
[   42.984604][ T3962] 5.15.125-syzkaller #0 Tainted: G        W        
[   42.986360][ T3962] --------------------------------------------
[   42.987895][ T3962] syz-executor192/3962 is trying to acquire lock:
[   42.989502][ T3962] ffff0000c120d108 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1f0/0x2a4
[   42.991837][ T3962] 
[   42.991837][ T3962] but task is already holding lock:
[   42.993665][ T3962] ffff0000c120d108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   42.995893][ T3962] 
[   42.995893][ T3962] other info that might help us debug this:
[   42.997899][ T3962]  Possible unsafe locking scenario:
[   42.997899][ T3962] 
[   42.999812][ T3962]        CPU0
[   43.000653][ T3962]        ----
[   43.001471][ T3962]   lock(&sch->q.lock);
[   43.002481][ T3962]   lock(&sch->q.lock);
[   43.003511][ T3962] 
[   43.003511][ T3962]  *** DEADLOCK ***
[   43.003511][ T3962] 
[   43.005607][ T3962]  May be due to missing lock nesting notation
[   43.005607][ T3962] 
[   43.007695][ T3962] 2 locks held by syz-executor192/3962:
[   43.009021][ T3962]  #0: ffff8000169e7428 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0xa2c/0xdac
[   43.011422][ T3962]  #1: ffff0000c120d108 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x22c/0x1a90
[   43.013829][ T3962] 
[   43.013829][ T3962] stack backtrace:
[   43.015364][ T3962] CPU: 1 PID: 3962 Comm: syz-executor192 Tainted: G        W         5.15.125-syzkaller #0
[   43.018062][ T3962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   43.020570][ T3962] Call trace:
[   43.021444][ T3962]  dump_backtrace+0x0/0x530
[   43.022637][ T3962]  show_stack+0x2c/0x3c
[   43.023745][ T3962]  dump_stack_lvl+0x108/0x170
[   43.024995][ T3962]  dump_stack+0x1c/0x58
[   43.026105][ T3962]  __lock_acquire+0x62b4/0x7620
[   43.027317][ T3962]  lock_acquire+0x240/0x77c
[   43.028447][ T3962]  _raw_spin_lock_bh+0x124/0x1c4
[   43.029792][ T3962]  get_dist_table+0x1f0/0x2a4
[   43.031028][ T3962]  netem_change+0x7cc/0x1a90
[   43.032186][ T3962]  netem_init+0x54/0xb8
[   43.033219][ T3962]  qdisc_create+0x6fc/0xf44
[   43.034326][ T3962]  tc_modify_qdisc+0x8dc/0x1344
[   43.035534][ T3962]  rtnetlink_rcv_msg+0xa74/0xdac
[   43.036750][ T3962]  netlink_rcv_skb+0x20c/0x3b8
[   43.037942][ T3962]  rtnetlink_rcv+0x28/0x38
[   43.039025][ T3962]  netlink_unicast+0x664/0x938
[   43.040205][ T3962]  netlink_sendmsg+0x844/0xb38
[   43.041392][ T3962]  ____sys_sendmsg+0x584/0x870
[   43.042540][ T3962]  ___sys_sendmsg+0x214/0x294
[   43.043702][ T3962]  __arm64_sys_sendmsg+0x1ac/0x25c
[   43.044976][ T3962]  invoke_syscall+0x98/0x2b8
[   43.046107][ T3962]  el0_svc_common+0x138/0x258
[   43.047344][ T3962]  do_el0_svc+0x58/0x14c
[   43.048455][ T3962]  el0_svc+0x7c/0x1f0
[   43.049463][ T3962]  el0t_64_sync_handler+0x84/0xe4
[   43.050727][ T3962]  el0t_64_sync+0x1a0/0x1a4