Warning: Permanently added '10.128.0.62' (ED25519) to the list of known hosts.
executing program
[   32.005642][ T4223] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[   32.008241][ T4223] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4223, name: syz-executor717
[   32.010720][ T4223] preempt_count: 201, expected: 0
[   32.012094][ T4223] RCU nest depth: 0, expected: 0
[   32.013384][ T4223] 2 locks held by syz-executor717/4223:
[   32.014937][ T4223]  #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94
[   32.017389][ T4223]  #1: ffff0000d4efa908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   32.019759][ T4223] Preemption disabled at:
[   32.019769][ T4223] [<ffff8000106c72ec>] sch_tree_lock+0x120/0x1d4
[   32.022441][ T4223] CPU: 0 PID: 4223 Comm: syz-executor717 Not tainted 6.1.42-syzkaller #0
[   32.024591][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   32.027200][ T4223] Call trace:
[   32.028025][ T4223]  dump_backtrace+0x1c8/0x1f4
[   32.029255][ T4223]  show_stack+0x2c/0x3c
[   32.030339][ T4223]  dump_stack_lvl+0x108/0x170
[   32.031593][ T4223]  dump_stack+0x1c/0x58
[   32.032718][ T4223]  __might_resched+0x37c/0x4d8
[   32.033884][ T4223]  __might_sleep+0x90/0xe4
[   32.035008][ T4223]  __kmem_cache_alloc_node+0x74/0x388
[   32.036406][ T4223]  __kmalloc_node+0xcc/0x1d0
[   32.037605][ T4223]  kvmalloc_node+0x84/0x1e4
[   32.038744][ T4223]  get_dist_table+0xa0/0x354
[   32.039960][ T4223]  netem_change+0x754/0x1900
[   32.041136][ T4223]  netem_init+0x54/0xb8
[   32.042211][ T4223]  qdisc_create+0x70c/0xe64
[   32.043370][ T4223]  tc_modify_qdisc+0x9f0/0x1840
[   32.044593][ T4223]  rtnetlink_rcv_msg+0x72c/0xd94
[   32.045875][ T4223]  netlink_rcv_skb+0x20c/0x3b8
[   32.047085][ T4223]  rtnetlink_rcv+0x28/0x38
[   32.048197][ T4223]  netlink_unicast+0x660/0x8d4
[   32.049465][ T4223]  netlink_sendmsg+0x834/0xb18
[   32.050699][ T4223]  ____sys_sendmsg+0x558/0x844
[   32.051904][ T4223]  __sys_sendmsg+0x26c/0x33c
[   32.053090][ T4223]  __arm64_sys_sendmsg+0x80/0x94
[   32.054360][ T4223]  invoke_syscall+0x98/0x2c0
[   32.055601][ T4223]  el0_svc_common+0x138/0x258
[   32.056861][ T4223]  do_el0_svc+0x64/0x218
[   32.057933][ T4223]  el0_svc+0x58/0x168
[   32.058964][ T4223]  el0t_64_sync_handler+0x84/0xf0
[   32.060291][ T4223]  el0t_64_sync+0x18c/0x190
[   32.061548][ T4223] 
[   32.062083][ T4223] ============================================
[   32.063665][ T4223] WARNING: possible recursive locking detected
[   32.065254][ T4223] 6.1.42-syzkaller #0 Tainted: G        W         
[   32.066885][ T4223] --------------------------------------------
[   32.068475][ T4223] syz-executor717/4223 is trying to acquire lock:
[   32.070202][ T4223] ffff0000d4efa908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354
[   32.072483][ T4223] 
[   32.072483][ T4223] but task is already holding lock:
[   32.074377][ T4223] ffff0000d4efa908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   32.076667][ T4223] 
[   32.076667][ T4223] other info that might help us debug this:
[   32.078754][ T4223]  Possible unsafe locking scenario:
[   32.078754][ T4223] 
[   32.080729][ T4223]        CPU0
[   32.081565][ T4223]        ----
[   32.082421][ T4223]   lock(&sch->q.lock);
[   32.083517][ T4223]   lock(&sch->q.lock);
[   32.084570][ T4223] 
[   32.084570][ T4223]  *** DEADLOCK ***
[   32.084570][ T4223] 
[   32.086640][ T4223]  May be due to missing lock nesting notation
[   32.086640][ T4223] 
[   32.088738][ T4223] 2 locks held by syz-executor717/4223:
[   32.090127][ T4223]  #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94
[   32.092514][ T4223]  #1: ffff0000d4efa908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   32.094841][ T4223] 
[   32.094841][ T4223] stack backtrace:
[   32.096393][ T4223] CPU: 0 PID: 4223 Comm: syz-executor717 Tainted: G        W          6.1.42-syzkaller #0
[   32.098946][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   32.101553][ T4223] Call trace:
[   32.102431][ T4223]  dump_backtrace+0x1c8/0x1f4
[   32.103632][ T4223]  show_stack+0x2c/0x3c
[   32.104712][ T4223]  dump_stack_lvl+0x108/0x170
[   32.105944][ T4223]  dump_stack+0x1c/0x58
[   32.107052][ T4223]  __lock_acquire+0x6310/0x764c
[   32.108315][ T4223]  lock_acquire+0x26c/0x7cc
[   32.109450][ T4223]  _raw_spin_lock_bh+0x54/0x6c
[   32.110666][ T4223]  get_dist_table+0x240/0x354
[   32.111874][ T4223]  netem_change+0x754/0x1900
[   32.113094][ T4223]  netem_init+0x54/0xb8
[   32.114139][ T4223]  qdisc_create+0x70c/0xe64
[   32.115316][ T4223]  tc_modify_qdisc+0x9f0/0x1840
[   32.116574][ T4223]  rtnetlink_rcv_msg+0x72c/0xd94
[   32.117842][ T4223]  netlink_rcv_skb+0x20c/0x3b8
[   32.119078][ T4223]  rtnetlink_rcv+0x28/0x38
[   32.120229][ T4223]  netlink_unicast+0x660/0x8d4
[   32.121448][ T4223]  netlink_sendmsg+0x834/0xb18
[   32.122706][ T4223]  ____sys_sendmsg+0x558/0x844
[   32.123933][ T4223]  __sys_sendmsg+0x26c/0x33c
[   32.125163][ T4223]  __arm64_sys_sendmsg+0x80/0x94
[   32.126425][ T4223]  invoke_syscall+0x98/0x2c0
[   32.127625][ T4223]  el0_svc_common+0x138/0x258
[   32.128809][ T4223]  do_el0_svc+0x64/0x218
[   32.129900][ T4223]  el0_svc+0x58/0x168
[   32.130911][ T4223]  el0t_64_sync_handler+0x84/0xf0
[   32.132215][ T4223]  el0t_64_sync+0x18c/0x190