Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts.
executing program
[   35.163432][ T4223] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[   35.166143][ T4223] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 4223, name: syz-executor425
[   35.168650][ T4223] preempt_count: 201, expected: 0
[   35.169994][ T4223] RCU nest depth: 0, expected: 0
[   35.171274][ T4223] 2 locks held by syz-executor425/4223:
[   35.172810][ T4223]  #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94
[   35.175452][ T4223]  #1: ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   35.177932][ T4223] Preemption disabled at:
[   35.177942][ T4223] [<ffff8000106c72ec>] sch_tree_lock+0x120/0x1d4
[   35.180744][ T4223] CPU: 1 PID: 4223 Comm: syz-executor425 Not tainted 6.1.42-syzkaller #0
[   35.182942][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   35.185655][ T4223] Call trace:
[   35.186519][ T4223]  dump_backtrace+0x1c8/0x1f4
[   35.187771][ T4223]  show_stack+0x2c/0x3c
[   35.188937][ T4223]  dump_stack_lvl+0x108/0x170
[   35.190220][ T4223]  dump_stack+0x1c/0x58
[   35.191347][ T4223]  __might_resched+0x37c/0x4d8
[   35.192648][ T4223]  __might_sleep+0x90/0xe4
[   35.193795][ T4223]  __kmem_cache_alloc_node+0x74/0x388
[   35.195223][ T4223]  __kmalloc_node+0xcc/0x1d0
[   35.196496][ T4223]  kvmalloc_node+0x84/0x1e4
[   35.197745][ T4223]  get_dist_table+0xa0/0x354
[   35.198974][ T4223]  netem_change+0x754/0x1900
[   35.200231][ T4223]  netem_init+0x54/0xb8
[   35.201418][ T4223]  qdisc_create+0x70c/0xe64
[   35.202613][ T4223]  tc_modify_qdisc+0x9f0/0x1840
[   35.203892][ T4223]  rtnetlink_rcv_msg+0x72c/0xd94
[   35.205214][ T4223]  netlink_rcv_skb+0x20c/0x3b8
[   35.206512][ T4223]  rtnetlink_rcv+0x28/0x38
[   35.207752][ T4223]  netlink_unicast+0x660/0x8d4
[   35.209036][ T4223]  netlink_sendmsg+0x834/0xb18
[   35.210315][ T4223]  ____sys_sendmsg+0x558/0x844
[   35.211627][ T4223]  __sys_sendmsg+0x26c/0x33c
[   35.212849][ T4223]  __arm64_sys_sendmsg+0x80/0x94
[   35.214196][ T4223]  invoke_syscall+0x98/0x2c0
[   35.215519][ T4223]  el0_svc_common+0x138/0x258
[   35.216819][ T4223]  do_el0_svc+0x64/0x218
[   35.217941][ T4223]  el0_svc+0x58/0x168
[   35.219023][ T4223]  el0t_64_sync_handler+0x84/0xf0
[   35.220385][ T4223]  el0t_64_sync+0x18c/0x190
[   35.221774][ T4223] 
[   35.222413][ T4223] ============================================
[   35.224047][ T4223] WARNING: possible recursive locking detected
[   35.225750][ T4223] 6.1.42-syzkaller #0 Tainted: G        W         
[   35.227532][ T4223] --------------------------------------------
[   35.229174][ T4223] syz-executor425/4223 is trying to acquire lock:
[   35.230858][ T4223] ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x240/0x354
[   35.233277][ T4223] 
[   35.233277][ T4223] but task is already holding lock:
[   35.235255][ T4223] ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   35.237628][ T4223] 
[   35.237628][ T4223] other info that might help us debug this:
[   35.239793][ T4223]  Possible unsafe locking scenario:
[   35.239793][ T4223] 
[   35.241814][ T4223]        CPU0
[   35.242666][ T4223]        ----
[   35.243552][ T4223]   lock(&sch->q.lock);
[   35.244664][ T4223]   lock(&sch->q.lock);
[   35.245785][ T4223] 
[   35.245785][ T4223]  *** DEADLOCK ***
[   35.245785][ T4223] 
[   35.247922][ T4223]  May be due to missing lock nesting notation
[   35.247922][ T4223] 
[   35.250183][ T4223] 2 locks held by syz-executor425/4223:
[   35.251660][ T4223]  #0: ffff800017e6f7c8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x6e8/0xd94
[   35.254203][ T4223]  #1: ffff0000d63ff908 (&sch->q.lock){+...}-{2:2}, at: sch_tree_lock+0x120/0x1d4
[   35.256746][ T4223] 
[   35.256746][ T4223] stack backtrace:
[   35.258393][ T4223] CPU: 1 PID: 4223 Comm: syz-executor425 Tainted: G        W          6.1.42-syzkaller #0
[   35.261170][ T4223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023
[   35.263973][ T4223] Call trace:
[   35.264844][ T4223]  dump_backtrace+0x1c8/0x1f4
[   35.266013][ T4223]  show_stack+0x2c/0x3c
[   35.267048][ T4223]  dump_stack_lvl+0x108/0x170
[   35.268201][ T4223]  dump_stack+0x1c/0x58
[   35.269247][ T4223]  __lock_acquire+0x6310/0x764c
[   35.270643][ T4223]  lock_acquire+0x26c/0x7cc
[   35.271847][ T4223]  _raw_spin_lock_bh+0x54/0x6c
[   35.273122][ T4223]  get_dist_table+0x240/0x354
[   35.274451][ T4223]  netem_change+0x754/0x1900
[   35.275706][ T4223]  netem_init+0x54/0xb8
[   35.276839][ T4223]  qdisc_create+0x70c/0xe64
[   35.278073][ T4223]  tc_modify_qdisc+0x9f0/0x1840
[   35.279380][ T4223]  rtnetlink_rcv_msg+0x72c/0xd94
[   35.280698][ T4223]  netlink_rcv_skb+0x20c/0x3b8
[   35.281970][ T4223]  rtnetlink_rcv+0x28/0x38
[   35.283172][ T4223]  netlink_unicast+0x660/0x8d4
[   35.284423][ T4223]  netlink_sendmsg+0x834/0xb18
[   35.285710][ T4223]  ____sys_sendmsg+0x558/0x844
[   35.286963][ T4223]  __sys_sendmsg+0x26c/0x33c
[   35.288177][ T4223]  __arm64_sys_sendmsg+0x80/0x94
[   35.289501][ T4223]  invoke_syscall+0x98/0x2c0
[   35.290705][ T4223]  el0_svc_common+0x138/0x258
[   35.291951][ T4223]  do_el0_svc+0x64/0x218
[   35.293087][ T4223]  el0_svc+0x58/0x168
[   35.294128][ T4223]  el0t_64_sync_handler+0x84/0xf0
[   35.295509][ T4223]  el0t_64_sync+0x18c/0x190