Warning: Permanently added '10.128.0.99' (ED25519) to the list of known hosts.
executing program
[ 49.422761][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[ 49.432349][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor162
[ 49.441812][ T3486] 2 locks held by syz-executor162/3486:
[ 49.447334][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 49.456740][ T3486] #1: ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x257/0x20c0
[ 49.465977][ T3486] Preemption disabled at:
[ 49.465986][ T3486] [<0000000000000000>] 0x0
[ 49.474714][ T3486] CPU: 1 PID: 3486 Comm: syz-executor162 Not tainted 5.15.126-syzkaller #0
[ 49.483282][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[ 49.493319][ T3486] Call Trace:
[ 49.496579][ T3486]
[ 49.499490][ T3486] dump_stack_lvl+0x1e3/0x2cb
[ 49.504153][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 49.509772][ T3486] ? panic+0x84d/0x84d
[ 49.513833][ T3486] ___might_sleep+0x547/0x6a0
[ 49.518493][ T3486] ? __might_sleep+0xc0/0xc0
[ 49.523089][ T3486] slab_pre_alloc_hook+0x44/0xc0
[ 49.528022][ T3486] __kmalloc_node+0x71/0x390
[ 49.532614][ T3486] ? kvmalloc_node+0x80/0x140
[ 49.537270][ T3486] ? __bpf_trace_softirq+0x10/0x10
[ 49.542366][ T3486] kvmalloc_node+0x80/0x140
[ 49.546855][ T3486] get_dist_table+0x83/0x2c0
[ 49.551427][ T3486] netem_change+0xa05/0x20c0
[ 49.556005][ T3486] ? netem_destroy+0xb0/0xb0
[ 49.560577][ T3486] ? debug_object_init+0x10/0x10
[ 49.565503][ T3486] ? memset+0x1f/0x40
[ 49.569463][ T3486] ? lockdep_init_map_type+0x9d/0x8d0
[ 49.574826][ T3486] ? memset+0x1f/0x40
[ 49.578789][ T3486] ? __hrtimer_init+0x181/0x260
[ 49.583626][ T3486] netem_init+0x58/0xb0
[ 49.587770][ T3486] ? qdisc_peek_dequeued+0x220/0x220
[ 49.593042][ T3486] qdisc_create+0x8ae/0x1390
[ 49.597616][ T3486] ? qdisc_notify+0x380/0x380
[ 49.602270][ T3486] ? apparmor_capable+0x12e/0x190
[ 49.607281][ T3486] tc_modify_qdisc+0xac5/0x1710
[ 49.612123][ T3486] ? rcu_lock_release+0x20/0x20
[ 49.616985][ T3486] ? rcu_lock_release+0x20/0x20
[ 49.621819][ T3486] rtnetlink_rcv_msg+0x993/0xee0
[ 49.626737][ T3486] ? reacquire_held_locks+0x660/0x660
[ 49.632096][ T3486] ? rtnetlink_bind+0x80/0x80
[ 49.636750][ T3486] ? is_bpf_text_address+0x24f/0x260
[ 49.642017][ T3486] ? stack_trace_save+0x1c0/0x1c0
[ 49.647021][ T3486] ? __kernel_text_address+0x94/0x100
[ 49.652374][ T3486] ? unwind_get_return_address+0x49/0x80
[ 49.657988][ T3486] ? arch_stack_walk+0xf3/0x140
[ 49.662820][ T3486] ? mark_lock+0x98/0x340
[ 49.667130][ T3486] ? mark_lock+0x98/0x340
[ 49.671439][ T3486] ? __lock_acquire+0x1295/0x1ff0
[ 49.676460][ T3486] netlink_rcv_skb+0x1cf/0x410
[ 49.681205][ T3486] ? rtnetlink_bind+0x80/0x80
[ 49.685862][ T3486] ? netlink_ack+0xb10/0xb10
[ 49.690442][ T3486] netlink_unicast+0x7b6/0x980
[ 49.695203][ T3486] ? netlink_detachskb+0x90/0x90
[ 49.700125][ T3486] ? 0xffffffff81000000
[ 49.704266][ T3486] ? __check_object_size+0x300/0x410
[ 49.709531][ T3486] ? bpf_lsm_netlink_send+0x5/0x10
[ 49.714628][ T3486] netlink_sendmsg+0xa30/0xd60
[ 49.719381][ T3486] ? netlink_getsockopt+0x5b0/0x5b0
[ 49.724562][ T3486] ? aa_sock_msg_perm+0x91/0x150
[ 49.729481][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10
[ 49.734744][ T3486] ? security_socket_sendmsg+0x7d/0xa0
[ 49.740189][ T3486] ? netlink_getsockopt+0x5b0/0x5b0
[ 49.745370][ T3486] ____sys_sendmsg+0x59e/0x8f0
[ 49.750118][ T3486] ? iovec_from_user+0x300/0x390
[ 49.755051][ T3486] ? __sys_sendmsg_sock+0x30/0x30
[ 49.760063][ T3486] ___sys_sendmsg+0x252/0x2e0
[ 49.764723][ T3486] ? __might_fault+0xb8/0x110
[ 49.769385][ T3486] ? __sys_sendmsg+0x260/0x260
[ 49.774128][ T3486] ? __lock_acquire+0x1295/0x1ff0
[ 49.779151][ T3486] ? read_lock_is_recursive+0x10/0x10
[ 49.784505][ T3486] ? __context_tracking_exit+0x4c/0x80
[ 49.789942][ T3486] ? __fdget+0x158/0x220
[ 49.794170][ T3486] __se_sys_sendmsg+0x19a/0x260
[ 49.799004][ T3486] ? __x64_sys_sendmsg+0x80/0x80
[ 49.803925][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230
[ 49.809885][ T3486] ? lockdep_hardirqs_on+0x94/0x130
[ 49.815083][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230
[ 49.821049][ T3486] do_syscall_64+0x3d/0xb0
[ 49.825446][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 49.831318][ T3486] RIP: 0033:0x7fd2575965a9
[ 49.835712][ T3486] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 49.855299][ T3486] RSP: 002b:00007ffe6ce5f4a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 49.863690][ T3486] RAX: ffffffffffffffda RBX: 00007ffe6ce5f678 RCX: 00007fd2575965a9
[ 49.871641][ T3486] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[ 49.879590][ T3486] RBP: 00007fd257609610 R08: 00000000ffffffff R09: 00007ffe6ce5f678
[ 49.887539][ T3486] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 49.895499][ T3486] R13: 00007ffe6ce5f668 R14: 0000000000000001 R15: 0000000000000001
[ 49.903459][ T3486]
[ 49.906581][ T3486]
[ 49.908896][ T3486] ============================================
[ 49.915029][ T3486] WARNING: possible recursive locking detected
[ 49.921152][ T3486] 5.15.126-syzkaller #0 Tainted: G W
[ 49.927721][ T3486] --------------------------------------------
[ 49.933860][ T3486] syz-executor162/3486 is trying to acquire lock:
[ 49.940253][ T3486] ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: get_dist_table+0x1fa/0x2c0
[ 49.949110][ T3486]
[ 49.949110][ T3486] but task is already holding lock:
[ 49.956453][ T3486] ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x257/0x20c0
[ 49.965217][ T3486]
[ 49.965217][ T3486] other info that might help us debug this:
[ 49.973255][ T3486] Possible unsafe locking scenario:
[ 49.973255][ T3486]
[ 49.980692][ T3486] CPU0
[ 49.983953][ T3486] ----
[ 49.987226][ T3486] lock(&sch->q.lock);
[ 49.991359][ T3486] lock(&sch->q.lock);
[ 49.995491][ T3486]
[ 49.995491][ T3486] *** DEADLOCK ***
[ 49.995491][ T3486]
[ 50.003607][ T3486] May be due to missing lock nesting notation
[ 50.003607][ T3486]
[ 50.011912][ T3486] 2 locks held by syz-executor162/3486:
[ 50.017442][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[ 50.026821][ T3486] #1: ffff888079817908 (&sch->q.lock){+...}-{2:2}, at: netem_change+0x257/0x20c0
[ 50.036031][ T3486]
[ 50.036031][ T3486] stack backtrace:
[ 50.041896][ T3486] CPU: 1 PID: 3486 Comm: syz-executor162 Tainted: G W 5.15.126-syzkaller #0
[ 50.051846][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[ 50.061879][ T3486] Call Trace:
[ 50.065139][ T3486]
[ 50.068057][ T3486] dump_stack_lvl+0x1e3/0x2cb
[ 50.072715][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d
[ 50.078330][ T3486] ? panic+0x84d/0x84d
[ 50.082381][ T3486] validate_chain+0x46cf/0x58b0
[ 50.087216][ T3486] ? do_raw_spin_unlock+0x137/0x8b0
[ 50.092392][ T3486] ? reacquire_held_locks+0x660/0x660
[ 50.097759][ T3486] ? _raw_spin_unlock_irqrestore+0xd9/0x130
[ 50.103631][ T3486] ? _raw_spin_unlock+0x40/0x40
[ 50.108460][ T3486] ? stack_trace_save+0x113/0x1c0
[ 50.113459][ T3486] ? asm_common_interrupt+0x22/0x40
[ 50.118634][ T3486] ? stack_trace_snprint+0xe0/0xe0
[ 50.123725][ T3486] ? stack_depot_save+0x3db/0x440
[ 50.128730][ T3486] ? ____kasan_kmalloc+0xd1/0xf0
[ 50.133646][ T3486] ? mark_lock+0x98/0x340
[ 50.137952][ T3486] ? qdisc_create+0x8ae/0x1390
[ 50.142694][ T3486] __lock_acquire+0x1295/0x1ff0
[ 50.147527][ T3486] lock_acquire+0x1db/0x4f0
[ 50.152010][ T3486] ? get_dist_table+0x1fa/0x2c0
[ 50.156838][ T3486] ? read_lock_is_recursive+0x10/0x10
[ 50.162188][ T3486] ? get_dist_table+0x1fa/0x2c0
[ 50.167030][ T3486] ? __bpf_trace_softirq+0x10/0x10
[ 50.172117][ T3486] ? __kmalloc_node+0x199/0x390
[ 50.176949][ T3486] ? kvmalloc_node+0x80/0x140
[ 50.181608][ T3486] ? __bpf_trace_softirq+0x10/0x10
[ 50.186708][ T3486] ? get_dist_table+0x1fa/0x2c0
[ 50.191543][ T3486] _raw_spin_lock_bh+0x31/0x40
[ 50.196293][ T3486] ? get_dist_table+0x1fa/0x2c0
[ 50.201132][ T3486] get_dist_table+0x1fa/0x2c0
[ 50.205793][ T3486] netem_change+0xa05/0x20c0
[ 50.210365][ T3486] ? netem_destroy+0xb0/0xb0
[ 50.214931][ T3486] ? debug_object_init+0x10/0x10
[ 50.219844][ T3486] ? memset+0x1f/0x40
[ 50.223819][ T3486] ? lockdep_init_map_type+0x9d/0x8d0
[ 50.229186][ T3486] ? memset+0x1f/0x40
[ 50.233144][ T3486] ? __hrtimer_init+0x181/0x260
[ 50.238003][ T3486] netem_init+0x58/0xb0
[ 50.242135][ T3486] ? qdisc_peek_dequeued+0x220/0x220
[ 50.247402][ T3486] qdisc_create+0x8ae/0x1390
[ 50.251972][ T3486] ? qdisc_notify+0x380/0x380
[ 50.256624][ T3486] ? apparmor_capable+0x12e/0x190
[ 50.261629][ T3486] tc_modify_qdisc+0xac5/0x1710
[ 50.266465][ T3486] ? rcu_lock_release+0x20/0x20
[ 50.271300][ T3486] ? rcu_lock_release+0x20/0x20
[ 50.276129][ T3486] rtnetlink_rcv_msg+0x993/0xee0
[ 50.281049][ T3486] ? reacquire_held_locks+0x660/0x660
[ 50.286398][ T3486] ? rtnetlink_bind+0x80/0x80
[ 50.291052][ T3486] ? is_bpf_text_address+0x24f/0x260
[ 50.296322][ T3486] ? stack_trace_save+0x1c0/0x1c0
[ 50.301324][ T3486] ? __kernel_text_address+0x94/0x100
[ 50.306674][ T3486] ? unwind_get_return_address+0x49/0x80
[ 50.312286][ T3486] ? arch_stack_walk+0xf3/0x140
[ 50.317117][ T3486] ? mark_lock+0x98/0x340
[ 50.321423][ T3486] ? mark_lock+0x98/0x340
[ 50.325729][ T3486] ? __lock_acquire+0x1295/0x1ff0
[ 50.330742][ T3486] netlink_rcv_skb+0x1cf/0x410
[ 50.335485][ T3486] ? rtnetlink_bind+0x80/0x80
[ 50.340138][ T3486] ? netlink_ack+0xb10/0xb10
[ 50.344714][ T3486] netlink_unicast+0x7b6/0x980
[ 50.349459][ T3486] ? netlink_detachskb+0x90/0x90
[ 50.354838][ T3486] ? 0xffffffff81000000
[ 50.358976][ T3486] ? __check_object_size+0x300/0x410
[ 50.364247][ T3486] ? bpf_lsm_netlink_send+0x5/0x10
[ 50.369358][ T3486] netlink_sendmsg+0xa30/0xd60
[ 50.374115][ T3486] ? netlink_getsockopt+0x5b0/0x5b0
[ 50.379299][ T3486] ? aa_sock_msg_perm+0x91/0x150
[ 50.384217][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10
[ 50.389485][ T3486] ? security_socket_sendmsg+0x7d/0xa0
[ 50.394924][ T3486] ? netlink_getsockopt+0x5b0/0x5b0
[ 50.400109][ T3486] ____sys_sendmsg+0x59e/0x8f0
[ 50.404859][ T3486] ? iovec_from_user+0x300/0x390
[ 50.409778][ T3486] ? __sys_sendmsg_sock+0x30/0x30
[ 50.414784][ T3486] ___sys_sendmsg+0x252/0x2e0
[ 50.419443][ T3486] ? __might_fault+0xb8/0x110
[ 50.424097][ T3486] ? __sys_sendmsg+0x260/0x260
[ 50.428838][ T3486] ? __lock_acquire+0x1295/0x1ff0
[ 50.433849][ T3486] ? read_lock_is_recursive+0x10/0x10
[ 50.439199][ T3486] ? __context_tracking_exit+0x4c/0x80
[ 50.444638][ T3486] ? __fdget+0x158/0x220
[ 50.448859][ T3486] __se_sys_sendmsg+0x19a/0x260
[ 50.453687][ T3486] ? __x64_sys_sendmsg+0x80/0x80
[ 50.458603][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230
[ 50.464558][ T3486] ? lockdep_hardirqs_on+0x94/0x130
[ 50.469732][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230
[ 50.475692][ T3486] do_syscall_64+0x3d/0xb0
[ 50.480095][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 50.485981][ T3486] RIP: 0033:0x7fd2575965a9
[ 50.490378][ T3486] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[ 50.509962][ T3486] RSP: 002b:00007ffe6ce5f4a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 50.518356][ T3486] RAX: ffffffffffffffda RBX: 00007ffe6ce5f678 RCX: 00007fd2575965a9
[ 50.526307][ T3486] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003
[ 50.534263][ T3486] RBP: 00007fd257609610 R08: 00000000ffffffff R09: 00007ffe6ce5f678
[ 50.542221][ T3486] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[ 50.550169][ T3486] R13: 00007ffe6ce5f668 R14: 0000000000000001 R15: 0000000000000001
[ 50.558122][ T3486]