Warning: Permanently added '10.128.0.76' (ED25519) to the list of known hosts.
executing program
[   49.253402][ T3493] 
[   49.255735][ T3493] =====================================================
[   49.262635][ T3493] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
[   49.270060][ T3493] 5.15.126-syzkaller #0 Not tainted
[   49.275223][ T3493] -----------------------------------------------------
[   49.282120][ T3493] syz-executor308/3493 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire:
[   49.290168][ T3493] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0
[   49.299106][ T3493] 
[   49.299106][ T3493] and this task is already holding:
[   49.306440][ T3493] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   49.315621][ T3493] which would create a new lock dependency:
[   49.321485][ T3493]  (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0}
[   49.329363][ T3493] 
[   49.329363][ T3493] but this new dependency connects a SOFTIRQ-irq-safe lock:
[   49.338786][ T3493]  (noop_qdisc.q.lock){+.-.}-{2:2}
[   49.338805][ T3493] 
[   49.338805][ T3493] ... which became SOFTIRQ-irq-safe at:
[   49.351575][ T3493]   lock_acquire+0x1db/0x4f0
[   49.356152][ T3493]   _raw_spin_lock+0x2a/0x40
[   49.360714][ T3493]   net_tx_action+0x6c5/0x8e0
[   49.365367][ T3493]   __do_softirq+0x3b3/0x93a
[   49.369984][ T3493]   do_softirq+0x162/0x240
[   49.374397][ T3493]   __local_bh_enable_ip+0x1b1/0x1f0
[   49.379743][ T3493]   dev_deactivate_many+0x524/0xbf0
[   49.384913][ T3493]   dev_deactivate+0x177/0x270
[   49.389821][ T3493]   linkwatch_do_dev+0x104/0x160
[   49.394728][ T3493]   __linkwatch_run_queue+0x4ca/0x7f0
[   49.400069][ T3493]   linkwatch_event+0x48/0x50
[   49.404722][ T3493]   process_one_work+0x8a1/0x10c0
[   49.409733][ T3493]   worker_thread+0xaca/0x1280
[   49.414475][ T3493]   kthread+0x3f6/0x4f0
[   49.418663][ T3493]   ret_from_fork+0x1f/0x30
[   49.423151][ T3493] 
[   49.423151][ T3493] to a SOFTIRQ-irq-unsafe lock:
[   49.430147][ T3493]  (fs_reclaim){+.+.}-{0:0}
[   49.430168][ T3493] 
[   49.430168][ T3493] ... which became SOFTIRQ-irq-unsafe at:
[   49.442517][ T3493] ...
[   49.442521][ T3493]   lock_acquire+0x1db/0x4f0
[   49.449650][ T3493]   fs_reclaim_acquire+0x83/0x120
[   49.454655][ T3493]   slab_pre_alloc_hook+0x22/0xc0
[   49.459652][ T3493]   kmem_cache_alloc_trace+0x49/0x290
[   49.465008][ T3493]   wq_numa_init+0x122/0x49f
[   49.469585][ T3493]   workqueue_init+0x18/0x5e1
[   49.474241][ T3493]   kernel_init_freeable+0x40a/0x5c5
[   49.479596][ T3493]   kernel_init+0x19/0x290
[   49.483988][ T3493]   ret_from_fork+0x1f/0x30
[   49.488551][ T3493] 
[   49.488551][ T3493] other info that might help us debug this:
[   49.488551][ T3493] 
[   49.498753][ T3493]  Possible interrupt unsafe locking scenario:
[   49.498753][ T3493] 
[   49.507056][ T3493]        CPU0                    CPU1
[   49.512406][ T3493]        ----                    ----
[   49.517747][ T3493]   lock(fs_reclaim);
[   49.521706][ T3493]                                local_irq_disable();
[   49.528432][ T3493]                                lock(noop_qdisc.q.lock);
[   49.535515][ T3493]                                lock(fs_reclaim);
[   49.541992][ T3493]   <Interrupt>
[   49.545420][ T3493]     lock(noop_qdisc.q.lock);
[   49.550150][ T3493] 
[   49.550150][ T3493]  *** DEADLOCK ***
[   49.550150][ T3493] 
[   49.558263][ T3493] 2 locks held by syz-executor308/3493:
[   49.563778][ T3493]  #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[   49.573138][ T3493]  #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   49.582753][ T3493] 
[   49.582753][ T3493] the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
[   49.593125][ T3493] -> (noop_qdisc.q.lock){+.-.}-{2:2} {
[   49.598563][ T3493]    HARDIRQ-ON-W at:
[   49.602513][ T3493]                     lock_acquire+0x1db/0x4f0
[   49.608643][ T3493]                     _raw_spin_lock+0x2a/0x40
[   49.614772][ T3493]                     __dev_queue_xmit+0xad6/0x3230
[   49.621349][ T3493]                     tx+0x64/0x100
[   49.626530][ T3493]                     kthread+0x234/0x440
[   49.632221][ T3493]                     kthread+0x3f6/0x4f0
[   49.637915][ T3493]                     ret_from_fork+0x1f/0x30
[   49.643964][ T3493]    IN-SOFTIRQ-W at:
[   49.647922][ T3493]                     lock_acquire+0x1db/0x4f0
[   49.654058][ T3493]                     _raw_spin_lock+0x2a/0x40
[   49.660370][ T3493]                     net_tx_action+0x6c5/0x8e0
[   49.666594][ T3493]                     __do_softirq+0x3b3/0x93a
[   49.672734][ T3493]                     do_softirq+0x162/0x240
[   49.678687][ T3493]                     __local_bh_enable_ip+0x1b1/0x1f0
[   49.685512][ T3493]                     dev_deactivate_many+0x524/0xbf0
[   49.692251][ T3493]                     dev_deactivate+0x177/0x270
[   49.698554][ T3493]                     linkwatch_do_dev+0x104/0x160
[   49.705027][ T3493]                     __linkwatch_run_queue+0x4ca/0x7f0
[   49.711933][ T3493]                     linkwatch_event+0x48/0x50
[   49.718144][ T3493]                     process_one_work+0x8a1/0x10c0
[   49.724704][ T3493]                     worker_thread+0xaca/0x1280
[   49.731010][ T3493]                     kthread+0x3f6/0x4f0
[   49.736699][ T3493]                     ret_from_fork+0x1f/0x30
[   49.742739][ T3493]    INITIAL USE at:
[   49.746606][ T3493]                    lock_acquire+0x1db/0x4f0
[   49.752651][ T3493]                    _raw_spin_lock+0x2a/0x40
[   49.758705][ T3493]                    __dev_queue_xmit+0xad6/0x3230
[   49.765195][ T3493]                    tx+0x64/0x100
[   49.770291][ T3493]                    kthread+0x234/0x440
[   49.775903][ T3493]                    kthread+0x3f6/0x4f0
[   49.781506][ T3493]                    ret_from_fork+0x1f/0x30
[   49.787461][ T3493]  }
[   49.789934][ T3493]  ... key      at: [<ffffffff8da20808>] noop_qdisc+0x108/0x320
[   49.797552][ T3493] 
[   49.797552][ T3493] the dependencies between the lock to be acquired
[   49.797558][ T3493]  and SOFTIRQ-irq-unsafe lock:
[   49.811056][ T3493] -> (fs_reclaim){+.+.}-{0:0} {
[   49.815888][ T3493]    HARDIRQ-ON-W at:
[   49.819838][ T3493]                     lock_acquire+0x1db/0x4f0
[   49.825964][ T3493]                     fs_reclaim_acquire+0x83/0x120
[   49.832531][ T3493]                     slab_pre_alloc_hook+0x22/0xc0
[   49.839088][ T3493]                     kmem_cache_alloc_trace+0x49/0x290
[   49.845999][ T3493]                     wq_numa_init+0x122/0x49f
[   49.852138][ T3493]                     workqueue_init+0x18/0x5e1
[   49.858356][ T3493]                     kernel_init_freeable+0x40a/0x5c5
[   49.865179][ T3493]                     kernel_init+0x19/0x290
[   49.871139][ T3493]                     ret_from_fork+0x1f/0x30
[   49.877187][ T3493]    SOFTIRQ-ON-W at:
[   49.881149][ T3493]                     lock_acquire+0x1db/0x4f0
[   49.887281][ T3493]                     fs_reclaim_acquire+0x83/0x120
[   49.893842][ T3493]                     slab_pre_alloc_hook+0x22/0xc0
[   49.900403][ T3493]                     kmem_cache_alloc_trace+0x49/0x290
[   49.907312][ T3493]                     wq_numa_init+0x122/0x49f
[   49.913442][ T3493]                     workqueue_init+0x18/0x5e1
[   49.919653][ T3493]                     kernel_init_freeable+0x40a/0x5c5
[   49.926471][ T3493]                     kernel_init+0x19/0x290
[   49.932422][ T3493]                     ret_from_fork+0x1f/0x30
[   49.938471][ T3493]    INITIAL USE at:
[   49.942336][ T3493]                    lock_acquire+0x1db/0x4f0
[   49.948375][ T3493]                    fs_reclaim_acquire+0x83/0x120
[   49.954845][ T3493]                    slab_pre_alloc_hook+0x22/0xc0
[   49.961315][ T3493]                    kmem_cache_alloc_trace+0x49/0x290
[   49.968132][ T3493]                    wq_numa_init+0x122/0x49f
[   49.974168][ T3493]                    workqueue_init+0x18/0x5e1
[   49.980293][ T3493]                    kernel_init_freeable+0x40a/0x5c5
[   49.987035][ T3493]                    kernel_init+0x19/0x290
[   49.992904][ T3493]                    ret_from_fork+0x1f/0x30
[   49.998855][ T3493]  }
[   50.001325][ T3493]  ... key      at: [<ffffffff8c9dfba0>] __fs_reclaim_map+0x0/0x160
[   50.009274][ T3493]  ... acquired at:
[   50.013084][ T3493]    lock_acquire+0x1db/0x4f0
[   50.017732][ T3493]    fs_reclaim_acquire+0x83/0x120
[   50.022815][ T3493]    slab_pre_alloc_hook+0x22/0xc0
[   50.027898][ T3493]    __kmalloc_node+0x71/0x390
[   50.032632][ T3493]    kvmalloc_node+0x80/0x140
[   50.037282][ T3493]    get_dist_table+0x83/0x2c0
[   50.042017][ T3493]    netem_change+0xa05/0x20c0
[   50.046751][ T3493]    netem_init+0x58/0xb0
[   50.051050][ T3493]    qdisc_create+0x8ae/0x1390
[   50.055785][ T3493]    tc_modify_qdisc+0xac5/0x1710
[   50.060789][ T3493]    rtnetlink_rcv_msg+0x993/0xee0
[   50.065873][ T3493]    netlink_rcv_skb+0x1cf/0x410
[   50.070782][ T3493]    netlink_unicast+0x7b6/0x980
[   50.075691][ T3493]    netlink_sendmsg+0xa30/0xd60
[   50.080609][ T3493]    ____sys_sendmsg+0x59e/0x8f0
[   50.085519][ T3493]    ___sys_sendmsg+0x252/0x2e0
[   50.090340][ T3493]    __se_sys_sendmsg+0x19a/0x260
[   50.095335][ T3493]    do_syscall_64+0x3d/0xb0
[   50.099894][ T3493]    entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   50.105930][ T3493] 
[   50.108226][ T3493] 
[   50.108226][ T3493] stack backtrace:
[   50.114084][ T3493] CPU: 1 PID: 3493 Comm: syz-executor308 Not tainted 5.15.126-syzkaller #0
[   50.122636][ T3493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   50.132666][ T3493] Call Trace:
[   50.135930][ T3493]  <TASK>
[   50.138845][ T3493]  dump_stack_lvl+0x1e3/0x2cb
[   50.143506][ T3493]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   50.149121][ T3493]  ? panic+0x84d/0x84d
[   50.153166][ T3493]  ? print_shortest_lock_dependencies+0xee/0x150
[   50.159470][ T3493]  validate_chain+0x4cfe/0x58b0
[   50.164301][ T3493]  ? reacquire_held_locks+0x660/0x660
[   50.169666][ T3493]  ? validate_chain+0x112/0x58b0
[   50.174582][ T3493]  ? reacquire_held_locks+0x660/0x660
[   50.179931][ T3493]  ? mark_lock+0x98/0x340
[   50.184232][ T3493]  __lock_acquire+0x1295/0x1ff0
[   50.189070][ T3493]  lock_acquire+0x1db/0x4f0
[   50.193560][ T3493]  ? slab_pre_alloc_hook+0x22/0xc0
[   50.198648][ T3493]  ? read_lock_is_recursive+0x10/0x10
[   50.204010][ T3493]  fs_reclaim_acquire+0x83/0x120
[   50.208935][ T3493]  ? slab_pre_alloc_hook+0x22/0xc0
[   50.214028][ T3493]  slab_pre_alloc_hook+0x22/0xc0
[   50.218948][ T3493]  __kmalloc_node+0x71/0x390
[   50.223518][ T3493]  ? kvmalloc_node+0x80/0x140
[   50.228172][ T3493]  ? __bpf_trace_softirq+0x10/0x10
[   50.233261][ T3493]  kvmalloc_node+0x80/0x140
[   50.237742][ T3493]  get_dist_table+0x83/0x2c0
[   50.242397][ T3493]  netem_change+0xa05/0x20c0
[   50.246972][ T3493]  ? netem_destroy+0xb0/0xb0
[   50.251532][ T3493]  ? debug_object_init+0x10/0x10
[   50.256444][ T3493]  ? memset+0x1f/0x40
[   50.260398][ T3493]  ? lockdep_init_map_type+0x9d/0x8d0
[   50.265751][ T3493]  ? memset+0x1f/0x40
[   50.269711][ T3493]  ? __hrtimer_init+0x181/0x260
[   50.274548][ T3493]  netem_init+0x58/0xb0
[   50.278687][ T3493]  ? qdisc_peek_dequeued+0x220/0x220
[   50.283952][ T3493]  qdisc_create+0x8ae/0x1390
[   50.288520][ T3493]  ? qdisc_notify+0x380/0x380
[   50.293175][ T3493]  ? apparmor_capable+0x12e/0x190
[   50.298175][ T3493]  tc_modify_qdisc+0xac5/0x1710
[   50.303003][ T3493]  ? rcu_lock_release+0x20/0x20
[   50.307834][ T3493]  ? rcu_lock_release+0x20/0x20
[   50.312658][ T3493]  rtnetlink_rcv_msg+0x993/0xee0
[   50.317580][ T3493]  ? reacquire_held_locks+0x660/0x660
[   50.322943][ T3493]  ? rtnetlink_bind+0x80/0x80
[   50.327598][ T3493]  ? is_bpf_text_address+0x24f/0x260
[   50.332861][ T3493]  ? stack_trace_save+0x1c0/0x1c0
[   50.337858][ T3493]  ? __kernel_text_address+0x94/0x100
[   50.343299][ T3493]  ? unwind_get_return_address+0x49/0x80
[   50.348909][ T3493]  ? arch_stack_walk+0xf3/0x140
[   50.353734][ T3493]  ? mark_lock+0x98/0x340
[   50.358039][ T3493]  ? mark_lock+0x98/0x340
[   50.362387][ T3493]  ? __lock_acquire+0x1295/0x1ff0
[   50.367391][ T3493]  netlink_rcv_skb+0x1cf/0x410
[   50.372138][ T3493]  ? rtnetlink_bind+0x80/0x80
[   50.376789][ T3493]  ? netlink_ack+0xb10/0xb10
[   50.381352][ T3493]  netlink_unicast+0x7b6/0x980
[   50.386099][ T3493]  ? netlink_detachskb+0x90/0x90
[   50.391013][ T3493]  ? 0xffffffff81000000
[   50.395138][ T3493]  ? __check_object_size+0x300/0x410
[   50.400393][ T3493]  ? bpf_lsm_netlink_send+0x5/0x10
[   50.405479][ T3493]  netlink_sendmsg+0xa30/0xd60
[   50.410215][ T3493]  ? netlink_getsockopt+0x5b0/0x5b0
[   50.415383][ T3493]  ? aa_sock_msg_perm+0x91/0x150
[   50.420293][ T3493]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   50.425566][ T3493]  ? security_socket_sendmsg+0x7d/0xa0
[   50.431012][ T3493]  ? netlink_getsockopt+0x5b0/0x5b0
[   50.436191][ T3493]  ____sys_sendmsg+0x59e/0x8f0
[   50.440938][ T3493]  ? iovec_from_user+0x300/0x390
[   50.445859][ T3493]  ? __sys_sendmsg_sock+0x30/0x30
[   50.450863][ T3493]  ___sys_sendmsg+0x252/0x2e0
[   50.455516][ T3493]  ? __sys_sendmsg+0x260/0x260
[   50.460252][ T3493]  ? __lock_acquire+0x1295/0x1ff0
[   50.465258][ T3493]  ? read_lock_is_recursive+0x10/0x10
[   50.470608][ T3493]  ? __context_tracking_exit+0x4c/0x80
[   50.476038][ T3493]  ? __fdget+0x158/0x220
[   50.480255][ T3493]  __se_sys_sendmsg+0x19a/0x260
[   50.485077][ T3493]  ? __x64_sys_sendmsg+0x80/0x80
[   50.490001][ T3493]  ? syscall_enter_from_user_mode+0x2e/0x230
[   50.495969][ T3493]  ? lockdep_hardirqs_on+0x94/0x130
[   50.501142][ T3493]  ? syscall_enter_from_user_mode+0x2e/0x230
[   50.507095][ T3493]  do_syscall_64+0x3d/0xb0
[   50.511489][ T3493]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   50.517361][ T3493] RIP: 0033:0x7fc802d018b9
[   50.521754][ T3493] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   50.541332][ T3493] RSP: 002b:00007ffecba52538 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   50.549727][ T3493] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc802d018b9
[   50.557686][ T3493] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003
[   50.565637][ T3493] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffecba525b0
[   50.573583][ T3493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   50.581535][ T3493] R13: 00007ffecba52738 R14: 0000000000000001 R15: 0000000000000001
[   50.589492][ T3493]  </TASK>
[   50.592586][ T3493] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   50.602048][ T3493] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3493, name: syz-executor308
[   50.611530][ T3493] INFO: lockdep is turned off.
[   50.616285][ T3493] Preemption disabled at:
[   50.616294][ T3493] [<0000000000000000>] 0x0
[   50.625012][ T3493] CPU: 1 PID: 3493 Comm: syz-executor308 Not tainted 5.15.126-syzkaller #0
[   50.633572][ T3493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   50.643602][ T3493] Call Trace:
[   50.646864][ T3493]  <TASK>
[   50.649771][ T3493]  dump_stack_lvl+0x1e3/0x2cb
[   50.654457][ T3493]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   50.660061][ T3493]  ? panic+0x84d/0x84d
[   50.664102][ T3493]  ? rcu_is_watching+0x11/0xa0
[   50.668839][ T3493]  ? rcu_is_watching+0x11/0xa0
[   50.673574][ T3493]  ___might_sleep+0x547/0x6a0
[   50.678223][ T3493]  ? __might_sleep+0xc0/0xc0
[   50.682786][ T3493]  slab_pre_alloc_hook+0x44/0xc0
[   50.687700][ T3493]  __kmalloc_node+0x71/0x390
[   50.692259][ T3493]  ? kvmalloc_node+0x80/0x140
[   50.696909][ T3493]  ? __bpf_trace_softirq+0x10/0x10
[   50.701991][ T3493]  kvmalloc_node+0x80/0x140
[   50.706475][ T3493]  get_dist_table+0x83/0x2c0
[   50.711055][ T3493]  netem_change+0xa05/0x20c0
[   50.715637][ T3493]  ? netem_destroy+0xb0/0xb0
[   50.720205][ T3493]  ? debug_object_init+0x10/0x10
[   50.725119][ T3493]  ? memset+0x1f/0x40
[   50.729085][ T3493]  ? lockdep_init_map_type+0x9d/0x8d0
[   50.734448][ T3493]  ? memset+0x1f/0x40
[   50.738423][ T3493]  ? __hrtimer_init+0x181/0x260
[   50.743253][ T3493]  netem_init+0x58/0xb0
[   50.747395][ T3493]  ? qdisc_peek_dequeued+0x220/0x220
[   50.752746][ T3493]  qdisc_create+0x8ae/0x1390
[   50.757321][ T3493]  ? qdisc_notify+0x380/0x380
[   50.761991][ T3493]  ? apparmor_capable+0x12e/0x190
[   50.766993][ T3493]  tc_modify_qdisc+0xac5/0x1710
[   50.771827][ T3493]  ? rcu_lock_release+0x20/0x20
[   50.776657][ T3493]  ? rcu_lock_release+0x20/0x20
[   50.781483][ T3493]  rtnetlink_rcv_msg+0x993/0xee0
[   50.786423][ T3493]  ? reacquire_held_locks+0x660/0x660
[   50.791772][ T3493]  ? rtnetlink_bind+0x80/0x80
[   50.796422][ T3493]  ? is_bpf_text_address+0x24f/0x260
[   50.801678][ T3493]  ? stack_trace_save+0x1c0/0x1c0
[   50.806678][ T3493]  ? __kernel_text_address+0x94/0x100
[   50.812029][ T3493]  ? unwind_get_return_address+0x49/0x80
[   50.817653][ T3493]  ? arch_stack_walk+0xf3/0x140
[   50.822486][ T3493]  ? mark_lock+0x98/0x340
[   50.826793][ T3493]  ? mark_lock+0x98/0x340
[   50.831096][ T3493]  ? __lock_acquire+0x1295/0x1ff0
[   50.836104][ T3493]  netlink_rcv_skb+0x1cf/0x410
[   50.840858][ T3493]  ? rtnetlink_bind+0x80/0x80
[   50.845517][ T3493]  ? netlink_ack+0xb10/0xb10
[   50.850089][ T3493]  netlink_unicast+0x7b6/0x980
[   50.854837][ T3493]  ? netlink_detachskb+0x90/0x90
[   50.859751][ T3493]  ? 0xffffffff81000000
[   50.863878][ T3493]  ? __check_object_size+0x300/0x410
[   50.869140][ T3493]  ? bpf_lsm_netlink_send+0x5/0x10
[   50.874231][ T3493]  netlink_sendmsg+0xa30/0xd60
[   50.878976][ T3493]  ? netlink_getsockopt+0x5b0/0x5b0
[   50.884152][ T3493]  ? aa_sock_msg_perm+0x91/0x150
[   50.889067][ T3493]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   50.894322][ T3493]  ? security_socket_sendmsg+0x7d/0xa0
[   50.899758][ T3493]  ? netlink_getsockopt+0x5b0/0x5b0
[   50.904930][ T3493]  ____sys_sendmsg+0x59e/0x8f0
[   50.909668][ T3493]  ? iovec_from_user+0x300/0x390
[   50.914580][ T3493]  ? __sys_sendmsg_sock+0x30/0x30
[   50.919579][ T3493]  ___sys_sendmsg+0x252/0x2e0
[   50.924226][ T3493]  ? __sys_sendmsg+0x260/0x260
[   50.928964][ T3493]  ? __lock_acquire+0x1295/0x1ff0
[   50.933966][ T3493]  ? read_lock_is_recursive+0x10/0x10
[   50.939311][ T3493]  ? __context_tracking_exit+0x4c/0x80
[   50.944740][ T3493]  ? __fdget+0x158/0x220
[   50.948955][ T3493]  __se_sys_sendmsg+0x19a/0x260
[   50.953782][ T3493]  ? __x64_sys_sendmsg+0x80/0x80
[   50.958694][ T3493]  ? syscall_enter_from_user_mode+0x2e/0x230
[   50.964644][ T3493]  ? lockdep_hardirqs_on+0x94/0x130
[   50.969812][ T3493]  ? syscall_enter_from_user_mode+0x2e/0x230
[   50.975762][ T3493]  do_syscall_64+0x3d/0xb0
[   50.980158][ T3493]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   50.986022][ T3493] RIP: 0033:0x7fc802d018b9
[   50.990411][ T3493] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   51.009986][ T3493] RSP: 002b:00007ffecba52538 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   51.018370][ T3493] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc802d018b9
[   51.026313][ T3493] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003
[   51.034264][ T3493] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffecba525b0
[   51.042209][ T3493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   51.050150][ T3493] R13: 00007ffecba52738 R14: 0000000000000001 R15: 0000000000000001
[   51.058096][ T3493]  </TASK>