Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts.
executing program
[   42.345443][ T3497] 
[   42.347770][ T3497] =====================================================
[   42.354670][ T3497] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
[   42.362117][ T3497] 5.15.119-syzkaller #0 Not tainted
[   42.367282][ T3497] -----------------------------------------------------
[   42.374185][ T3497] syz-executor305/3497 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire:
[   42.382222][ T3497] ffffffff8c9dcce0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0
[   42.391159][ T3497] 
[   42.391159][ T3497] and this task is already holding:
[   42.398492][ T3497] ffffffff8da1d808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   42.407677][ T3497] which would create a new lock dependency:
[   42.413624][ T3497]  (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0}
[   42.421243][ T3497] 
[   42.421243][ T3497] but this new dependency connects a SOFTIRQ-irq-safe lock:
[   42.430660][ T3497]  (noop_qdisc.q.lock){+.-.}-{2:2}
[   42.430674][ T3497] 
[   42.430674][ T3497] ... which became SOFTIRQ-irq-safe at:
[   42.443424][ T3497]   lock_acquire+0x1db/0x4f0
[   42.447991][ T3497]   _raw_spin_lock+0x2a/0x40
[   42.452549][ T3497]   net_tx_action+0x6c5/0x8e0
[   42.457199][ T3497]   __do_softirq+0x3b3/0x93a
[   42.461759][ T3497]   do_softirq+0x162/0x240
[   42.466148][ T3497]   __local_bh_enable_ip+0x1b1/0x1f0
[   42.471403][ T3497]   dev_deactivate_many+0x524/0xbf0
[   42.476573][ T3497]   dev_deactivate+0x177/0x270
[   42.481306][ T3497]   linkwatch_do_dev+0x104/0x160
[   42.486215][ T3497]   __linkwatch_run_queue+0x4ca/0x7f0
[   42.491554][ T3497]   linkwatch_event+0x48/0x50
[   42.496199][ T3497]   process_one_work+0x8a1/0x10c0
[   42.501195][ T3497]   worker_thread+0xaca/0x1280
[   42.505933][ T3497]   kthread+0x3f6/0x4f0
[   42.510059][ T3497]   ret_from_fork+0x1f/0x30
[   42.514536][ T3497] 
[   42.514536][ T3497] to a SOFTIRQ-irq-unsafe lock:
[   42.521540][ T3497]  (fs_reclaim){+.+.}-{0:0}
[   42.521556][ T3497] 
[   42.521556][ T3497] ... which became SOFTIRQ-irq-unsafe at:
[   42.533872][ T3497] ...
[   42.533877][ T3497]   lock_acquire+0x1db/0x4f0
[   42.540991][ T3497]   fs_reclaim_acquire+0x83/0x120
[   42.545991][ T3497]   slab_pre_alloc_hook+0x22/0xc0
[   42.550988][ T3497]   kmem_cache_alloc_trace+0x49/0x290
[   42.556339][ T3497]   wq_numa_init+0x122/0x49f
[   42.560902][ T3497]   workqueue_init+0x18/0x5e1
[   42.565550][ T3497]   kernel_init_freeable+0x40a/0x5c5
[   42.570805][ T3497]   kernel_init+0x19/0x290
[   42.575190][ T3497]   ret_from_fork+0x1f/0x30
[   42.579666][ T3497] 
[   42.579666][ T3497] other info that might help us debug this:
[   42.579666][ T3497] 
[   42.589866][ T3497]  Possible interrupt unsafe locking scenario:
[   42.589866][ T3497] 
[   42.598155][ T3497]        CPU0                    CPU1
[   42.603491][ T3497]        ----                    ----
[   42.608829][ T3497]   lock(fs_reclaim);
[   42.612781][ T3497]                                local_irq_disable();
[   42.619504][ T3497]                                lock(noop_qdisc.q.lock);
[   42.626582][ T3497]                                lock(fs_reclaim);
[   42.633063][ T3497]   <Interrupt>
[   42.636492][ T3497]     lock(noop_qdisc.q.lock);
[   42.641225][ T3497] 
[   42.641225][ T3497]  *** DEADLOCK ***
[   42.641225][ T3497] 
[   42.649335][ T3497] 2 locks held by syz-executor305/3497:
[   42.654849][ T3497]  #0: ffffffff8d9de208 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[   42.664316][ T3497]  #1: ffffffff8da1d808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   42.673950][ T3497] 
[   42.673950][ T3497] the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
[   42.684332][ T3497] -> (noop_qdisc.q.lock){+.-.}-{2:2} {
[   42.689775][ T3497]    HARDIRQ-ON-W at:
[   42.693726][ T3497]                     lock_acquire+0x1db/0x4f0
[   42.699857][ T3497]                     _raw_spin_lock+0x2a/0x40
[   42.705978][ T3497]                     __dev_queue_xmit+0xad6/0x3230
[   42.712540][ T3497]                     tx+0x64/0x100
[   42.717708][ T3497]                     kthread+0x234/0x440
[   42.723403][ T3497]                     kthread+0x3f6/0x4f0
[   42.729106][ T3497]                     ret_from_fork+0x1f/0x30
[   42.735154][ T3497]    IN-SOFTIRQ-W at:
[   42.739111][ T3497]                     lock_acquire+0x1db/0x4f0
[   42.745243][ T3497]                     _raw_spin_lock+0x2a/0x40
[   42.751374][ T3497]                     net_tx_action+0x6c5/0x8e0
[   42.757587][ T3497]                     __do_softirq+0x3b3/0x93a
[   42.763711][ T3497]                     do_softirq+0x162/0x240
[   42.769664][ T3497]                     __local_bh_enable_ip+0x1b1/0x1f0
[   42.776496][ T3497]                     dev_deactivate_many+0x524/0xbf0
[   42.783230][ T3497]                     dev_deactivate+0x177/0x270
[   42.789528][ T3497]                     linkwatch_do_dev+0x104/0x160
[   42.795998][ T3497]                     __linkwatch_run_queue+0x4ca/0x7f0
[   42.802909][ T3497]                     linkwatch_event+0x48/0x50
[   42.809122][ T3497]                     process_one_work+0x8a1/0x10c0
[   42.815681][ T3497]                     worker_thread+0xaca/0x1280
[   42.821979][ T3497]                     kthread+0x3f6/0x4f0
[   42.827681][ T3497]                     ret_from_fork+0x1f/0x30
[   42.833718][ T3497]    INITIAL USE at:
[   42.837586][ T3497]                    lock_acquire+0x1db/0x4f0
[   42.843623][ T3497]                    _raw_spin_lock+0x2a/0x40
[   42.849658][ T3497]                    __dev_queue_xmit+0xad6/0x3230
[   42.856128][ T3497]                    tx+0x64/0x100
[   42.861209][ T3497]                    kthread+0x234/0x440
[   42.866816][ T3497]                    kthread+0x3f6/0x4f0
[   42.872415][ T3497]                    ret_from_fork+0x1f/0x30
[   42.878375][ T3497]  }
[   42.880846][ T3497]  ... key      at: [<ffffffff8da1d808>] noop_qdisc+0x108/0x320
[   42.888454][ T3497] 
[   42.888454][ T3497] the dependencies between the lock to be acquired
[   42.888458][ T3497]  and SOFTIRQ-irq-unsafe lock:
[   42.901926][ T3497] -> (fs_reclaim){+.+.}-{0:0} {
[   42.906757][ T3497]    HARDIRQ-ON-W at:
[   42.910705][ T3497]                     lock_acquire+0x1db/0x4f0
[   42.916831][ T3497]                     fs_reclaim_acquire+0x83/0x120
[   42.923389][ T3497]                     slab_pre_alloc_hook+0x22/0xc0
[   42.929948][ T3497]                     kmem_cache_alloc_trace+0x49/0x290
[   42.936851][ T3497]                     wq_numa_init+0x122/0x49f
[   42.942978][ T3497]                     workqueue_init+0x18/0x5e1
[   42.949190][ T3497]                     kernel_init_freeable+0x40a/0x5c5
[   42.956011][ T3497]                     kernel_init+0x19/0x290
[   42.961965][ T3497]                     ret_from_fork+0x1f/0x30
[   42.968015][ T3497]    SOFTIRQ-ON-W at:
[   42.971970][ T3497]                     lock_acquire+0x1db/0x4f0
[   42.978096][ T3497]                     fs_reclaim_acquire+0x83/0x120
[   42.984654][ T3497]                     slab_pre_alloc_hook+0x22/0xc0
[   42.991215][ T3497]                     kmem_cache_alloc_trace+0x49/0x290
[   42.998121][ T3497]                     wq_numa_init+0x122/0x49f
[   43.004246][ T3497]                     workqueue_init+0x18/0x5e1
[   43.010458][ T3497]                     kernel_init_freeable+0x40a/0x5c5
[   43.017275][ T3497]                     kernel_init+0x19/0x290
[   43.023225][ T3497]                     ret_from_fork+0x1f/0x30
[   43.029263][ T3497]    INITIAL USE at:
[   43.033130][ T3497]                    lock_acquire+0x1db/0x4f0
[   43.039168][ T3497]                    fs_reclaim_acquire+0x83/0x120
[   43.045640][ T3497]                    slab_pre_alloc_hook+0x22/0xc0
[   43.052117][ T3497]                    kmem_cache_alloc_trace+0x49/0x290
[   43.058936][ T3497]                    wq_numa_init+0x122/0x49f
[   43.064972][ T3497]                    workqueue_init+0x18/0x5e1
[   43.071099][ T3497]                    kernel_init_freeable+0x40a/0x5c5
[   43.077829][ T3497]                    kernel_init+0x19/0x290
[   43.083690][ T3497]                    ret_from_fork+0x1f/0x30
[   43.089640][ T3497]  }
[   43.092113][ T3497]  ... key      at: [<ffffffff8c9dcce0>] __fs_reclaim_map+0x0/0x160
[   43.100064][ T3497]  ... acquired at:
[   43.103836][ T3497]    lock_acquire+0x1db/0x4f0
[   43.108487][ T3497]    fs_reclaim_acquire+0x83/0x120
[   43.113569][ T3497]    slab_pre_alloc_hook+0x22/0xc0
[   43.118656][ T3497]    __kmalloc_node+0x71/0x390
[   43.123393][ T3497]    kvmalloc_node+0x80/0x140
[   43.128042][ T3497]    get_dist_table+0x83/0x2c0
[   43.132774][ T3497]    netem_change+0xa05/0x20c0
[   43.137510][ T3497]    netem_init+0x58/0xb0
[   43.141807][ T3497]    qdisc_create+0x8ae/0x1390
[   43.146543][ T3497]    tc_modify_qdisc+0xac5/0x1710
[   43.151537][ T3497]    rtnetlink_rcv_msg+0x993/0xee0
[   43.156617][ T3497]    netlink_rcv_skb+0x1cf/0x410
[   43.161525][ T3497]    netlink_unicast+0x7b6/0x980
[   43.166433][ T3497]    netlink_sendmsg+0xa30/0xd60
[   43.171341][ T3497]    ____sys_sendmsg+0x59e/0x8f0
[   43.176254][ T3497]    ___sys_sendmsg+0x252/0x2e0
[   43.181076][ T3497]    __se_sys_sendmsg+0x19a/0x260
[   43.186071][ T3497]    do_syscall_64+0x3d/0xb0
[   43.190630][ T3497]    entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   43.196668][ T3497] 
[   43.198969][ T3497] 
[   43.198969][ T3497] stack backtrace:
[   43.204826][ T3497] CPU: 0 PID: 3497 Comm: syz-executor305 Not tainted 5.15.119-syzkaller #0
[   43.213382][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   43.223409][ T3497] Call Trace:
[   43.226667][ T3497]  <TASK>
[   43.229571][ T3497]  dump_stack_lvl+0x1e3/0x2cb
[   43.234223][ T3497]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   43.239828][ T3497]  ? panic+0x84d/0x84d
[   43.243868][ T3497]  ? print_shortest_lock_dependencies+0xee/0x150
[   43.250175][ T3497]  validate_chain+0x4cfe/0x58b0
[   43.255005][ T3497]  ? reacquire_held_locks+0x660/0x660
[   43.260350][ T3497]  ? validate_chain+0x112/0x58b0
[   43.265274][ T3497]  ? reacquire_held_locks+0x660/0x660
[   43.270619][ T3497]  ? mark_lock+0x98/0x340
[   43.274920][ T3497]  __lock_acquire+0x1295/0x1ff0
[   43.279747][ T3497]  lock_acquire+0x1db/0x4f0
[   43.284223][ T3497]  ? slab_pre_alloc_hook+0x22/0xc0
[   43.289308][ T3497]  ? read_lock_is_recursive+0x10/0x10
[   43.294658][ T3497]  fs_reclaim_acquire+0x83/0x120
[   43.299569][ T3497]  ? slab_pre_alloc_hook+0x22/0xc0
[   43.304656][ T3497]  slab_pre_alloc_hook+0x22/0xc0
[   43.309564][ T3497]  __kmalloc_node+0x71/0x390
[   43.314126][ T3497]  ? kvmalloc_node+0x80/0x140
[   43.318775][ T3497]  ? __bpf_trace_softirq+0x10/0x10
[   43.323861][ T3497]  kvmalloc_node+0x80/0x140
[   43.328337][ T3497]  get_dist_table+0x83/0x2c0
[   43.332898][ T3497]  netem_change+0xa05/0x20c0
[   43.337465][ T3497]  ? netem_destroy+0xb0/0xb0
[   43.342024][ T3497]  ? debug_object_init+0x10/0x10
[   43.346939][ T3497]  ? memset+0x1f/0x40
[   43.350891][ T3497]  ? lockdep_init_map_type+0x9d/0x8d0
[   43.356241][ T3497]  ? memset+0x1f/0x40
[   43.360193][ T3497]  ? __hrtimer_init+0x181/0x260
[   43.365017][ T3497]  netem_init+0x58/0xb0
[   43.369157][ T3497]  ? qdisc_peek_dequeued+0x220/0x220
[   43.374413][ T3497]  qdisc_create+0x8ae/0x1390
[   43.378978][ T3497]  ? qdisc_notify+0x380/0x380
[   43.383631][ T3497]  ? apparmor_capable+0x12e/0x190
[   43.388629][ T3497]  tc_modify_qdisc+0xac5/0x1710
[   43.393455][ T3497]  ? rcu_lock_release+0x20/0x20
[   43.398281][ T3497]  ? rcu_lock_release+0x20/0x20
[   43.403103][ T3497]  rtnetlink_rcv_msg+0x993/0xee0
[   43.408016][ T3497]  ? reacquire_held_locks+0x660/0x660
[   43.413363][ T3497]  ? rtnetlink_bind+0x80/0x80
[   43.418012][ T3497]  ? is_bpf_text_address+0x24f/0x260
[   43.423268][ T3497]  ? stack_trace_save+0x1c0/0x1c0
[   43.428263][ T3497]  ? __kernel_text_address+0x94/0x100
[   43.433608][ T3497]  ? unwind_get_return_address+0x49/0x80
[   43.439213][ T3497]  ? arch_stack_walk+0xf3/0x140
[   43.444037][ T3497]  ? mark_lock+0x98/0x340
[   43.448341][ T3497]  ? mark_lock+0x98/0x340
[   43.452642][ T3497]  ? __lock_acquire+0x1295/0x1ff0
[   43.457642][ T3497]  netlink_rcv_skb+0x1cf/0x410
[   43.462379][ T3497]  ? rtnetlink_bind+0x80/0x80
[   43.467028][ T3497]  ? netlink_ack+0xb10/0xb10
[   43.471590][ T3497]  netlink_unicast+0x7b6/0x980
[   43.476328][ T3497]  ? netlink_detachskb+0x90/0x90
[   43.481236][ T3497]  ? 0xffffffff81000000
[   43.485361][ T3497]  ? __check_object_size+0x300/0x410
[   43.490617][ T3497]  ? bpf_lsm_netlink_send+0x5/0x10
[   43.495703][ T3497]  netlink_sendmsg+0xa30/0xd60
[   43.500442][ T3497]  ? netlink_getsockopt+0x5b0/0x5b0
[   43.505613][ T3497]  ? aa_sock_msg_perm+0x91/0x150
[   43.510524][ T3497]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   43.515782][ T3497]  ? security_socket_sendmsg+0x7d/0xa0
[   43.521210][ T3497]  ? netlink_getsockopt+0x5b0/0x5b0
[   43.526381][ T3497]  ____sys_sendmsg+0x59e/0x8f0
[   43.531121][ T3497]  ? iovec_from_user+0x300/0x390
[   43.536034][ T3497]  ? __sys_sendmsg_sock+0x30/0x30
[   43.541034][ T3497]  ___sys_sendmsg+0x252/0x2e0
[   43.545685][ T3497]  ? __sys_sendmsg+0x260/0x260
[   43.550432][ T3497]  ? __lock_acquire+0x1295/0x1ff0
[   43.555446][ T3497]  ? __context_tracking_enter+0x5f/0x90
[   43.560967][ T3497]  ? __context_tracking_exit+0x4c/0x80
[   43.566398][ T3497]  ? __fdget+0x158/0x220
[   43.570613][ T3497]  __se_sys_sendmsg+0x19a/0x260
[   43.575439][ T3497]  ? __x64_sys_sendmsg+0x80/0x80
[   43.580351][ T3497]  ? syscall_enter_from_user_mode+0x2e/0x230
[   43.586319][ T3497]  ? lockdep_hardirqs_on+0x94/0x130
[   43.591490][ T3497]  ? syscall_enter_from_user_mode+0x2e/0x230
[   43.597442][ T3497]  do_syscall_64+0x3d/0xb0
[   43.601829][ T3497]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   43.607693][ T3497] RIP: 0033:0x7f2c07fd01f9
[   43.612168][ T3497] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   43.631834][ T3497] RSP: 002b:00007ffc4a9bb2e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   43.640218][ T3497] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2c07fd01f9
[   43.648168][ T3497] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
[   43.656121][ T3497] RBP: 00007f2c07f941e0 R08: 00000000ffffffff R09: 0000000000000000
[   43.664066][ T3497] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f2c07f94270
[   43.672012][ T3497] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   43.679968][ T3497]  </TASK>
[   43.683014][ T3497] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   43.692467][ T3497] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3497, name: syz-executor305
[   43.701935][ T3497] INFO: lockdep is turned off.
[   43.706680][ T3497] Preemption disabled at:
[   43.706685][ T3497] [<0000000000000000>] 0x0
[   43.715408][ T3497] CPU: 0 PID: 3497 Comm: syz-executor305 Not tainted 5.15.119-syzkaller #0
[   43.723964][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023
[   43.733993][ T3497] Call Trace:
[   43.737244][ T3497]  <TASK>
[   43.740149][ T3497]  dump_stack_lvl+0x1e3/0x2cb
[   43.744802][ T3497]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   43.750410][ T3497]  ? panic+0x84d/0x84d
[   43.754453][ T3497]  ? rcu_is_watching+0x11/0xa0
[   43.759186][ T3497]  ? rcu_is_watching+0x11/0xa0
[   43.763921][ T3497]  ___might_sleep+0x547/0x6a0
[   43.768575][ T3497]  ? __might_sleep+0xc0/0xc0
[   43.773138][ T3497]  slab_pre_alloc_hook+0x44/0xc0
[   43.778050][ T3497]  __kmalloc_node+0x71/0x390
[   43.782612][ T3497]  ? kvmalloc_node+0x80/0x140
[   43.787262][ T3497]  ? __bpf_trace_softirq+0x10/0x10
[   43.792352][ T3497]  kvmalloc_node+0x80/0x140
[   43.796839][ T3497]  get_dist_table+0x83/0x2c0
[   43.801403][ T3497]  netem_change+0xa05/0x20c0
[   43.805970][ T3497]  ? netem_destroy+0xb0/0xb0
[   43.810529][ T3497]  ? debug_object_init+0x10/0x10
[   43.815442][ T3497]  ? memset+0x1f/0x40
[   43.819394][ T3497]  ? lockdep_init_map_type+0x9d/0x8d0
[   43.824742][ T3497]  ? memset+0x1f/0x40
[   43.828706][ T3497]  ? __hrtimer_init+0x181/0x260
[   43.833530][ T3497]  netem_init+0x58/0xb0
[   43.837658][ T3497]  ? qdisc_peek_dequeued+0x220/0x220
[   43.842915][ T3497]  qdisc_create+0x8ae/0x1390
[   43.847482][ T3497]  ? qdisc_notify+0x380/0x380
[   43.852130][ T3497]  ? apparmor_capable+0x12e/0x190
[   43.857139][ T3497]  tc_modify_qdisc+0xac5/0x1710
[   43.861975][ T3497]  ? rcu_lock_release+0x20/0x20
[   43.866801][ T3497]  ? rcu_lock_release+0x20/0x20
[   43.871621][ T3497]  rtnetlink_rcv_msg+0x993/0xee0
[   43.876531][ T3497]  ? reacquire_held_locks+0x660/0x660
[   43.881873][ T3497]  ? rtnetlink_bind+0x80/0x80
[   43.886519][ T3497]  ? is_bpf_text_address+0x24f/0x260
[   43.891774][ T3497]  ? stack_trace_save+0x1c0/0x1c0
[   43.896768][ T3497]  ? __kernel_text_address+0x94/0x100
[   43.902114][ T3497]  ? unwind_get_return_address+0x49/0x80
[   43.907721][ T3497]  ? arch_stack_walk+0xf3/0x140
[   43.912546][ T3497]  ? mark_lock+0x98/0x340
[   43.916845][ T3497]  ? mark_lock+0x98/0x340
[   43.921149][ T3497]  ? __lock_acquire+0x1295/0x1ff0
[   43.926153][ T3497]  netlink_rcv_skb+0x1cf/0x410
[   43.930893][ T3497]  ? rtnetlink_bind+0x80/0x80
[   43.935542][ T3497]  ? netlink_ack+0xb10/0xb10
[   43.940105][ T3497]  netlink_unicast+0x7b6/0x980
[   43.944843][ T3497]  ? netlink_detachskb+0x90/0x90
[   43.949752][ T3497]  ? 0xffffffff81000000
[   43.953878][ T3497]  ? __check_object_size+0x300/0x410
[   43.959138][ T3497]  ? bpf_lsm_netlink_send+0x5/0x10
[   43.964222][ T3497]  netlink_sendmsg+0xa30/0xd60
[   43.968966][ T3497]  ? netlink_getsockopt+0x5b0/0x5b0
[   43.974135][ T3497]  ? aa_sock_msg_perm+0x91/0x150
[   43.979047][ T3497]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   43.984390][ T3497]  ? security_socket_sendmsg+0x7d/0xa0
[   43.989821][ T3497]  ? netlink_getsockopt+0x5b0/0x5b0
[   43.994995][ T3497]  ____sys_sendmsg+0x59e/0x8f0
[   43.999733][ T3497]  ? iovec_from_user+0x300/0x390
[   44.004645][ T3497]  ? __sys_sendmsg_sock+0x30/0x30
[   44.009646][ T3497]  ___sys_sendmsg+0x252/0x2e0
[   44.014296][ T3497]  ? __sys_sendmsg+0x260/0x260
[   44.019034][ T3497]  ? __lock_acquire+0x1295/0x1ff0
[   44.024038][ T3497]  ? __context_tracking_enter+0x5f/0x90
[   44.029555][ T3497]  ? __context_tracking_exit+0x4c/0x80
[   44.034984][ T3497]  ? __fdget+0x158/0x220
[   44.039198][ T3497]  __se_sys_sendmsg+0x19a/0x260
[   44.044019][ T3497]  ? __x64_sys_sendmsg+0x80/0x80
[   44.048934][ T3497]  ? syscall_enter_from_user_mode+0x2e/0x230
[   44.054892][ T3497]  ? lockdep_hardirqs_on+0x94/0x130
[   44.060066][ T3497]  ? syscall_enter_from_user_mode+0x2e/0x230
[   44.066016][ T3497]  do_syscall_64+0x3d/0xb0
[   44.070409][ T3497]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   44.076276][ T3497] RIP: 0033:0x7f2c07fd01f9
[   44.080665][ T3497] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
[   44.100242][ T3497] RSP: 002b:00007ffc4a9bb2e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   44.108632][ T3497] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2c07fd01f9
[   44.116581][ T3497] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
[   44.124526][ T3497] RBP: 00007f2c07f941e0 R08: 00000000ffffffff R09: 0000000000000000
[   44.132470][ T3497] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f2c07f94270
[   44.140424][ T3497] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[   44.148375][ T3497]  </TASK>