Warning: Permanently added '10.128.0.35' (ED25519) to the list of known hosts.
executing program
[   54.242836][ T3486] 
[   54.245192][ T3486] =====================================================
[   54.252103][ T3486] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
[   54.259542][ T3486] 5.15.126-syzkaller #0 Not tainted
[   54.264711][ T3486] -----------------------------------------------------
[   54.271703][ T3486] syz-executor628/3486 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire:
[   54.279752][ T3486] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0
[   54.288712][ T3486] 
[   54.288712][ T3486] and this task is already holding:
[   54.296054][ T3486] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   54.305250][ T3486] which would create a new lock dependency:
[   54.311114][ T3486]  (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0}
[   54.318664][ T3486] 
[   54.318664][ T3486] but this new dependency connects a SOFTIRQ-irq-safe lock:
[   54.328087][ T3486]  (noop_qdisc.q.lock){+.-.}-{2:2}
[   54.328106][ T3486] 
[   54.328106][ T3486] ... which became SOFTIRQ-irq-safe at:
[   54.340886][ T3486]   lock_acquire+0x1db/0x4f0
[   54.345459][ T3486]   _raw_spin_lock+0x2a/0x40
[   54.350032][ T3486]   net_tx_action+0x6c5/0x8e0
[   54.354690][ T3486]   __do_softirq+0x3b3/0x93a
[   54.359266][ T3486]   do_softirq+0x162/0x240
[   54.363666][ T3486]   __local_bh_enable_ip+0x1b1/0x1f0
[   54.368932][ T3486]   dev_deactivate_many+0x524/0xbf0
[   54.374115][ T3486]   dev_deactivate+0x177/0x270
[   54.378882][ T3486]   linkwatch_do_dev+0x104/0x160
[   54.383804][ T3486]   __linkwatch_run_queue+0x4ca/0x7f0
[   54.389158][ T3486]   linkwatch_event+0x48/0x50
[   54.393820][ T3486]   process_one_work+0x8a1/0x10c0
[   54.398832][ T3486]   worker_thread+0xaca/0x1280
[   54.403581][ T3486]   kthread+0x3f6/0x4f0
[   54.407713][ T3486]   ret_from_fork+0x1f/0x30
[   54.412199][ T3486] 
[   54.412199][ T3486] to a SOFTIRQ-irq-unsafe lock:
[   54.419282][ T3486]  (fs_reclaim){+.+.}-{0:0}
[   54.419318][ T3486] 
[   54.419318][ T3486] ... which became SOFTIRQ-irq-unsafe at:
[   54.431655][ T3486] ...
[   54.431660][ T3486]   lock_acquire+0x1db/0x4f0
[   54.438797][ T3486]   fs_reclaim_acquire+0x83/0x120
[   54.443806][ T3486]   slab_pre_alloc_hook+0x22/0xc0
[   54.448812][ T3486]   kmem_cache_alloc_trace+0x49/0x290
[   54.454166][ T3486]   wq_numa_init+0x122/0x49f
[   54.458740][ T3486]   workqueue_init+0x18/0x5e1
[   54.463398][ T3486]   kernel_init_freeable+0x40a/0x5c5
[   54.468769][ T3486]   kernel_init+0x19/0x290
[   54.473168][ T3486]   ret_from_fork+0x1f/0x30
[   54.477662][ T3486] 
[   54.477662][ T3486] other info that might help us debug this:
[   54.477662][ T3486] 
[   54.487870][ T3486]  Possible interrupt unsafe locking scenario:
[   54.487870][ T3486] 
[   54.496166][ T3486]        CPU0                    CPU1
[   54.501508][ T3486]        ----                    ----
[   54.506852][ T3486]   lock(fs_reclaim);
[   54.510815][ T3486]                                local_irq_disable();
[   54.517547][ T3486]                                lock(noop_qdisc.q.lock);
[   54.524641][ T3486]                                lock(fs_reclaim);
[   54.531122][ T3486]   <Interrupt>
[   54.534564][ T3486]     lock(noop_qdisc.q.lock);
[   54.539307][ T3486] 
[   54.539307][ T3486]  *** DEADLOCK ***
[   54.539307][ T3486] 
[   54.547422][ T3486] 2 locks held by syz-executor628/3486:
[   54.552942][ T3486]  #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[   54.562324][ T3486]  #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   54.571979][ T3486] 
[   54.571979][ T3486] the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
[   54.582362][ T3486] -> (noop_qdisc.q.lock){+.-.}-{2:2} {
[   54.587818][ T3486]    HARDIRQ-ON-W at:
[   54.591779][ T3486]                     lock_acquire+0x1db/0x4f0
[   54.597944][ T3486]                     _raw_spin_lock+0x2a/0x40
[   54.604081][ T3486]                     __dev_queue_xmit+0xad6/0x3230
[   54.610654][ T3486]                     tx+0x64/0x100
[   54.615829][ T3486]                     kthread+0x234/0x440
[   54.621525][ T3486]                     kthread+0x3f6/0x4f0
[   54.627221][ T3486]                     ret_from_fork+0x1f/0x30
[   54.633266][ T3486]    IN-SOFTIRQ-W at:
[   54.637225][ T3486]                     lock_acquire+0x1db/0x4f0
[   54.643373][ T3486]                     _raw_spin_lock+0x2a/0x40
[   54.649503][ T3486]                     net_tx_action+0x6c5/0x8e0
[   54.655724][ T3486]                     __do_softirq+0x3b3/0x93a
[   54.661863][ T3486]                     do_softirq+0x162/0x240
[   54.667821][ T3486]                     __local_bh_enable_ip+0x1b1/0x1f0
[   54.674648][ T3486]                     dev_deactivate_many+0x524/0xbf0
[   54.681391][ T3486]                     dev_deactivate+0x177/0x270
[   54.687697][ T3486]                     linkwatch_do_dev+0x104/0x160
[   54.694182][ T3486]                     __linkwatch_run_queue+0x4ca/0x7f0
[   54.701098][ T3486]                     linkwatch_event+0x48/0x50
[   54.707315][ T3486]                     process_one_work+0x8a1/0x10c0
[   54.713881][ T3486]                     worker_thread+0xaca/0x1280
[   54.720192][ T3486]                     kthread+0x3f6/0x4f0
[   54.725888][ T3486]                     ret_from_fork+0x1f/0x30
[   54.731938][ T3486]    INITIAL USE at:
[   54.735828][ T3486]                    lock_acquire+0x1db/0x4f0
[   54.741872][ T3486]                    _raw_spin_lock+0x2a/0x40
[   54.747923][ T3486]                    __dev_queue_xmit+0xad6/0x3230
[   54.754414][ T3486]                    tx+0x64/0x100
[   54.759511][ T3486]                    kthread+0x234/0x440
[   54.765125][ T3486]                    kthread+0x3f6/0x4f0
[   54.770739][ T3486]                    ret_from_fork+0x1f/0x30
[   54.776700][ T3486]  }
[   54.779177][ T3486]  ... key      at: [<ffffffff8da20808>] noop_qdisc+0x108/0x320
[   54.786795][ T3486] 
[   54.786795][ T3486] the dependencies between the lock to be acquired
[   54.786802][ T3486]  and SOFTIRQ-irq-unsafe lock:
[   54.800279][ T3486] -> (fs_reclaim){+.+.}-{0:0} {
[   54.805126][ T3486]    HARDIRQ-ON-W at:
[   54.809088][ T3486]                     lock_acquire+0x1db/0x4f0
[   54.815231][ T3486]                     fs_reclaim_acquire+0x83/0x120
[   54.821810][ T3486]                     slab_pre_alloc_hook+0x22/0xc0
[   54.828403][ T3486]                     kmem_cache_alloc_trace+0x49/0x290
[   54.835317][ T3486]                     wq_numa_init+0x122/0x49f
[   54.841451][ T3486]                     workqueue_init+0x18/0x5e1
[   54.847669][ T3486]                     kernel_init_freeable+0x40a/0x5c5
[   54.854499][ T3486]                     kernel_init+0x19/0x290
[   54.860483][ T3486]                     ret_from_fork+0x1f/0x30
[   54.866543][ T3486]    SOFTIRQ-ON-W at:
[   54.870524][ T3486]                     lock_acquire+0x1db/0x4f0
[   54.876668][ T3486]                     fs_reclaim_acquire+0x83/0x120
[   54.883241][ T3486]                     slab_pre_alloc_hook+0x22/0xc0
[   54.889808][ T3486]                     kmem_cache_alloc_trace+0x49/0x290
[   54.896726][ T3486]                     wq_numa_init+0x122/0x49f
[   54.902864][ T3486]                     workqueue_init+0x18/0x5e1
[   54.909088][ T3486]                     kernel_init_freeable+0x40a/0x5c5
[   54.915920][ T3486]                     kernel_init+0x19/0x290
[   54.921879][ T3486]                     ret_from_fork+0x1f/0x30
[   54.927930][ T3486]    INITIAL USE at:
[   54.931808][ T3486]                    lock_acquire+0x1db/0x4f0
[   54.937867][ T3486]                    fs_reclaim_acquire+0x83/0x120
[   54.944352][ T3486]                    slab_pre_alloc_hook+0x22/0xc0
[   54.950835][ T3486]                    kmem_cache_alloc_trace+0x49/0x290
[   54.957670][ T3486]                    wq_numa_init+0x122/0x49f
[   54.963721][ T3486]                    workqueue_init+0x18/0x5e1
[   54.969944][ T3486]                    kernel_init_freeable+0x40a/0x5c5
[   54.976692][ T3486]                    kernel_init+0x19/0x290
[   54.982570][ T3486]                    ret_from_fork+0x1f/0x30
[   54.988623][ T3486]  }
[   54.991102][ T3486]  ... key      at: [<ffffffff8c9dfba0>] __fs_reclaim_map+0x0/0x160
[   54.999083][ T3486]  ... acquired at:
[   55.002867][ T3486]    lock_acquire+0x1db/0x4f0
[   55.007541][ T3486]    fs_reclaim_acquire+0x83/0x120
[   55.012641][ T3486]    slab_pre_alloc_hook+0x22/0xc0
[   55.017738][ T3486]    __kmalloc_node+0x71/0x390
[   55.022488][ T3486]    kvmalloc_node+0x80/0x140
[   55.027152][ T3486]    get_dist_table+0x83/0x2c0
[   55.031899][ T3486]    netem_change+0xa05/0x20c0
[   55.036643][ T3486]    netem_init+0x58/0xb0
[   55.040947][ T3486]    qdisc_create+0x8ae/0x1390
[   55.045712][ T3486]    tc_modify_qdisc+0xac5/0x1710
[   55.050735][ T3486]    rtnetlink_rcv_msg+0x993/0xee0
[   55.055829][ T3486]    netlink_rcv_skb+0x1cf/0x410
[   55.060747][ T3486]    netlink_unicast+0x7b6/0x980
[   55.065662][ T3486]    netlink_sendmsg+0xa30/0xd60
[   55.070583][ T3486]    ____sys_sendmsg+0x59e/0x8f0
[   55.075505][ T3486]    ___sys_sendmsg+0x252/0x2e0
[   55.080342][ T3486]    __se_sys_sendmsg+0x19a/0x260
[   55.085344][ T3486]    do_syscall_64+0x3d/0xb0
[   55.089916][ T3486]    entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   55.095967][ T3486] 
[   55.098274][ T3486] 
[   55.098274][ T3486] stack backtrace:
[   55.104142][ T3486] CPU: 1 PID: 3486 Comm: syz-executor628 Not tainted 5.15.126-syzkaller #0
[   55.112716][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   55.122763][ T3486] Call Trace:
[   55.126034][ T3486]  <TASK>
[   55.128954][ T3486]  dump_stack_lvl+0x1e3/0x2cb
[   55.133633][ T3486]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   55.139256][ T3486]  ? panic+0x84d/0x84d
[   55.143313][ T3486]  ? print_shortest_lock_dependencies+0xee/0x150
[   55.149632][ T3486]  validate_chain+0x4cfe/0x58b0
[   55.154481][ T3486]  ? reacquire_held_locks+0x660/0x660
[   55.159840][ T3486]  ? validate_chain+0x112/0x58b0
[   55.164773][ T3486]  ? reacquire_held_locks+0x660/0x660
[   55.170131][ T3486]  ? mark_lock+0x98/0x340
[   55.174458][ T3486]  __lock_acquire+0x1295/0x1ff0
[   55.179311][ T3486]  lock_acquire+0x1db/0x4f0
[   55.183817][ T3486]  ? slab_pre_alloc_hook+0x22/0xc0
[   55.188922][ T3486]  ? read_lock_is_recursive+0x10/0x10
[   55.194297][ T3486]  fs_reclaim_acquire+0x83/0x120
[   55.199229][ T3486]  ? slab_pre_alloc_hook+0x22/0xc0
[   55.204347][ T3486]  slab_pre_alloc_hook+0x22/0xc0
[   55.209276][ T3486]  __kmalloc_node+0x71/0x390
[   55.213872][ T3486]  ? kvmalloc_node+0x80/0x140
[   55.218533][ T3486]  ? __bpf_trace_softirq+0x10/0x10
[   55.223629][ T3486]  kvmalloc_node+0x80/0x140
[   55.228116][ T3486]  get_dist_table+0x83/0x2c0
[   55.232695][ T3486]  netem_change+0xa05/0x20c0
[   55.237277][ T3486]  ? netem_destroy+0xb0/0xb0
[   55.241852][ T3486]  ? debug_object_init+0x10/0x10
[   55.246785][ T3486]  ? memset+0x1f/0x40
[   55.250749][ T3486]  ? lockdep_init_map_type+0x9d/0x8d0
[   55.256106][ T3486]  ? memset+0x1f/0x40
[   55.260064][ T3486]  ? __hrtimer_init+0x181/0x260
[   55.264895][ T3486]  netem_init+0x58/0xb0
[   55.269029][ T3486]  ? qdisc_peek_dequeued+0x220/0x220
[   55.274295][ T3486]  qdisc_create+0x8ae/0x1390
[   55.278866][ T3486]  ? qdisc_notify+0x380/0x380
[   55.283549][ T3486]  ? apparmor_capable+0x12e/0x190
[   55.288556][ T3486]  tc_modify_qdisc+0xac5/0x1710
[   55.293397][ T3486]  ? rcu_lock_release+0x20/0x20
[   55.298336][ T3486]  ? rcu_lock_release+0x20/0x20
[   55.303176][ T3486]  rtnetlink_rcv_msg+0x993/0xee0
[   55.308104][ T3486]  ? reacquire_held_locks+0x660/0x660
[   55.313456][ T3486]  ? rtnetlink_bind+0x80/0x80
[   55.318112][ T3486]  ? is_bpf_text_address+0x24f/0x260
[   55.323384][ T3486]  ? stack_trace_save+0x1c0/0x1c0
[   55.328390][ T3486]  ? __kernel_text_address+0x94/0x100
[   55.333756][ T3486]  ? unwind_get_return_address+0x49/0x80
[   55.339373][ T3486]  ? arch_stack_walk+0xf3/0x140
[   55.344203][ T3486]  ? mark_lock+0x98/0x340
[   55.348515][ T3486]  ? mark_lock+0x98/0x340
[   55.352828][ T3486]  ? __lock_acquire+0x1295/0x1ff0
[   55.357851][ T3486]  netlink_rcv_skb+0x1cf/0x410
[   55.362602][ T3486]  ? rtnetlink_bind+0x80/0x80
[   55.367262][ T3486]  ? netlink_ack+0xb10/0xb10
[   55.371841][ T3486]  netlink_unicast+0x7b6/0x980
[   55.376589][ T3486]  ? netlink_detachskb+0x90/0x90
[   55.381504][ T3486]  ? 0xffffffff81000000
[   55.385636][ T3486]  ? __check_object_size+0x300/0x410
[   55.390908][ T3486]  ? bpf_lsm_netlink_send+0x5/0x10
[   55.396010][ T3486]  netlink_sendmsg+0xa30/0xd60
[   55.400761][ T3486]  ? netlink_getsockopt+0x5b0/0x5b0
[   55.405944][ T3486]  ? aa_sock_msg_perm+0x91/0x150
[   55.410868][ T3486]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   55.416132][ T3486]  ? security_socket_sendmsg+0x7d/0xa0
[   55.421578][ T3486]  ? netlink_getsockopt+0x5b0/0x5b0
[   55.426762][ T3486]  ____sys_sendmsg+0x59e/0x8f0
[   55.431512][ T3486]  ? iovec_from_user+0x300/0x390
[   55.436434][ T3486]  ? __sys_sendmsg_sock+0x30/0x30
[   55.441479][ T3486]  ___sys_sendmsg+0x252/0x2e0
[   55.446142][ T3486]  ? __sys_sendmsg+0x260/0x260
[   55.450890][ T3486]  ? __lock_acquire+0x1295/0x1ff0
[   55.455907][ T3486]  ? read_lock_is_recursive+0x10/0x10
[   55.461263][ T3486]  ? __context_tracking_exit+0x4c/0x80
[   55.466724][ T3486]  ? __fdget+0x158/0x220
[   55.470950][ T3486]  __se_sys_sendmsg+0x19a/0x260
[   55.475810][ T3486]  ? __x64_sys_sendmsg+0x80/0x80
[   55.480744][ T3486]  ? syscall_enter_from_user_mode+0x2e/0x230
[   55.486714][ T3486]  ? lockdep_hardirqs_on+0x94/0x130
[   55.491901][ T3486]  ? syscall_enter_from_user_mode+0x2e/0x230
[   55.497871][ T3486]  do_syscall_64+0x3d/0xb0
[   55.502283][ T3486]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   55.508167][ T3486] RIP: 0033:0x7fbf3f8e8939
[   55.512571][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   55.532160][ T3486] RSP: 002b:00007ffd21da4988 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   55.540580][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbf3f8e8939
[   55.548537][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
[   55.556491][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd21da4a00
[   55.564443][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   55.572396][ T3486] R13: 00007ffd21da4b88 R14: 0000000000000001 R15: 0000000000000001
[   55.580358][ T3486]  </TASK>
[   55.583463][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   55.592935][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor628
[   55.602425][ T3486] INFO: lockdep is turned off.
[   55.607183][ T3486] Preemption disabled at:
[   55.607193][ T3486] [<0000000000000000>] 0x0
[   55.615955][ T3486] CPU: 1 PID: 3486 Comm: syz-executor628 Not tainted 5.15.126-syzkaller #0
[   55.624538][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   55.634585][ T3486] Call Trace:
[   55.637864][ T3486]  <TASK>
[   55.640785][ T3486]  dump_stack_lvl+0x1e3/0x2cb
[   55.645458][ T3486]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   55.651080][ T3486]  ? panic+0x84d/0x84d
[   55.655132][ T3486]  ? rcu_is_watching+0x11/0xa0
[   55.659877][ T3486]  ? rcu_is_watching+0x11/0xa0
[   55.664620][ T3486]  ___might_sleep+0x547/0x6a0
[   55.669279][ T3486]  ? __might_sleep+0xc0/0xc0
[   55.673858][ T3486]  slab_pre_alloc_hook+0x44/0xc0
[   55.678782][ T3486]  __kmalloc_node+0x71/0x390
[   55.683363][ T3486]  ? kvmalloc_node+0x80/0x140
[   55.688018][ T3486]  ? __bpf_trace_softirq+0x10/0x10
[   55.693119][ T3486]  kvmalloc_node+0x80/0x140
[   55.697609][ T3486]  get_dist_table+0x83/0x2c0
[   55.702187][ T3486]  netem_change+0xa05/0x20c0
[   55.706770][ T3486]  ? netem_destroy+0xb0/0xb0
[   55.711340][ T3486]  ? debug_object_init+0x10/0x10
[   55.716259][ T3486]  ? memset+0x1f/0x40
[   55.720249][ T3486]  ? lockdep_init_map_type+0x9d/0x8d0
[   55.725628][ T3486]  ? memset+0x1f/0x40
[   55.729601][ T3486]  ? __hrtimer_init+0x181/0x260
[   55.734441][ T3486]  netem_init+0x58/0xb0
[   55.738582][ T3486]  ? qdisc_peek_dequeued+0x220/0x220
[   55.743869][ T3486]  qdisc_create+0x8ae/0x1390
[   55.748479][ T3486]  ? qdisc_notify+0x380/0x380
[   55.753139][ T3486]  ? apparmor_capable+0x12e/0x190
[   55.758180][ T3486]  tc_modify_qdisc+0xac5/0x1710
[   55.763022][ T3486]  ? rcu_lock_release+0x20/0x20
[   55.767862][ T3486]  ? rcu_lock_release+0x20/0x20
[   55.772692][ T3486]  rtnetlink_rcv_msg+0x993/0xee0
[   55.777614][ T3486]  ? reacquire_held_locks+0x660/0x660
[   55.782967][ T3486]  ? rtnetlink_bind+0x80/0x80
[   55.787627][ T3486]  ? is_bpf_text_address+0x24f/0x260
[   55.792890][ T3486]  ? stack_trace_save+0x1c0/0x1c0
[   55.797900][ T3486]  ? __kernel_text_address+0x94/0x100
[   55.803256][ T3486]  ? unwind_get_return_address+0x49/0x80
[   55.808868][ T3486]  ? arch_stack_walk+0xf3/0x140
[   55.813705][ T3486]  ? mark_lock+0x98/0x340
[   55.818020][ T3486]  ? mark_lock+0x98/0x340
[   55.822332][ T3486]  ? __lock_acquire+0x1295/0x1ff0
[   55.827352][ T3486]  netlink_rcv_skb+0x1cf/0x410
[   55.832100][ T3486]  ? rtnetlink_bind+0x80/0x80
[   55.836762][ T3486]  ? netlink_ack+0xb10/0xb10
[   55.841349][ T3486]  netlink_unicast+0x7b6/0x980
[   55.846095][ T3486]  ? netlink_detachskb+0x90/0x90
[   55.851016][ T3486]  ? 0xffffffff81000000
[   55.855152][ T3486]  ? __check_object_size+0x300/0x410
[   55.860415][ T3486]  ? bpf_lsm_netlink_send+0x5/0x10
[   55.865526][ T3486]  netlink_sendmsg+0xa30/0xd60
[   55.870286][ T3486]  ? netlink_getsockopt+0x5b0/0x5b0
[   55.875475][ T3486]  ? aa_sock_msg_perm+0x91/0x150
[   55.880398][ T3486]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   55.885667][ T3486]  ? security_socket_sendmsg+0x7d/0xa0
[   55.891111][ T3486]  ? netlink_getsockopt+0x5b0/0x5b0
[   55.896301][ T3486]  ____sys_sendmsg+0x59e/0x8f0
[   55.901048][ T3486]  ? iovec_from_user+0x300/0x390
[   55.905964][ T3486]  ? __sys_sendmsg_sock+0x30/0x30
[   55.910976][ T3486]  ___sys_sendmsg+0x252/0x2e0
[   55.915632][ T3486]  ? __sys_sendmsg+0x260/0x260
[   55.920372][ T3486]  ? __lock_acquire+0x1295/0x1ff0
[   55.925389][ T3486]  ? read_lock_is_recursive+0x10/0x10
[   55.930746][ T3486]  ? __context_tracking_exit+0x4c/0x80
[   55.936185][ T3486]  ? __fdget+0x158/0x220
[   55.940447][ T3486]  __se_sys_sendmsg+0x19a/0x260
[   55.945275][ T3486]  ? __x64_sys_sendmsg+0x80/0x80
[   55.950195][ T3486]  ? syscall_enter_from_user_mode+0x2e/0x230
[   55.956151][ T3486]  ? lockdep_hardirqs_on+0x94/0x130
[   55.961325][ T3486]  ? syscall_enter_from_user_mode+0x2e/0x230
[   55.967280][ T3486]  do_syscall_64+0x3d/0xb0
[   55.971675][ T3486]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   55.977554][ T3486] RIP: 0033:0x7fbf3f8e8939
[   55.981970][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   56.001560][ T3486] RSP: 002b:00007ffd21da4988 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   56.009960][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbf3f8e8939
[   56.017922][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
[   56.025885][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd21da4a00
[   56.033850][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   56.041813][ T3486] R13: 00007ffd21da4b88 R14: 0000000000000001 R15: 0000000000000001
[   56.049787][ T3486]  </TASK>