Warning: Permanently added '10.128.0.113' (ED25519) to the list of known hosts.
executing program
[   52.760711][ T3487] 
[   52.763079][ T3487] =====================================================
[   52.769997][ T3487] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
[   52.777437][ T3487] 5.15.126-syzkaller #0 Not tainted
[   52.782617][ T3487] -----------------------------------------------------
[   52.789556][ T3487] syz-executor846/3487 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire:
[   52.797614][ T3487] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0
[   52.806577][ T3487] 
[   52.806577][ T3487] and this task is already holding:
[   52.813922][ T3487] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   52.823149][ T3487] which would create a new lock dependency:
[   52.829108][ T3487]  (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0}
[   52.836663][ T3487] 
[   52.836663][ T3487] but this new dependency connects a SOFTIRQ-irq-safe lock:
[   52.846094][ T3487]  (noop_qdisc.q.lock){+.-.}-{2:2}
[   52.846113][ T3487] 
[   52.846113][ T3487] ... which became SOFTIRQ-irq-safe at:
[   52.858918][ T3487]   lock_acquire+0x1db/0x4f0
[   52.863504][ T3487]   _raw_spin_lock+0x2a/0x40
[   52.868115][ T3487]   net_tx_action+0x6c5/0x8e0
[   52.872798][ T3487]   __do_softirq+0x3b3/0x93a
[   52.877391][ T3487]   do_softirq+0x162/0x240
[   52.881803][ T3487]   __local_bh_enable_ip+0x1b1/0x1f0
[   52.887100][ T3487]   dev_deactivate_many+0x524/0xbf0
[   52.892288][ T3487]   dev_deactivate+0x177/0x270
[   52.897045][ T3487]   linkwatch_do_dev+0x104/0x160
[   52.901972][ T3487]   __linkwatch_run_queue+0x4ca/0x7f0
[   52.907338][ T3487]   linkwatch_event+0x48/0x50
[   52.912017][ T3487]   process_one_work+0x8a1/0x10c0
[   52.917028][ T3487]   worker_thread+0xaca/0x1280
[   52.921803][ T3487]   kthread+0x3f6/0x4f0
[   52.925968][ T3487]   ret_from_fork+0x1f/0x30
[   52.930460][ T3487] 
[   52.930460][ T3487] to a SOFTIRQ-irq-unsafe lock:
[   52.937460][ T3487]  (fs_reclaim){+.+.}-{0:0}
[   52.937481][ T3487] 
[   52.937481][ T3487] ... which became SOFTIRQ-irq-unsafe at:
[   52.949837][ T3487] ...
[   52.949842][ T3487]   lock_acquire+0x1db/0x4f0
[   52.956984][ T3487]   fs_reclaim_acquire+0x83/0x120
[   52.962003][ T3487]   slab_pre_alloc_hook+0x22/0xc0
[   52.967104][ T3487]   kmem_cache_alloc_trace+0x49/0x290
[   52.972550][ T3487]   wq_numa_init+0x122/0x49f
[   52.977134][ T3487]   workqueue_init+0x18/0x5e1
[   52.981797][ T3487]   kernel_init_freeable+0x40a/0x5c5
[   52.987075][ T3487]   kernel_init+0x19/0x290
[   52.991480][ T3487]   ret_from_fork+0x1f/0x30
[   52.995973][ T3487] 
[   52.995973][ T3487] other info that might help us debug this:
[   52.995973][ T3487] 
[   53.006185][ T3487]  Possible interrupt unsafe locking scenario:
[   53.006185][ T3487] 
[   53.014489][ T3487]        CPU0                    CPU1
[   53.019839][ T3487]        ----                    ----
[   53.025192][ T3487]   lock(fs_reclaim);
[   53.029163][ T3487]                                local_irq_disable();
[   53.035903][ T3487]                                lock(noop_qdisc.q.lock);
[   53.042999][ T3487]                                lock(fs_reclaim);
[   53.049596][ T3487]   <Interrupt>
[   53.053034][ T3487]     lock(noop_qdisc.q.lock);
[   53.057792][ T3487] 
[   53.057792][ T3487]  *** DEADLOCK ***
[   53.057792][ T3487] 
[   53.065930][ T3487] 2 locks held by syz-executor846/3487:
[   53.071485][ T3487]  #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0
[   53.081052][ T3487]  #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0
[   53.090710][ T3487] 
[   53.090710][ T3487] the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
[   53.101116][ T3487] -> (noop_qdisc.q.lock){+.-.}-{2:2} {
[   53.106588][ T3487]    HARDIRQ-ON-W at:
[   53.110558][ T3487]                     lock_acquire+0x1db/0x4f0
[   53.116706][ T3487]                     _raw_spin_lock+0x2a/0x40
[   53.122855][ T3487]                     __dev_queue_xmit+0xad6/0x3230
[   53.129523][ T3487]                     tx+0x64/0x100
[   53.134756][ T3487]                     kthread+0x234/0x440
[   53.140647][ T3487]                     kthread+0x3f6/0x4f0
[   53.148704][ T3487]                     ret_from_fork+0x1f/0x30
[   53.154950][ T3487]    IN-SOFTIRQ-W at:
[   53.160172][ T3487]                     lock_acquire+0x1db/0x4f0
[   53.166519][ T3487]                     _raw_spin_lock+0x2a/0x40
[   53.172861][ T3487]                     net_tx_action+0x6c5/0x8e0
[   53.179294][ T3487]                     __do_softirq+0x3b3/0x93a
[   53.185449][ T3487]                     do_softirq+0x162/0x240
[   53.191793][ T3487]                     __local_bh_enable_ip+0x1b1/0x1f0
[   53.198828][ T3487]                     dev_deactivate_many+0x524/0xbf0
[   53.205588][ T3487]                     dev_deactivate+0x177/0x270
[   53.211908][ T3487]                     linkwatch_do_dev+0x104/0x160
[   53.218413][ T3487]                     __linkwatch_run_queue+0x4ca/0x7f0
[   53.225476][ T3487]                     linkwatch_event+0x48/0x50
[   53.231740][ T3487]                     process_one_work+0x8a1/0x10c0
[   53.238322][ T3487]                     worker_thread+0xaca/0x1280
[   53.244642][ T3487]                     kthread+0x3f6/0x4f0
[   53.250522][ T3487]                     ret_from_fork+0x1f/0x30
[   53.256766][ T3487]    INITIAL USE at:
[   53.260667][ T3487]                    lock_acquire+0x1db/0x4f0
[   53.266741][ T3487]                    _raw_spin_lock+0x2a/0x40
[   53.273016][ T3487]                    __dev_queue_xmit+0xad6/0x3230
[   53.279627][ T3487]                    tx+0x64/0x100
[   53.284840][ T3487]                    kthread+0x234/0x440
[   53.290644][ T3487]                    kthread+0x3f6/0x4f0
[   53.296278][ T3487]                    ret_from_fork+0x1f/0x30
[   53.302492][ T3487]  }
[   53.304982][ T3487]  ... key      at: [<ffffffff8da20808>] noop_qdisc+0x108/0x320
[   53.312620][ T3487] 
[   53.312620][ T3487] the dependencies between the lock to be acquired
[   53.312628][ T3487]  and SOFTIRQ-irq-unsafe lock:
[   53.326215][ T3487] -> (fs_reclaim){+.+.}-{0:0} {
[   53.331082][ T3487]    HARDIRQ-ON-W at:
[   53.335059][ T3487]                     lock_acquire+0x1db/0x4f0
[   53.341226][ T3487]                     fs_reclaim_acquire+0x83/0x120
[   53.347813][ T3487]                     slab_pre_alloc_hook+0x22/0xc0
[   53.354398][ T3487]                     kmem_cache_alloc_trace+0x49/0x290
[   53.361326][ T3487]                     wq_numa_init+0x122/0x49f
[   53.367571][ T3487]                     workqueue_init+0x18/0x5e1
[   53.373818][ T3487]                     kernel_init_freeable+0x40a/0x5c5
[   53.380656][ T3487]                     kernel_init+0x19/0x290
[   53.386710][ T3487]                     ret_from_fork+0x1f/0x30
[   53.392768][ T3487]    SOFTIRQ-ON-W at:
[   53.396736][ T3487]                     lock_acquire+0x1db/0x4f0
[   53.402894][ T3487]                     fs_reclaim_acquire+0x83/0x120
[   53.409473][ T3487]                     slab_pre_alloc_hook+0x22/0xc0
[   53.416051][ T3487]                     kmem_cache_alloc_trace+0x49/0x290
[   53.423065][ T3487]                     wq_numa_init+0x122/0x49f
[   53.429210][ T3487]                     workqueue_init+0x18/0x5e1
[   53.435455][ T3487]                     kernel_init_freeable+0x40a/0x5c5
[   53.442290][ T3487]                     kernel_init+0x19/0x290
[   53.448361][ T3487]                     ret_from_fork+0x1f/0x30
[   53.454416][ T3487]    INITIAL USE at:
[   53.458297][ T3487]                    lock_acquire+0x1db/0x4f0
[   53.464354][ T3487]                    fs_reclaim_acquire+0x83/0x120
[   53.470845][ T3487]                    slab_pre_alloc_hook+0x22/0xc0
[   53.477338][ T3487]                    kmem_cache_alloc_trace+0x49/0x290
[   53.484174][ T3487]                    wq_numa_init+0x122/0x49f
[   53.490335][ T3487]                    workqueue_init+0x18/0x5e1
[   53.496565][ T3487]                    kernel_init_freeable+0x40a/0x5c5
[   53.503319][ T3487]                    kernel_init+0x19/0x290
[   53.509200][ T3487]                    ret_from_fork+0x1f/0x30
[   53.515172][ T3487]  }
[   53.517655][ T3487]  ... key      at: [<ffffffff8c9dfba0>] __fs_reclaim_map+0x0/0x160
[   53.525626][ T3487]  ... acquired at:
[   53.529425][ T3487]    lock_acquire+0x1db/0x4f0
[   53.534091][ T3487]    fs_reclaim_acquire+0x83/0x120
[   53.539215][ T3487]    slab_pre_alloc_hook+0x22/0xc0
[   53.544316][ T3487]    __kmalloc_node+0x71/0x390
[   53.549155][ T3487]    kvmalloc_node+0x80/0x140
[   53.553821][ T3487]    get_dist_table+0x83/0x2c0
[   53.558570][ T3487]    netem_change+0xa05/0x20c0
[   53.563339][ T3487]    netem_init+0x58/0xb0
[   53.567709][ T3487]    qdisc_create+0x8ae/0x1390
[   53.572476][ T3487]    tc_modify_qdisc+0xac5/0x1710
[   53.577488][ T3487]    rtnetlink_rcv_msg+0x993/0xee0
[   53.582587][ T3487]    netlink_rcv_skb+0x1cf/0x410
[   53.587512][ T3487]    netlink_unicast+0x7b6/0x980
[   53.592437][ T3487]    netlink_sendmsg+0xa30/0xd60
[   53.597364][ T3487]    ____sys_sendmsg+0x59e/0x8f0
[   53.602289][ T3487]    ___sys_sendmsg+0x252/0x2e0
[   53.607128][ T3487]    __se_sys_sendmsg+0x19a/0x260
[   53.612140][ T3487]    do_syscall_64+0x3d/0xb0
[   53.616805][ T3487]    entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   53.622871][ T3487] 
[   53.625179][ T3487] 
[   53.625179][ T3487] stack backtrace:
[   53.631052][ T3487] CPU: 1 PID: 3487 Comm: syz-executor846 Not tainted 5.15.126-syzkaller #0
[   53.639713][ T3487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   53.649863][ T3487] Call Trace:
[   53.653134][ T3487]  <TASK>
[   53.656055][ T3487]  dump_stack_lvl+0x1e3/0x2cb
[   53.660728][ T3487]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   53.666362][ T3487]  ? panic+0x84d/0x84d
[   53.670521][ T3487]  ? print_shortest_lock_dependencies+0xee/0x150
[   53.676939][ T3487]  validate_chain+0x4cfe/0x58b0
[   53.682112][ T3487]  ? reacquire_held_locks+0x660/0x660
[   53.687599][ T3487]  ? validate_chain+0x112/0x58b0
[   53.692562][ T3487]  ? reacquire_held_locks+0x660/0x660
[   53.697962][ T3487]  ? mark_lock+0x98/0x340
[   53.702286][ T3487]  __lock_acquire+0x1295/0x1ff0
[   53.707144][ T3487]  lock_acquire+0x1db/0x4f0
[   53.711719][ T3487]  ? slab_pre_alloc_hook+0x22/0xc0
[   53.716832][ T3487]  ? read_lock_is_recursive+0x10/0x10
[   53.722212][ T3487]  fs_reclaim_acquire+0x83/0x120
[   53.727150][ T3487]  ? slab_pre_alloc_hook+0x22/0xc0
[   53.732253][ T3487]  slab_pre_alloc_hook+0x22/0xc0
[   53.737184][ T3487]  __kmalloc_node+0x71/0x390
[   53.741782][ T3487]  ? kvmalloc_node+0x80/0x140
[   53.746449][ T3487]  ? __bpf_trace_softirq+0x10/0x10
[   53.751555][ T3487]  kvmalloc_node+0x80/0x140
[   53.756184][ T3487]  get_dist_table+0x83/0x2c0
[   53.760771][ T3487]  netem_change+0xa05/0x20c0
[   53.765356][ T3487]  ? netem_destroy+0xb0/0xb0
[   53.770196][ T3487]  ? debug_object_init+0x10/0x10
[   53.775124][ T3487]  ? memset+0x1f/0x40
[   53.779095][ T3487]  ? lockdep_init_map_type+0x9d/0x8d0
[   53.784469][ T3487]  ? memset+0x1f/0x40
[   53.788441][ T3487]  ? __hrtimer_init+0x181/0x260
[   53.793292][ T3487]  netem_init+0x58/0xb0
[   53.797456][ T3487]  ? qdisc_peek_dequeued+0x220/0x220
[   53.802731][ T3487]  qdisc_create+0x8ae/0x1390
[   53.807751][ T3487]  ? qdisc_notify+0x380/0x380
[   53.812416][ T3487]  ? apparmor_capable+0x12e/0x190
[   53.817447][ T3487]  tc_modify_qdisc+0xac5/0x1710
[   53.822300][ T3487]  ? rcu_lock_release+0x20/0x20
[   53.827333][ T3487]  ? rcu_lock_release+0x20/0x20
[   53.832176][ T3487]  rtnetlink_rcv_msg+0x993/0xee0
[   53.837316][ T3487]  ? reacquire_held_locks+0x660/0x660
[   53.842687][ T3487]  ? rtnetlink_bind+0x80/0x80
[   53.847352][ T3487]  ? is_bpf_text_address+0x24f/0x260
[   53.852627][ T3487]  ? stack_trace_save+0x1c0/0x1c0
[   53.857639][ T3487]  ? __kernel_text_address+0x94/0x100
[   53.863027][ T3487]  ? unwind_get_return_address+0x49/0x80
[   53.868691][ T3487]  ? arch_stack_walk+0xf3/0x140
[   53.873633][ T3487]  ? mark_lock+0x98/0x340
[   53.877954][ T3487]  ? mark_lock+0x98/0x340
[   53.882274][ T3487]  ? __lock_acquire+0x1295/0x1ff0
[   53.887308][ T3487]  netlink_rcv_skb+0x1cf/0x410
[   53.892094][ T3487]  ? rtnetlink_bind+0x80/0x80
[   53.896934][ T3487]  ? netlink_ack+0xb10/0xb10
[   53.901518][ T3487]  netlink_unicast+0x7b6/0x980
[   53.906277][ T3487]  ? netlink_detachskb+0x90/0x90
[   53.911204][ T3487]  ? 0xffffffff81000000
[   53.915347][ T3487]  ? __check_object_size+0x300/0x410
[   53.920620][ T3487]  ? bpf_lsm_netlink_send+0x5/0x10
[   53.925725][ T3487]  netlink_sendmsg+0xa30/0xd60
[   53.930491][ T3487]  ? netlink_getsockopt+0x5b0/0x5b0
[   53.935778][ T3487]  ? aa_sock_msg_perm+0x91/0x150
[   53.940710][ T3487]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   53.946071][ T3487]  ? security_socket_sendmsg+0x7d/0xa0
[   53.951653][ T3487]  ? netlink_getsockopt+0x5b0/0x5b0
[   53.956859][ T3487]  ____sys_sendmsg+0x59e/0x8f0
[   53.961628][ T3487]  ? iovec_from_user+0x300/0x390
[   53.966562][ T3487]  ? __sys_sendmsg_sock+0x30/0x30
[   53.971584][ T3487]  ___sys_sendmsg+0x252/0x2e0
[   53.976256][ T3487]  ? __sys_sendmsg+0x260/0x260
[   53.981023][ T3487]  ? __lock_acquire+0x1295/0x1ff0
[   53.986068][ T3487]  ? read_lock_is_recursive+0x10/0x10
[   53.991639][ T3487]  ? __context_tracking_exit+0x4c/0x80
[   53.998925][ T3487]  ? __fdget+0x158/0x220
[   54.003180][ T3487]  __se_sys_sendmsg+0x19a/0x260
[   54.008051][ T3487]  ? __x64_sys_sendmsg+0x80/0x80
[   54.014288][ T3487]  ? syscall_enter_from_user_mode+0x2e/0x230
[   54.020261][ T3487]  ? lockdep_hardirqs_on+0x94/0x130
[   54.025634][ T3487]  ? syscall_enter_from_user_mode+0x2e/0x230
[   54.031616][ T3487]  do_syscall_64+0x3d/0xb0
[   54.036044][ T3487]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   54.041950][ T3487] RIP: 0033:0x7fa0b710e8b9
[   54.046906][ T3487] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   54.066513][ T3487] RSP: 002b:00007ffc29e3f758 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   54.074930][ T3487] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa0b710e8b9
[   54.082928][ T3487] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
[   54.090914][ T3487] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffc29e3f7d0
[   54.098881][ T3487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   54.106844][ T3487] R13: 00007ffc29e3f958 R14: 0000000000000001 R15: 0000000000000001
[   54.114834][ T3487]  </TASK>
[   54.117974][ T3487] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209
[   54.127463][ T3487] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3487, name: syz-executor846
[   54.136929][ T3487] INFO: lockdep is turned off.
[   54.141754][ T3487] Preemption disabled at:
[   54.141763][ T3487] [<0000000000000000>] 0x0
[   54.150710][ T3487] CPU: 1 PID: 3487 Comm: syz-executor846 Not tainted 5.15.126-syzkaller #0
[   54.159395][ T3487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023
[   54.169443][ T3487] Call Trace:
[   54.172715][ T3487]  <TASK>
[   54.175758][ T3487]  dump_stack_lvl+0x1e3/0x2cb
[   54.180694][ T3487]  ? io_uring_drop_tctx_refs+0x19d/0x19d
[   54.186358][ T3487]  ? panic+0x84d/0x84d
[   54.190419][ T3487]  ? rcu_is_watching+0x11/0xa0
[   54.195181][ T3487]  ? rcu_is_watching+0x11/0xa0
[   54.200025][ T3487]  ___might_sleep+0x547/0x6a0
[   54.204700][ T3487]  ? __might_sleep+0xc0/0xc0
[   54.209286][ T3487]  slab_pre_alloc_hook+0x44/0xc0
[   54.214215][ T3487]  __kmalloc_node+0x71/0x390
[   54.218794][ T3487]  ? kvmalloc_node+0x80/0x140
[   54.223464][ T3487]  ? __bpf_trace_softirq+0x10/0x10
[   54.228663][ T3487]  kvmalloc_node+0x80/0x140
[   54.233157][ T3487]  get_dist_table+0x83/0x2c0
[   54.237739][ T3487]  netem_change+0xa05/0x20c0
[   54.242328][ T3487]  ? netem_destroy+0xb0/0xb0
[   54.246905][ T3487]  ? debug_object_init+0x10/0x10
[   54.251834][ T3487]  ? memset+0x1f/0x40
[   54.255812][ T3487]  ? lockdep_init_map_type+0x9d/0x8d0
[   54.261219][ T3487]  ? memset+0x1f/0x40
[   54.265215][ T3487]  ? __hrtimer_init+0x181/0x260
[   54.270059][ T3487]  netem_init+0x58/0xb0
[   54.274240][ T3487]  ? qdisc_peek_dequeued+0x220/0x220
[   54.279516][ T3487]  qdisc_create+0x8ae/0x1390
[   54.284101][ T3487]  ? qdisc_notify+0x380/0x380
[   54.288766][ T3487]  ? apparmor_capable+0x12e/0x190
[   54.293785][ T3487]  tc_modify_qdisc+0xac5/0x1710
[   54.298720][ T3487]  ? rcu_lock_release+0x20/0x20
[   54.303569][ T3487]  ? rcu_lock_release+0x20/0x20
[   54.308408][ T3487]  rtnetlink_rcv_msg+0x993/0xee0
[   54.313338][ T3487]  ? reacquire_held_locks+0x660/0x660
[   54.318707][ T3487]  ? rtnetlink_bind+0x80/0x80
[   54.323379][ T3487]  ? is_bpf_text_address+0x24f/0x260
[   54.328650][ T3487]  ? stack_trace_save+0x1c0/0x1c0
[   54.333663][ T3487]  ? __kernel_text_address+0x94/0x100
[   54.339043][ T3487]  ? unwind_get_return_address+0x49/0x80
[   54.344927][ T3487]  ? arch_stack_walk+0xf3/0x140
[   54.349769][ T3487]  ? mark_lock+0x98/0x340
[   54.354118][ T3487]  ? mark_lock+0x98/0x340
[   54.358435][ T3487]  ? __lock_acquire+0x1295/0x1ff0
[   54.363463][ T3487]  netlink_rcv_skb+0x1cf/0x410
[   54.368219][ T3487]  ? rtnetlink_bind+0x80/0x80
[   54.372884][ T3487]  ? netlink_ack+0xb10/0xb10
[   54.377487][ T3487]  netlink_unicast+0x7b6/0x980
[   54.382266][ T3487]  ? netlink_detachskb+0x90/0x90
[   54.387192][ T3487]  ? 0xffffffff81000000
[   54.391335][ T3487]  ? __check_object_size+0x300/0x410
[   54.396612][ T3487]  ? bpf_lsm_netlink_send+0x5/0x10
[   54.401716][ T3487]  netlink_sendmsg+0xa30/0xd60
[   54.406490][ T3487]  ? netlink_getsockopt+0x5b0/0x5b0
[   54.411767][ T3487]  ? aa_sock_msg_perm+0x91/0x150
[   54.416697][ T3487]  ? bpf_lsm_socket_sendmsg+0x5/0x10
[   54.421971][ T3487]  ? security_socket_sendmsg+0x7d/0xa0
[   54.427435][ T3487]  ? netlink_getsockopt+0x5b0/0x5b0
[   54.432640][ T3487]  ____sys_sendmsg+0x59e/0x8f0
[   54.437393][ T3487]  ? iovec_from_user+0x300/0x390
[   54.442324][ T3487]  ? __sys_sendmsg_sock+0x30/0x30
[   54.447353][ T3487]  ___sys_sendmsg+0x252/0x2e0
[   54.452023][ T3487]  ? __sys_sendmsg+0x260/0x260
[   54.456783][ T3487]  ? __lock_acquire+0x1295/0x1ff0
[   54.461808][ T3487]  ? read_lock_is_recursive+0x10/0x10
[   54.467170][ T3487]  ? __context_tracking_exit+0x4c/0x80
[   54.472619][ T3487]  ? __fdget+0x158/0x220
[   54.476853][ T3487]  __se_sys_sendmsg+0x19a/0x260
[   54.481692][ T3487]  ? __x64_sys_sendmsg+0x80/0x80
[   54.486628][ T3487]  ? syscall_enter_from_user_mode+0x2e/0x230
[   54.492607][ T3487]  ? lockdep_hardirqs_on+0x94/0x130
[   54.497887][ T3487]  ? syscall_enter_from_user_mode+0x2e/0x230
[   54.503856][ T3487]  do_syscall_64+0x3d/0xb0
[   54.508263][ T3487]  entry_SYSCALL_64_after_hwframe+0x61/0xcb
[   54.514147][ T3487] RIP: 0033:0x7fa0b710e8b9
[   54.518552][ T3487] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   54.538235][ T3487] RSP: 002b:00007ffc29e3f758 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   54.546660][ T3487] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa0b710e8b9
[   54.554621][ T3487] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003
[   54.562579][ T3487] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffc29e3f7d0
[   54.570537][ T3487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[   54.578497][ T3487] R13: 00007ffc29e3f958 R14: 0000000000000001 R15: 0000000000000001
[   54.586463][ T3487]  </TASK>