INFO: trying to register non-static key. the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 1 PID: 7038 Comm: syz-executor1 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 register_lock_class+0x55e/0x2c70 kernel/locking/lockdep.c:781 __lock_acquire+0x203/0x4770 kernel/locking/lockdep.c:3387 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:174 spin_lock_bh include/linux/spinlock.h:320 [inline] tcp_fastopen_reset_cipher+0x194/0x580 net/ipv4/tcp_fastopen.c:98 do_tcp_setsockopt.isra.37+0x24d/0x21b0 net/ipv4/tcp.c:2589 tcp_setsockopt+0xb0/0xd0 net/ipv4/tcp.c:2879 sock_common_setsockopt+0x95/0xd0 net/core/sock.c:2965 SYSC_setsockopt net/socket.c:1851 [inline] SyS_setsockopt+0x189/0x360 net/socket.c:1830 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f20d6d70be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000021 RSI: 0000000000000006 RDI: 0000000000000013 RBP: 0000000000000086 R08: 0000000000000010 R09: 0000000000000000 R10: 0000000020f2b000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f20d6d719c0 R15: 0000000000000000 device eql entered promiscuous mode device gre0 entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device gre0 entered promiscuous mode netlink: 14 bytes leftover after parsing attributes in process `syz-executor0'. device eql entered promiscuous mode netlink: 14 bytes leftover after parsing attributes in process `syz-executor0'. device eql entered promiscuous mode futex_wake_op: syz-executor3 tries to shift op by 4095; fix this program netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. device eql entered promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. futex_wake_op: syz-executor3 tries to shift op by 4095; fix this program netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode tc_dump_action: action bad kind tc_dump_action: action bad kind device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device gre0 entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pig=8305 comm=syz-executor1 device eql entered promiscuous mode SELinux: unrecognized netlink message: protocol=9 nlmsg_type=30 sclass=netlink_audit_socket pig=8305 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65535 sclass=netlink_audit_socket pig=8319 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=30 sclass=netlink_audit_socket pig=8305 comm=syz-executor1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 8345 Comm: syz-executor7 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3373 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3547 getname_flags+0xcb/0x580 fs/namei.c:138 getname+0x19/0x20 fs/namei.c:209 do_mq_open+0x1b6/0xdc0 ipc/mqueue.c:785 SYSC_mq_open ipc/mqueue.c:854 [inline] SyS_mq_open+0xac/0xf0 ipc/mqueue.c:847 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f22d6f1abe8 EFLAGS: 00000212 ORIG_RAX: 00000000000000f0 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000000 RSI: fffffffffffffffe RDI: 000000002004b000 RBP: 00007f22d6f1aa20 R08: 0000000000000000 R09: 0000000000000000 R10: 000000002004b000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007f22d6f1ab58 R14: 00000000004b7560 R15: 0000000000000000 device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode QAT: Invalid ioctl device eql entered promiscuous mode device eql entered promiscuous mode rpcbind: RPC call returned error 22 device eql entered promiscuous mode rpcbind: RPC call returned error 22 device eql entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device lo entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode device lo left promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8658 Comm: syz-executor2 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc_node mm/slab.c:3294 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3637 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:982 [inline] alloc_skb_with_frags+0x10d/0x750 net/core/skbuff.c:5141 sock_alloc_send_pskb+0x787/0x9b0 net/core/sock.c:2078 tun_alloc_skb drivers/net/tun.c:1353 [inline] tun_get_user+0x91a/0x36d0 drivers/net/tun.c:1641 tun_chr_write_iter+0xbf/0x160 drivers/net/tun.c:1797 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007ff6d2895be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000032 RSI: 00000000208aef50 RDI: 0000000000000015 RBP: 00007ff6d2895a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007ff6d2895b58 R14: 00000000004b7560 R15: 0000000000000000 device eql entered promiscuous mode device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8686 Comm: syz-executor2 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc_node mm/slab.c:3294 [inline] kmem_cache_alloc_node_trace+0x5a/0x760 mm/slab.c:3656 __do_kmalloc_node mm/slab.c:3676 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3691 __kmalloc_reserve.isra.40+0x41/0xd0 net/core/skbuff.c:137 __alloc_skb+0x13b/0x780 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:982 [inline] alloc_skb_with_frags+0x10d/0x750 net/core/skbuff.c:5141 sock_alloc_send_pskb+0x787/0x9b0 net/core/sock.c:2078 tun_alloc_skb drivers/net/tun.c:1353 [inline] tun_get_user+0x91a/0x36d0 drivers/net/tun.c:1641 tun_chr_write_iter+0xbf/0x160 drivers/net/tun.c:1797 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007ff6d2895be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000032 RSI: 00000000208aef50 RDI: 0000000000000015 RBP: 00007ff6d2895a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007ff6d2895b58 R14: 00000000004b7560 R15: 0000000000000000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8693 comm=syz-executor6 device eql entered promiscuous mode device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8709 Comm: syz-executor2 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3373 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3547 dst_alloc+0x11f/0x1a0 net/core/dst.c:107 rt_dst_alloc+0xe9/0x540 net/ipv4/route.c:1496 ip_route_input_slow net/ipv4/route.c:2005 [inline] ip_route_input_rcu+0xfe4/0x3030 net/ipv4/route.c:2136 ip_route_input_noref+0xf5/0x1e0 net/ipv4/route.c:2082 ip_rcv_finish+0x2c8/0x19a0 net/ipv4/ip_input.c:348 NF_HOOK include/linux/netfilter.h:250 [inline] ip_rcv+0xc3f/0x1820 net/ipv4/ip_input.c:493 __netif_receive_skb_core+0x1a3e/0x34b0 net/core/dev.c:4477 __netif_receive_skb+0x2c/0x1b0 net/core/dev.c:4542 netif_receive_skb_internal+0x10b/0x670 net/core/dev.c:4615 netif_receive_skb+0xae/0x390 net/core/dev.c:4639 tun_rx_batched.isra.50+0x5ed/0x860 drivers/net/tun.c:1376 tun_get_user+0x249a/0x36d0 drivers/net/tun.c:1771 tun_chr_write_iter+0xbf/0x160 drivers/net/tun.c:1797 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007ff6d2895be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452869 RDX: 0000000000000032 RSI: 00000000208aef50 RDI: 0000000000000015 RBP: 00007ff6d2895a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007ff6d2895b58 R14: 00000000004b7560 R15: 0000000000000000 device eql entered promiscuous mode device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8772 Comm: syz-executor4 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc_node mm/slab.c:3294 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3637 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:982 [inline] pfkey_sendmsg+0x20f/0x9f0 net/key/af_key.c:3635 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 sock_write_iter+0x320/0x5e0 net/socket.c:911 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f5982d1abe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452869 RDX: 0000000000000010 RSI: 0000000020639000 RDI: 0000000000000014 RBP: 00007f5982d1aa20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007f5982d1ab58 R14: 00000000004b7560 R15: 0000000000000000 device eql entered promiscuous mode device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8816 Comm: syz-executor4 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc_node mm/slab.c:3294 [inline] kmem_cache_alloc_node_trace+0x5a/0x760 mm/slab.c:3656 __do_kmalloc_node mm/slab.c:3676 [inline] __kmalloc_node_track_caller+0x33/0x70 mm/slab.c:3691 __kmalloc_reserve.isra.40+0x41/0xd0 net/core/skbuff.c:137 __alloc_skb+0x13b/0x780 net/core/skbuff.c:205 alloc_skb include/linux/skbuff.h:982 [inline] pfkey_sendmsg+0x20f/0x9f0 net/key/af_key.c:3635 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 sock_write_iter+0x320/0x5e0 net/socket.c:911 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f5982d1abe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452869 RDX: 0000000000000010 RSI: 0000000020639000 RDI: 0000000000000014 RBP: 00007f5982d1aa20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007f5982d1ab58 R14: 00000000004b7560 R15: 0000000000000000 rfkill: input handler disabled device eql entered promiscuous mode device eql entered promiscuous mode rfkill: input handler enabled device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 8843 Comm: syz-executor4 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3373 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3547 skb_clone+0x1ae/0x480 net/core/skbuff.c:1278 pfkey_process+0xb9/0x720 net/key/af_key.c:2801 pfkey_sendmsg+0x4d6/0x9f0 net/key/af_key.c:3648 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 sock_write_iter+0x320/0x5e0 net/socket.c:911 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x452869 RSP: 002b:00007f5982d1abe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452869 RDX: 0000000000000010 RSI: 0000000020639000 RDI: 0000000000000014 RBP: 00007f5982d1aa20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b7550 R13: 00007f5982d1ab58 R14: 00000000004b7560 R15: 0000000000000000 kvm [8845]: vcpu0, guest rIP: 0x0 Hyper-V uhandled wrmsr: 0x40000087 data 0x10000001000 kvm [8845]: vcpu0, guest rIP: 0x0 Hyper-V uhandled wrmsr: 0x40000087 data 0x10000001000 device eql entered promiscuous mode device eql entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8869 Comm: syz-executor4 Not tainted 4.14.0-rc7-next-20171103+ #38 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc_node mm/slab.c:3294 [inline] kmem_cache_alloc_node+0x56/0x760 mm/slab.c:3637 __alloc_skb+0xf1/0x780 net/core/skbuff.c:193 skb_copy+0x12c/0x2e0 net/core/skbuff.c:1341 pfkey_promisc+0x377/0x410 net/key/af_key.c:1873 pfkey_process+0x60b/0x720 net/key/af_key.c:2809 pfkey_sendmsg+0x4d6/0x9f0 net/key/af_key.c:3648 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 sock_write_iter+0x320/0x5e0 net/socket.c:911 call_write_iter include/linux/fs.h:1771 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581