Warning: Permanently added '10.128.1.73' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 68.879987][ T3552] [ 68.882341][ T3552] ===================================================== [ 68.889268][ T3552] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 68.896706][ T3552] 6.1.37-syzkaller #0 Not tainted [ 68.901709][ T3552] ----------------------------------------------------- [ 68.908620][ T3552] syz-executor192/3552 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 68.916670][ T3552] ffffffff8d0002e0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 68.925725][ T3552] [ 68.925725][ T3552] and this task is already holding: [ 68.933075][ T3552] ffffffff8e0db488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 68.942287][ T3552] which would create a new lock dependency: [ 68.948171][ T3552] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 68.955735][ T3552] [ 68.955735][ T3552] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 68.965181][ T3552] (noop_qdisc.q.lock){+.-.}-{2:2} [ 68.965203][ T3552] [ 68.965203][ T3552] ... which became SOFTIRQ-irq-safe at: [ 68.977979][ T3552] lock_acquire+0x1f8/0x5a0 [ 68.982566][ T3552] _raw_spin_lock+0x2a/0x40 [ 68.987152][ T3552] net_tx_action+0x752/0x970 [ 68.991823][ T3552] __do_softirq+0x2e9/0xa4c [ 68.996401][ T3552] do_softirq+0x162/0x240 [ 69.000804][ T3552] __local_bh_enable_ip+0x1b1/0x1f0 [ 69.006071][ T3552] dev_deactivate_many+0x3b4/0xaf0 [ 69.011254][ T3552] dev_deactivate+0x177/0x270 [ 69.016000][ T3552] linkwatch_do_dev+0x104/0x160 [ 69.020921][ T3552] __linkwatch_run_queue+0x448/0x6b0 [ 69.026279][ T3552] linkwatch_event+0x48/0x50 [ 69.030958][ T3552] process_one_work+0x8aa/0x11f0 [ 69.035994][ T3552] worker_thread+0xa5f/0x1210 [ 69.040755][ T3552] kthread+0x26e/0x300 [ 69.044916][ T3552] ret_from_fork+0x1f/0x30 [ 69.049420][ T3552] [ 69.049420][ T3552] to a SOFTIRQ-irq-unsafe lock: [ 69.056422][ T3552] (fs_reclaim){+.+.}-{0:0} [ 69.056444][ T3552] [ 69.056444][ T3552] ... which became SOFTIRQ-irq-unsafe at: [ 69.068798][ T3552] ... [ 69.068804][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.075954][ T3552] fs_reclaim_acquire+0x83/0x120 [ 69.080965][ T3552] slab_pre_alloc_hook+0x2a/0x2a0 [ 69.086076][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 69.091536][ T3552] kmalloc_trace+0x26/0xe0 [ 69.096036][ T3552] alloc_workqueue_attrs+0x46/0xc0 [ 69.101226][ T3552] wq_numa_init+0x122/0x4b0 [ 69.105812][ T3552] workqueue_init+0x22/0x59d [ 69.110485][ T3552] kernel_init_freeable+0x40a/0x61f [ 69.115765][ T3552] kernel_init+0x19/0x290 [ 69.120171][ T3552] ret_from_fork+0x1f/0x30 [ 69.124675][ T3552] [ 69.124675][ T3552] other info that might help us debug this: [ 69.124675][ T3552] [ 69.134900][ T3552] Possible interrupt unsafe locking scenario: [ 69.134900][ T3552] [ 69.143226][ T3552] CPU0 CPU1 [ 69.148583][ T3552] ---- ---- [ 69.153946][ T3552] lock(fs_reclaim); [ 69.157928][ T3552] local_irq_disable(); [ 69.164672][ T3552] lock(noop_qdisc.q.lock); [ 69.171771][ T3552] lock(fs_reclaim); [ 69.178265][ T3552] [ 69.181707][ T3552] lock(noop_qdisc.q.lock); [ 69.186467][ T3552] [ 69.186467][ T3552] *** DEADLOCK *** [ 69.186467][ T3552] [ 69.194600][ T3552] 2 locks held by syz-executor192/3552: [ 69.200152][ T3552] #0: ffffffff8e0949a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 69.209564][ T3552] #1: ffffffff8e0db488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 69.219227][ T3552] [ 69.219227][ T3552] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 69.229620][ T3552] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 69.235092][ T3552] HARDIRQ-ON-W at: [ 69.239064][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.245217][ T3552] _raw_spin_lock+0x2a/0x40 [ 69.251367][ T3552] __dev_queue_xmit+0xd50/0x3c90 [ 69.257956][ T3552] tx+0x66/0x100 [ 69.263176][ T3552] kthread+0x234/0x440 [ 69.268889][ T3552] kthread+0x26e/0x300 [ 69.274603][ T3552] ret_from_fork+0x1f/0x30 [ 69.280667][ T3552] IN-SOFTIRQ-W at: [ 69.284634][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.290776][ T3552] _raw_spin_lock+0x2a/0x40 [ 69.296924][ T3552] net_tx_action+0x752/0x970 [ 69.303167][ T3552] __do_softirq+0x2e9/0xa4c [ 69.309318][ T3552] do_softirq+0x162/0x240 [ 69.315287][ T3552] __local_bh_enable_ip+0x1b1/0x1f0 [ 69.322122][ T3552] dev_deactivate_many+0x3b4/0xaf0 [ 69.328892][ T3552] dev_deactivate+0x177/0x270 [ 69.335215][ T3552] linkwatch_do_dev+0x104/0x160 [ 69.341722][ T3552] __linkwatch_run_queue+0x448/0x6b0 [ 69.348652][ T3552] linkwatch_event+0x48/0x50 [ 69.354881][ T3552] process_one_work+0x8aa/0x11f0 [ 69.361467][ T3552] worker_thread+0xa5f/0x1210 [ 69.367793][ T3552] kthread+0x26e/0x300 [ 69.373509][ T3552] ret_from_fork+0x1f/0x30 [ 69.379574][ T3552] INITIAL USE at: [ 69.383462][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.389516][ T3552] _raw_spin_lock+0x2a/0x40 [ 69.395574][ T3552] __dev_queue_xmit+0xd50/0x3c90 [ 69.402075][ T3552] tx+0x66/0x100 [ 69.407178][ T3552] kthread+0x234/0x440 [ 69.412805][ T3552] kthread+0x26e/0x300 [ 69.418436][ T3552] ret_from_fork+0x1f/0x30 [ 69.424414][ T3552] } [ 69.426915][ T3552] ... key at: [] noop_qdisc+0x108/0x320 [ 69.434553][ T3552] [ 69.434553][ T3552] the dependencies between the lock to be acquired [ 69.434561][ T3552] and SOFTIRQ-irq-unsafe lock: [ 69.448058][ T3552] -> (fs_reclaim){+.+.}-{0:0} { [ 69.452920][ T3552] HARDIRQ-ON-W at: [ 69.456893][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.463051][ T3552] fs_reclaim_acquire+0x83/0x120 [ 69.469644][ T3552] slab_pre_alloc_hook+0x2a/0x2a0 [ 69.476310][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 69.483328][ T3552] kmalloc_trace+0x26/0xe0 [ 69.489383][ T3552] alloc_workqueue_attrs+0x46/0xc0 [ 69.496142][ T3552] wq_numa_init+0x122/0x4b0 [ 69.502299][ T3552] workqueue_init+0x22/0x59d [ 69.508539][ T3552] kernel_init_freeable+0x40a/0x61f [ 69.515403][ T3552] kernel_init+0x19/0x290 [ 69.521378][ T3552] ret_from_fork+0x1f/0x30 [ 69.527446][ T3552] SOFTIRQ-ON-W at: [ 69.531419][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.537567][ T3552] fs_reclaim_acquire+0x83/0x120 [ 69.544152][ T3552] slab_pre_alloc_hook+0x2a/0x2a0 [ 69.550824][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 69.557842][ T3552] kmalloc_trace+0x26/0xe0 [ 69.563905][ T3552] alloc_workqueue_attrs+0x46/0xc0 [ 69.570664][ T3552] wq_numa_init+0x122/0x4b0 [ 69.576822][ T3552] workqueue_init+0x22/0x59d [ 69.583064][ T3552] kernel_init_freeable+0x40a/0x61f [ 69.589911][ T3552] kernel_init+0x19/0x290 [ 69.595888][ T3552] ret_from_fork+0x1f/0x30 [ 69.601958][ T3552] INITIAL USE at: [ 69.605842][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.611898][ T3552] fs_reclaim_acquire+0x83/0x120 [ 69.618392][ T3552] slab_pre_alloc_hook+0x2a/0x2a0 [ 69.624980][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 69.631908][ T3552] kmalloc_trace+0x26/0xe0 [ 69.637909][ T3552] alloc_workqueue_attrs+0x46/0xc0 [ 69.644589][ T3552] wq_numa_init+0x122/0x4b0 [ 69.650661][ T3552] workqueue_init+0x22/0x59d [ 69.656835][ T3552] kernel_init_freeable+0x40a/0x61f [ 69.663591][ T3552] kernel_init+0x19/0x290 [ 69.669474][ T3552] ret_from_fork+0x1f/0x30 [ 69.675456][ T3552] } [ 69.677952][ T3552] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 69.685883][ T3552] ... acquired at: [ 69.689682][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.694349][ T3552] fs_reclaim_acquire+0x83/0x120 [ 69.699453][ T3552] slab_pre_alloc_hook+0x2a/0x2a0 [ 69.704648][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 69.710213][ T3552] __kmalloc_node+0xa2/0x230 [ 69.714962][ T3552] kvmalloc_node+0x6e/0x180 [ 69.719628][ T3552] get_dist_table+0x91/0x380 [ 69.724388][ T3552] netem_change+0x947/0x1ea0 [ 69.729145][ T3552] netem_init+0x58/0xb0 [ 69.733469][ T3552] qdisc_create+0x8a1/0x1220 [ 69.738235][ T3552] tc_modify_qdisc+0x9e0/0x1da0 [ 69.743251][ T3552] rtnetlink_rcv_msg+0x776/0xf00 [ 69.748350][ T3552] netlink_rcv_skb+0x1cd/0x410 [ 69.753277][ T3552] netlink_unicast+0x7bf/0x990 [ 69.758198][ T3552] netlink_sendmsg+0xa26/0xd60 [ 69.763125][ T3552] ____sys_sendmsg+0x59e/0x8f0 [ 69.768073][ T3552] __sys_sendmsg+0x2a9/0x390 [ 69.772840][ T3552] do_syscall_64+0x3d/0xb0 [ 69.777429][ T3552] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 69.783495][ T3552] [ 69.785831][ T3552] [ 69.785831][ T3552] stack backtrace: [ 69.791727][ T3552] CPU: 0 PID: 3552 Comm: syz-executor192 Not tainted 6.1.37-syzkaller #0 [ 69.800134][ T3552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 69.810187][ T3552] Call Trace: [ 69.813473][ T3552] [ 69.816400][ T3552] dump_stack_lvl+0x1e3/0x2cb [ 69.821081][ T3552] ? nf_tcp_handle_invalid+0x642/0x642 [ 69.826575][ T3552] ? panic+0x75d/0x75d [ 69.830655][ T3552] ? print_shortest_lock_dependencies+0xee/0x150 [ 69.836991][ T3552] validate_chain+0x4d2e/0x58e0 [ 69.841855][ T3552] ? reacquire_held_locks+0x660/0x660 [ 69.847241][ T3552] ? validate_chain+0x115/0x58e0 [ 69.852198][ T3552] ? mark_lock+0x9a/0x340 [ 69.856545][ T3552] __lock_acquire+0x125b/0x1f80 [ 69.861406][ T3552] lock_acquire+0x1f8/0x5a0 [ 69.865909][ T3552] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 69.871112][ T3552] ? read_lock_is_recursive+0x10/0x10 [ 69.876513][ T3552] ? __lock_acquire+0x125b/0x1f80 [ 69.881539][ T3552] fs_reclaim_acquire+0x83/0x120 [ 69.886475][ T3552] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 69.891681][ T3552] slab_pre_alloc_hook+0x2a/0x2a0 [ 69.896711][ T3552] ? kvmalloc_node+0x6e/0x180 [ 69.901384][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 69.906858][ T3552] ? kvmalloc_node+0x6e/0x180 [ 69.911532][ T3552] __kmalloc_node+0xa2/0x230 [ 69.916139][ T3552] kvmalloc_node+0x6e/0x180 [ 69.920640][ T3552] get_dist_table+0x91/0x380 [ 69.925236][ T3552] netem_change+0x947/0x1ea0 [ 69.929830][ T3552] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 69.935816][ T3552] ? netem_destroy+0xb0/0xb0 [ 69.940422][ T3552] ? do_raw_spin_unlock+0x137/0x8a0 [ 69.945622][ T3552] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 69.951521][ T3552] ? lockdep_hardirqs_on+0x94/0x130 [ 69.956730][ T3552] ? memset+0x1f/0x40 [ 69.960717][ T3552] ? __hrtimer_init+0x181/0x260 [ 69.965574][ T3552] netem_init+0x58/0xb0 [ 69.969824][ T3552] ? qdisc_peek_dequeued+0x220/0x220 [ 69.975110][ T3552] qdisc_create+0x8a1/0x1220 [ 69.979702][ T3552] ? qdisc_notify+0x390/0x390 [ 69.984380][ T3552] tc_modify_qdisc+0x9e0/0x1da0 [ 69.989237][ T3552] ? rcu_lock_release+0x20/0x20 [ 69.994097][ T3552] ? rcu_lock_release+0x20/0x20 [ 69.998962][ T3552] rtnetlink_rcv_msg+0x776/0xf00 [ 70.003924][ T3552] ? rtnetlink_bind+0x80/0x80 [ 70.008598][ T3552] ? stack_trace_save+0x1c0/0x1c0 [ 70.013632][ T3552] ? kernel_text_address+0x9f/0xd0 [ 70.018748][ T3552] ? __kernel_text_address+0x9/0x40 [ 70.023944][ T3552] ? unwind_get_return_address+0x49/0x80 [ 70.029574][ T3552] ? arch_stack_walk+0xf3/0x140 [ 70.034423][ T3552] ? mark_lock+0x9a/0x340 [ 70.038745][ T3552] ? mark_lock+0x9a/0x340 [ 70.043154][ T3552] ? __lock_acquire+0x125b/0x1f80 [ 70.048178][ T3552] netlink_rcv_skb+0x1cd/0x410 [ 70.052946][ T3552] ? rtnetlink_bind+0x80/0x80 [ 70.057619][ T3552] ? netlink_ack+0xe60/0xe60 [ 70.062226][ T3552] netlink_unicast+0x7bf/0x990 [ 70.066984][ T3552] ? netlink_detachskb+0x90/0x90 [ 70.071914][ T3552] ? __virt_addr_valid+0x22b/0x2e0 [ 70.077025][ T3552] ? __phys_addr_symbol+0x2b/0x70 [ 70.082054][ T3552] ? __check_object_size+0x4dd/0xa30 [ 70.087509][ T3552] ? bpf_lsm_netlink_send+0x5/0x10 [ 70.092621][ T3552] netlink_sendmsg+0xa26/0xd60 [ 70.097389][ T3552] ? netlink_getsockopt+0x5b0/0x5b0 [ 70.102588][ T3552] ? aa_sock_msg_perm+0x91/0x150 [ 70.107541][ T3552] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 70.112819][ T3552] ? security_socket_sendmsg+0x7d/0xa0 [ 70.118276][ T3552] ? netlink_getsockopt+0x5b0/0x5b0 [ 70.123471][ T3552] ____sys_sendmsg+0x59e/0x8f0 [ 70.128239][ T3552] ? __sys_sendmsg_sock+0x30/0x30 [ 70.133275][ T3552] __sys_sendmsg+0x2a9/0x390 [ 70.137865][ T3552] ? ____sys_sendmsg+0x8f0/0x8f0 [ 70.142833][ T3552] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 70.148827][ T3552] ? syscall_enter_from_user_mode+0x2e/0x220 [ 70.154804][ T3552] ? lockdep_hardirqs_on+0x94/0x130 [ 70.159999][ T3552] ? syscall_enter_from_user_mode+0x2e/0x220 [ 70.165975][ T3552] do_syscall_64+0x3d/0xb0 [ 70.170388][ T3552] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 70.176285][ T3552] RIP: 0033:0x7fc6e33c21f9 [ 70.180696][ T3552] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 70.200293][ T3552] RSP: 002b:00007ffcd4edfc98 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 70.208698][ T3552] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc6e33c21f9 [ 70.216663][ T3552] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 70.224630][ T3552] RBP: 00007fc6e33861e0 R08: 00000000ffffffff R09: 0000000000000000 [ 70.232593][ T3552] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fc6e3386270 [ 70.240555][ T3552] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 70.248525][ T3552] [ 70.251608][ T3552] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 70.261082][ T3552] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3552, name: syz-executor192 [ 70.270565][ T3552] preempt_count: 201, expected: 0 [ 70.275614][ T3552] RCU nest depth: 0, expected: 0 [ 70.280550][ T3552] INFO: lockdep is turned off. [ 70.285317][ T3552] Preemption disabled at: [ 70.285323][ T3552] [<0000000000000000>] 0x0 [ 70.294046][ T3552] CPU: 0 PID: 3552 Comm: syz-executor192 Not tainted 6.1.37-syzkaller #0 [ 70.302454][ T3552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 70.312583][ T3552] Call Trace: [ 70.315848][ T3552] [ 70.318776][ T3552] dump_stack_lvl+0x1e3/0x2cb [ 70.323446][ T3552] ? nf_tcp_handle_invalid+0x642/0x642 [ 70.328897][ T3552] ? panic+0x75d/0x75d [ 70.332953][ T3552] ? rcu_is_watching+0x11/0xb0 [ 70.337733][ T3552] __might_resched+0x5cb/0x780 [ 70.342508][ T3552] ? __might_sleep+0xb0/0xb0 [ 70.347102][ T3552] slab_pre_alloc_hook+0x4a/0x2a0 [ 70.352120][ T3552] ? kvmalloc_node+0x6e/0x180 [ 70.356784][ T3552] __kmem_cache_alloc_node+0x47/0x260 [ 70.362177][ T3552] ? kvmalloc_node+0x6e/0x180 [ 70.366848][ T3552] __kmalloc_node+0xa2/0x230 [ 70.371517][ T3552] kvmalloc_node+0x6e/0x180 [ 70.376135][ T3552] get_dist_table+0x91/0x380 [ 70.380723][ T3552] netem_change+0x947/0x1ea0 [ 70.385307][ T3552] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 70.391272][ T3552] ? netem_destroy+0xb0/0xb0 [ 70.395852][ T3552] ? do_raw_spin_unlock+0x137/0x8a0 [ 70.401040][ T3552] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 70.406930][ T3552] ? lockdep_hardirqs_on+0x94/0x130 [ 70.412134][ T3552] ? memset+0x1f/0x40 [ 70.416113][ T3552] ? __hrtimer_init+0x181/0x260 [ 70.420972][ T3552] netem_init+0x58/0xb0 [ 70.425133][ T3552] ? qdisc_peek_dequeued+0x220/0x220 [ 70.430415][ T3552] qdisc_create+0x8a1/0x1220 [ 70.435007][ T3552] ? qdisc_notify+0x390/0x390 [ 70.439687][ T3552] tc_modify_qdisc+0x9e0/0x1da0 [ 70.444542][ T3552] ? rcu_lock_release+0x20/0x20 [ 70.449418][ T3552] ? rcu_lock_release+0x20/0x20 [ 70.454273][ T3552] rtnetlink_rcv_msg+0x776/0xf00 [ 70.459215][ T3552] ? rtnetlink_bind+0x80/0x80 [ 70.463907][ T3552] ? stack_trace_save+0x1c0/0x1c0 [ 70.468931][ T3552] ? kernel_text_address+0x9f/0xd0 [ 70.474049][ T3552] ? __kernel_text_address+0x9/0x40 [ 70.479253][ T3552] ? unwind_get_return_address+0x49/0x80 [ 70.484894][ T3552] ? arch_stack_walk+0xf3/0x140 [ 70.489746][ T3552] ? mark_lock+0x9a/0x340 [ 70.494077][ T3552] ? mark_lock+0x9a/0x340 [ 70.498408][ T3552] ? __lock_acquire+0x125b/0x1f80 [ 70.503446][ T3552] netlink_rcv_skb+0x1cd/0x410 [ 70.508210][ T3552] ? rtnetlink_bind+0x80/0x80 [ 70.512885][ T3552] ? netlink_ack+0xe60/0xe60 [ 70.517755][ T3552] netlink_unicast+0x7bf/0x990 [ 70.522522][ T3552] ? netlink_detachskb+0x90/0x90 [ 70.527456][ T3552] ? __virt_addr_valid+0x22b/0x2e0 [ 70.532574][ T3552] ? __phys_addr_symbol+0x2b/0x70 [ 70.537609][ T3552] ? __check_object_size+0x4dd/0xa30 [ 70.542893][ T3552] ? bpf_lsm_netlink_send+0x5/0x10 [ 70.548001][ T3552] netlink_sendmsg+0xa26/0xd60 [ 70.552794][ T3552] ? netlink_getsockopt+0x5b0/0x5b0 [ 70.557991][ T3552] ? aa_sock_msg_perm+0x91/0x150 [ 70.562927][ T3552] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 70.568296][ T3552] ? security_socket_sendmsg+0x7d/0xa0 [ 70.573754][ T3552] ? netlink_getsockopt+0x5b0/0x5b0 [ 70.578953][ T3552] ____sys_sendmsg+0x59e/0x8f0 [ 70.583723][ T3552] ? __sys_sendmsg_sock+0x30/0x30 [ 70.588756][ T3552] __sys_sendmsg+0x2a9/0x390 [ 70.593449][ T3552] ? ____sys_sendmsg+0x8f0/0x8f0 [ 70.598398][ T3552] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 70.604387][ T3552] ? syscall_enter_from_user_mode+0x2e/0x220 [ 70.610360][ T3552] ? lockdep_hardirqs_on+0x94/0x130 [ 70.615566][ T3552] ? syscall_enter_from_user_mode+0x2e/0x220 [ 70.621549][ T3552] do_syscall_64+0x3d/0xb0 [ 70.625973][ T3552] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 70.631863][ T3552] RIP: 0033:0x7fc6e33c21f9 [ 70.636271][ T3552] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 70.655869][ T3552] RSP: 002b:00007ffcd4edfc98 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 70.664488][ T3552] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc6e33c21f9 [ 70.675413][ T3552] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 70.683377][ T3552] RBP: 00007fc6e33861e0 R08: 00000000ffffffff R09: 0000000000000000 [ 70.691360][ T3552] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fc6e3386270 [ 70.699326][ T3552] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 70.707298][ T3552]