Warning: Permanently added '10.128.10.24' (ED25519) to the list of known hosts. executing program [ 52.465867][ T3506] [ 52.468202][ T3506] ===================================================== [ 52.475117][ T3506] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 52.482551][ T3506] 6.1.45-syzkaller #0 Not tainted [ 52.487551][ T3506] ----------------------------------------------------- [ 52.494458][ T3506] syz-executor274/3506 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 52.502502][ T3506] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 52.511623][ T3506] [ 52.511623][ T3506] and this task is already holding: [ 52.518961][ T3506] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 52.528172][ T3506] which would create a new lock dependency: [ 52.534047][ T3506] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 52.541607][ T3506] [ 52.541607][ T3506] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 52.551036][ T3506] (noop_qdisc.q.lock){+.-.}-{2:2} [ 52.551055][ T3506] [ 52.551055][ T3506] ... which became SOFTIRQ-irq-safe at: [ 52.563836][ T3506] lock_acquire+0x1f8/0x5a0 [ 52.568413][ T3506] _raw_spin_lock+0x2a/0x40 [ 52.572998][ T3506] net_tx_action+0x752/0x970 [ 52.577665][ T3506] __do_softirq+0x2e9/0xa4c [ 52.582341][ T3506] do_softirq+0x162/0x240 [ 52.586831][ T3506] __local_bh_enable_ip+0x1b1/0x1f0 [ 52.592112][ T3506] dev_deactivate_many+0x3b4/0xaf0 [ 52.597296][ T3506] dev_deactivate+0x177/0x270 [ 52.602046][ T3506] linkwatch_do_dev+0x104/0x160 [ 52.607490][ T3506] __linkwatch_run_queue+0x448/0x6b0 [ 52.612848][ T3506] linkwatch_event+0x48/0x50 [ 52.617508][ T3506] process_one_work+0x8aa/0x11f0 [ 52.622518][ T3506] worker_thread+0xa5f/0x1210 [ 52.627282][ T3506] kthread+0x26e/0x300 [ 52.631448][ T3506] ret_from_fork+0x1f/0x30 [ 52.635944][ T3506] [ 52.635944][ T3506] to a SOFTIRQ-irq-unsafe lock: [ 52.642959][ T3506] (fs_reclaim){+.+.}-{0:0} [ 52.642980][ T3506] [ 52.642980][ T3506] ... which became SOFTIRQ-irq-unsafe at: [ 52.655327][ T3506] ... [ 52.655333][ T3506] lock_acquire+0x1f8/0x5a0 [ 52.662483][ T3506] fs_reclaim_acquire+0x83/0x120 [ 52.667492][ T3506] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.672590][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 52.678033][ T3506] kmalloc_trace+0x26/0xe0 [ 52.682521][ T3506] alloc_workqueue_attrs+0x46/0xc0 [ 52.687702][ T3506] wq_numa_init+0x122/0x4b0 [ 52.692363][ T3506] workqueue_init+0x22/0x59d [ 52.697026][ T3506] kernel_init_freeable+0x40a/0x61f [ 52.702292][ T3506] kernel_init+0x19/0x290 [ 52.706729][ T3506] ret_from_fork+0x1f/0x30 [ 52.711218][ T3506] [ 52.711218][ T3506] other info that might help us debug this: [ 52.711218][ T3506] [ 52.721442][ T3506] Possible interrupt unsafe locking scenario: [ 52.721442][ T3506] [ 52.729916][ T3506] CPU0 CPU1 [ 52.735982][ T3506] ---- ---- [ 52.741382][ T3506] lock(fs_reclaim); [ 52.745360][ T3506] local_irq_disable(); [ 52.752098][ T3506] lock(noop_qdisc.q.lock); [ 52.759455][ T3506] lock(fs_reclaim); [ 52.765942][ T3506] [ 52.769396][ T3506] lock(noop_qdisc.q.lock); [ 52.774146][ T3506] [ 52.774146][ T3506] *** DEADLOCK *** [ 52.774146][ T3506] [ 52.782273][ T3506] 2 locks held by syz-executor274/3506: [ 52.787800][ T3506] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 52.797272][ T3506] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 52.806913][ T3506] [ 52.806913][ T3506] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 52.817299][ T3506] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 52.822930][ T3506] HARDIRQ-ON-W at: [ 52.826895][ T3506] lock_acquire+0x1f8/0x5a0 [ 52.833037][ T3506] _raw_spin_lock+0x2a/0x40 [ 52.839180][ T3506] __dev_queue_xmit+0xd50/0x3c90 [ 52.845758][ T3506] tx+0x66/0x100 [ 52.850943][ T3506] kthread+0x234/0x440 [ 52.856648][ T3506] kthread+0x26e/0x300 [ 52.862352][ T3506] ret_from_fork+0x1f/0x30 [ 52.868412][ T3506] IN-SOFTIRQ-W at: [ 52.872376][ T3506] lock_acquire+0x1f8/0x5a0 [ 52.878512][ T3506] _raw_spin_lock+0x2a/0x40 [ 52.884741][ T3506] net_tx_action+0x752/0x970 [ 52.891073][ T3506] __do_softirq+0x2e9/0xa4c [ 52.897209][ T3506] do_softirq+0x162/0x240 [ 52.903191][ T3506] __local_bh_enable_ip+0x1b1/0x1f0 [ 52.910055][ T3506] dev_deactivate_many+0x3b4/0xaf0 [ 52.917070][ T3506] dev_deactivate+0x177/0x270 [ 52.923383][ T3506] linkwatch_do_dev+0x104/0x160 [ 52.929868][ T3506] __linkwatch_run_queue+0x448/0x6b0 [ 52.936788][ T3506] linkwatch_event+0x48/0x50 [ 52.943026][ T3506] process_one_work+0x8aa/0x11f0 [ 52.949602][ T3506] worker_thread+0xa5f/0x1210 [ 52.955925][ T3506] kthread+0x26e/0x300 [ 52.961890][ T3506] ret_from_fork+0x1f/0x30 [ 52.967945][ T3506] INITIAL USE at: [ 52.971832][ T3506] lock_acquire+0x1f8/0x5a0 [ 52.977884][ T3506] _raw_spin_lock+0x2a/0x40 [ 52.983937][ T3506] __dev_queue_xmit+0xd50/0x3c90 [ 52.990426][ T3506] tx+0x66/0x100 [ 52.995524][ T3506] kthread+0x234/0x440 [ 53.001140][ T3506] kthread+0x26e/0x300 [ 53.006773][ T3506] ret_from_fork+0x1f/0x30 [ 53.012753][ T3506] } [ 53.015237][ T3506] ... key at: [] noop_qdisc+0x108/0x320 [ 53.022945][ T3506] [ 53.022945][ T3506] the dependencies between the lock to be acquired [ 53.022952][ T3506] and SOFTIRQ-irq-unsafe lock: [ 53.036489][ T3506] -> (fs_reclaim){+.+.}-{0:0} { [ 53.041361][ T3506] HARDIRQ-ON-W at: [ 53.045340][ T3506] lock_acquire+0x1f8/0x5a0 [ 53.051492][ T3506] fs_reclaim_acquire+0x83/0x120 [ 53.058084][ T3506] slab_pre_alloc_hook+0x2a/0x2a0 [ 53.064752][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 53.071937][ T3506] kmalloc_trace+0x26/0xe0 [ 53.078075][ T3506] alloc_workqueue_attrs+0x46/0xc0 [ 53.084827][ T3506] wq_numa_init+0x122/0x4b0 [ 53.091146][ T3506] workqueue_init+0x22/0x59d [ 53.097373][ T3506] kernel_init_freeable+0x40a/0x61f [ 53.104209][ T3506] kernel_init+0x19/0x290 [ 53.110179][ T3506] ret_from_fork+0x1f/0x30 [ 53.116256][ T3506] SOFTIRQ-ON-W at: [ 53.120225][ T3506] lock_acquire+0x1f8/0x5a0 [ 53.126368][ T3506] fs_reclaim_acquire+0x83/0x120 [ 53.132953][ T3506] slab_pre_alloc_hook+0x2a/0x2a0 [ 53.140660][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 53.147670][ T3506] kmalloc_trace+0x26/0xe0 [ 53.153723][ T3506] alloc_workqueue_attrs+0x46/0xc0 [ 53.160470][ T3506] wq_numa_init+0x122/0x4b0 [ 53.166629][ T3506] workqueue_init+0x22/0x59d [ 53.172898][ T3506] kernel_init_freeable+0x40a/0x61f [ 53.179737][ T3506] kernel_init+0x19/0x290 [ 53.185796][ T3506] ret_from_fork+0x1f/0x30 [ 53.191853][ T3506] INITIAL USE at: [ 53.195819][ T3506] lock_acquire+0x1f8/0x5a0 [ 53.201874][ T3506] fs_reclaim_acquire+0x83/0x120 [ 53.208359][ T3506] slab_pre_alloc_hook+0x2a/0x2a0 [ 53.214939][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 53.221948][ T3506] kmalloc_trace+0x26/0xe0 [ 53.227915][ T3506] alloc_workqueue_attrs+0x46/0xc0 [ 53.234678][ T3506] wq_numa_init+0x122/0x4b0 [ 53.240734][ T3506] workqueue_init+0x22/0x59d [ 53.246919][ T3506] kernel_init_freeable+0x40a/0x61f [ 53.253667][ T3506] kernel_init+0x19/0x290 [ 53.259548][ T3506] ret_from_fork+0x1f/0x30 [ 53.265516][ T3506] } [ 53.268108][ T3506] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 53.276008][ T3506] ... acquired at: [ 53.279827][ T3506] lock_acquire+0x1f8/0x5a0 [ 53.284498][ T3506] fs_reclaim_acquire+0x83/0x120 [ 53.289598][ T3506] slab_pre_alloc_hook+0x2a/0x2a0 [ 53.294788][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 53.300324][ T3506] __kmalloc_node+0xa2/0x230 [ 53.305090][ T3506] kvmalloc_node+0x6e/0x180 [ 53.309849][ T3506] get_dist_table+0x91/0x380 [ 53.314693][ T3506] netem_change+0x9a0/0x1ea0 [ 53.319449][ T3506] netem_init+0x58/0xb0 [ 53.323867][ T3506] qdisc_create+0x8a1/0x1220 [ 53.328624][ T3506] tc_modify_qdisc+0x9e0/0x1da0 [ 53.333634][ T3506] rtnetlink_rcv_msg+0x776/0xf00 [ 53.338735][ T3506] netlink_rcv_skb+0x1cd/0x410 [ 53.343668][ T3506] netlink_unicast+0x7bf/0x990 [ 53.348590][ T3506] netlink_sendmsg+0xa26/0xd60 [ 53.353519][ T3506] ____sys_sendmsg+0x59e/0x8f0 [ 53.359397][ T3506] __sys_sendmsg+0x2a9/0x390 [ 53.364142][ T3506] do_syscall_64+0x3d/0xb0 [ 53.368727][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.374790][ T3506] [ 53.377094][ T3506] [ 53.377094][ T3506] stack backtrace: [ 53.382964][ T3506] CPU: 1 PID: 3506 Comm: syz-executor274 Not tainted 6.1.45-syzkaller #0 [ 53.391361][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.401399][ T3506] Call Trace: [ 53.404667][ T3506] [ 53.407585][ T3506] dump_stack_lvl+0x1e3/0x2cb [ 53.412257][ T3506] ? nf_tcp_handle_invalid+0x642/0x642 [ 53.417700][ T3506] ? panic+0x75d/0x75d [ 53.421755][ T3506] ? print_shortest_lock_dependencies+0xee/0x150 [ 53.428067][ T3506] validate_chain+0x4d2e/0x58e0 [ 53.432911][ T3506] ? reacquire_held_locks+0x660/0x660 [ 53.438357][ T3506] ? validate_chain+0x115/0x58e0 [ 53.443282][ T3506] ? mark_lock+0x9a/0x340 [ 53.447705][ T3506] __lock_acquire+0x125b/0x1f80 [ 53.452547][ T3506] lock_acquire+0x1f8/0x5a0 [ 53.457036][ T3506] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 53.462224][ T3506] ? read_lock_is_recursive+0x10/0x10 [ 53.467609][ T3506] ? __lock_acquire+0x125b/0x1f80 [ 53.472621][ T3506] fs_reclaim_acquire+0x83/0x120 [ 53.477807][ T3506] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 53.483079][ T3506] slab_pre_alloc_hook+0x2a/0x2a0 [ 53.488092][ T3506] ? kvmalloc_node+0x6e/0x180 [ 53.492754][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 53.498113][ T3506] ? kvmalloc_node+0x6e/0x180 [ 53.502776][ T3506] __kmalloc_node+0xa2/0x230 [ 53.507353][ T3506] kvmalloc_node+0x6e/0x180 [ 53.511842][ T3506] get_dist_table+0x91/0x380 [ 53.516422][ T3506] netem_change+0x9a0/0x1ea0 [ 53.521090][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.527056][ T3506] ? netem_destroy+0xb0/0xb0 [ 53.532332][ T3506] ? do_raw_spin_unlock+0x137/0x8a0 [ 53.537518][ T3506] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 53.543400][ T3506] ? lockdep_hardirqs_on+0x94/0x130 [ 53.548659][ T3506] ? memset+0x1f/0x40 [ 53.552634][ T3506] ? __hrtimer_init+0x181/0x260 [ 53.557708][ T3506] netem_init+0x58/0xb0 [ 53.561856][ T3506] ? qdisc_peek_dequeued+0x220/0x220 [ 53.567130][ T3506] qdisc_create+0x8a1/0x1220 [ 53.571800][ T3506] ? qdisc_notify+0x390/0x390 [ 53.576469][ T3506] tc_modify_qdisc+0x9e0/0x1da0 [ 53.581309][ T3506] ? rcu_lock_release+0x20/0x20 [ 53.586159][ T3506] ? rcu_lock_release+0x20/0x20 [ 53.590997][ T3506] rtnetlink_rcv_msg+0x776/0xf00 [ 53.595923][ T3506] ? rtnetlink_bind+0x80/0x80 [ 53.600584][ T3506] ? stack_trace_save+0x1c0/0x1c0 [ 53.605593][ T3506] ? kernel_text_address+0x9f/0xd0 [ 53.610695][ T3506] ? __kernel_text_address+0x9/0x40 [ 53.615883][ T3506] ? unwind_get_return_address+0x49/0x80 [ 53.621501][ T3506] ? arch_stack_walk+0xf3/0x140 [ 53.626338][ T3506] ? mark_lock+0x9a/0x340 [ 53.630735][ T3506] ? mark_lock+0x9a/0x340 [ 53.635043][ T3506] ? __lock_acquire+0x125b/0x1f80 [ 53.640054][ T3506] netlink_rcv_skb+0x1cd/0x410 [ 53.644908][ T3506] ? rtnetlink_bind+0x80/0x80 [ 53.649582][ T3506] ? netlink_ack+0xe60/0xe60 [ 53.654342][ T3506] netlink_unicast+0x7bf/0x990 [ 53.659093][ T3506] ? netlink_detachskb+0x90/0x90 [ 53.664011][ T3506] ? __virt_addr_valid+0x22b/0x2e0 [ 53.669211][ T3506] ? __phys_addr_symbol+0x2b/0x70 [ 53.674226][ T3506] ? __check_object_size+0x4dd/0xa30 [ 53.679497][ T3506] ? bpf_lsm_netlink_send+0x5/0x10 [ 53.684595][ T3506] netlink_sendmsg+0xa26/0xd60 [ 53.689340][ T3506] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.696513][ T3506] ? aa_sock_msg_perm+0x91/0x150 [ 53.701868][ T3506] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 53.707133][ T3506] ? security_socket_sendmsg+0x7d/0xa0 [ 53.712579][ T3506] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.717760][ T3506] ____sys_sendmsg+0x59e/0x8f0 [ 53.722592][ T3506] ? __sys_sendmsg_sock+0x30/0x30 [ 53.727944][ T3506] __sys_sendmsg+0x2a9/0x390 [ 53.732513][ T3506] ? ____sys_sendmsg+0x8f0/0x8f0 [ 53.737452][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.743413][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.749463][ T3506] ? lockdep_hardirqs_on+0x94/0x130 [ 53.754725][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.760708][ T3506] do_syscall_64+0x3d/0xb0 [ 53.765106][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.770979][ T3506] RIP: 0033:0x7f46e4c204e9 [ 53.775371][ T3506] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.794954][ T3506] RSP: 002b:00007ffd7e181698 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.803343][ T3506] RAX: ffffffffffffffda RBX: 00007ffd7e181868 RCX: 00007f46e4c204e9 [ 53.811291][ T3506] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 53.819239][ T3506] RBP: 00007f46e4c93610 R08: 00000000ffffffff R09: 00007ffd7e181868 [ 53.827188][ T3506] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 53.835139][ T3506] R13: 00007ffd7e181858 R14: 0000000000000001 R15: 0000000000000001 [ 53.843094][ T3506] [ 53.846186][ T3506] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 53.855716][ T3506] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3506, name: syz-executor274 [ 53.865261][ T3506] preempt_count: 201, expected: 0 [ 53.870255][ T3506] RCU nest depth: 0, expected: 0 [ 53.875434][ T3506] INFO: lockdep is turned off. [ 53.880168][ T3506] Preemption disabled at: [ 53.880172][ T3506] [<0000000000000000>] 0x0 [ 53.888878][ T3506] CPU: 1 PID: 3506 Comm: syz-executor274 Not tainted 6.1.45-syzkaller #0 [ 53.897265][ T3506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.907308][ T3506] Call Trace: [ 53.910587][ T3506] [ 53.913510][ T3506] dump_stack_lvl+0x1e3/0x2cb [ 53.918181][ T3506] ? nf_tcp_handle_invalid+0x642/0x642 [ 53.923627][ T3506] ? panic+0x75d/0x75d [ 53.927692][ T3506] ? rcu_is_watching+0x11/0xb0 [ 53.932794][ T3506] __might_resched+0x5cb/0x780 [ 53.937553][ T3506] ? __might_sleep+0xb0/0xb0 [ 53.942129][ T3506] slab_pre_alloc_hook+0x4a/0x2a0 [ 53.947133][ T3506] ? kvmalloc_node+0x6e/0x180 [ 53.951796][ T3506] __kmem_cache_alloc_node+0x47/0x260 [ 53.957153][ T3506] ? kvmalloc_node+0x6e/0x180 [ 53.961915][ T3506] __kmalloc_node+0xa2/0x230 [ 53.966516][ T3506] kvmalloc_node+0x6e/0x180 [ 53.971536][ T3506] get_dist_table+0x91/0x380 [ 53.976121][ T3506] netem_change+0x9a0/0x1ea0 [ 53.980698][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.986764][ T3506] ? netem_destroy+0xb0/0xb0 [ 53.991551][ T3506] ? do_raw_spin_unlock+0x137/0x8a0 [ 53.997275][ T3506] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 54.003166][ T3506] ? lockdep_hardirqs_on+0x94/0x130 [ 54.008353][ T3506] ? memset+0x1f/0x40 [ 54.012407][ T3506] ? __hrtimer_init+0x181/0x260 [ 54.017238][ T3506] netem_init+0x58/0xb0 [ 54.021381][ T3506] ? qdisc_peek_dequeued+0x220/0x220 [ 54.026918][ T3506] qdisc_create+0x8a1/0x1220 [ 54.031590][ T3506] ? qdisc_notify+0x390/0x390 [ 54.036430][ T3506] tc_modify_qdisc+0x9e0/0x1da0 [ 54.041440][ T3506] ? rcu_lock_release+0x20/0x20 [ 54.046280][ T3506] ? rcu_lock_release+0x20/0x20 [ 54.051106][ T3506] rtnetlink_rcv_msg+0x776/0xf00 [ 54.056032][ T3506] ? rtnetlink_bind+0x80/0x80 [ 54.060686][ T3506] ? stack_trace_save+0x1c0/0x1c0 [ 54.065690][ T3506] ? kernel_text_address+0x9f/0xd0 [ 54.070780][ T3506] ? __kernel_text_address+0x9/0x40 [ 54.075964][ T3506] ? unwind_get_return_address+0x49/0x80 [ 54.081667][ T3506] ? arch_stack_walk+0xf3/0x140 [ 54.086513][ T3506] ? mark_lock+0x9a/0x340 [ 54.090827][ T3506] ? mark_lock+0x9a/0x340 [ 54.095132][ T3506] ? __lock_acquire+0x125b/0x1f80 [ 54.100140][ T3506] netlink_rcv_skb+0x1cd/0x410 [ 54.104898][ T3506] ? rtnetlink_bind+0x80/0x80 [ 54.109637][ T3506] ? netlink_ack+0xe60/0xe60 [ 54.114211][ T3506] netlink_unicast+0x7bf/0x990 [ 54.119039][ T3506] ? netlink_detachskb+0x90/0x90 [ 54.124281][ T3506] ? __virt_addr_valid+0x22b/0x2e0 [ 54.129458][ T3506] ? __phys_addr_symbol+0x2b/0x70 [ 54.134461][ T3506] ? __check_object_size+0x4dd/0xa30 [ 54.139724][ T3506] ? bpf_lsm_netlink_send+0x5/0x10 [ 54.144815][ T3506] netlink_sendmsg+0xa26/0xd60 [ 54.149562][ T3506] ? netlink_getsockopt+0x5b0/0x5b0 [ 54.154996][ T3506] ? aa_sock_msg_perm+0x91/0x150 [ 54.159912][ T3506] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 54.165172][ T3506] ? security_socket_sendmsg+0x7d/0xa0 [ 54.170610][ T3506] ? netlink_getsockopt+0x5b0/0x5b0 [ 54.175785][ T3506] ____sys_sendmsg+0x59e/0x8f0 [ 54.180530][ T3506] ? __sys_sendmsg_sock+0x30/0x30 [ 54.185533][ T3506] __sys_sendmsg+0x2a9/0x390 [ 54.190118][ T3506] ? ____sys_sendmsg+0x8f0/0x8f0 [ 54.195058][ T3506] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 54.201031][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 54.206997][ T3506] ? lockdep_hardirqs_on+0x94/0x130 [ 54.212185][ T3506] ? syscall_enter_from_user_mode+0x2e/0x220 [ 54.218145][ T3506] do_syscall_64+0x3d/0xb0 [ 54.222548][ T3506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 54.228423][ T3506] RIP: 0033:0x7f46e4c204e9 [ 54.232817][ T3506] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.252423][ T3506] RSP: 002b:00007ffd7e181698 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 54.260813][ T3506] RAX: ffffffffffffffda RBX: 00007ffd7e181868 RCX: 00007f46e4c204e9 [ 54.268790][ T3506] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 54.276740][ T3506] RBP: 00007f46e4c93610 R08: 00000000ffffffff R09: 00007ffd7e181868 [ 54.284690][ T3506] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 54.292643][ T3506] R13: 00007ffd7e181858 R14: 0000000000000001 R15: 0000000000000001 [ 54.300598][ T3506]