Warning: Permanently added '10.128.1.11' (ED25519) to the list of known hosts. executing program [ 67.114754][ T3511] [ 67.117156][ T3511] ===================================================== [ 67.124100][ T3511] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 67.131544][ T3511] 6.1.45-syzkaller #0 Not tainted [ 67.136554][ T3511] ----------------------------------------------------- [ 67.143477][ T3511] syz-executor428/3511 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 67.151577][ T3511] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 67.160768][ T3511] [ 67.160768][ T3511] and this task is already holding: [ 67.168123][ T3511] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 67.177373][ T3511] which would create a new lock dependency: [ 67.183254][ T3511] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 67.190829][ T3511] [ 67.190829][ T3511] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 67.204699][ T3511] (noop_qdisc.q.lock){+.-.}-{2:2} [ 67.204722][ T3511] [ 67.204722][ T3511] ... which became SOFTIRQ-irq-safe at: [ 67.217515][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.222106][ T3511] _raw_spin_lock+0x2a/0x40 [ 67.226697][ T3511] net_tx_action+0x752/0x970 [ 67.231367][ T3511] __do_softirq+0x2e9/0xa4c [ 67.235949][ T3511] do_softirq+0x162/0x240 [ 67.240357][ T3511] __local_bh_enable_ip+0x1b1/0x1f0 [ 67.245634][ T3511] dev_deactivate_many+0x3b4/0xaf0 [ 67.250830][ T3511] dev_deactivate+0x177/0x270 [ 67.255591][ T3511] linkwatch_do_dev+0x104/0x160 [ 67.260531][ T3511] __linkwatch_run_queue+0x448/0x6b0 [ 67.265993][ T3511] linkwatch_event+0x48/0x50 [ 67.270667][ T3511] process_one_work+0x8aa/0x11f0 [ 67.275696][ T3511] worker_thread+0xa5f/0x1210 [ 67.280457][ T3511] kthread+0x26e/0x300 [ 67.284610][ T3511] ret_from_fork+0x1f/0x30 [ 67.289114][ T3511] [ 67.289114][ T3511] to a SOFTIRQ-irq-unsafe lock: [ 67.296120][ T3511] (fs_reclaim){+.+.}-{0:0} [ 67.296143][ T3511] [ 67.296143][ T3511] ... which became SOFTIRQ-irq-unsafe at: [ 67.308500][ T3511] ... [ 67.308507][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.315683][ T3511] fs_reclaim_acquire+0x83/0x120 [ 67.320717][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 67.325841][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 67.331302][ T3511] kmalloc_trace+0x26/0xe0 [ 67.335811][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 67.341006][ T3511] wq_numa_init+0x122/0x4b0 [ 67.345597][ T3511] workqueue_init+0x22/0x59d [ 67.350273][ T3511] kernel_init_freeable+0x40a/0x61f [ 67.355552][ T3511] kernel_init+0x19/0x290 [ 67.359982][ T3511] ret_from_fork+0x1f/0x30 [ 67.364580][ T3511] [ 67.364580][ T3511] other info that might help us debug this: [ 67.364580][ T3511] [ 67.374990][ T3511] Possible interrupt unsafe locking scenario: [ 67.374990][ T3511] [ 67.383397][ T3511] CPU0 CPU1 [ 67.388760][ T3511] ---- ---- [ 67.394119][ T3511] lock(fs_reclaim); [ 67.398115][ T3511] local_irq_disable(); [ 67.404895][ T3511] lock(noop_qdisc.q.lock); [ 67.412185][ T3511] lock(fs_reclaim); [ 67.418690][ T3511] [ 67.422175][ T3511] lock(noop_qdisc.q.lock); [ 67.426953][ T3511] [ 67.426953][ T3511] *** DEADLOCK *** [ 67.426953][ T3511] [ 67.435111][ T3511] 2 locks held by syz-executor428/3511: [ 67.440652][ T3511] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 67.450108][ T3511] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 67.459788][ T3511] [ 67.459788][ T3511] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 67.470188][ T3511] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 67.475660][ T3511] HARDIRQ-ON-W at: [ 67.479632][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.485779][ T3511] _raw_spin_lock+0x2a/0x40 [ 67.491928][ T3511] __dev_queue_xmit+0xd50/0x3c90 [ 67.498517][ T3511] tx+0x66/0x100 [ 67.503805][ T3511] kthread+0x234/0x440 [ 67.509524][ T3511] kthread+0x26e/0x300 [ 67.515253][ T3511] ret_from_fork+0x1f/0x30 [ 67.521379][ T3511] IN-SOFTIRQ-W at: [ 67.525378][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.531569][ T3511] _raw_spin_lock+0x2a/0x40 [ 67.537741][ T3511] net_tx_action+0x752/0x970 [ 67.543982][ T3511] __do_softirq+0x2e9/0xa4c [ 67.550131][ T3511] do_softirq+0x162/0x240 [ 67.556106][ T3511] __local_bh_enable_ip+0x1b1/0x1f0 [ 67.562953][ T3511] dev_deactivate_many+0x3b4/0xaf0 [ 67.569718][ T3511] dev_deactivate+0x177/0x270 [ 67.576062][ T3511] linkwatch_do_dev+0x104/0x160 [ 67.582564][ T3511] __linkwatch_run_queue+0x448/0x6b0 [ 67.589512][ T3511] linkwatch_event+0x48/0x50 [ 67.595749][ T3511] process_one_work+0x8aa/0x11f0 [ 67.602340][ T3511] worker_thread+0xa5f/0x1210 [ 67.608675][ T3511] kthread+0x26e/0x300 [ 67.614390][ T3511] ret_from_fork+0x1f/0x30 [ 67.620459][ T3511] INITIAL USE at: [ 67.624356][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.630417][ T3511] _raw_spin_lock+0x2a/0x40 [ 67.636483][ T3511] __dev_queue_xmit+0xd50/0x3c90 [ 67.642993][ T3511] tx+0x66/0x100 [ 67.648106][ T3511] kthread+0x234/0x440 [ 67.653740][ T3511] kthread+0x26e/0x300 [ 67.659366][ T3511] ret_from_fork+0x1f/0x30 [ 67.665347][ T3511] } [ 67.667838][ T3511] ... key at: [] noop_qdisc+0x108/0x320 [ 67.675557][ T3511] [ 67.675557][ T3511] the dependencies between the lock to be acquired [ 67.675565][ T3511] and SOFTIRQ-irq-unsafe lock: [ 67.689068][ T3511] -> (fs_reclaim){+.+.}-{0:0} { [ 67.693929][ T3511] HARDIRQ-ON-W at: [ 67.697905][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.704055][ T3511] fs_reclaim_acquire+0x83/0x120 [ 67.710660][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 67.717337][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 67.724360][ T3511] kmalloc_trace+0x26/0xe0 [ 67.730421][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 67.737185][ T3511] wq_numa_init+0x122/0x4b0 [ 67.743343][ T3511] workqueue_init+0x22/0x59d [ 67.749590][ T3511] kernel_init_freeable+0x40a/0x61f [ 67.756436][ T3511] kernel_init+0x19/0x290 [ 67.762419][ T3511] ret_from_fork+0x1f/0x30 [ 67.768498][ T3511] SOFTIRQ-ON-W at: [ 67.772486][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.778644][ T3511] fs_reclaim_acquire+0x83/0x120 [ 67.785230][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 67.791907][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 67.799106][ T3511] kmalloc_trace+0x26/0xe0 [ 67.805197][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 67.811963][ T3511] wq_numa_init+0x122/0x4b0 [ 67.818123][ T3511] workqueue_init+0x22/0x59d [ 67.824363][ T3511] kernel_init_freeable+0x40a/0x61f [ 67.831210][ T3511] kernel_init+0x19/0x290 [ 67.837191][ T3511] ret_from_fork+0x1f/0x30 [ 67.843260][ T3511] INITIAL USE at: [ 67.847156][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.853221][ T3511] fs_reclaim_acquire+0x83/0x120 [ 67.859719][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 67.866310][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 67.873267][ T3511] kmalloc_trace+0x26/0xe0 [ 67.879246][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 67.885919][ T3511] wq_numa_init+0x122/0x4b0 [ 67.891988][ T3511] workqueue_init+0x22/0x59d [ 67.898253][ T3511] kernel_init_freeable+0x40a/0x61f [ 67.905011][ T3511] kernel_init+0x19/0x290 [ 67.910917][ T3511] ret_from_fork+0x1f/0x30 [ 67.916899][ T3511] } [ 67.919389][ T3511] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 67.927282][ T3511] ... acquired at: [ 67.931077][ T3511] lock_acquire+0x1f8/0x5a0 [ 67.935753][ T3511] fs_reclaim_acquire+0x83/0x120 [ 67.940870][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 67.946155][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 67.951708][ T3511] __kmalloc_node+0xa2/0x230 [ 67.956464][ T3511] kvmalloc_node+0x6e/0x180 [ 67.961142][ T3511] get_dist_table+0x91/0x380 [ 67.965911][ T3511] netem_change+0x947/0x1ea0 [ 67.970676][ T3511] netem_init+0x58/0xb0 [ 67.975005][ T3511] qdisc_create+0x8a1/0x1220 [ 67.979779][ T3511] tc_modify_qdisc+0x9e0/0x1da0 [ 67.984804][ T3511] rtnetlink_rcv_msg+0x776/0xf00 [ 67.989925][ T3511] netlink_rcv_skb+0x1cd/0x410 [ 67.994861][ T3511] netlink_unicast+0x7bf/0x990 [ 67.999793][ T3511] netlink_sendmsg+0xa26/0xd60 [ 68.004726][ T3511] ____sys_sendmsg+0x59e/0x8f0 [ 68.009690][ T3511] __sys_sendmsg+0x2a9/0x390 [ 68.014469][ T3511] do_syscall_64+0x3d/0xb0 [ 68.019095][ T3511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.025169][ T3511] [ 68.027487][ T3511] [ 68.027487][ T3511] stack backtrace: [ 68.033374][ T3511] CPU: 1 PID: 3511 Comm: syz-executor428 Not tainted 6.1.45-syzkaller #0 [ 68.041788][ T3511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 68.051840][ T3511] Call Trace: [ 68.055116][ T3511] [ 68.058042][ T3511] dump_stack_lvl+0x1e3/0x2cb [ 68.062730][ T3511] ? nf_tcp_handle_invalid+0x642/0x642 [ 68.068198][ T3511] ? panic+0x75d/0x75d [ 68.072277][ T3511] ? print_shortest_lock_dependencies+0xee/0x150 [ 68.078605][ T3511] validate_chain+0x4d2e/0x58e0 [ 68.083465][ T3511] ? reacquire_held_locks+0x660/0x660 [ 68.088834][ T3511] ? validate_chain+0x115/0x58e0 [ 68.093778][ T3511] ? mark_lock+0x9a/0x340 [ 68.098112][ T3511] __lock_acquire+0x125b/0x1f80 [ 68.102987][ T3511] lock_acquire+0x1f8/0x5a0 [ 68.107487][ T3511] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 68.112688][ T3511] ? read_lock_is_recursive+0x10/0x10 [ 68.118091][ T3511] ? __lock_acquire+0x125b/0x1f80 [ 68.123217][ T3511] fs_reclaim_acquire+0x83/0x120 [ 68.128151][ T3511] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 68.133348][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 68.138383][ T3511] ? kvmalloc_node+0x6e/0x180 [ 68.143056][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 68.148866][ T3511] ? kvmalloc_node+0x6e/0x180 [ 68.153554][ T3511] __kmalloc_node+0xa2/0x230 [ 68.158154][ T3511] kvmalloc_node+0x6e/0x180 [ 68.162682][ T3511] get_dist_table+0x91/0x380 [ 68.167303][ T3511] netem_change+0x947/0x1ea0 [ 68.171898][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 68.177883][ T3511] ? netem_destroy+0xb0/0xb0 [ 68.182474][ T3511] ? do_raw_spin_unlock+0x137/0x8a0 [ 68.187672][ T3511] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 68.193567][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 68.198773][ T3511] ? memset+0x1f/0x40 [ 68.202766][ T3511] ? __hrtimer_init+0x181/0x260 [ 68.207635][ T3511] netem_init+0x58/0xb0 [ 68.211804][ T3511] ? qdisc_peek_dequeued+0x220/0x220 [ 68.217133][ T3511] qdisc_create+0x8a1/0x1220 [ 68.221758][ T3511] ? qdisc_notify+0x390/0x390 [ 68.226470][ T3511] tc_modify_qdisc+0x9e0/0x1da0 [ 68.231341][ T3511] ? rcu_lock_release+0x20/0x20 [ 68.236207][ T3511] ? rcu_lock_release+0x20/0x20 [ 68.241060][ T3511] rtnetlink_rcv_msg+0x776/0xf00 [ 68.246017][ T3511] ? rtnetlink_bind+0x80/0x80 [ 68.250705][ T3511] ? stack_trace_save+0x1c0/0x1c0 [ 68.255750][ T3511] ? kernel_text_address+0x9f/0xd0 [ 68.260882][ T3511] ? __kernel_text_address+0x9/0x40 [ 68.266163][ T3511] ? unwind_get_return_address+0x49/0x80 [ 68.271804][ T3511] ? arch_stack_walk+0xf3/0x140 [ 68.276678][ T3511] ? mark_lock+0x9a/0x340 [ 68.281037][ T3511] ? mark_lock+0x9a/0x340 [ 68.285388][ T3511] ? __lock_acquire+0x125b/0x1f80 [ 68.290437][ T3511] netlink_rcv_skb+0x1cd/0x410 [ 68.295491][ T3511] ? rtnetlink_bind+0x80/0x80 [ 68.300268][ T3511] ? netlink_ack+0xe60/0xe60 [ 68.304896][ T3511] netlink_unicast+0x7bf/0x990 [ 68.310904][ T3511] ? netlink_detachskb+0x90/0x90 [ 68.315840][ T3511] ? __virt_addr_valid+0x22b/0x2e0 [ 68.320971][ T3511] ? __phys_addr_symbol+0x2b/0x70 [ 68.326043][ T3511] ? __check_object_size+0x4dd/0xa30 [ 68.331362][ T3511] ? bpf_lsm_netlink_send+0x5/0x10 [ 68.336501][ T3511] netlink_sendmsg+0xa26/0xd60 [ 68.341292][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 68.346612][ T3511] ? aa_sock_msg_perm+0x91/0x150 [ 68.351570][ T3511] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 68.356886][ T3511] ? security_socket_sendmsg+0x7d/0xa0 [ 68.362467][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 68.367699][ T3511] ____sys_sendmsg+0x59e/0x8f0 [ 68.372476][ T3511] ? __sys_sendmsg_sock+0x30/0x30 [ 68.377512][ T3511] __sys_sendmsg+0x2a9/0x390 [ 68.382130][ T3511] ? ____sys_sendmsg+0x8f0/0x8f0 [ 68.387093][ T3511] ? _copy_to_user+0xe9/0x130 [ 68.391863][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 68.398028][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 68.404014][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 68.409228][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 68.415243][ T3511] do_syscall_64+0x3d/0xb0 [ 68.419775][ T3511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.425781][ T3511] RIP: 0033:0x7f80092cd8b9 [ 68.430206][ T3511] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 68.450015][ T3511] RSP: 002b:00007ffce5e9b888 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 68.458449][ T3511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80092cd8b9 [ 68.466442][ T3511] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 68.474438][ T3511] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffce5e9b900 [ 68.482848][ T3511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 68.490828][ T3511] R13: 00007ffce5e9ba88 R14: 0000000000000001 R15: 0000000000000001 [ 68.498813][ T3511] [ 68.501973][ T3511] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 68.511494][ T3511] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3511, name: syz-executor428 [ 68.521028][ T3511] preempt_count: 201, expected: 0 [ 68.526067][ T3511] RCU nest depth: 0, expected: 0 [ 68.531073][ T3511] INFO: lockdep is turned off. [ 68.535857][ T3511] Preemption disabled at: [ 68.535866][ T3511] [<0000000000000000>] 0x0 [ 68.544647][ T3511] CPU: 1 PID: 3511 Comm: syz-executor428 Not tainted 6.1.45-syzkaller #0 [ 68.553077][ T3511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 68.563134][ T3511] Call Trace: [ 68.566412][ T3511] [ 68.569427][ T3511] dump_stack_lvl+0x1e3/0x2cb [ 68.574113][ T3511] ? nf_tcp_handle_invalid+0x642/0x642 [ 68.579580][ T3511] ? panic+0x75d/0x75d [ 68.583646][ T3511] ? rcu_is_watching+0x11/0xb0 [ 68.588411][ T3511] __might_resched+0x5cb/0x780 [ 68.593174][ T3511] ? __might_sleep+0xb0/0xb0 [ 68.597793][ T3511] slab_pre_alloc_hook+0x4a/0x2a0 [ 68.602820][ T3511] ? kvmalloc_node+0x6e/0x180 [ 68.607492][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 68.612864][ T3511] ? kvmalloc_node+0x6e/0x180 [ 68.617535][ T3511] __kmalloc_node+0xa2/0x230 [ 68.622122][ T3511] kvmalloc_node+0x6e/0x180 [ 68.626620][ T3511] get_dist_table+0x91/0x380 [ 68.631214][ T3511] netem_change+0x947/0x1ea0 [ 68.635825][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 68.641892][ T3511] ? netem_destroy+0xb0/0xb0 [ 68.646484][ T3511] ? do_raw_spin_unlock+0x137/0x8a0 [ 68.651729][ T3511] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 68.657628][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 68.662844][ T3511] ? memset+0x1f/0x40 [ 68.666840][ T3511] ? __hrtimer_init+0x181/0x260 [ 68.671796][ T3511] netem_init+0x58/0xb0 [ 68.675966][ T3511] ? qdisc_peek_dequeued+0x220/0x220 [ 68.681256][ T3511] qdisc_create+0x8a1/0x1220 [ 68.685853][ T3511] ? qdisc_notify+0x390/0x390 [ 68.690532][ T3511] tc_modify_qdisc+0x9e0/0x1da0 [ 68.695396][ T3511] ? rcu_lock_release+0x20/0x20 [ 68.700262][ T3511] ? rcu_lock_release+0x20/0x20 [ 68.705118][ T3511] rtnetlink_rcv_msg+0x776/0xf00 [ 68.710061][ T3511] ? rtnetlink_bind+0x80/0x80 [ 68.714733][ T3511] ? stack_trace_save+0x1c0/0x1c0 [ 68.719770][ T3511] ? kernel_text_address+0x9f/0xd0 [ 68.724886][ T3511] ? __kernel_text_address+0x9/0x40 [ 68.730089][ T3511] ? unwind_get_return_address+0x49/0x80 [ 68.735727][ T3511] ? arch_stack_walk+0xf3/0x140 [ 68.740578][ T3511] ? mark_lock+0x9a/0x340 [ 68.744975][ T3511] ? mark_lock+0x9a/0x340 [ 68.749329][ T3511] ? __lock_acquire+0x125b/0x1f80 [ 68.754375][ T3511] netlink_rcv_skb+0x1cd/0x410 [ 68.759141][ T3511] ? rtnetlink_bind+0x80/0x80 [ 68.763814][ T3511] ? netlink_ack+0xe60/0xe60 [ 68.768415][ T3511] netlink_unicast+0x7bf/0x990 [ 68.773266][ T3511] ? netlink_detachskb+0x90/0x90 [ 68.778200][ T3511] ? __virt_addr_valid+0x22b/0x2e0 [ 68.783334][ T3511] ? __phys_addr_symbol+0x2b/0x70 [ 68.788361][ T3511] ? __check_object_size+0x4dd/0xa30 [ 68.793646][ T3511] ? bpf_lsm_netlink_send+0x5/0x10 [ 68.798760][ T3511] netlink_sendmsg+0xa26/0xd60 [ 68.803532][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 68.808912][ T3511] ? aa_sock_msg_perm+0x91/0x150 [ 68.813861][ T3511] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 68.819250][ T3511] ? security_socket_sendmsg+0x7d/0xa0 [ 68.824801][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 68.830016][ T3511] ____sys_sendmsg+0x59e/0x8f0 [ 68.834794][ T3511] ? __sys_sendmsg_sock+0x30/0x30 [ 68.839822][ T3511] __sys_sendmsg+0x2a9/0x390 [ 68.844410][ T3511] ? ____sys_sendmsg+0x8f0/0x8f0 [ 68.849348][ T3511] ? _copy_to_user+0xe9/0x130 [ 68.854035][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 68.860021][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 68.866000][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 68.871284][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 68.877266][ T3511] do_syscall_64+0x3d/0xb0 [ 68.881687][ T3511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 68.887584][ T3511] RIP: 0033:0x7f80092cd8b9 [ 68.891996][ T3511] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 68.911595][ T3511] RSP: 002b:00007ffce5e9b888 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 68.920092][ T3511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80092cd8b9 [ 68.928131][ T3511] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 68.936136][ T3511] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffce5e9b900 [ 68.944119][ T3511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 68.952097][ T3511] R13: 00007ffce5e9ba88 R14: 0000000000000001 R15: 0000000000000001 [ 68.960081][ T3511]