Warning: Permanently added '10.128.0.104' (ED25519) to the list of known hosts. executing program [ 60.182548][ T3512] [ 60.184905][ T3512] ===================================================== [ 60.191828][ T3512] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 60.199274][ T3512] 6.1.45-syzkaller #0 Not tainted [ 60.204289][ T3512] ----------------------------------------------------- [ 60.211207][ T3512] syz-executor288/3512 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 60.219267][ T3512] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 60.228336][ T3512] [ 60.228336][ T3512] and this task is already holding: [ 60.235692][ T3512] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 60.244929][ T3512] which would create a new lock dependency: [ 60.250807][ T3512] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 60.258378][ T3512] [ 60.258378][ T3512] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 60.267817][ T3512] (noop_qdisc.q.lock){+.-.}-{2:2} [ 60.267839][ T3512] [ 60.267839][ T3512] ... which became SOFTIRQ-irq-safe at: [ 60.280808][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.285400][ T3512] _raw_spin_lock+0x2a/0x40 [ 60.289989][ T3512] net_tx_action+0x752/0x970 [ 60.294705][ T3512] __do_softirq+0x2e9/0xa4c [ 60.299290][ T3512] do_softirq+0x162/0x240 [ 60.303703][ T3512] __local_bh_enable_ip+0x1b1/0x1f0 [ 60.308982][ T3512] dev_deactivate_many+0x3b4/0xaf0 [ 60.314179][ T3512] dev_deactivate+0x177/0x270 [ 60.318939][ T3512] linkwatch_do_dev+0x104/0x160 [ 60.323871][ T3512] __linkwatch_run_queue+0x448/0x6b0 [ 60.329243][ T3512] linkwatch_event+0x48/0x50 [ 60.333928][ T3512] process_one_work+0x8aa/0x11f0 [ 60.338960][ T3512] worker_thread+0xa5f/0x1210 [ 60.343734][ T3512] kthread+0x26e/0x300 [ 60.347891][ T3512] ret_from_fork+0x1f/0x30 [ 60.352401][ T3512] [ 60.352401][ T3512] to a SOFTIRQ-irq-unsafe lock: [ 60.359414][ T3512] (fs_reclaim){+.+.}-{0:0} [ 60.359439][ T3512] [ 60.359439][ T3512] ... which became SOFTIRQ-irq-unsafe at: [ 60.371833][ T3512] ... [ 60.371840][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.379012][ T3512] fs_reclaim_acquire+0x83/0x120 [ 60.384037][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.389157][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 60.394621][ T3512] kmalloc_trace+0x26/0xe0 [ 60.399148][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 60.404349][ T3512] wq_numa_init+0x122/0x4b0 [ 60.408944][ T3512] workqueue_init+0x22/0x59d [ 60.413650][ T3512] kernel_init_freeable+0x40a/0x61f [ 60.418942][ T3512] kernel_init+0x19/0x290 [ 60.423361][ T3512] ret_from_fork+0x1f/0x30 [ 60.427942][ T3512] [ 60.427942][ T3512] other info that might help us debug this: [ 60.427942][ T3512] [ 60.438189][ T3512] Possible interrupt unsafe locking scenario: [ 60.438189][ T3512] [ 60.446504][ T3512] CPU0 CPU1 [ 60.451866][ T3512] ---- ---- [ 60.457239][ T3512] lock(fs_reclaim); [ 60.461315][ T3512] local_irq_disable(); [ 60.468076][ T3512] lock(noop_qdisc.q.lock); [ 60.475187][ T3512] lock(fs_reclaim); [ 60.481692][ T3512] [ 60.485235][ T3512] lock(noop_qdisc.q.lock); [ 60.490003][ T3512] [ 60.490003][ T3512] *** DEADLOCK *** [ 60.490003][ T3512] [ 60.498228][ T3512] 2 locks held by syz-executor288/3512: [ 60.503865][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 60.513296][ T3512] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 60.522988][ T3512] [ 60.522988][ T3512] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 60.533389][ T3512] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 60.539043][ T3512] HARDIRQ-ON-W at: [ 60.543022][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.549177][ T3512] _raw_spin_lock+0x2a/0x40 [ 60.555334][ T3512] __dev_queue_xmit+0xd50/0x3c90 [ 60.561930][ T3512] tx+0x66/0x100 [ 60.567134][ T3512] kthread+0x234/0x440 [ 60.572857][ T3512] kthread+0x26e/0x300 [ 60.578581][ T3512] ret_from_fork+0x1f/0x30 [ 60.584657][ T3512] IN-SOFTIRQ-W at: [ 60.588645][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.594802][ T3512] _raw_spin_lock+0x2a/0x40 [ 60.600959][ T3512] net_tx_action+0x752/0x970 [ 60.607202][ T3512] __do_softirq+0x2e9/0xa4c [ 60.613359][ T3512] do_softirq+0x162/0x240 [ 60.619339][ T3512] __local_bh_enable_ip+0x1b1/0x1f0 [ 60.626188][ T3512] dev_deactivate_many+0x3b4/0xaf0 [ 60.632954][ T3512] dev_deactivate+0x177/0x270 [ 60.639461][ T3512] linkwatch_do_dev+0x104/0x160 [ 60.645966][ T3512] __linkwatch_run_queue+0x448/0x6b0 [ 60.652903][ T3512] linkwatch_event+0x48/0x50 [ 60.659159][ T3512] process_one_work+0x8aa/0x11f0 [ 60.665761][ T3512] worker_thread+0xa5f/0x1210 [ 60.672097][ T3512] kthread+0x26e/0x300 [ 60.677823][ T3512] ret_from_fork+0x1f/0x30 [ 60.683920][ T3512] INITIAL USE at: [ 60.687814][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.693884][ T3512] _raw_spin_lock+0x2a/0x40 [ 60.699955][ T3512] __dev_queue_xmit+0xd50/0x3c90 [ 60.706462][ T3512] tx+0x66/0x100 [ 60.711578][ T3512] kthread+0x234/0x440 [ 60.717216][ T3512] kthread+0x26e/0x300 [ 60.722853][ T3512] ret_from_fork+0x1f/0x30 [ 60.728844][ T3512] } [ 60.731342][ T3512] ... key at: [] noop_qdisc+0x108/0x320 [ 60.738981][ T3512] [ 60.738981][ T3512] the dependencies between the lock to be acquired [ 60.738989][ T3512] and SOFTIRQ-irq-unsafe lock: [ 60.752506][ T3512] -> (fs_reclaim){+.+.}-{0:0} { [ 60.757379][ T3512] HARDIRQ-ON-W at: [ 60.761369][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.767527][ T3512] fs_reclaim_acquire+0x83/0x120 [ 60.774115][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.780796][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 60.787879][ T3512] kmalloc_trace+0x26/0xe0 [ 60.793957][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 60.800721][ T3512] wq_numa_init+0x122/0x4b0 [ 60.807056][ T3512] workqueue_init+0x22/0x59d [ 60.813303][ T3512] kernel_init_freeable+0x40a/0x61f [ 60.820156][ T3512] kernel_init+0x19/0x290 [ 60.826143][ T3512] ret_from_fork+0x1f/0x30 [ 60.832222][ T3512] SOFTIRQ-ON-W at: [ 60.836204][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.842358][ T3512] fs_reclaim_acquire+0x83/0x120 [ 60.848947][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.855631][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 60.862658][ T3512] kmalloc_trace+0x26/0xe0 [ 60.868728][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 60.875495][ T3512] wq_numa_init+0x122/0x4b0 [ 60.881667][ T3512] workqueue_init+0x22/0x59d [ 60.887943][ T3512] kernel_init_freeable+0x40a/0x61f [ 60.894797][ T3512] kernel_init+0x19/0x290 [ 60.900789][ T3512] ret_from_fork+0x1f/0x30 [ 60.906867][ T3512] INITIAL USE at: [ 60.910767][ T3512] lock_acquire+0x1f8/0x5a0 [ 60.916839][ T3512] fs_reclaim_acquire+0x83/0x120 [ 60.923343][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.931323][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 60.938263][ T3512] kmalloc_trace+0x26/0xe0 [ 60.944242][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 60.950918][ T3512] wq_numa_init+0x122/0x4b0 [ 60.957005][ T3512] workqueue_init+0x22/0x59d [ 60.963163][ T3512] kernel_init_freeable+0x40a/0x61f [ 60.970008][ T3512] kernel_init+0x19/0x290 [ 60.975948][ T3512] ret_from_fork+0x1f/0x30 [ 60.981938][ T3512] } [ 60.984438][ T3512] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 60.992342][ T3512] ... acquired at: [ 60.996142][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.000821][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.006023][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.011230][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.016786][ T3512] __kmalloc_node+0xa2/0x230 [ 61.021553][ T3512] kvmalloc_node+0x6e/0x180 [ 61.026247][ T3512] get_dist_table+0x91/0x380 [ 61.031028][ T3512] netem_change+0x947/0x1ea0 [ 61.035798][ T3512] netem_init+0x58/0xb0 [ 61.040156][ T3512] qdisc_create+0x8a1/0x1220 [ 61.044943][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 61.050014][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 61.055230][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 61.060192][ T3512] netlink_unicast+0x7bf/0x990 [ 61.065142][ T3512] netlink_sendmsg+0xa26/0xd60 [ 61.070187][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 61.075133][ T3512] __sys_sendmsg+0x2a9/0x390 [ 61.079898][ T3512] do_syscall_64+0x3d/0xb0 [ 61.084497][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.090770][ T3512] [ 61.093123][ T3512] [ 61.093123][ T3512] stack backtrace: [ 61.099107][ T3512] CPU: 0 PID: 3512 Comm: syz-executor288 Not tainted 6.1.45-syzkaller #0 [ 61.107529][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 61.117591][ T3512] Call Trace: [ 61.120879][ T3512] [ 61.123813][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 61.128515][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 61.133986][ T3512] ? panic+0x75d/0x75d [ 61.138063][ T3512] ? print_shortest_lock_dependencies+0xee/0x150 [ 61.144393][ T3512] validate_chain+0x4d2e/0x58e0 [ 61.149260][ T3512] ? reacquire_held_locks+0x660/0x660 [ 61.154646][ T3512] ? validate_chain+0x115/0x58e0 [ 61.159598][ T3512] ? mark_lock+0x9a/0x340 [ 61.163937][ T3512] __lock_acquire+0x125b/0x1f80 [ 61.168798][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.173326][ T3512] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 61.178534][ T3512] ? read_lock_is_recursive+0x10/0x10 [ 61.183941][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 61.188981][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.193921][ T3512] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 61.199131][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.204170][ T3512] ? kvmalloc_node+0x6e/0x180 [ 61.208849][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.214235][ T3512] ? kvmalloc_node+0x6e/0x180 [ 61.218932][ T3512] __kmalloc_node+0xa2/0x230 [ 61.223526][ T3512] kvmalloc_node+0x6e/0x180 [ 61.228032][ T3512] get_dist_table+0x91/0x380 [ 61.232639][ T3512] netem_change+0x947/0x1ea0 [ 61.237245][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.243259][ T3512] ? netem_destroy+0xb0/0xb0 [ 61.247860][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 61.253094][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 61.258998][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 61.264210][ T3512] ? memset+0x1f/0x40 [ 61.268303][ T3512] ? __hrtimer_init+0x181/0x260 [ 61.273455][ T3512] netem_init+0x58/0xb0 [ 61.277636][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 61.282937][ T3512] qdisc_create+0x8a1/0x1220 [ 61.287579][ T3512] ? qdisc_notify+0x390/0x390 [ 61.292355][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 61.297221][ T3512] ? rcu_lock_release+0x20/0x20 [ 61.302093][ T3512] ? rcu_lock_release+0x20/0x20 [ 61.306952][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 61.311898][ T3512] ? rtnetlink_bind+0x80/0x80 [ 61.316579][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 61.321712][ T3512] ? kernel_text_address+0x9f/0xd0 [ 61.326837][ T3512] ? __kernel_text_address+0x9/0x40 [ 61.332062][ T3512] ? unwind_get_return_address+0x49/0x80 [ 61.337701][ T3512] ? arch_stack_walk+0xf3/0x140 [ 61.342562][ T3512] ? mark_lock+0x9a/0x340 [ 61.346899][ T3512] ? mark_lock+0x9a/0x340 [ 61.351237][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 61.356277][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 61.361049][ T3512] ? rtnetlink_bind+0x80/0x80 [ 61.365729][ T3512] ? netlink_ack+0xe60/0xe60 [ 61.370332][ T3512] netlink_unicast+0x7bf/0x990 [ 61.375110][ T3512] ? netlink_detachskb+0x90/0x90 [ 61.380052][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 61.385177][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 61.390216][ T3512] ? __check_object_size+0x4dd/0xa30 [ 61.395597][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 61.400718][ T3512] netlink_sendmsg+0xa26/0xd60 [ 61.405584][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.410814][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 61.415781][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 61.421072][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 61.426548][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.431761][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 61.436542][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 61.441578][ T3512] __sys_sendmsg+0x2a9/0x390 [ 61.446186][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 61.451134][ T3512] ? _copy_to_user+0xe9/0x130 [ 61.455843][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.461832][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.467831][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 61.473559][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.479636][ T3512] do_syscall_64+0x3d/0xb0 [ 61.484106][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.490042][ T3512] RIP: 0033:0x7f3e1ed248f9 [ 61.494463][ T3512] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 61.514159][ T3512] RSP: 002b:00007fffd1571f28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.522578][ T3512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3e1ed248f9 [ 61.530559][ T3512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 61.538535][ T3512] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fffd1571fa0 [ 61.546513][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 61.554490][ T3512] R13: 00007fffd1572128 R14: 0000000000000001 R15: 0000000000000001 [ 61.562499][ T3512] [ 61.565618][ T3512] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 61.575115][ T3512] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3512, name: syz-executor288 [ 61.584636][ T3512] preempt_count: 201, expected: 0 [ 61.589709][ T3512] RCU nest depth: 0, expected: 0 [ 61.594665][ T3512] INFO: lockdep is turned off. [ 61.599461][ T3512] Preemption disabled at: [ 61.599469][ T3512] [<0000000000000000>] 0x0 [ 61.608231][ T3512] CPU: 0 PID: 3512 Comm: syz-executor288 Not tainted 6.1.45-syzkaller #0 [ 61.616659][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 61.626720][ T3512] Call Trace: [ 61.630088][ T3512] [ 61.633014][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 61.637702][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 61.643189][ T3512] ? panic+0x75d/0x75d [ 61.647260][ T3512] ? rcu_is_watching+0x11/0xb0 [ 61.652115][ T3512] __might_resched+0x5cb/0x780 [ 61.656882][ T3512] ? __might_sleep+0xb0/0xb0 [ 61.661656][ T3512] slab_pre_alloc_hook+0x4a/0x2a0 [ 61.666711][ T3512] ? kvmalloc_node+0x6e/0x180 [ 61.671389][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.676764][ T3512] ? kvmalloc_node+0x6e/0x180 [ 61.681436][ T3512] __kmalloc_node+0xa2/0x230 [ 61.686023][ T3512] kvmalloc_node+0x6e/0x180 [ 61.690524][ T3512] get_dist_table+0x91/0x380 [ 61.695118][ T3512] netem_change+0x947/0x1ea0 [ 61.699716][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.705697][ T3512] ? netem_destroy+0xb0/0xb0 [ 61.710289][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 61.715488][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 61.721412][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 61.726628][ T3512] ? memset+0x1f/0x40 [ 61.730638][ T3512] ? __hrtimer_init+0x181/0x260 [ 61.735512][ T3512] netem_init+0x58/0xb0 [ 61.739679][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 61.745080][ T3512] qdisc_create+0x8a1/0x1220 [ 61.749690][ T3512] ? qdisc_notify+0x390/0x390 [ 61.754412][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 61.759284][ T3512] ? rcu_lock_release+0x20/0x20 [ 61.764156][ T3512] ? rcu_lock_release+0x20/0x20 [ 61.769020][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 61.773976][ T3512] ? rtnetlink_bind+0x80/0x80 [ 61.778661][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 61.783690][ T3512] ? kernel_text_address+0x9f/0xd0 [ 61.788815][ T3512] ? __kernel_text_address+0x9/0x40 [ 61.794025][ T3512] ? unwind_get_return_address+0x49/0x80 [ 61.799690][ T3512] ? arch_stack_walk+0xf3/0x140 [ 61.804559][ T3512] ? mark_lock+0x9a/0x340 [ 61.808899][ T3512] ? mark_lock+0x9a/0x340 [ 61.813417][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 61.818464][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 61.823244][ T3512] ? rtnetlink_bind+0x80/0x80 [ 61.827931][ T3512] ? netlink_ack+0xe60/0xe60 [ 61.832603][ T3512] netlink_unicast+0x7bf/0x990 [ 61.837408][ T3512] ? netlink_detachskb+0x90/0x90 [ 61.842360][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 61.847571][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 61.852607][ T3512] ? __check_object_size+0x4dd/0xa30 [ 61.857900][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 61.863027][ T3512] netlink_sendmsg+0xa26/0xd60 [ 61.867808][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.873014][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 61.877967][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 61.883318][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 61.888786][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.893992][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 61.898773][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 61.903806][ T3512] __sys_sendmsg+0x2a9/0x390 [ 61.908400][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 61.913347][ T3512] ? _copy_to_user+0xe9/0x130 [ 61.918040][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.924032][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.930063][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 61.935280][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.941276][ T3512] do_syscall_64+0x3d/0xb0 [ 61.945713][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.951642][ T3512] RIP: 0033:0x7f3e1ed248f9 [ 61.956061][ T3512] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 61.975668][ T3512] RSP: 002b:00007fffd1571f28 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.984188][ T3512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3e1ed248f9 [ 61.992166][ T3512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 62.000140][ T3512] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fffd1571fa0 [ 62.008111][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 62.016081][ T3512] R13: 00007fffd1572128 R14: 0000000000000001 R15: 0000000000000001 [ 62.024058][ T3512]