Warning: Permanently added '10.128.0.158' (ED25519) to the list of known hosts. executing program [ 62.088691][ T3520] [ 62.091050][ T3520] ===================================================== [ 62.097966][ T3520] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 62.105404][ T3520] 6.1.45-syzkaller #0 Not tainted [ 62.110434][ T3520] ----------------------------------------------------- [ 62.117378][ T3520] syz-executor262/3520 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 62.125457][ T3520] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 62.134527][ T3520] [ 62.134527][ T3520] and this task is already holding: [ 62.141880][ T3520] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 62.151114][ T3520] which would create a new lock dependency: [ 62.156999][ T3520] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 62.164566][ T3520] [ 62.164566][ T3520] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 62.174010][ T3520] (noop_qdisc.q.lock){+.-.}-{2:2} [ 62.174032][ T3520] [ 62.174032][ T3520] ... which became SOFTIRQ-irq-safe at: [ 62.186833][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.191420][ T3520] _raw_spin_lock+0x2a/0x40 [ 62.196006][ T3520] net_tx_action+0x752/0x970 [ 62.200674][ T3520] __do_softirq+0x2e9/0xa4c [ 62.205257][ T3520] do_softirq+0x162/0x240 [ 62.209665][ T3520] __local_bh_enable_ip+0x1b1/0x1f0 [ 62.214939][ T3520] dev_deactivate_many+0x3b4/0xaf0 [ 62.220143][ T3520] dev_deactivate+0x177/0x270 [ 62.224907][ T3520] linkwatch_do_dev+0x104/0x160 [ 62.229847][ T3520] __linkwatch_run_queue+0x448/0x6b0 [ 62.235227][ T3520] linkwatch_event+0x48/0x50 [ 62.239899][ T3520] process_one_work+0x8aa/0x11f0 [ 62.244919][ T3520] worker_thread+0xa5f/0x1210 [ 62.249675][ T3520] kthread+0x26e/0x300 [ 62.253821][ T3520] ret_from_fork+0x1f/0x30 [ 62.258323][ T3520] [ 62.258323][ T3520] to a SOFTIRQ-irq-unsafe lock: [ 62.265326][ T3520] (fs_reclaim){+.+.}-{0:0} [ 62.265349][ T3520] [ 62.265349][ T3520] ... which became SOFTIRQ-irq-unsafe at: [ 62.277697][ T3520] ... [ 62.277703][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.284854][ T3520] fs_reclaim_acquire+0x83/0x120 [ 62.289867][ T3520] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.294971][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 62.300423][ T3520] kmalloc_trace+0x26/0xe0 [ 62.304919][ T3520] alloc_workqueue_attrs+0x46/0xc0 [ 62.310125][ T3520] wq_numa_init+0x122/0x4b0 [ 62.314728][ T3520] workqueue_init+0x22/0x59d [ 62.319406][ T3520] kernel_init_freeable+0x40a/0x61f [ 62.324690][ T3520] kernel_init+0x19/0x290 [ 62.329106][ T3520] ret_from_fork+0x1f/0x30 [ 62.333610][ T3520] [ 62.333610][ T3520] other info that might help us debug this: [ 62.333610][ T3520] [ 62.343827][ T3520] Possible interrupt unsafe locking scenario: [ 62.343827][ T3520] [ 62.352129][ T3520] CPU0 CPU1 [ 62.357482][ T3520] ---- ---- [ 62.362828][ T3520] lock(fs_reclaim); [ 62.366797][ T3520] local_irq_disable(); [ 62.373551][ T3520] lock(noop_qdisc.q.lock); [ 62.380649][ T3520] lock(fs_reclaim); [ 62.387136][ T3520] [ 62.390574][ T3520] lock(noop_qdisc.q.lock); [ 62.395328][ T3520] [ 62.395328][ T3520] *** DEADLOCK *** [ 62.395328][ T3520] [ 62.403459][ T3520] 2 locks held by syz-executor262/3520: [ 62.408987][ T3520] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 62.418386][ T3520] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 62.428041][ T3520] [ 62.428041][ T3520] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 62.438439][ T3520] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 62.443919][ T3520] HARDIRQ-ON-W at: [ 62.447907][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.454063][ T3520] _raw_spin_lock+0x2a/0x40 [ 62.460211][ T3520] __dev_queue_xmit+0xd50/0x3c90 [ 62.466834][ T3520] tx+0x66/0x100 [ 62.472035][ T3520] kthread+0x234/0x440 [ 62.477747][ T3520] kthread+0x26e/0x300 [ 62.483455][ T3520] ret_from_fork+0x1f/0x30 [ 62.489518][ T3520] IN-SOFTIRQ-W at: [ 62.493502][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.499645][ T3520] _raw_spin_lock+0x2a/0x40 [ 62.505815][ T3520] net_tx_action+0x752/0x970 [ 62.512044][ T3520] __do_softirq+0x2e9/0xa4c [ 62.518183][ T3520] do_softirq+0x162/0x240 [ 62.524150][ T3520] __local_bh_enable_ip+0x1b1/0x1f0 [ 62.530982][ T3520] dev_deactivate_many+0x3b4/0xaf0 [ 62.537735][ T3520] dev_deactivate+0x177/0x270 [ 62.544053][ T3520] linkwatch_do_dev+0x104/0x160 [ 62.550546][ T3520] __linkwatch_run_queue+0x448/0x6b0 [ 62.557489][ T3520] linkwatch_event+0x48/0x50 [ 62.563715][ T3520] process_one_work+0x8aa/0x11f0 [ 62.570304][ T3520] worker_thread+0xa5f/0x1210 [ 62.576637][ T3520] kthread+0x26e/0x300 [ 62.582352][ T3520] ret_from_fork+0x1f/0x30 [ 62.588409][ T3520] INITIAL USE at: [ 62.592292][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.598344][ T3520] _raw_spin_lock+0x2a/0x40 [ 62.604399][ T3520] __dev_queue_xmit+0xd50/0x3c90 [ 62.610894][ T3520] tx+0x66/0x100 [ 62.615999][ T3520] kthread+0x234/0x440 [ 62.621641][ T3520] kthread+0x26e/0x300 [ 62.627262][ T3520] ret_from_fork+0x1f/0x30 [ 62.633231][ T3520] } [ 62.635717][ T3520] ... key at: [] noop_qdisc+0x108/0x320 [ 62.643336][ T3520] [ 62.643336][ T3520] the dependencies between the lock to be acquired [ 62.643343][ T3520] and SOFTIRQ-irq-unsafe lock: [ 62.656875][ T3520] -> (fs_reclaim){+.+.}-{0:0} { [ 62.661732][ T3520] HARDIRQ-ON-W at: [ 62.665704][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.671849][ T3520] fs_reclaim_acquire+0x83/0x120 [ 62.678427][ T3520] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.685097][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 62.692123][ T3520] kmalloc_trace+0x26/0xe0 [ 62.698182][ T3520] alloc_workqueue_attrs+0x46/0xc0 [ 62.704942][ T3520] wq_numa_init+0x122/0x4b0 [ 62.711093][ T3520] workqueue_init+0x22/0x59d [ 62.717326][ T3520] kernel_init_freeable+0x40a/0x61f [ 62.724165][ T3520] kernel_init+0x19/0x290 [ 62.730141][ T3520] ret_from_fork+0x1f/0x30 [ 62.736228][ T3520] SOFTIRQ-ON-W at: [ 62.740196][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.746342][ T3520] fs_reclaim_acquire+0x83/0x120 [ 62.752915][ T3520] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.759580][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 62.766597][ T3520] kmalloc_trace+0x26/0xe0 [ 62.772649][ T3520] alloc_workqueue_attrs+0x46/0xc0 [ 62.779414][ T3520] wq_numa_init+0x122/0x4b0 [ 62.785562][ T3520] workqueue_init+0x22/0x59d [ 62.791795][ T3520] kernel_init_freeable+0x40a/0x61f [ 62.798636][ T3520] kernel_init+0x19/0x290 [ 62.804614][ T3520] ret_from_fork+0x1f/0x30 [ 62.810678][ T3520] INITIAL USE at: [ 62.814576][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.820629][ T3520] fs_reclaim_acquire+0x83/0x120 [ 62.827124][ T3520] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.833705][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 62.840632][ T3520] kmalloc_trace+0x26/0xe0 [ 62.846600][ T3520] alloc_workqueue_attrs+0x46/0xc0 [ 62.853264][ T3520] wq_numa_init+0x122/0x4b0 [ 62.859325][ T3520] workqueue_init+0x22/0x59d [ 62.865474][ T3520] kernel_init_freeable+0x40a/0x61f [ 62.872227][ T3520] kernel_init+0x19/0x290 [ 62.878112][ T3520] ret_from_fork+0x1f/0x30 [ 62.884090][ T3520] } [ 62.886576][ T3520] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 62.894468][ T3520] ... acquired at: [ 62.898255][ T3520] lock_acquire+0x1f8/0x5a0 [ 62.902917][ T3520] fs_reclaim_acquire+0x83/0x120 [ 62.908032][ T3520] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.913221][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 62.918758][ T3520] __kmalloc_node+0xa2/0x230 [ 62.923510][ T3520] kvmalloc_node+0x6e/0x180 [ 62.928179][ T3520] get_dist_table+0x91/0x380 [ 62.932936][ T3520] netem_change+0x947/0x1ea0 [ 62.937698][ T3520] netem_init+0x58/0xb0 [ 62.942021][ T3520] qdisc_create+0x8a1/0x1220 [ 62.946782][ T3520] tc_modify_qdisc+0x9e0/0x1da0 [ 62.951808][ T3520] rtnetlink_rcv_msg+0x776/0xf00 [ 62.956912][ T3520] netlink_rcv_skb+0x1cd/0x410 [ 62.961856][ T3520] netlink_unicast+0x7bf/0x990 [ 62.966786][ T3520] netlink_sendmsg+0xa26/0xd60 [ 62.971716][ T3520] ____sys_sendmsg+0x59e/0x8f0 [ 62.976645][ T3520] __sys_sendmsg+0x2a9/0x390 [ 62.981399][ T3520] do_syscall_64+0x3d/0xb0 [ 62.985986][ T3520] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.992049][ T3520] [ 62.994371][ T3520] [ 62.994371][ T3520] stack backtrace: [ 63.000247][ T3520] CPU: 1 PID: 3520 Comm: syz-executor262 Not tainted 6.1.45-syzkaller #0 [ 63.008669][ T3520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 63.018715][ T3520] Call Trace: [ 63.022008][ T3520] [ 63.024931][ T3520] dump_stack_lvl+0x1e3/0x2cb [ 63.029609][ T3520] ? nf_tcp_handle_invalid+0x642/0x642 [ 63.035066][ T3520] ? panic+0x75d/0x75d [ 63.039127][ T3520] ? print_shortest_lock_dependencies+0xee/0x150 [ 63.045449][ T3520] validate_chain+0x4d2e/0x58e0 [ 63.050301][ T3520] ? reacquire_held_locks+0x660/0x660 [ 63.055666][ T3520] ? validate_chain+0x115/0x58e0 [ 63.060603][ T3520] ? mark_lock+0x9a/0x340 [ 63.064923][ T3520] __lock_acquire+0x125b/0x1f80 [ 63.069771][ T3520] lock_acquire+0x1f8/0x5a0 [ 63.074266][ T3520] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 63.079476][ T3520] ? read_lock_is_recursive+0x10/0x10 [ 63.084855][ T3520] ? __lock_acquire+0x125b/0x1f80 [ 63.089881][ T3520] fs_reclaim_acquire+0x83/0x120 [ 63.094836][ T3520] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 63.100036][ T3520] slab_pre_alloc_hook+0x2a/0x2a0 [ 63.105064][ T3520] ? kvmalloc_node+0x6e/0x180 [ 63.109748][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 63.115121][ T3520] ? kvmalloc_node+0x6e/0x180 [ 63.119788][ T3520] __kmalloc_node+0xa2/0x230 [ 63.124381][ T3520] kvmalloc_node+0x6e/0x180 [ 63.128878][ T3520] get_dist_table+0x91/0x380 [ 63.133469][ T3520] netem_change+0x947/0x1ea0 [ 63.138064][ T3520] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.144047][ T3520] ? netem_destroy+0xb0/0xb0 [ 63.148634][ T3520] ? do_raw_spin_unlock+0x137/0x8a0 [ 63.153831][ T3520] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 63.159727][ T3520] ? lockdep_hardirqs_on+0x94/0x130 [ 63.164922][ T3520] ? memset+0x1f/0x40 [ 63.168893][ T3520] ? __hrtimer_init+0x181/0x260 [ 63.173751][ T3520] netem_init+0x58/0xb0 [ 63.177918][ T3520] ? qdisc_peek_dequeued+0x220/0x220 [ 63.183198][ T3520] qdisc_create+0x8a1/0x1220 [ 63.187785][ T3520] ? qdisc_notify+0x390/0x390 [ 63.192466][ T3520] tc_modify_qdisc+0x9e0/0x1da0 [ 63.197329][ T3520] ? rcu_lock_release+0x20/0x20 [ 63.202225][ T3520] ? rcu_lock_release+0x20/0x20 [ 63.207087][ T3520] rtnetlink_rcv_msg+0x776/0xf00 [ 63.212025][ T3520] ? rtnetlink_bind+0x80/0x80 [ 63.216702][ T3520] ? stack_trace_save+0x1c0/0x1c0 [ 63.221721][ T3520] ? kernel_text_address+0x9f/0xd0 [ 63.226834][ T3520] ? __kernel_text_address+0x9/0x40 [ 63.232033][ T3520] ? unwind_get_return_address+0x49/0x80 [ 63.237663][ T3520] ? arch_stack_walk+0xf3/0x140 [ 63.242522][ T3520] ? mark_lock+0x9a/0x340 [ 63.246855][ T3520] ? mark_lock+0x9a/0x340 [ 63.251193][ T3520] ? __lock_acquire+0x125b/0x1f80 [ 63.256227][ T3520] netlink_rcv_skb+0x1cd/0x410 [ 63.260994][ T3520] ? rtnetlink_bind+0x80/0x80 [ 63.265698][ T3520] ? netlink_ack+0xe60/0xe60 [ 63.270307][ T3520] netlink_unicast+0x7bf/0x990 [ 63.275080][ T3520] ? netlink_detachskb+0x90/0x90 [ 63.280008][ T3520] ? __virt_addr_valid+0x22b/0x2e0 [ 63.285119][ T3520] ? __phys_addr_symbol+0x2b/0x70 [ 63.290144][ T3520] ? __check_object_size+0x4dd/0xa30 [ 63.295431][ T3520] ? bpf_lsm_netlink_send+0x5/0x10 [ 63.300554][ T3520] netlink_sendmsg+0xa26/0xd60 [ 63.305330][ T3520] ? netlink_getsockopt+0x5b0/0x5b0 [ 63.310544][ T3520] ? aa_sock_msg_perm+0x91/0x150 [ 63.315489][ T3520] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 63.320770][ T3520] ? security_socket_sendmsg+0x7d/0xa0 [ 63.326230][ T3520] ? netlink_getsockopt+0x5b0/0x5b0 [ 63.331454][ T3520] ____sys_sendmsg+0x59e/0x8f0 [ 63.336227][ T3520] ? __sys_sendmsg_sock+0x30/0x30 [ 63.341253][ T3520] __sys_sendmsg+0x2a9/0x390 [ 63.345835][ T3520] ? ____sys_sendmsg+0x8f0/0x8f0 [ 63.350770][ T3520] ? _copy_to_user+0xe9/0x130 [ 63.355457][ T3520] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.361441][ T3520] ? syscall_enter_from_user_mode+0x2e/0x220 [ 63.367424][ T3520] ? lockdep_hardirqs_on+0x94/0x130 [ 63.372637][ T3520] ? syscall_enter_from_user_mode+0x2e/0x220 [ 63.378615][ T3520] do_syscall_64+0x3d/0xb0 [ 63.383031][ T3520] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 63.388921][ T3520] RIP: 0033:0x7f0317a408b9 [ 63.393324][ T3520] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 63.412929][ T3520] RSP: 002b:00007ffca106b618 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.421339][ T3520] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0317a408b9 [ 63.429324][ T3520] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 63.437311][ T3520] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffca106b690 [ 63.445279][ T3520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 63.453243][ T3520] R13: 00007ffca106b818 R14: 0000000000000001 R15: 0000000000000001 [ 63.461213][ T3520] [ 63.464326][ T3520] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 63.473765][ T3520] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3520, name: syz-executor262 [ 63.483257][ T3520] preempt_count: 201, expected: 0 [ 63.488321][ T3520] RCU nest depth: 0, expected: 0 [ 63.493263][ T3520] INFO: lockdep is turned off. [ 63.498042][ T3520] Preemption disabled at: [ 63.498052][ T3520] [<0000000000000000>] 0x0 [ 63.506796][ T3520] CPU: 1 PID: 3520 Comm: syz-executor262 Not tainted 6.1.45-syzkaller #0 [ 63.515200][ T3520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 63.525246][ T3520] Call Trace: [ 63.528517][ T3520] [ 63.531439][ T3520] dump_stack_lvl+0x1e3/0x2cb [ 63.536142][ T3520] ? nf_tcp_handle_invalid+0x642/0x642 [ 63.541602][ T3520] ? panic+0x75d/0x75d [ 63.545663][ T3520] ? rcu_is_watching+0x11/0xb0 [ 63.550424][ T3520] __might_resched+0x5cb/0x780 [ 63.555184][ T3520] ? __might_sleep+0xb0/0xb0 [ 63.559773][ T3520] slab_pre_alloc_hook+0x4a/0x2a0 [ 63.564795][ T3520] ? kvmalloc_node+0x6e/0x180 [ 63.569464][ T3520] __kmem_cache_alloc_node+0x47/0x260 [ 63.574836][ T3520] ? kvmalloc_node+0x6e/0x180 [ 63.579517][ T3520] __kmalloc_node+0xa2/0x230 [ 63.584104][ T3520] kvmalloc_node+0x6e/0x180 [ 63.588609][ T3520] get_dist_table+0x91/0x380 [ 63.593194][ T3520] netem_change+0x947/0x1ea0 [ 63.597781][ T3520] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.603753][ T3520] ? netem_destroy+0xb0/0xb0 [ 63.608360][ T3520] ? do_raw_spin_unlock+0x137/0x8a0 [ 63.613556][ T3520] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 63.619442][ T3520] ? lockdep_hardirqs_on+0x94/0x130 [ 63.624639][ T3520] ? memset+0x1f/0x40 [ 63.628625][ T3520] ? __hrtimer_init+0x181/0x260 [ 63.633470][ T3520] netem_init+0x58/0xb0 [ 63.637619][ T3520] ? qdisc_peek_dequeued+0x220/0x220 [ 63.642896][ T3520] qdisc_create+0x8a1/0x1220 [ 63.647482][ T3520] ? qdisc_notify+0x390/0x390 [ 63.652161][ T3520] tc_modify_qdisc+0x9e0/0x1da0 [ 63.657016][ T3520] ? rcu_lock_release+0x20/0x20 [ 63.661868][ T3520] ? rcu_lock_release+0x20/0x20 [ 63.666710][ T3520] rtnetlink_rcv_msg+0x776/0xf00 [ 63.671641][ T3520] ? rtnetlink_bind+0x80/0x80 [ 63.676415][ T3520] ? stack_trace_save+0x1c0/0x1c0 [ 63.681430][ T3520] ? kernel_text_address+0x9f/0xd0 [ 63.686537][ T3520] ? __kernel_text_address+0x9/0x40 [ 63.691727][ T3520] ? unwind_get_return_address+0x49/0x80 [ 63.697368][ T3520] ? arch_stack_walk+0xf3/0x140 [ 63.702213][ T3520] ? mark_lock+0x9a/0x340 [ 63.706535][ T3520] ? mark_lock+0x9a/0x340 [ 63.710856][ T3520] ? __lock_acquire+0x125b/0x1f80 [ 63.715881][ T3520] netlink_rcv_skb+0x1cd/0x410 [ 63.720636][ T3520] ? rtnetlink_bind+0x80/0x80 [ 63.725304][ T3520] ? netlink_ack+0xe60/0xe60 [ 63.729896][ T3520] netlink_unicast+0x7bf/0x990 [ 63.734679][ T3520] ? netlink_detachskb+0x90/0x90 [ 63.739605][ T3520] ? __virt_addr_valid+0x22b/0x2e0 [ 63.744714][ T3520] ? __phys_addr_symbol+0x2b/0x70 [ 63.749752][ T3520] ? __check_object_size+0x4dd/0xa30 [ 63.755031][ T3520] ? bpf_lsm_netlink_send+0x5/0x10 [ 63.760139][ T3520] netlink_sendmsg+0xa26/0xd60 [ 63.764902][ T3520] ? netlink_getsockopt+0x5b0/0x5b0 [ 63.770094][ T3520] ? aa_sock_msg_perm+0x91/0x150 [ 63.775023][ T3520] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 63.780300][ T3520] ? security_socket_sendmsg+0x7d/0xa0 [ 63.785758][ T3520] ? netlink_getsockopt+0x5b0/0x5b0 [ 63.790948][ T3520] ____sys_sendmsg+0x59e/0x8f0 [ 63.795709][ T3520] ? __sys_sendmsg_sock+0x30/0x30 [ 63.800747][ T3520] __sys_sendmsg+0x2a9/0x390 [ 63.805327][ T3520] ? ____sys_sendmsg+0x8f0/0x8f0 [ 63.810257][ T3520] ? _copy_to_user+0xe9/0x130 [ 63.814932][ T3520] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.820906][ T3520] ? syscall_enter_from_user_mode+0x2e/0x220 [ 63.826879][ T3520] ? lockdep_hardirqs_on+0x94/0x130 [ 63.832069][ T3520] ? syscall_enter_from_user_mode+0x2e/0x220 [ 63.838043][ T3520] do_syscall_64+0x3d/0xb0 [ 63.842458][ T3520] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 63.848347][ T3520] RIP: 0033:0x7f0317a408b9 [ 63.852753][ T3520] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 63.872390][ T3520] RSP: 002b:00007ffca106b618 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.880886][ T3520] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0317a408b9 [ 63.888855][ T3520] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 63.896821][ T3520] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffca106b690 [ 63.904784][ T3520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 63.912745][ T3520] R13: 00007ffca106b818 R14: 0000000000000001 R15: 0000000000000001 [ 63.920716][ T3520]