Warning: Permanently added '10.128.1.10' (ED25519) to the list of known hosts. executing program [ 51.185782][ T3507] [ 51.188132][ T3507] ===================================================== [ 51.195046][ T3507] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 51.202477][ T3507] 6.1.44-syzkaller #0 Not tainted [ 51.207477][ T3507] ----------------------------------------------------- [ 51.214386][ T3507] syz-executor175/3507 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 51.222445][ T3507] ffffffff8d2032c0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 51.231487][ T3507] [ 51.231487][ T3507] and this task is already holding: [ 51.238833][ T3507] ffffffff8e2df2c8 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 51.248042][ T3507] which would create a new lock dependency: [ 51.253908][ T3507] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 51.261462][ T3507] [ 51.261462][ T3507] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 51.270897][ T3507] (noop_qdisc.q.lock){+.-.}-{2:2} [ 51.270913][ T3507] [ 51.270913][ T3507] ... which became SOFTIRQ-irq-safe at: [ 51.283688][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.288263][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.292837][ T3507] net_tx_action+0x752/0x970 [ 51.297498][ T3507] __do_softirq+0x2e9/0xa4c [ 51.302070][ T3507] do_softirq+0x162/0x240 [ 51.306467][ T3507] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.311735][ T3507] dev_deactivate_many+0x3b4/0xaf0 [ 51.316919][ T3507] dev_deactivate+0x177/0x270 [ 51.321666][ T3507] linkwatch_do_dev+0x104/0x160 [ 51.326585][ T3507] __linkwatch_run_queue+0x448/0x6b0 [ 51.331936][ T3507] linkwatch_event+0x48/0x50 [ 51.336594][ T3507] process_one_work+0x8aa/0x11f0 [ 51.341603][ T3507] worker_thread+0xa5f/0x1210 [ 51.346349][ T3507] kthread+0x26e/0x300 [ 51.350484][ T3507] ret_from_fork+0x1f/0x30 [ 51.354970][ T3507] [ 51.354970][ T3507] to a SOFTIRQ-irq-unsafe lock: [ 51.361965][ T3507] (fs_reclaim){+.+.}-{0:0} [ 51.361982][ T3507] [ 51.361982][ T3507] ... which became SOFTIRQ-irq-unsafe at: [ 51.374319][ T3507] ... [ 51.374325][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.381463][ T3507] fs_reclaim_acquire+0x83/0x120 [ 51.386467][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 51.391560][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 51.397003][ T3507] kmalloc_trace+0x26/0xe0 [ 51.401487][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 51.406665][ T3507] wq_numa_init+0x122/0x4b0 [ 51.411236][ T3507] workqueue_init+0x22/0x59d [ 51.415895][ T3507] kernel_init_freeable+0x40a/0x61f [ 51.421166][ T3507] kernel_init+0x19/0x290 [ 51.425563][ T3507] ret_from_fork+0x1f/0x30 [ 51.430059][ T3507] [ 51.430059][ T3507] other info that might help us debug this: [ 51.430059][ T3507] [ 51.440268][ T3507] Possible interrupt unsafe locking scenario: [ 51.440268][ T3507] [ 51.448565][ T3507] CPU0 CPU1 [ 51.453908][ T3507] ---- ---- [ 51.459250][ T3507] lock(fs_reclaim); [ 51.463214][ T3507] local_irq_disable(); [ 51.469949][ T3507] lock(noop_qdisc.q.lock); [ 51.477038][ T3507] lock(fs_reclaim); [ 51.483521][ T3507] [ 51.486957][ T3507] lock(noop_qdisc.q.lock); [ 51.491705][ T3507] [ 51.491705][ T3507] *** DEADLOCK *** [ 51.491705][ T3507] [ 51.499831][ T3507] 2 locks held by syz-executor175/3507: [ 51.505355][ T3507] #0: ffffffff8e298728 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 51.514907][ T3507] #1: ffffffff8e2df2c8 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 51.524540][ T3507] [ 51.524540][ T3507] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 51.534928][ T3507] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 51.540379][ T3507] HARDIRQ-ON-W at: [ 51.544343][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.550479][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.556613][ T3507] __dev_queue_xmit+0xd50/0x3c90 [ 51.563184][ T3507] tx+0x66/0x100 [ 51.568364][ T3507] kthread+0x234/0x440 [ 51.574063][ T3507] kthread+0x26e/0x300 [ 51.579763][ T3507] ret_from_fork+0x1f/0x30 [ 51.585813][ T3507] IN-SOFTIRQ-W at: [ 51.589777][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.595915][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.602050][ T3507] net_tx_action+0x752/0x970 [ 51.608278][ T3507] __do_softirq+0x2e9/0xa4c [ 51.614432][ T3507] do_softirq+0x162/0x240 [ 51.620395][ T3507] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.627227][ T3507] dev_deactivate_many+0x3b4/0xaf0 [ 51.633979][ T3507] dev_deactivate+0x177/0x270 [ 51.640292][ T3507] linkwatch_do_dev+0x104/0x160 [ 51.646776][ T3507] __linkwatch_run_queue+0x448/0x6b0 [ 51.653692][ T3507] linkwatch_event+0x48/0x50 [ 51.659912][ T3507] process_one_work+0x8aa/0x11f0 [ 51.666483][ T3507] worker_thread+0xa5f/0x1210 [ 51.672790][ T3507] kthread+0x26e/0x300 [ 51.678496][ T3507] ret_from_fork+0x1f/0x30 [ 51.684549][ T3507] INITIAL USE at: [ 51.688421][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.694470][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.700522][ T3507] __dev_queue_xmit+0xd50/0x3c90 [ 51.707006][ T3507] tx+0x66/0x100 [ 51.712100][ T3507] kthread+0x234/0x440 [ 51.717725][ T3507] kthread+0x26e/0x300 [ 51.723333][ T3507] ret_from_fork+0x1f/0x30 [ 51.729298][ T3507] } [ 51.731776][ T3507] ... key at: [] noop_qdisc+0x108/0x320 [ 51.739388][ T3507] [ 51.739388][ T3507] the dependencies between the lock to be acquired [ 51.739394][ T3507] and SOFTIRQ-irq-unsafe lock: [ 51.752876][ T3507] -> (fs_reclaim){+.+.}-{0:0} { [ 51.757716][ T3507] HARDIRQ-ON-W at: [ 51.761674][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.767806][ T3507] fs_reclaim_acquire+0x83/0x120 [ 51.774391][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 51.781061][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 51.788071][ T3507] kmalloc_trace+0x26/0xe0 [ 51.794122][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 51.800868][ T3507] wq_numa_init+0x122/0x4b0 [ 51.807004][ T3507] workqueue_init+0x22/0x59d [ 51.813227][ T3507] kernel_init_freeable+0x40a/0x61f [ 51.820056][ T3507] kernel_init+0x19/0x290 [ 51.826022][ T3507] ret_from_fork+0x1f/0x30 [ 51.832073][ T3507] SOFTIRQ-ON-W at: [ 51.836048][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.842196][ T3507] fs_reclaim_acquire+0x83/0x120 [ 51.848778][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 51.855447][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 51.862451][ T3507] kmalloc_trace+0x26/0xe0 [ 51.868498][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 51.875250][ T3507] wq_numa_init+0x122/0x4b0 [ 51.881389][ T3507] workqueue_init+0x22/0x59d [ 51.887614][ T3507] kernel_init_freeable+0x40a/0x61f [ 51.894444][ T3507] kernel_init+0x19/0x290 [ 51.900405][ T3507] ret_from_fork+0x1f/0x30 [ 51.906455][ T3507] INITIAL USE at: [ 51.910329][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.916376][ T3507] fs_reclaim_acquire+0x83/0x120 [ 51.922871][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 51.929460][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 51.936390][ T3507] kmalloc_trace+0x26/0xe0 [ 51.942357][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 51.949025][ T3507] wq_numa_init+0x122/0x4b0 [ 51.955078][ T3507] workqueue_init+0x22/0x59d [ 51.961214][ T3507] kernel_init_freeable+0x40a/0x61f [ 51.967966][ T3507] kernel_init+0x19/0x290 [ 51.973856][ T3507] ret_from_fork+0x1f/0x30 [ 51.979834][ T3507] } [ 51.982314][ T3507] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 51.990195][ T3507] ... acquired at: [ 51.993980][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.998640][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.003732][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.008913][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.014438][ T3507] __kmalloc_node+0xa2/0x230 [ 52.019184][ T3507] kvmalloc_node+0x6e/0x180 [ 52.023842][ T3507] get_dist_table+0x91/0x380 [ 52.028588][ T3507] netem_change+0x947/0x1ea0 [ 52.033333][ T3507] netem_init+0x58/0xb0 [ 52.037643][ T3507] qdisc_create+0x8a1/0x1220 [ 52.042388][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.047394][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.052489][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.057416][ T3507] netlink_unicast+0x7bf/0x990 [ 52.062335][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.067253][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.072172][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.076919][ T3507] do_syscall_64+0x3d/0xb0 [ 52.081506][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.087557][ T3507] [ 52.089865][ T3507] [ 52.089865][ T3507] stack backtrace: [ 52.095732][ T3507] CPU: 1 PID: 3507 Comm: syz-executor175 Not tainted 6.1.44-syzkaller #0 [ 52.104130][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.114174][ T3507] Call Trace: [ 52.117444][ T3507] [ 52.120355][ T3507] dump_stack_lvl+0x1e3/0x2cb [ 52.125022][ T3507] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.130467][ T3507] ? panic+0x75d/0x75d [ 52.134520][ T3507] ? print_shortest_lock_dependencies+0xee/0x150 [ 52.140829][ T3507] validate_chain+0x4d2e/0x58e0 [ 52.145669][ T3507] ? reacquire_held_locks+0x660/0x660 [ 52.151023][ T3507] ? validate_chain+0x115/0x58e0 [ 52.155947][ T3507] ? mark_lock+0x9a/0x340 [ 52.160267][ T3507] __lock_acquire+0x125b/0x1f80 [ 52.165105][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.169590][ T3507] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 52.174773][ T3507] ? read_lock_is_recursive+0x10/0x10 [ 52.180131][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.185147][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.190066][ T3507] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 52.195245][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.200259][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.204919][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.210276][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.214936][ T3507] __kmalloc_node+0xa2/0x230 [ 52.219530][ T3507] kvmalloc_node+0x6e/0x180 [ 52.224022][ T3507] get_dist_table+0x91/0x380 [ 52.228600][ T3507] netem_change+0x947/0x1ea0 [ 52.233181][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.239142][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.244326][ T3507] ? netem_destroy+0xb0/0xb0 [ 52.248903][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.254087][ T3507] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 52.259966][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.265164][ T3507] ? memset+0x1f/0x40 [ 52.269131][ T3507] ? __hrtimer_init+0x181/0x260 [ 52.273965][ T3507] netem_init+0x58/0xb0 [ 52.278106][ T3507] ? qdisc_peek_dequeued+0x220/0x220 [ 52.283384][ T3507] qdisc_create+0x8a1/0x1220 [ 52.287960][ T3507] ? qdisc_notify+0x390/0x390 [ 52.292622][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.297460][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.302297][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.307129][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.312054][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.316723][ T3507] ? stack_trace_save+0x1c0/0x1c0 [ 52.321730][ T3507] ? kernel_text_address+0x9f/0xd0 [ 52.326829][ T3507] ? __kernel_text_address+0x9/0x40 [ 52.332020][ T3507] ? unwind_get_return_address+0x49/0x80 [ 52.337641][ T3507] ? arch_stack_walk+0xf3/0x140 [ 52.342475][ T3507] ? mark_lock+0x9a/0x340 [ 52.346787][ T3507] ? mark_lock+0x9a/0x340 [ 52.351097][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.356110][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.360860][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.365517][ T3507] ? netlink_ack+0xe60/0xe60 [ 52.370096][ T3507] netlink_unicast+0x7bf/0x990 [ 52.374846][ T3507] ? netlink_detachskb+0x90/0x90 [ 52.379770][ T3507] ? __virt_addr_valid+0x22b/0x2e0 [ 52.384868][ T3507] ? __phys_addr_symbol+0x2b/0x70 [ 52.389876][ T3507] ? __check_object_size+0x4dd/0xa30 [ 52.395143][ T3507] ? bpf_lsm_netlink_send+0x5/0x10 [ 52.400239][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.404990][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.410173][ T3507] ? aa_sock_msg_perm+0x91/0x150 [ 52.415090][ T3507] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 52.420355][ T3507] ? security_socket_sendmsg+0x7d/0xa0 [ 52.425797][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.430977][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.435725][ T3507] ? __sys_sendmsg_sock+0x30/0x30 [ 52.440760][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.445351][ T3507] ? ____sys_sendmsg+0x8f0/0x8f0 [ 52.450283][ T3507] ? _copy_to_user+0xe9/0x130 [ 52.454948][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.460920][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.466890][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.472097][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.478064][ T3507] do_syscall_64+0x3d/0xb0 [ 52.482471][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.488357][ T3507] RIP: 0033:0x7f2c6f98f779 [ 52.492757][ T3507] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.512347][ T3507] RSP: 002b:00007fff7c2b5c18 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 52.520743][ T3507] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2c6f98f779 [ 52.528701][ T3507] RDX: 0000000000000000 RSI: 0000000020000440 RDI: 0000000000000003 [ 52.536654][ T3507] RBP: 00007fff7c2b5c30 R08: 00007fff7c2b5c90 R09: 00007fff7c2b5c90 [ 52.544607][ T3507] R10: 00007fff7c2b5c90 R11: 0000000000000246 R12: 00007f2c6fa025f0 [ 52.552566][ T3507] R13: 00007fff7c2b5e18 R14: 0000000000000001 R15: 0000000000000001 [ 52.560529][ T3507] [ 52.563657][ T3507] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 52.573157][ T3507] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3507, name: syz-executor175 [ 52.582639][ T3507] preempt_count: 201, expected: 0 [ 52.587679][ T3507] RCU nest depth: 0, expected: 0 [ 52.592613][ T3507] INFO: lockdep is turned off. [ 52.597402][ T3507] Preemption disabled at: [ 52.597411][ T3507] [<0000000000000000>] 0x0 [ 52.606130][ T3507] CPU: 1 PID: 3507 Comm: syz-executor175 Not tainted 6.1.44-syzkaller #0 [ 52.614525][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.624577][ T3507] Call Trace: [ 52.627856][ T3507] [ 52.630774][ T3507] dump_stack_lvl+0x1e3/0x2cb [ 52.635446][ T3507] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.640892][ T3507] ? panic+0x75d/0x75d [ 52.644956][ T3507] ? rcu_is_watching+0x11/0xb0 [ 52.649713][ T3507] __might_resched+0x5cb/0x780 [ 52.654483][ T3507] ? __might_sleep+0xb0/0xb0 [ 52.659072][ T3507] slab_pre_alloc_hook+0x4a/0x2a0 [ 52.664084][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.668743][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.674102][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.678758][ T3507] __kmalloc_node+0xa2/0x230 [ 52.683361][ T3507] kvmalloc_node+0x6e/0x180 [ 52.687844][ T3507] get_dist_table+0x91/0x380 [ 52.692420][ T3507] netem_change+0x947/0x1ea0 [ 52.696993][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.702954][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.708133][ T3507] ? netem_destroy+0xb0/0xb0 [ 52.712704][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.717883][ T3507] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 52.723754][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.728934][ T3507] ? memset+0x1f/0x40 [ 52.732896][ T3507] ? __hrtimer_init+0x181/0x260 [ 52.737729][ T3507] netem_init+0x58/0xb0 [ 52.741865][ T3507] ? qdisc_peek_dequeued+0x220/0x220 [ 52.747129][ T3507] qdisc_create+0x8a1/0x1220 [ 52.751896][ T3507] ? qdisc_notify+0x390/0x390 [ 52.756570][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.761418][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.766272][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.771111][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.776038][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.780704][ T3507] ? stack_trace_save+0x1c0/0x1c0 [ 52.785715][ T3507] ? kernel_text_address+0x9f/0xd0 [ 52.790818][ T3507] ? __kernel_text_address+0x9/0x40 [ 52.796013][ T3507] ? unwind_get_return_address+0x49/0x80 [ 52.801641][ T3507] ? arch_stack_walk+0xf3/0x140 [ 52.806482][ T3507] ? mark_lock+0x9a/0x340 [ 52.810802][ T3507] ? mark_lock+0x9a/0x340 [ 52.815116][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.820136][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.824884][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.829566][ T3507] ? netlink_ack+0xe60/0xe60 [ 52.834140][ T3507] netlink_unicast+0x7bf/0x990 [ 52.838889][ T3507] ? netlink_detachskb+0x90/0x90 [ 52.843804][ T3507] ? __virt_addr_valid+0x22b/0x2e0 [ 52.848903][ T3507] ? __phys_addr_symbol+0x2b/0x70 [ 52.853917][ T3507] ? __check_object_size+0x4dd/0xa30 [ 52.859190][ T3507] ? bpf_lsm_netlink_send+0x5/0x10 [ 52.864287][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.869038][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.874217][ T3507] ? aa_sock_msg_perm+0x91/0x150 [ 52.879146][ T3507] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 52.884410][ T3507] ? security_socket_sendmsg+0x7d/0xa0 [ 52.889852][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.895034][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.899782][ T3507] ? __sys_sendmsg_sock+0x30/0x30 [ 52.904791][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.909364][ T3507] ? ____sys_sendmsg+0x8f0/0x8f0 [ 52.914286][ T3507] ? _copy_to_user+0xe9/0x130 [ 52.918948][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.924911][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.930875][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.936055][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.942021][ T3507] do_syscall_64+0x3d/0xb0 [ 52.946426][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.952308][ T3507] RIP: 0033:0x7f2c6f98f779 [ 52.956706][ T3507] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.976299][ T3507] RSP: 002b:00007fff7c2b5c18 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 52.984696][ T3507] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2c6f98f779 [ 52.992652][ T3507] RDX: 0000000000000000 RSI: 0000000020000440 RDI: 0000000000000003 [ 53.000631][ T3507] RBP: 00007fff7c2b5c30 R08: 00007fff7c2b5c90 R09: 00007fff7c2b5c90 [ 53.008588][ T3507] R10: 00007fff7c2b5c90 R11: 0000000000000246 R12: 00007f2c6fa025f0 [ 53.016540][ T3507] R13: 00007fff7c2b5e18 R14: 0000000000000001 R15: 0000000000000001 [ 53.024503][ T3507]