Warning: Permanently added '10.128.0.7' (ED25519) to the list of known hosts. executing program [ 52.134738][ T3508] [ 52.137086][ T3508] ===================================================== [ 52.143992][ T3508] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 52.151421][ T3508] 6.1.45-syzkaller #0 Not tainted [ 52.156416][ T3508] ----------------------------------------------------- [ 52.163321][ T3508] syz-executor222/3508 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 52.171365][ T3508] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 52.180494][ T3508] [ 52.180494][ T3508] and this task is already holding: [ 52.187839][ T3508] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 52.197048][ T3508] which would create a new lock dependency: [ 52.202916][ T3508] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 52.210547][ T3508] [ 52.210547][ T3508] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 52.219974][ T3508] (noop_qdisc.q.lock){+.-.}-{2:2} [ 52.219989][ T3508] [ 52.219989][ T3508] ... which became SOFTIRQ-irq-safe at: [ 52.232758][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.237330][ T3508] _raw_spin_lock+0x2a/0x40 [ 52.241898][ T3508] net_tx_action+0x752/0x970 [ 52.246556][ T3508] __do_softirq+0x2e9/0xa4c [ 52.251122][ T3508] do_softirq+0x162/0x240 [ 52.255515][ T3508] __local_bh_enable_ip+0x1b1/0x1f0 [ 52.260800][ T3508] dev_deactivate_many+0x3b4/0xaf0 [ 52.265975][ T3508] dev_deactivate+0x177/0x270 [ 52.270714][ T3508] linkwatch_do_dev+0x104/0x160 [ 52.275632][ T3508] __linkwatch_run_queue+0x448/0x6b0 [ 52.280982][ T3508] linkwatch_event+0x48/0x50 [ 52.285639][ T3508] process_one_work+0x8aa/0x11f0 [ 52.290640][ T3508] worker_thread+0xa5f/0x1210 [ 52.295406][ T3508] kthread+0x26e/0x300 [ 52.299549][ T3508] ret_from_fork+0x1f/0x30 [ 52.304028][ T3508] [ 52.304028][ T3508] to a SOFTIRQ-irq-unsafe lock: [ 52.311020][ T3508] (fs_reclaim){+.+.}-{0:0} [ 52.311036][ T3508] [ 52.311036][ T3508] ... which became SOFTIRQ-irq-unsafe at: [ 52.323361][ T3508] ... [ 52.323365][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.330491][ T3508] fs_reclaim_acquire+0x83/0x120 [ 52.335495][ T3508] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.340585][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 52.346018][ T3508] kmalloc_trace+0x26/0xe0 [ 52.350496][ T3508] alloc_workqueue_attrs+0x46/0xc0 [ 52.355671][ T3508] wq_numa_init+0x122/0x4b0 [ 52.360237][ T3508] workqueue_init+0x22/0x59d [ 52.364892][ T3508] kernel_init_freeable+0x40a/0x61f [ 52.370153][ T3508] kernel_init+0x19/0x290 [ 52.374545][ T3508] ret_from_fork+0x1f/0x30 [ 52.379028][ T3508] [ 52.379028][ T3508] other info that might help us debug this: [ 52.379028][ T3508] [ 52.389231][ T3508] Possible interrupt unsafe locking scenario: [ 52.389231][ T3508] [ 52.397526][ T3508] CPU0 CPU1 [ 52.402865][ T3508] ---- ---- [ 52.408214][ T3508] lock(fs_reclaim); [ 52.412171][ T3508] local_irq_disable(); [ 52.418901][ T3508] lock(noop_qdisc.q.lock); [ 52.425988][ T3508] lock(fs_reclaim); [ 52.432466][ T3508] [ 52.435904][ T3508] lock(noop_qdisc.q.lock); [ 52.440644][ T3508] [ 52.440644][ T3508] *** DEADLOCK *** [ 52.440644][ T3508] [ 52.448782][ T3508] 2 locks held by syz-executor222/3508: [ 52.454303][ T3508] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 52.463672][ T3508] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 52.473303][ T3508] [ 52.473303][ T3508] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 52.483771][ T3508] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 52.489227][ T3508] HARDIRQ-ON-W at: [ 52.493186][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.499406][ T3508] _raw_spin_lock+0x2a/0x40 [ 52.505542][ T3508] __dev_queue_xmit+0xd50/0x3c90 [ 52.512108][ T3508] tx+0x66/0x100 [ 52.517286][ T3508] kthread+0x234/0x440 [ 52.522980][ T3508] kthread+0x26e/0x300 [ 52.528690][ T3508] ret_from_fork+0x1f/0x30 [ 52.534755][ T3508] IN-SOFTIRQ-W at: [ 52.538713][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.544842][ T3508] _raw_spin_lock+0x2a/0x40 [ 52.550981][ T3508] net_tx_action+0x752/0x970 [ 52.557199][ T3508] __do_softirq+0x2e9/0xa4c [ 52.563328][ T3508] do_softirq+0x162/0x240 [ 52.569284][ T3508] __local_bh_enable_ip+0x1b1/0x1f0 [ 52.576143][ T3508] dev_deactivate_many+0x3b4/0xaf0 [ 52.582889][ T3508] dev_deactivate+0x177/0x270 [ 52.589192][ T3508] linkwatch_do_dev+0x104/0x160 [ 52.595763][ T3508] __linkwatch_run_queue+0x448/0x6b0 [ 52.602673][ T3508] linkwatch_event+0x48/0x50 [ 52.608888][ T3508] process_one_work+0x8aa/0x11f0 [ 52.615471][ T3508] worker_thread+0xa5f/0x1210 [ 52.621777][ T3508] kthread+0x26e/0x300 [ 52.627562][ T3508] ret_from_fork+0x1f/0x30 [ 52.633607][ T3508] INITIAL USE at: [ 52.637489][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.643562][ T3508] _raw_spin_lock+0x2a/0x40 [ 52.649615][ T3508] __dev_queue_xmit+0xd50/0x3c90 [ 52.656095][ T3508] tx+0x66/0x100 [ 52.661185][ T3508] kthread+0x234/0x440 [ 52.666793][ T3508] kthread+0x26e/0x300 [ 52.672411][ T3508] ret_from_fork+0x1f/0x30 [ 52.678409][ T3508] } [ 52.680907][ T3508] ... key at: [] noop_qdisc+0x108/0x320 [ 52.688524][ T3508] [ 52.688524][ T3508] the dependencies between the lock to be acquired [ 52.688530][ T3508] and SOFTIRQ-irq-unsafe lock: [ 52.702030][ T3508] -> (fs_reclaim){+.+.}-{0:0} { [ 52.706883][ T3508] HARDIRQ-ON-W at: [ 52.710846][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.716984][ T3508] fs_reclaim_acquire+0x83/0x120 [ 52.723557][ T3508] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.730210][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 52.737213][ T3508] kmalloc_trace+0x26/0xe0 [ 52.743255][ T3508] alloc_workqueue_attrs+0x46/0xc0 [ 52.749992][ T3508] wq_numa_init+0x122/0x4b0 [ 52.756145][ T3508] workqueue_init+0x22/0x59d [ 52.762363][ T3508] kernel_init_freeable+0x40a/0x61f [ 52.769187][ T3508] kernel_init+0x19/0x290 [ 52.775143][ T3508] ret_from_fork+0x1f/0x30 [ 52.781190][ T3508] SOFTIRQ-ON-W at: [ 52.785148][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.791319][ T3508] fs_reclaim_acquire+0x83/0x120 [ 52.797883][ T3508] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.804536][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 52.811536][ T3508] kmalloc_trace+0x26/0xe0 [ 52.818016][ T3508] alloc_workqueue_attrs+0x46/0xc0 [ 52.824754][ T3508] wq_numa_init+0x122/0x4b0 [ 52.830883][ T3508] workqueue_init+0x22/0x59d [ 52.837125][ T3508] kernel_init_freeable+0x40a/0x61f [ 52.843948][ T3508] kernel_init+0x19/0x290 [ 52.849909][ T3508] ret_from_fork+0x1f/0x30 [ 52.855954][ T3508] INITIAL USE at: [ 52.859824][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.865870][ T3508] fs_reclaim_acquire+0x83/0x120 [ 52.872347][ T3508] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.878916][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 52.885829][ T3508] kmalloc_trace+0x26/0xe0 [ 52.891784][ T3508] alloc_workqueue_attrs+0x46/0xc0 [ 52.898434][ T3508] wq_numa_init+0x122/0x4b0 [ 52.904478][ T3508] workqueue_init+0x22/0x59d [ 52.910622][ T3508] kernel_init_freeable+0x40a/0x61f [ 52.917384][ T3508] kernel_init+0x19/0x290 [ 52.923255][ T3508] ret_from_fork+0x1f/0x30 [ 52.929216][ T3508] } [ 52.931690][ T3508] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 52.939568][ T3508] ... acquired at: [ 52.943347][ T3508] lock_acquire+0x1f8/0x5a0 [ 52.947999][ T3508] fs_reclaim_acquire+0x83/0x120 [ 52.953083][ T3508] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.958257][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 52.963780][ T3508] __kmalloc_node+0xa2/0x230 [ 52.968520][ T3508] kvmalloc_node+0x6e/0x180 [ 52.973171][ T3508] get_dist_table+0x91/0x380 [ 52.977913][ T3508] netem_change+0x947/0x1ea0 [ 52.982654][ T3508] netem_init+0x58/0xb0 [ 52.986960][ T3508] qdisc_create+0x8a1/0x1220 [ 52.991700][ T3508] tc_modify_qdisc+0x9e0/0x1da0 [ 52.996701][ T3508] rtnetlink_rcv_msg+0x776/0xf00 [ 53.001786][ T3508] netlink_rcv_skb+0x1cd/0x410 [ 53.006700][ T3508] netlink_unicast+0x7bf/0x990 [ 53.011613][ T3508] netlink_sendmsg+0xa26/0xd60 [ 53.016527][ T3508] ____sys_sendmsg+0x59e/0x8f0 [ 53.021442][ T3508] __sys_sendmsg+0x2a9/0x390 [ 53.026182][ T3508] do_syscall_64+0x3d/0xb0 [ 53.030751][ T3508] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.036798][ T3508] [ 53.039097][ T3508] [ 53.039097][ T3508] stack backtrace: [ 53.044980][ T3508] CPU: 0 PID: 3508 Comm: syz-executor222 Not tainted 6.1.45-syzkaller #0 [ 53.053386][ T3508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.063420][ T3508] Call Trace: [ 53.066682][ T3508] [ 53.069621][ T3508] dump_stack_lvl+0x1e3/0x2cb [ 53.074286][ T3508] ? nf_tcp_handle_invalid+0x642/0x642 [ 53.079728][ T3508] ? panic+0x75d/0x75d [ 53.083774][ T3508] ? print_shortest_lock_dependencies+0xee/0x150 [ 53.090080][ T3508] validate_chain+0x4d2e/0x58e0 [ 53.094914][ T3508] ? reacquire_held_locks+0x660/0x660 [ 53.100262][ T3508] ? validate_chain+0x115/0x58e0 [ 53.105181][ T3508] ? mark_lock+0x9a/0x340 [ 53.109488][ T3508] __lock_acquire+0x125b/0x1f80 [ 53.114314][ T3508] lock_acquire+0x1f8/0x5a0 [ 53.118792][ T3508] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 53.123971][ T3508] ? read_lock_is_recursive+0x10/0x10 [ 53.129318][ T3508] ? __lock_acquire+0x125b/0x1f80 [ 53.134325][ T3508] fs_reclaim_acquire+0x83/0x120 [ 53.139239][ T3508] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 53.144427][ T3508] slab_pre_alloc_hook+0x2a/0x2a0 [ 53.149429][ T3508] ? kvmalloc_node+0x6e/0x180 [ 53.154081][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 53.159433][ T3508] ? kvmalloc_node+0x6e/0x180 [ 53.164083][ T3508] __kmalloc_node+0xa2/0x230 [ 53.168653][ T3508] kvmalloc_node+0x6e/0x180 [ 53.173132][ T3508] get_dist_table+0x91/0x380 [ 53.177704][ T3508] netem_change+0x947/0x1ea0 [ 53.182278][ T3508] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.188234][ T3508] ? netem_destroy+0xb0/0xb0 [ 53.192804][ T3508] ? do_raw_spin_unlock+0x137/0x8a0 [ 53.197979][ T3508] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 53.203852][ T3508] ? lockdep_hardirqs_on+0x94/0x130 [ 53.209029][ T3508] ? memset+0x1f/0x40 [ 53.212986][ T3508] ? __hrtimer_init+0x181/0x260 [ 53.217835][ T3508] netem_init+0x58/0xb0 [ 53.221971][ T3508] ? qdisc_peek_dequeued+0x220/0x220 [ 53.227235][ T3508] qdisc_create+0x8a1/0x1220 [ 53.231812][ T3508] ? qdisc_notify+0x390/0x390 [ 53.236472][ T3508] tc_modify_qdisc+0x9e0/0x1da0 [ 53.241301][ T3508] ? rcu_lock_release+0x20/0x20 [ 53.246135][ T3508] ? rcu_lock_release+0x20/0x20 [ 53.250962][ T3508] rtnetlink_rcv_msg+0x776/0xf00 [ 53.255879][ T3508] ? rtnetlink_bind+0x80/0x80 [ 53.260547][ T3508] ? stack_trace_save+0x1c0/0x1c0 [ 53.265549][ T3508] ? kernel_text_address+0x9f/0xd0 [ 53.270639][ T3508] ? __kernel_text_address+0x9/0x40 [ 53.275828][ T3508] ? unwind_get_return_address+0x49/0x80 [ 53.281437][ T3508] ? arch_stack_walk+0xf3/0x140 [ 53.286267][ T3508] ? mark_lock+0x9a/0x340 [ 53.290574][ T3508] ? mark_lock+0x9a/0x340 [ 53.294881][ T3508] ? __lock_acquire+0x125b/0x1f80 [ 53.299885][ T3508] netlink_rcv_skb+0x1cd/0x410 [ 53.304629][ T3508] ? rtnetlink_bind+0x80/0x80 [ 53.309283][ T3508] ? netlink_ack+0xe60/0xe60 [ 53.313851][ T3508] netlink_unicast+0x7bf/0x990 [ 53.318681][ T3508] ? netlink_detachskb+0x90/0x90 [ 53.323613][ T3508] ? __virt_addr_valid+0x22b/0x2e0 [ 53.328721][ T3508] ? __phys_addr_symbol+0x2b/0x70 [ 53.333724][ T3508] ? __check_object_size+0x4dd/0xa30 [ 53.339003][ T3508] ? bpf_lsm_netlink_send+0x5/0x10 [ 53.344094][ T3508] netlink_sendmsg+0xa26/0xd60 [ 53.348840][ T3508] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.354014][ T3508] ? aa_sock_msg_perm+0x91/0x150 [ 53.358929][ T3508] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 53.364189][ T3508] ? security_socket_sendmsg+0x7d/0xa0 [ 53.369639][ T3508] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.374816][ T3508] ____sys_sendmsg+0x59e/0x8f0 [ 53.379562][ T3508] ? __sys_sendmsg_sock+0x30/0x30 [ 53.384565][ T3508] __sys_sendmsg+0x2a9/0x390 [ 53.389133][ T3508] ? ____sys_sendmsg+0x8f0/0x8f0 [ 53.394048][ T3508] ? _copy_to_user+0xe9/0x130 [ 53.398706][ T3508] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.404681][ T3508] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.410647][ T3508] ? lockdep_hardirqs_on+0x94/0x130 [ 53.415912][ T3508] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.421874][ T3508] do_syscall_64+0x3d/0xb0 [ 53.426279][ T3508] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.432186][ T3508] RIP: 0033:0x7f3ac3cf2879 [ 53.436608][ T3508] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.456233][ T3508] RSP: 002b:00007ffca98c2df8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.464625][ T3508] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3ac3cf2879 [ 53.472576][ T3508] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 53.480526][ T3508] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffca98c2e70 [ 53.488477][ T3508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.496466][ T3508] R13: 00007ffca98c2ff8 R14: 0000000000000001 R15: 0000000000000001 [ 53.504476][ T3508] [ 53.507557][ T3508] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 53.517039][ T3508] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3508, name: syz-executor222 [ 53.526508][ T3508] preempt_count: 201, expected: 0 [ 53.531505][ T3508] RCU nest depth: 0, expected: 0 [ 53.536451][ T3508] INFO: lockdep is turned off. [ 53.541198][ T3508] Preemption disabled at: [ 53.541204][ T3508] [<0000000000000000>] 0x0 [ 53.549942][ T3508] CPU: 0 PID: 3508 Comm: syz-executor222 Not tainted 6.1.45-syzkaller #0 [ 53.558334][ T3508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.568365][ T3508] Call Trace: [ 53.571622][ T3508] [ 53.574531][ T3508] dump_stack_lvl+0x1e3/0x2cb [ 53.579193][ T3508] ? nf_tcp_handle_invalid+0x642/0x642 [ 53.584633][ T3508] ? panic+0x75d/0x75d [ 53.588678][ T3508] ? rcu_is_watching+0x11/0xb0 [ 53.593421][ T3508] __might_resched+0x5cb/0x780 [ 53.598167][ T3508] ? __might_sleep+0xb0/0xb0 [ 53.602737][ T3508] slab_pre_alloc_hook+0x4a/0x2a0 [ 53.607745][ T3508] ? kvmalloc_node+0x6e/0x180 [ 53.612400][ T3508] __kmem_cache_alloc_node+0x47/0x260 [ 53.617772][ T3508] ? kvmalloc_node+0x6e/0x180 [ 53.622427][ T3508] __kmalloc_node+0xa2/0x230 [ 53.627028][ T3508] kvmalloc_node+0x6e/0x180 [ 53.631523][ T3508] get_dist_table+0x91/0x380 [ 53.636316][ T3508] netem_change+0x947/0x1ea0 [ 53.640896][ T3508] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.646849][ T3508] ? netem_destroy+0xb0/0xb0 [ 53.651417][ T3508] ? do_raw_spin_unlock+0x137/0x8a0 [ 53.656594][ T3508] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 53.662463][ T3508] ? lockdep_hardirqs_on+0x94/0x130 [ 53.667645][ T3508] ? memset+0x1f/0x40 [ 53.671602][ T3508] ? __hrtimer_init+0x181/0x260 [ 53.676434][ T3508] netem_init+0x58/0xb0 [ 53.680568][ T3508] ? qdisc_peek_dequeued+0x220/0x220 [ 53.685828][ T3508] qdisc_create+0x8a1/0x1220 [ 53.690412][ T3508] ? qdisc_notify+0x390/0x390 [ 53.695086][ T3508] tc_modify_qdisc+0x9e0/0x1da0 [ 53.699916][ T3508] ? rcu_lock_release+0x20/0x20 [ 53.704747][ T3508] ? rcu_lock_release+0x20/0x20 [ 53.709573][ T3508] rtnetlink_rcv_msg+0x776/0xf00 [ 53.714498][ T3508] ? rtnetlink_bind+0x80/0x80 [ 53.719149][ T3508] ? stack_trace_save+0x1c0/0x1c0 [ 53.724147][ T3508] ? kernel_text_address+0x9f/0xd0 [ 53.729239][ T3508] ? __kernel_text_address+0x9/0x40 [ 53.734414][ T3508] ? unwind_get_return_address+0x49/0x80 [ 53.740023][ T3508] ? arch_stack_walk+0xf3/0x140 [ 53.744851][ T3508] ? mark_lock+0x9a/0x340 [ 53.749162][ T3508] ? mark_lock+0x9a/0x340 [ 53.753466][ T3508] ? __lock_acquire+0x125b/0x1f80 [ 53.758478][ T3508] netlink_rcv_skb+0x1cd/0x410 [ 53.763219][ T3508] ? rtnetlink_bind+0x80/0x80 [ 53.767873][ T3508] ? netlink_ack+0xe60/0xe60 [ 53.772441][ T3508] netlink_unicast+0x7bf/0x990 [ 53.777184][ T3508] ? netlink_detachskb+0x90/0x90 [ 53.782100][ T3508] ? __virt_addr_valid+0x22b/0x2e0 [ 53.787190][ T3508] ? __phys_addr_symbol+0x2b/0x70 [ 53.792199][ T3508] ? __check_object_size+0x4dd/0xa30 [ 53.797463][ T3508] ? bpf_lsm_netlink_send+0x5/0x10 [ 53.802646][ T3508] netlink_sendmsg+0xa26/0xd60 [ 53.807405][ T3508] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.812580][ T3508] ? aa_sock_msg_perm+0x91/0x150 [ 53.817494][ T3508] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 53.822752][ T3508] ? security_socket_sendmsg+0x7d/0xa0 [ 53.828194][ T3508] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.833369][ T3508] ____sys_sendmsg+0x59e/0x8f0 [ 53.838112][ T3508] ? __sys_sendmsg_sock+0x30/0x30 [ 53.843117][ T3508] __sys_sendmsg+0x2a9/0x390 [ 53.847688][ T3508] ? ____sys_sendmsg+0x8f0/0x8f0 [ 53.852603][ T3508] ? _copy_to_user+0xe9/0x130 [ 53.857265][ T3508] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.863237][ T3508] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.869195][ T3508] ? lockdep_hardirqs_on+0x94/0x130 [ 53.874366][ T3508] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.880321][ T3508] do_syscall_64+0x3d/0xb0 [ 53.884719][ T3508] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.890593][ T3508] RIP: 0033:0x7f3ac3cf2879 [ 53.894982][ T3508] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.914648][ T3508] RSP: 002b:00007ffca98c2df8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.923036][ T3508] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3ac3cf2879 [ 53.930985][ T3508] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 53.938933][ T3508] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffca98c2e70 [ 53.946880][ T3508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.954825][ T3508] R13: 00007ffca98c2ff8 R14: 0000000000000001 R15: 0000000000000001 [ 53.962779][ T3508]