Warning: Permanently added '10.128.0.245' (ED25519) to the list of known hosts. executing program [ 62.573107][ T3512] [ 62.575466][ T3512] ===================================================== [ 62.582387][ T3512] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 62.589831][ T3512] 6.1.45-syzkaller #0 Not tainted [ 62.594845][ T3512] ----------------------------------------------------- [ 62.601780][ T3512] syz-executor341/3512 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 62.609838][ T3512] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 62.618909][ T3512] [ 62.618909][ T3512] and this task is already holding: [ 62.626262][ T3512] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 62.635492][ T3512] which would create a new lock dependency: [ 62.641361][ T3512] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 62.648920][ T3512] [ 62.648920][ T3512] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 62.658353][ T3512] (noop_qdisc.q.lock){+.-.}-{2:2} [ 62.658374][ T3512] [ 62.658374][ T3512] ... which became SOFTIRQ-irq-safe at: [ 62.671171][ T3512] lock_acquire+0x1f8/0x5a0 [ 62.675750][ T3512] _raw_spin_lock+0x2a/0x40 [ 62.680333][ T3512] net_tx_action+0x752/0x970 [ 62.685003][ T3512] __do_softirq+0x2e9/0xa4c [ 62.689582][ T3512] do_softirq+0x162/0x240 [ 62.693987][ T3512] __local_bh_enable_ip+0x1b1/0x1f0 [ 62.699270][ T3512] dev_deactivate_many+0x3b4/0xaf0 [ 62.704471][ T3512] dev_deactivate+0x177/0x270 [ 62.709222][ T3512] linkwatch_do_dev+0x104/0x160 [ 62.714147][ T3512] __linkwatch_run_queue+0x448/0x6b0 [ 62.719517][ T3512] linkwatch_event+0x48/0x50 [ 62.724182][ T3512] process_one_work+0x8aa/0x11f0 [ 62.729196][ T3512] worker_thread+0xa5f/0x1210 [ 62.733967][ T3512] kthread+0x26e/0x300 [ 62.738120][ T3512] ret_from_fork+0x1f/0x30 [ 62.742636][ T3512] [ 62.742636][ T3512] to a SOFTIRQ-irq-unsafe lock: [ 62.749636][ T3512] (fs_reclaim){+.+.}-{0:0} [ 62.749658][ T3512] [ 62.749658][ T3512] ... which became SOFTIRQ-irq-unsafe at: [ 62.762027][ T3512] ... [ 62.762033][ T3512] lock_acquire+0x1f8/0x5a0 [ 62.769192][ T3512] fs_reclaim_acquire+0x83/0x120 [ 62.774206][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.779310][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 62.784763][ T3512] kmalloc_trace+0x26/0xe0 [ 62.789267][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 62.794455][ T3512] wq_numa_init+0x122/0x4b0 [ 62.799038][ T3512] workqueue_init+0x22/0x59d [ 62.803716][ T3512] kernel_init_freeable+0x40a/0x61f [ 62.808991][ T3512] kernel_init+0x19/0x290 [ 62.813400][ T3512] ret_from_fork+0x1f/0x30 [ 62.817898][ T3512] [ 62.817898][ T3512] other info that might help us debug this: [ 62.817898][ T3512] [ 62.828119][ T3512] Possible interrupt unsafe locking scenario: [ 62.828119][ T3512] [ 62.836419][ T3512] CPU0 CPU1 [ 62.841773][ T3512] ---- ---- [ 62.847127][ T3512] lock(fs_reclaim); [ 62.851130][ T3512] local_irq_disable(); [ 62.857873][ T3512] lock(noop_qdisc.q.lock); [ 62.865001][ T3512] lock(fs_reclaim); [ 62.871582][ T3512] [ 62.875029][ T3512] lock(noop_qdisc.q.lock); [ 62.879786][ T3512] [ 62.879786][ T3512] *** DEADLOCK *** [ 62.879786][ T3512] [ 62.887918][ T3512] 2 locks held by syz-executor341/3512: [ 62.893451][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 62.902848][ T3512] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 62.912523][ T3512] [ 62.912523][ T3512] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 62.922916][ T3512] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 62.928385][ T3512] HARDIRQ-ON-W at: [ 62.932357][ T3512] lock_acquire+0x1f8/0x5a0 [ 62.938504][ T3512] _raw_spin_lock+0x2a/0x40 [ 62.944655][ T3512] __dev_queue_xmit+0xd50/0x3c90 [ 62.951275][ T3512] tx+0x66/0x100 [ 62.956470][ T3512] kthread+0x234/0x440 [ 62.962185][ T3512] kthread+0x26e/0x300 [ 62.967916][ T3512] ret_from_fork+0x1f/0x30 [ 62.973985][ T3512] IN-SOFTIRQ-W at: [ 62.977959][ T3512] lock_acquire+0x1f8/0x5a0 [ 62.984106][ T3512] _raw_spin_lock+0x2a/0x40 [ 62.990254][ T3512] net_tx_action+0x752/0x970 [ 62.996501][ T3512] __do_softirq+0x2e9/0xa4c [ 63.002648][ T3512] do_softirq+0x162/0x240 [ 63.008647][ T3512] __local_bh_enable_ip+0x1b1/0x1f0 [ 63.015505][ T3512] dev_deactivate_many+0x3b4/0xaf0 [ 63.022266][ T3512] dev_deactivate+0x177/0x270 [ 63.028586][ T3512] linkwatch_do_dev+0x104/0x160 [ 63.035077][ T3512] __linkwatch_run_queue+0x448/0x6b0 [ 63.042088][ T3512] linkwatch_event+0x48/0x50 [ 63.048315][ T3512] process_one_work+0x8aa/0x11f0 [ 63.054903][ T3512] worker_thread+0xa5f/0x1210 [ 63.061262][ T3512] kthread+0x26e/0x300 [ 63.066976][ T3512] ret_from_fork+0x1f/0x30 [ 63.073055][ T3512] INITIAL USE at: [ 63.076947][ T3512] lock_acquire+0x1f8/0x5a0 [ 63.083025][ T3512] _raw_spin_lock+0x2a/0x40 [ 63.089100][ T3512] __dev_queue_xmit+0xd50/0x3c90 [ 63.095618][ T3512] tx+0x66/0x100 [ 63.100746][ T3512] kthread+0x234/0x440 [ 63.106378][ T3512] kthread+0x26e/0x300 [ 63.112008][ T3512] ret_from_fork+0x1f/0x30 [ 63.117990][ T3512] } [ 63.120496][ T3512] ... key at: [] noop_qdisc+0x108/0x320 [ 63.128128][ T3512] [ 63.128128][ T3512] the dependencies between the lock to be acquired [ 63.128135][ T3512] and SOFTIRQ-irq-unsafe lock: [ 63.141678][ T3512] -> (fs_reclaim){+.+.}-{0:0} { [ 63.146595][ T3512] HARDIRQ-ON-W at: [ 63.150752][ T3512] lock_acquire+0x1f8/0x5a0 [ 63.156990][ T3512] fs_reclaim_acquire+0x83/0x120 [ 63.163570][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 63.170256][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 63.177363][ T3512] kmalloc_trace+0x26/0xe0 [ 63.183420][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 63.190173][ T3512] wq_numa_init+0x122/0x4b0 [ 63.196415][ T3512] workqueue_init+0x22/0x59d [ 63.202652][ T3512] kernel_init_freeable+0x40a/0x61f [ 63.209502][ T3512] kernel_init+0x19/0x290 [ 63.215479][ T3512] ret_from_fork+0x1f/0x30 [ 63.222324][ T3512] SOFTIRQ-ON-W at: [ 63.226295][ T3512] lock_acquire+0x1f8/0x5a0 [ 63.232445][ T3512] fs_reclaim_acquire+0x83/0x120 [ 63.239111][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 63.245783][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 63.252803][ T3512] kmalloc_trace+0x26/0xe0 [ 63.258952][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 63.265706][ T3512] wq_numa_init+0x122/0x4b0 [ 63.271863][ T3512] workqueue_init+0x22/0x59d [ 63.278183][ T3512] kernel_init_freeable+0x40a/0x61f [ 63.285031][ T3512] kernel_init+0x19/0x290 [ 63.291098][ T3512] ret_from_fork+0x1f/0x30 [ 63.297165][ T3512] INITIAL USE at: [ 63.301050][ T3512] lock_acquire+0x1f8/0x5a0 [ 63.307111][ T3512] fs_reclaim_acquire+0x83/0x120 [ 63.313605][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 63.320191][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 63.327143][ T3512] kmalloc_trace+0x26/0xe0 [ 63.333117][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 63.339788][ T3512] wq_numa_init+0x122/0x4b0 [ 63.345887][ T3512] workqueue_init+0x22/0x59d [ 63.352043][ T3512] kernel_init_freeable+0x40a/0x61f [ 63.358800][ T3512] kernel_init+0x19/0x290 [ 63.364725][ T3512] ret_from_fork+0x1f/0x30 [ 63.370724][ T3512] } [ 63.373215][ T3512] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 63.381108][ T3512] ... acquired at: [ 63.384906][ T3512] lock_acquire+0x1f8/0x5a0 [ 63.389593][ T3512] fs_reclaim_acquire+0x83/0x120 [ 63.394696][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 63.399912][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 63.405474][ T3512] __kmalloc_node+0xa2/0x230 [ 63.410232][ T3512] kvmalloc_node+0x6e/0x180 [ 63.414922][ T3512] get_dist_table+0x91/0x380 [ 63.419689][ T3512] netem_change+0x947/0x1ea0 [ 63.424455][ T3512] netem_init+0x58/0xb0 [ 63.428779][ T3512] qdisc_create+0x8a1/0x1220 [ 63.433543][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 63.438563][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 63.443672][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 63.448613][ T3512] netlink_unicast+0x7bf/0x990 [ 63.453631][ T3512] netlink_sendmsg+0xa26/0xd60 [ 63.458565][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 63.463518][ T3512] __sys_sendmsg+0x2a9/0x390 [ 63.468273][ T3512] do_syscall_64+0x3d/0xb0 [ 63.473232][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 63.479298][ T3512] [ 63.481613][ T3512] [ 63.481613][ T3512] stack backtrace: [ 63.487535][ T3512] CPU: 1 PID: 3512 Comm: syz-executor341 Not tainted 6.1.45-syzkaller #0 [ 63.495957][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 63.506011][ T3512] Call Trace: [ 63.509284][ T3512] [ 63.512206][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 63.516905][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 63.522380][ T3512] ? panic+0x75d/0x75d [ 63.526446][ T3512] ? print_shortest_lock_dependencies+0xee/0x150 [ 63.532768][ T3512] validate_chain+0x4d2e/0x58e0 [ 63.537659][ T3512] ? reacquire_held_locks+0x660/0x660 [ 63.543036][ T3512] ? validate_chain+0x115/0x58e0 [ 63.547977][ T3512] ? mark_lock+0x9a/0x340 [ 63.552304][ T3512] __lock_acquire+0x125b/0x1f80 [ 63.557155][ T3512] lock_acquire+0x1f8/0x5a0 [ 63.561742][ T3512] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 63.566943][ T3512] ? read_lock_is_recursive+0x10/0x10 [ 63.572312][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 63.577339][ T3512] fs_reclaim_acquire+0x83/0x120 [ 63.582293][ T3512] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 63.587490][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 63.592538][ T3512] ? kvmalloc_node+0x6e/0x180 [ 63.597209][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 63.602583][ T3512] ? kvmalloc_node+0x6e/0x180 [ 63.607254][ T3512] __kmalloc_node+0xa2/0x230 [ 63.611849][ T3512] kvmalloc_node+0x6e/0x180 [ 63.616366][ T3512] get_dist_table+0x91/0x380 [ 63.620957][ T3512] netem_change+0x947/0x1ea0 [ 63.625555][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.631536][ T3512] ? netem_destroy+0xb0/0xb0 [ 63.636126][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 63.641335][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 63.647256][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 63.652458][ T3512] ? memset+0x1f/0x40 [ 63.656434][ T3512] ? __hrtimer_init+0x181/0x260 [ 63.661288][ T3512] netem_init+0x58/0xb0 [ 63.665443][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 63.670735][ T3512] qdisc_create+0x8a1/0x1220 [ 63.675336][ T3512] ? qdisc_notify+0x390/0x390 [ 63.680016][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 63.684872][ T3512] ? rcu_lock_release+0x20/0x20 [ 63.689729][ T3512] ? rcu_lock_release+0x20/0x20 [ 63.694576][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 63.699510][ T3512] ? rtnetlink_bind+0x80/0x80 [ 63.704180][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 63.709196][ T3512] ? kernel_text_address+0x9f/0xd0 [ 63.714310][ T3512] ? __kernel_text_address+0x9/0x40 [ 63.719522][ T3512] ? unwind_get_return_address+0x49/0x80 [ 63.725169][ T3512] ? arch_stack_walk+0xf3/0x140 [ 63.730020][ T3512] ? mark_lock+0x9a/0x340 [ 63.734345][ T3512] ? mark_lock+0x9a/0x340 [ 63.738668][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 63.743703][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 63.748490][ T3512] ? rtnetlink_bind+0x80/0x80 [ 63.753170][ T3512] ? netlink_ack+0xe60/0xe60 [ 63.757782][ T3512] netlink_unicast+0x7bf/0x990 [ 63.762544][ T3512] ? netlink_detachskb+0x90/0x90 [ 63.767472][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 63.772585][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 63.777612][ T3512] ? __check_object_size+0x4dd/0xa30 [ 63.782896][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 63.788007][ T3512] netlink_sendmsg+0xa26/0xd60 [ 63.792772][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 63.797971][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 63.802912][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 63.808194][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 63.813652][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 63.818850][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 63.823611][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 63.828636][ T3512] __sys_sendmsg+0x2a9/0x390 [ 63.833222][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 63.838163][ T3512] ? _copy_to_user+0xe9/0x130 [ 63.842937][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 63.848938][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 63.854923][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 63.860117][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 63.866099][ T3512] do_syscall_64+0x3d/0xb0 [ 63.870606][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 63.876502][ T3512] RIP: 0033:0x7f88c51a18b9 [ 63.880915][ T3512] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 63.900513][ T3512] RSP: 002b:00007ffe42069e48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.908934][ T3512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f88c51a18b9 [ 63.916917][ T3512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 63.924919][ T3512] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffe42069ec0 [ 63.932906][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 63.940874][ T3512] R13: 00007ffe4206a048 R14: 0000000000000001 R15: 0000000000000001 [ 63.948851][ T3512] [ 63.951975][ T3512] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 63.961429][ T3512] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3512, name: syz-executor341 [ 63.970897][ T3512] preempt_count: 201, expected: 0 [ 63.975934][ T3512] RCU nest depth: 0, expected: 0 [ 63.980857][ T3512] INFO: lockdep is turned off. [ 63.985615][ T3512] Preemption disabled at: [ 63.985621][ T3512] [<0000000000000000>] 0x0 [ 63.994362][ T3512] CPU: 1 PID: 3512 Comm: syz-executor341 Not tainted 6.1.45-syzkaller #0 [ 64.002767][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 64.012818][ T3512] Call Trace: [ 64.016098][ T3512] [ 64.019060][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 64.023750][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 64.029239][ T3512] ? panic+0x75d/0x75d [ 64.033319][ T3512] ? rcu_is_watching+0x11/0xb0 [ 64.038119][ T3512] __might_resched+0x5cb/0x780 [ 64.042900][ T3512] ? __might_sleep+0xb0/0xb0 [ 64.047502][ T3512] slab_pre_alloc_hook+0x4a/0x2a0 [ 64.052550][ T3512] ? kvmalloc_node+0x6e/0x180 [ 64.057223][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 64.062617][ T3512] ? kvmalloc_node+0x6e/0x180 [ 64.067289][ T3512] __kmalloc_node+0xa2/0x230 [ 64.071878][ T3512] kvmalloc_node+0x6e/0x180 [ 64.076397][ T3512] get_dist_table+0x91/0x380 [ 64.081011][ T3512] netem_change+0x947/0x1ea0 [ 64.085785][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 64.091774][ T3512] ? netem_destroy+0xb0/0xb0 [ 64.096463][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 64.101688][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 64.107621][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 64.112824][ T3512] ? memset+0x1f/0x40 [ 64.116807][ T3512] ? __hrtimer_init+0x181/0x260 [ 64.121667][ T3512] netem_init+0x58/0xb0 [ 64.125932][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 64.131237][ T3512] qdisc_create+0x8a1/0x1220 [ 64.135865][ T3512] ? qdisc_notify+0x390/0x390 [ 64.140547][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 64.145405][ T3512] ? rcu_lock_release+0x20/0x20 [ 64.150267][ T3512] ? rcu_lock_release+0x20/0x20 [ 64.155116][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 64.160058][ T3512] ? rtnetlink_bind+0x80/0x80 [ 64.164733][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 64.169762][ T3512] ? kernel_text_address+0x9f/0xd0 [ 64.174873][ T3512] ? __kernel_text_address+0x9/0x40 [ 64.180079][ T3512] ? unwind_get_return_address+0x49/0x80 [ 64.185725][ T3512] ? arch_stack_walk+0xf3/0x140 [ 64.190577][ T3512] ? mark_lock+0x9a/0x340 [ 64.194907][ T3512] ? mark_lock+0x9a/0x340 [ 64.199230][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 64.204258][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 64.209036][ T3512] ? rtnetlink_bind+0x80/0x80 [ 64.213734][ T3512] ? netlink_ack+0xe60/0xe60 [ 64.218341][ T3512] netlink_unicast+0x7bf/0x990 [ 64.223115][ T3512] ? netlink_detachskb+0x90/0x90 [ 64.228054][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 64.233173][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 64.238201][ T3512] ? __check_object_size+0x4dd/0xa30 [ 64.243485][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 64.248613][ T3512] netlink_sendmsg+0xa26/0xd60 [ 64.253396][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 64.258603][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 64.263541][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 64.268834][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 64.274294][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 64.279495][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 64.284264][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 64.289306][ T3512] __sys_sendmsg+0x2a9/0x390 [ 64.293916][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 64.298855][ T3512] ? _copy_to_user+0xe9/0x130 [ 64.303538][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 64.309522][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 64.315504][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 64.320700][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 64.326685][ T3512] do_syscall_64+0x3d/0xb0 [ 64.331115][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 64.337027][ T3512] RIP: 0033:0x7f88c51a18b9 [ 64.341436][ T3512] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 64.361034][ T3512] RSP: 002b:00007ffe42069e48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 64.369442][ T3512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f88c51a18b9 [ 64.377417][ T3512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 64.385384][ T3512] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffe42069ec0 [ 64.393351][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 64.401337][ T3512] R13: 00007ffe4206a048 R14: 0000000000000001 R15: 0000000000000001 [ 64.409329][ T3512]