Warning: Permanently added '10.128.0.193' (ED25519) to the list of known hosts. executing program [ 51.456986][ T3507] [ 51.459323][ T3507] ===================================================== [ 51.466236][ T3507] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 51.473668][ T3507] 6.1.45-syzkaller #0 Not tainted [ 51.478677][ T3507] ----------------------------------------------------- [ 51.485583][ T3507] syz-executor247/3507 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 51.493625][ T3507] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 51.502655][ T3507] [ 51.502655][ T3507] and this task is already holding: [ 51.510000][ T3507] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 51.519209][ T3507] which would create a new lock dependency: [ 51.525077][ T3507] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 51.534631][ T3507] [ 51.534631][ T3507] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 51.544063][ T3507] (noop_qdisc.q.lock){+.-.}-{2:2} [ 51.544082][ T3507] [ 51.544082][ T3507] ... which became SOFTIRQ-irq-safe at: [ 51.556849][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.561423][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.565998][ T3507] net_tx_action+0x752/0x970 [ 51.570658][ T3507] __do_softirq+0x2e9/0xa4c [ 51.575226][ T3507] do_softirq+0x162/0x240 [ 51.580230][ T3507] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.585495][ T3507] dev_deactivate_many+0x3b4/0xaf0 [ 51.590676][ T3507] dev_deactivate+0x177/0x270 [ 51.595421][ T3507] linkwatch_do_dev+0x104/0x160 [ 51.600338][ T3507] __linkwatch_run_queue+0x448/0x6b0 [ 51.605688][ T3507] linkwatch_event+0x48/0x50 [ 51.610344][ T3507] process_one_work+0x8aa/0x11f0 [ 51.615351][ T3507] worker_thread+0xa5f/0x1210 [ 51.620098][ T3507] kthread+0x26e/0x300 [ 51.624235][ T3507] ret_from_fork+0x1f/0x30 [ 51.628727][ T3507] [ 51.628727][ T3507] to a SOFTIRQ-irq-unsafe lock: [ 51.635721][ T3507] (fs_reclaim){+.+.}-{0:0} [ 51.635740][ T3507] [ 51.635740][ T3507] ... which became SOFTIRQ-irq-unsafe at: [ 51.648074][ T3507] ... [ 51.648080][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.655233][ T3507] fs_reclaim_acquire+0x83/0x120 [ 51.660257][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 51.665370][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 51.670817][ T3507] kmalloc_trace+0x26/0xe0 [ 51.675307][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 51.680491][ T3507] wq_numa_init+0x122/0x4b0 [ 51.685070][ T3507] workqueue_init+0x22/0x59d [ 51.689731][ T3507] kernel_init_freeable+0x40a/0x61f [ 51.694999][ T3507] kernel_init+0x19/0x290 [ 51.699399][ T3507] ret_from_fork+0x1f/0x30 [ 51.703901][ T3507] [ 51.703901][ T3507] other info that might help us debug this: [ 51.703901][ T3507] [ 51.714117][ T3507] Possible interrupt unsafe locking scenario: [ 51.714117][ T3507] [ 51.722412][ T3507] CPU0 CPU1 [ 51.727757][ T3507] ---- ---- [ 51.733100][ T3507] lock(fs_reclaim); [ 51.737066][ T3507] local_irq_disable(); [ 51.744163][ T3507] lock(noop_qdisc.q.lock); [ 51.751253][ T3507] lock(fs_reclaim); [ 51.757746][ T3507] [ 51.761184][ T3507] lock(noop_qdisc.q.lock); [ 51.765932][ T3507] [ 51.765932][ T3507] *** DEADLOCK *** [ 51.765932][ T3507] [ 51.775005][ T3507] 2 locks held by syz-executor247/3507: [ 51.780530][ T3507] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 51.789920][ T3507] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 51.799558][ T3507] [ 51.799558][ T3507] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 51.809949][ T3507] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 51.815416][ T3507] HARDIRQ-ON-W at: [ 51.819389][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.825542][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.831699][ T3507] __dev_queue_xmit+0xd50/0x3c90 [ 51.838282][ T3507] tx+0x66/0x100 [ 51.843469][ T3507] kthread+0x234/0x440 [ 51.849175][ T3507] kthread+0x26e/0x300 [ 51.854878][ T3507] ret_from_fork+0x1f/0x30 [ 51.860934][ T3507] IN-SOFTIRQ-W at: [ 51.864901][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.871038][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.877178][ T3507] net_tx_action+0x752/0x970 [ 51.883401][ T3507] __do_softirq+0x2e9/0xa4c [ 51.889535][ T3507] do_softirq+0x162/0x240 [ 51.895499][ T3507] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.903111][ T3507] dev_deactivate_many+0x3b4/0xaf0 [ 51.909862][ T3507] dev_deactivate+0x177/0x270 [ 51.916191][ T3507] linkwatch_do_dev+0x104/0x160 [ 51.922674][ T3507] __linkwatch_run_queue+0x448/0x6b0 [ 51.929594][ T3507] linkwatch_event+0x48/0x50 [ 51.935826][ T3507] process_one_work+0x8aa/0x11f0 [ 51.942398][ T3507] worker_thread+0xa5f/0x1210 [ 51.949488][ T3507] kthread+0x26e/0x300 [ 51.955191][ T3507] ret_from_fork+0x1f/0x30 [ 51.961245][ T3507] INITIAL USE at: [ 51.965124][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.971173][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.977221][ T3507] __dev_queue_xmit+0xd50/0x3c90 [ 51.983709][ T3507] tx+0x66/0x100 [ 51.988977][ T3507] kthread+0x234/0x440 [ 51.994604][ T3507] kthread+0x26e/0x300 [ 52.000218][ T3507] ret_from_fork+0x1f/0x30 [ 52.006187][ T3507] } [ 52.008664][ T3507] ... key at: [] noop_qdisc+0x108/0x320 [ 52.016278][ T3507] [ 52.016278][ T3507] the dependencies between the lock to be acquired [ 52.016284][ T3507] and SOFTIRQ-irq-unsafe lock: [ 52.029770][ T3507] -> (fs_reclaim){+.+.}-{0:0} { [ 52.034619][ T3507] HARDIRQ-ON-W at: [ 52.038579][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.045148][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.051714][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.058373][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.065377][ T3507] kmalloc_trace+0x26/0xe0 [ 52.071425][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 52.078170][ T3507] wq_numa_init+0x122/0x4b0 [ 52.084308][ T3507] workqueue_init+0x22/0x59d [ 52.090531][ T3507] kernel_init_freeable+0x40a/0x61f [ 52.097361][ T3507] kernel_init+0x19/0x290 [ 52.103321][ T3507] ret_from_fork+0x1f/0x30 [ 52.109370][ T3507] SOFTIRQ-ON-W at: [ 52.113334][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.119466][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.126034][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.132698][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.139703][ T3507] kmalloc_trace+0x26/0xe0 [ 52.146021][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 52.152763][ T3507] wq_numa_init+0x122/0x4b0 [ 52.158901][ T3507] workqueue_init+0x22/0x59d [ 52.165125][ T3507] kernel_init_freeable+0x40a/0x61f [ 52.171953][ T3507] kernel_init+0x19/0x290 [ 52.177914][ T3507] ret_from_fork+0x1f/0x30 [ 52.183965][ T3507] INITIAL USE at: [ 52.187837][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.193904][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.200384][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.206956][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.213885][ T3507] kmalloc_trace+0x26/0xe0 [ 52.219844][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 52.226499][ T3507] wq_numa_init+0x122/0x4b0 [ 52.232550][ T3507] workqueue_init+0x22/0x59d [ 52.238685][ T3507] kernel_init_freeable+0x40a/0x61f [ 52.245432][ T3507] kernel_init+0x19/0x290 [ 52.251304][ T3507] ret_from_fork+0x1f/0x30 [ 52.257269][ T3507] } [ 52.259751][ T3507] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 52.267629][ T3507] ... acquired at: [ 52.271411][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.276071][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.281162][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.286341][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.291867][ T3507] __kmalloc_node+0xa2/0x230 [ 52.296614][ T3507] kvmalloc_node+0x6e/0x180 [ 52.301964][ T3507] get_dist_table+0x91/0x380 [ 52.306711][ T3507] netem_change+0x9a0/0x1ea0 [ 52.311459][ T3507] netem_init+0x58/0xb0 [ 52.315772][ T3507] qdisc_create+0x8a1/0x1220 [ 52.320519][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.325525][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.330627][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.335549][ T3507] netlink_unicast+0x7bf/0x990 [ 52.340485][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.345406][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.350323][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.355067][ T3507] do_syscall_64+0x3d/0xb0 [ 52.359644][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.365697][ T3507] [ 52.368003][ T3507] [ 52.368003][ T3507] stack backtrace: [ 52.373879][ T3507] CPU: 0 PID: 3507 Comm: syz-executor247 Not tainted 6.1.45-syzkaller #0 [ 52.382270][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.392306][ T3507] Call Trace: [ 52.395570][ T3507] [ 52.398503][ T3507] dump_stack_lvl+0x1e3/0x2cb [ 52.403188][ T3507] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.408647][ T3507] ? panic+0x75d/0x75d [ 52.412705][ T3507] ? print_shortest_lock_dependencies+0xee/0x150 [ 52.419017][ T3507] validate_chain+0x4d2e/0x58e0 [ 52.423865][ T3507] ? reacquire_held_locks+0x660/0x660 [ 52.429224][ T3507] ? validate_chain+0x115/0x58e0 [ 52.434155][ T3507] ? mark_lock+0x9a/0x340 [ 52.438470][ T3507] __lock_acquire+0x125b/0x1f80 [ 52.443307][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.447793][ T3507] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 52.452978][ T3507] ? read_lock_is_recursive+0x10/0x10 [ 52.458332][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.463345][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.468266][ T3507] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 52.473448][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.478458][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.483123][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.488481][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.493139][ T3507] __kmalloc_node+0xa2/0x230 [ 52.497715][ T3507] kvmalloc_node+0x6e/0x180 [ 52.502200][ T3507] get_dist_table+0x91/0x380 [ 52.506778][ T3507] netem_change+0x9a0/0x1ea0 [ 52.511357][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.517321][ T3507] ? netem_destroy+0xb0/0xb0 [ 52.521896][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.527080][ T3507] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 52.532966][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.538238][ T3507] ? memset+0x1f/0x40 [ 52.542203][ T3507] ? __hrtimer_init+0x181/0x260 [ 52.547042][ T3507] netem_init+0x58/0xb0 [ 52.551182][ T3507] ? qdisc_peek_dequeued+0x220/0x220 [ 52.556452][ T3507] qdisc_create+0x8a1/0x1220 [ 52.561029][ T3507] ? qdisc_notify+0x390/0x390 [ 52.565695][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.570534][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.575376][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.580208][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.585135][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.589797][ T3507] ? stack_trace_save+0x1c0/0x1c0 [ 52.594807][ T3507] ? kernel_text_address+0x9f/0xd0 [ 52.599906][ T3507] ? __kernel_text_address+0x9/0x40 [ 52.605094][ T3507] ? unwind_get_return_address+0x49/0x80 [ 52.610710][ T3507] ? arch_stack_walk+0xf3/0x140 [ 52.615548][ T3507] ? mark_lock+0x9a/0x340 [ 52.619861][ T3507] ? mark_lock+0x9a/0x340 [ 52.624176][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.629191][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.633942][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.638601][ T3507] ? netlink_ack+0xe60/0xe60 [ 52.643177][ T3507] netlink_unicast+0x7bf/0x990 [ 52.647931][ T3507] ? netlink_detachskb+0x90/0x90 [ 52.652852][ T3507] ? __virt_addr_valid+0x22b/0x2e0 [ 52.657947][ T3507] ? __phys_addr_symbol+0x2b/0x70 [ 52.662956][ T3507] ? __check_object_size+0x4dd/0xa30 [ 52.668226][ T3507] ? bpf_lsm_netlink_send+0x5/0x10 [ 52.673320][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.678074][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.683259][ T3507] ? aa_sock_msg_perm+0x91/0x150 [ 52.688182][ T3507] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 52.693453][ T3507] ? security_socket_sendmsg+0x7d/0xa0 [ 52.698897][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.704086][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.708834][ T3507] ? __sys_sendmsg_sock+0x30/0x30 [ 52.713846][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.718419][ T3507] ? ____sys_sendmsg+0x8f0/0x8f0 [ 52.723347][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.729312][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.735277][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.740457][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.746423][ T3507] do_syscall_64+0x3d/0xb0 [ 52.750826][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.756706][ T3507] RIP: 0033:0x7f12101e84e9 [ 52.761103][ T3507] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.780690][ T3507] RSP: 002b:00007ffdd1a96b68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 52.789090][ T3507] RAX: ffffffffffffffda RBX: 00007ffdd1a96d38 RCX: 00007f12101e84e9 [ 52.797045][ T3507] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 52.804997][ T3507] RBP: 00007f121025b610 R08: 00000000ffffffff R09: 00007ffdd1a96d38 [ 52.812947][ T3507] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 52.820898][ T3507] R13: 00007ffdd1a96d28 R14: 0000000000000001 R15: 0000000000000001 [ 52.828851][ T3507] [ 52.831903][ T3507] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 52.841341][ T3507] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3507, name: syz-executor247 [ 52.850781][ T3507] preempt_count: 201, expected: 0 [ 52.855787][ T3507] RCU nest depth: 0, expected: 0 [ 52.860694][ T3507] INFO: lockdep is turned off. [ 52.865436][ T3507] Preemption disabled at: [ 52.865441][ T3507] [<0000000000000000>] 0x0 [ 52.874142][ T3507] CPU: 0 PID: 3507 Comm: syz-executor247 Not tainted 6.1.45-syzkaller #0 [ 52.882550][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.892590][ T3507] Call Trace: [ 52.895849][ T3507] [ 52.898757][ T3507] dump_stack_lvl+0x1e3/0x2cb [ 52.903422][ T3507] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.908859][ T3507] ? panic+0x75d/0x75d [ 52.912912][ T3507] ? rcu_is_watching+0x11/0xb0 [ 52.917659][ T3507] __might_resched+0x5cb/0x780 [ 52.922399][ T3507] ? __might_sleep+0xb0/0xb0 [ 52.926968][ T3507] slab_pre_alloc_hook+0x4a/0x2a0 [ 52.931970][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.936623][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.941972][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.946625][ T3507] __kmalloc_node+0xa2/0x230 [ 52.951191][ T3507] kvmalloc_node+0x6e/0x180 [ 52.955670][ T3507] get_dist_table+0x91/0x380 [ 52.960239][ T3507] netem_change+0x9a0/0x1ea0 [ 52.964810][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.970767][ T3507] ? netem_destroy+0xb0/0xb0 [ 52.975333][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.980506][ T3507] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 52.986378][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.991563][ T3507] ? memset+0x1f/0x40 [ 52.995521][ T3507] ? __hrtimer_init+0x181/0x260 [ 53.000350][ T3507] netem_init+0x58/0xb0 [ 53.004506][ T3507] ? qdisc_peek_dequeued+0x220/0x220 [ 53.009771][ T3507] qdisc_create+0x8a1/0x1220 [ 53.014339][ T3507] ? qdisc_notify+0x390/0x390 [ 53.018995][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 53.023829][ T3507] ? rcu_lock_release+0x20/0x20 [ 53.028662][ T3507] ? rcu_lock_release+0x20/0x20 [ 53.033521][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 53.038440][ T3507] ? rtnetlink_bind+0x80/0x80 [ 53.043098][ T3507] ? stack_trace_save+0x1c0/0x1c0 [ 53.048104][ T3507] ? kernel_text_address+0x9f/0xd0 [ 53.053196][ T3507] ? __kernel_text_address+0x9/0x40 [ 53.058377][ T3507] ? unwind_get_return_address+0x49/0x80 [ 53.063989][ T3507] ? arch_stack_walk+0xf3/0x140 [ 53.068819][ T3507] ? mark_lock+0x9a/0x340 [ 53.073130][ T3507] ? mark_lock+0x9a/0x340 [ 53.077440][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 53.082449][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 53.087193][ T3507] ? rtnetlink_bind+0x80/0x80 [ 53.091862][ T3507] ? netlink_ack+0xe60/0xe60 [ 53.096432][ T3507] netlink_unicast+0x7bf/0x990 [ 53.101174][ T3507] ? netlink_detachskb+0x90/0x90 [ 53.106086][ T3507] ? __virt_addr_valid+0x22b/0x2e0 [ 53.111181][ T3507] ? __phys_addr_symbol+0x2b/0x70 [ 53.116190][ T3507] ? __check_object_size+0x4dd/0xa30 [ 53.121450][ T3507] ? bpf_lsm_netlink_send+0x5/0x10 [ 53.126540][ T3507] netlink_sendmsg+0xa26/0xd60 [ 53.131283][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.136456][ T3507] ? aa_sock_msg_perm+0x91/0x150 [ 53.141371][ T3507] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 53.146630][ T3507] ? security_socket_sendmsg+0x7d/0xa0 [ 53.152069][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.157249][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 53.161995][ T3507] ? __sys_sendmsg_sock+0x30/0x30 [ 53.167012][ T3507] __sys_sendmsg+0x2a9/0x390 [ 53.171591][ T3507] ? ____sys_sendmsg+0x8f0/0x8f0 [ 53.176515][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.182472][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.188446][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 53.193631][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.199591][ T3507] do_syscall_64+0x3d/0xb0 [ 53.203991][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.209863][ T3507] RIP: 0033:0x7f12101e84e9 [ 53.214257][ T3507] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.233842][ T3507] RSP: 002b:00007ffdd1a96b68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.242230][ T3507] RAX: ffffffffffffffda RBX: 00007ffdd1a96d38 RCX: 00007f12101e84e9 [ 53.250181][ T3507] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 53.258141][ T3507] RBP: 00007f121025b610 R08: 00000000ffffffff R09: 00007ffdd1a96d38 [ 53.266091][ T3507] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 53.274127][ T3507] R13: 00007ffdd1a96d28 R14: 0000000000000001 R15: 0000000000000001 [ 53.282777][ T3507]