Warning: Permanently added '10.128.1.90' (ED25519) to the list of known hosts. executing program [ 60.153744][ T3511] [ 60.156097][ T3511] ===================================================== [ 60.163282][ T3511] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 60.170751][ T3511] 6.1.45-syzkaller #0 Not tainted [ 60.175943][ T3511] ----------------------------------------------------- [ 60.182879][ T3511] syz-executor247/3511 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 60.190974][ T3511] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 60.200068][ T3511] [ 60.200068][ T3511] and this task is already holding: [ 60.207423][ T3511] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 60.216651][ T3511] which would create a new lock dependency: [ 60.222526][ T3511] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 60.230106][ T3511] [ 60.230106][ T3511] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 60.239555][ T3511] (noop_qdisc.q.lock){+.-.}-{2:2} [ 60.239581][ T3511] [ 60.239581][ T3511] ... which became SOFTIRQ-irq-safe at: [ 60.252378][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.256970][ T3511] _raw_spin_lock+0x2a/0x40 [ 60.261563][ T3511] net_tx_action+0x752/0x970 [ 60.266240][ T3511] __do_softirq+0x2e9/0xa4c [ 60.270827][ T3511] do_softirq+0x162/0x240 [ 60.275240][ T3511] __local_bh_enable_ip+0x1b1/0x1f0 [ 60.280522][ T3511] dev_deactivate_many+0x3b4/0xaf0 [ 60.285723][ T3511] dev_deactivate+0x177/0x270 [ 60.290483][ T3511] linkwatch_do_dev+0x104/0x160 [ 60.295422][ T3511] __linkwatch_run_queue+0x448/0x6b0 [ 60.300794][ T3511] linkwatch_event+0x48/0x50 [ 60.305471][ T3511] process_one_work+0x8aa/0x11f0 [ 60.310503][ T3511] worker_thread+0xa5f/0x1210 [ 60.315274][ T3511] kthread+0x26e/0x300 [ 60.319432][ T3511] ret_from_fork+0x1f/0x30 [ 60.323945][ T3511] [ 60.323945][ T3511] to a SOFTIRQ-irq-unsafe lock: [ 60.330954][ T3511] (fs_reclaim){+.+.}-{0:0} [ 60.330979][ T3511] [ 60.330979][ T3511] ... which became SOFTIRQ-irq-unsafe at: [ 60.343535][ T3511] ... [ 60.343542][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.350881][ T3511] fs_reclaim_acquire+0x83/0x120 [ 60.355904][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.361024][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 60.366512][ T3511] kmalloc_trace+0x26/0xe0 [ 60.371066][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 60.376288][ T3511] wq_numa_init+0x122/0x4b0 [ 60.380914][ T3511] workqueue_init+0x22/0x59d [ 60.385608][ T3511] kernel_init_freeable+0x40a/0x61f [ 60.390902][ T3511] kernel_init+0x19/0x290 [ 60.395447][ T3511] ret_from_fork+0x1f/0x30 [ 60.399965][ T3511] [ 60.399965][ T3511] other info that might help us debug this: [ 60.399965][ T3511] [ 60.410195][ T3511] Possible interrupt unsafe locking scenario: [ 60.410195][ T3511] [ 60.418744][ T3511] CPU0 CPU1 [ 60.424269][ T3511] ---- ---- [ 60.429734][ T3511] lock(fs_reclaim); [ 60.433737][ T3511] local_irq_disable(); [ 60.440500][ T3511] lock(noop_qdisc.q.lock); [ 60.447625][ T3511] lock(fs_reclaim); [ 60.454165][ T3511] [ 60.457705][ T3511] lock(noop_qdisc.q.lock); [ 60.462478][ T3511] [ 60.462478][ T3511] *** DEADLOCK *** [ 60.462478][ T3511] [ 60.470647][ T3511] 2 locks held by syz-executor247/3511: [ 60.476190][ T3511] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 60.485866][ T3511] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 60.495554][ T3511] [ 60.495554][ T3511] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 60.505962][ T3511] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 60.511523][ T3511] HARDIRQ-ON-W at: [ 60.515502][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.521659][ T3511] _raw_spin_lock+0x2a/0x40 [ 60.527836][ T3511] __dev_queue_xmit+0xd50/0x3c90 [ 60.534430][ T3511] tx+0x66/0x100 [ 60.539632][ T3511] kthread+0x234/0x440 [ 60.545351][ T3511] kthread+0x26e/0x300 [ 60.551077][ T3511] ret_from_fork+0x1f/0x30 [ 60.557154][ T3511] IN-SOFTIRQ-W at: [ 60.561131][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.567294][ T3511] _raw_spin_lock+0x2a/0x40 [ 60.573543][ T3511] net_tx_action+0x752/0x970 [ 60.579784][ T3511] __do_softirq+0x2e9/0xa4c [ 60.585936][ T3511] do_softirq+0x162/0x240 [ 60.591931][ T3511] __local_bh_enable_ip+0x1b1/0x1f0 [ 60.598879][ T3511] dev_deactivate_many+0x3b4/0xaf0 [ 60.605651][ T3511] dev_deactivate+0x177/0x270 [ 60.611977][ T3511] linkwatch_do_dev+0x104/0x160 [ 60.618483][ T3511] __linkwatch_run_queue+0x448/0x6b0 [ 60.625428][ T3511] linkwatch_event+0x48/0x50 [ 60.631698][ T3511] process_one_work+0x8aa/0x11f0 [ 60.638396][ T3511] worker_thread+0xa5f/0x1210 [ 60.644732][ T3511] kthread+0x26e/0x300 [ 60.650464][ T3511] ret_from_fork+0x1f/0x30 [ 60.656539][ T3511] INITIAL USE at: [ 60.660521][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.666960][ T3511] _raw_spin_lock+0x2a/0x40 [ 60.673030][ T3511] __dev_queue_xmit+0xd50/0x3c90 [ 60.679535][ T3511] tx+0x66/0x100 [ 60.684663][ T3511] kthread+0x234/0x440 [ 60.690314][ T3511] kthread+0x26e/0x300 [ 60.695952][ T3511] ret_from_fork+0x1f/0x30 [ 60.701943][ T3511] } [ 60.704437][ T3511] ... key at: [] noop_qdisc+0x108/0x320 [ 60.712072][ T3511] [ 60.712072][ T3511] the dependencies between the lock to be acquired [ 60.712081][ T3511] and SOFTIRQ-irq-unsafe lock: [ 60.725591][ T3511] -> (fs_reclaim){+.+.}-{0:0} { [ 60.730461][ T3511] HARDIRQ-ON-W at: [ 60.734437][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.740594][ T3511] fs_reclaim_acquire+0x83/0x120 [ 60.747182][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.753860][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 60.760887][ T3511] kmalloc_trace+0x26/0xe0 [ 60.766951][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 60.773712][ T3511] wq_numa_init+0x122/0x4b0 [ 60.779891][ T3511] workqueue_init+0x22/0x59d [ 60.786148][ T3511] kernel_init_freeable+0x40a/0x61f [ 60.793091][ T3511] kernel_init+0x19/0x290 [ 60.799180][ T3511] ret_from_fork+0x1f/0x30 [ 60.805254][ T3511] SOFTIRQ-ON-W at: [ 60.809275][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.815434][ T3511] fs_reclaim_acquire+0x83/0x120 [ 60.822017][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.828704][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 60.835731][ T3511] kmalloc_trace+0x26/0xe0 [ 60.841805][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 60.848747][ T3511] wq_numa_init+0x122/0x4b0 [ 60.855009][ T3511] workqueue_init+0x22/0x59d [ 60.861253][ T3511] kernel_init_freeable+0x40a/0x61f [ 60.868100][ T3511] kernel_init+0x19/0x290 [ 60.874078][ T3511] ret_from_fork+0x1f/0x30 [ 60.880356][ T3511] INITIAL USE at: [ 60.884256][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.890327][ T3511] fs_reclaim_acquire+0x83/0x120 [ 60.896825][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.904022][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 60.910957][ T3511] kmalloc_trace+0x26/0xe0 [ 60.916932][ T3511] alloc_workqueue_attrs+0x46/0xc0 [ 60.923606][ T3511] wq_numa_init+0x122/0x4b0 [ 60.929698][ T3511] workqueue_init+0x22/0x59d [ 60.935950][ T3511] kernel_init_freeable+0x40a/0x61f [ 60.942794][ T3511] kernel_init+0x19/0x290 [ 60.948685][ T3511] ret_from_fork+0x1f/0x30 [ 60.954666][ T3511] } [ 60.957174][ T3511] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 60.965244][ T3511] ... acquired at: [ 60.969128][ T3511] lock_acquire+0x1f8/0x5a0 [ 60.973991][ T3511] fs_reclaim_acquire+0x83/0x120 [ 60.979430][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 60.984643][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 60.990194][ T3511] __kmalloc_node+0xa2/0x230 [ 60.994972][ T3511] kvmalloc_node+0x6e/0x180 [ 60.999740][ T3511] get_dist_table+0x91/0x380 [ 61.004508][ T3511] netem_change+0x947/0x1ea0 [ 61.009272][ T3511] netem_init+0x58/0xb0 [ 61.013704][ T3511] qdisc_create+0x8a1/0x1220 [ 61.018468][ T3511] tc_modify_qdisc+0x9e0/0x1da0 [ 61.023495][ T3511] rtnetlink_rcv_msg+0x776/0xf00 [ 61.028706][ T3511] netlink_rcv_skb+0x1cd/0x410 [ 61.033642][ T3511] netlink_unicast+0x7bf/0x990 [ 61.038578][ T3511] netlink_sendmsg+0xa26/0xd60 [ 61.043513][ T3511] ____sys_sendmsg+0x59e/0x8f0 [ 61.048447][ T3511] __sys_sendmsg+0x2a9/0x390 [ 61.053292][ T3511] do_syscall_64+0x3d/0xb0 [ 61.058059][ T3511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.064389][ T3511] [ 61.066709][ T3511] [ 61.066709][ T3511] stack backtrace: [ 61.072588][ T3511] CPU: 1 PID: 3511 Comm: syz-executor247 Not tainted 6.1.45-syzkaller #0 [ 61.081368][ T3511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 61.091508][ T3511] Call Trace: [ 61.094787][ T3511] [ 61.097743][ T3511] dump_stack_lvl+0x1e3/0x2cb [ 61.102453][ T3511] ? nf_tcp_handle_invalid+0x642/0x642 [ 61.108003][ T3511] ? panic+0x75d/0x75d [ 61.112073][ T3511] ? print_shortest_lock_dependencies+0xee/0x150 [ 61.118403][ T3511] validate_chain+0x4d2e/0x58e0 [ 61.123264][ T3511] ? reacquire_held_locks+0x660/0x660 [ 61.128637][ T3511] ? validate_chain+0x115/0x58e0 [ 61.133587][ T3511] ? mark_lock+0x9a/0x340 [ 61.137918][ T3511] __lock_acquire+0x125b/0x1f80 [ 61.142770][ T3511] lock_acquire+0x1f8/0x5a0 [ 61.147271][ T3511] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 61.152472][ T3511] ? read_lock_is_recursive+0x10/0x10 [ 61.157840][ T3511] ? __lock_acquire+0x125b/0x1f80 [ 61.162869][ T3511] fs_reclaim_acquire+0x83/0x120 [ 61.167805][ T3511] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 61.173005][ T3511] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.178031][ T3511] ? kvmalloc_node+0x6e/0x180 [ 61.182703][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 61.188076][ T3511] ? kvmalloc_node+0x6e/0x180 [ 61.192746][ T3511] __kmalloc_node+0xa2/0x230 [ 61.197498][ T3511] kvmalloc_node+0x6e/0x180 [ 61.202086][ T3511] get_dist_table+0x91/0x380 [ 61.206704][ T3511] netem_change+0x947/0x1ea0 [ 61.211320][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.217316][ T3511] ? netem_destroy+0xb0/0xb0 [ 61.222003][ T3511] ? do_raw_spin_unlock+0x137/0x8a0 [ 61.227208][ T3511] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 61.233190][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 61.238480][ T3511] ? memset+0x1f/0x40 [ 61.242547][ T3511] ? __hrtimer_init+0x181/0x260 [ 61.247407][ T3511] netem_init+0x58/0xb0 [ 61.251587][ T3511] ? qdisc_peek_dequeued+0x220/0x220 [ 61.257048][ T3511] qdisc_create+0x8a1/0x1220 [ 61.261660][ T3511] ? qdisc_notify+0x390/0x390 [ 61.266434][ T3511] tc_modify_qdisc+0x9e0/0x1da0 [ 61.271310][ T3511] ? rcu_lock_release+0x20/0x20 [ 61.276291][ T3511] ? rcu_lock_release+0x20/0x20 [ 61.281233][ T3511] rtnetlink_rcv_msg+0x776/0xf00 [ 61.286173][ T3511] ? rtnetlink_bind+0x80/0x80 [ 61.290843][ T3511] ? stack_trace_save+0x1c0/0x1c0 [ 61.295862][ T3511] ? kernel_text_address+0x9f/0xd0 [ 61.301068][ T3511] ? __kernel_text_address+0x9/0x40 [ 61.306359][ T3511] ? unwind_get_return_address+0x49/0x80 [ 61.312078][ T3511] ? arch_stack_walk+0xf3/0x140 [ 61.316938][ T3511] ? mark_lock+0x9a/0x340 [ 61.321267][ T3511] ? mark_lock+0x9a/0x340 [ 61.325628][ T3511] ? __lock_acquire+0x125b/0x1f80 [ 61.330709][ T3511] netlink_rcv_skb+0x1cd/0x410 [ 61.335483][ T3511] ? rtnetlink_bind+0x80/0x80 [ 61.340166][ T3511] ? netlink_ack+0xe60/0xe60 [ 61.344771][ T3511] netlink_unicast+0x7bf/0x990 [ 61.349631][ T3511] ? netlink_detachskb+0x90/0x90 [ 61.355003][ T3511] ? __virt_addr_valid+0x22b/0x2e0 [ 61.360211][ T3511] ? __phys_addr_symbol+0x2b/0x70 [ 61.365243][ T3511] ? __check_object_size+0x4dd/0xa30 [ 61.370619][ T3511] ? bpf_lsm_netlink_send+0x5/0x10 [ 61.375732][ T3511] netlink_sendmsg+0xa26/0xd60 [ 61.380503][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.385699][ T3511] ? aa_sock_msg_perm+0x91/0x150 [ 61.390648][ T3511] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 61.395947][ T3511] ? security_socket_sendmsg+0x7d/0xa0 [ 61.401419][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.406622][ T3511] ____sys_sendmsg+0x59e/0x8f0 [ 61.411405][ T3511] ? __sys_sendmsg_sock+0x30/0x30 [ 61.416445][ T3511] __sys_sendmsg+0x2a9/0x390 [ 61.421035][ T3511] ? ____sys_sendmsg+0x8f0/0x8f0 [ 61.425983][ T3511] ? _copy_to_user+0xe9/0x130 [ 61.430749][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.436734][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.442725][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 61.447948][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.453930][ T3511] do_syscall_64+0x3d/0xb0 [ 61.458357][ T3511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.464277][ T3511] RIP: 0033:0x7f3af878f8f9 [ 61.468882][ T3511] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 61.488756][ T3511] RSP: 002b:00007fff969a0598 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.497169][ T3511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3af878f8f9 [ 61.505231][ T3511] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 61.513199][ T3511] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fff969a0610 [ 61.521166][ T3511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 61.529130][ T3511] R13: 00007fff969a0798 R14: 0000000000000001 R15: 0000000000000001 [ 61.537104][ T3511] [ 61.540212][ T3511] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 61.549677][ T3511] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3511, name: syz-executor247 [ 61.559143][ T3511] preempt_count: 201, expected: 0 [ 61.564179][ T3511] RCU nest depth: 0, expected: 0 [ 61.569108][ T3511] INFO: lockdep is turned off. [ 61.573871][ T3511] Preemption disabled at: [ 61.573878][ T3511] [<0000000000000000>] 0x0 [ 61.582680][ T3511] CPU: 1 PID: 3511 Comm: syz-executor247 Not tainted 6.1.45-syzkaller #0 [ 61.591228][ T3511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 61.601450][ T3511] Call Trace: [ 61.604743][ T3511] [ 61.607675][ T3511] dump_stack_lvl+0x1e3/0x2cb [ 61.612359][ T3511] ? nf_tcp_handle_invalid+0x642/0x642 [ 61.617821][ T3511] ? panic+0x75d/0x75d [ 61.621884][ T3511] ? rcu_is_watching+0x11/0xb0 [ 61.626662][ T3511] __might_resched+0x5cb/0x780 [ 61.631428][ T3511] ? __might_sleep+0xb0/0xb0 [ 61.636022][ T3511] slab_pre_alloc_hook+0x4a/0x2a0 [ 61.641217][ T3511] ? kvmalloc_node+0x6e/0x180 [ 61.645890][ T3511] __kmem_cache_alloc_node+0x47/0x260 [ 61.651348][ T3511] ? kvmalloc_node+0x6e/0x180 [ 61.656040][ T3511] __kmalloc_node+0xa2/0x230 [ 61.660628][ T3511] kvmalloc_node+0x6e/0x180 [ 61.665129][ T3511] get_dist_table+0x91/0x380 [ 61.669811][ T3511] netem_change+0x947/0x1ea0 [ 61.674413][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.680391][ T3511] ? netem_destroy+0xb0/0xb0 [ 61.684994][ T3511] ? do_raw_spin_unlock+0x137/0x8a0 [ 61.690193][ T3511] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 61.696109][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 61.701316][ T3511] ? memset+0x1f/0x40 [ 61.705296][ T3511] ? __hrtimer_init+0x181/0x260 [ 61.710151][ T3511] netem_init+0x58/0xb0 [ 61.714310][ T3511] ? qdisc_peek_dequeued+0x220/0x220 [ 61.719600][ T3511] qdisc_create+0x8a1/0x1220 [ 61.724297][ T3511] ? qdisc_notify+0x390/0x390 [ 61.728980][ T3511] tc_modify_qdisc+0x9e0/0x1da0 [ 61.733854][ T3511] ? rcu_lock_release+0x20/0x20 [ 61.738726][ T3511] ? rcu_lock_release+0x20/0x20 [ 61.743577][ T3511] rtnetlink_rcv_msg+0x776/0xf00 [ 61.748603][ T3511] ? rtnetlink_bind+0x80/0x80 [ 61.753273][ T3511] ? stack_trace_save+0x1c0/0x1c0 [ 61.758291][ T3511] ? kernel_text_address+0x9f/0xd0 [ 61.763404][ T3511] ? __kernel_text_address+0x9/0x40 [ 61.768616][ T3511] ? unwind_get_return_address+0x49/0x80 [ 61.774251][ T3511] ? arch_stack_walk+0xf3/0x140 [ 61.779116][ T3511] ? mark_lock+0x9a/0x340 [ 61.783450][ T3511] ? mark_lock+0x9a/0x340 [ 61.787802][ T3511] ? __lock_acquire+0x125b/0x1f80 [ 61.792831][ T3511] netlink_rcv_skb+0x1cd/0x410 [ 61.797589][ T3511] ? rtnetlink_bind+0x80/0x80 [ 61.802261][ T3511] ? netlink_ack+0xe60/0xe60 [ 61.806852][ T3511] netlink_unicast+0x7bf/0x990 [ 61.811610][ T3511] ? netlink_detachskb+0x90/0x90 [ 61.816651][ T3511] ? __virt_addr_valid+0x22b/0x2e0 [ 61.821847][ T3511] ? __phys_addr_symbol+0x2b/0x70 [ 61.826870][ T3511] ? __check_object_size+0x4dd/0xa30 [ 61.832151][ T3511] ? bpf_lsm_netlink_send+0x5/0x10 [ 61.837278][ T3511] netlink_sendmsg+0xa26/0xd60 [ 61.842042][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.847236][ T3511] ? aa_sock_msg_perm+0x91/0x150 [ 61.852169][ T3511] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 61.857454][ T3511] ? security_socket_sendmsg+0x7d/0xa0 [ 61.862913][ T3511] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.868210][ T3511] ____sys_sendmsg+0x59e/0x8f0 [ 61.875196][ T3511] ? __sys_sendmsg_sock+0x30/0x30 [ 61.880251][ T3511] __sys_sendmsg+0x2a9/0x390 [ 61.884925][ T3511] ? ____sys_sendmsg+0x8f0/0x8f0 [ 61.889868][ T3511] ? _copy_to_user+0xe9/0x130 [ 61.894546][ T3511] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 61.900534][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.906517][ T3511] ? lockdep_hardirqs_on+0x94/0x130 [ 61.911712][ T3511] ? syscall_enter_from_user_mode+0x2e/0x220 [ 61.917693][ T3511] do_syscall_64+0x3d/0xb0 [ 61.922116][ T3511] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.928039][ T3511] RIP: 0033:0x7f3af878f8f9 [ 61.932450][ T3511] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 61.952136][ T3511] RSP: 002b:00007fff969a0598 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.960546][ T3511] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3af878f8f9 [ 61.968602][ T3511] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 61.976566][ T3511] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fff969a0610 [ 61.984538][ T3511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 61.992504][ T3511] R13: 00007fff969a0798 R14: 0000000000000001 R15: 0000000000000001 [ 62.000474][ T3511]