Warning: Permanently added '10.128.1.173' (ED25519) to the list of known hosts. executing program [ 61.073706][ T3512] [ 61.076071][ T3512] ===================================================== [ 61.082991][ T3512] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 61.090435][ T3512] 6.1.45-syzkaller #0 Not tainted [ 61.095446][ T3512] ----------------------------------------------------- [ 61.102367][ T3512] syz-executor253/3512 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 61.110423][ T3512] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 61.119513][ T3512] [ 61.119513][ T3512] and this task is already holding: [ 61.126865][ T3512] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 61.136127][ T3512] which would create a new lock dependency: [ 61.142013][ T3512] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 61.149672][ T3512] [ 61.149672][ T3512] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 61.159110][ T3512] (noop_qdisc.q.lock){+.-.}-{2:2} [ 61.159132][ T3512] [ 61.159132][ T3512] ... which became SOFTIRQ-irq-safe at: [ 61.171920][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.176505][ T3512] _raw_spin_lock+0x2a/0x40 [ 61.181090][ T3512] net_tx_action+0x752/0x970 [ 61.185784][ T3512] __do_softirq+0x2e9/0xa4c [ 61.190384][ T3512] do_softirq+0x162/0x240 [ 61.194800][ T3512] __local_bh_enable_ip+0x1b1/0x1f0 [ 61.200075][ T3512] dev_deactivate_many+0x3b4/0xaf0 [ 61.205267][ T3512] dev_deactivate+0x177/0x270 [ 61.210024][ T3512] linkwatch_do_dev+0x104/0x160 [ 61.214957][ T3512] __linkwatch_run_queue+0x448/0x6b0 [ 61.220372][ T3512] linkwatch_event+0x48/0x50 [ 61.225044][ T3512] process_one_work+0x8aa/0x11f0 [ 61.230086][ T3512] worker_thread+0xa5f/0x1210 [ 61.234870][ T3512] kthread+0x26e/0x300 [ 61.239035][ T3512] ret_from_fork+0x1f/0x30 [ 61.243537][ T3512] [ 61.243537][ T3512] to a SOFTIRQ-irq-unsafe lock: [ 61.250548][ T3512] (fs_reclaim){+.+.}-{0:0} [ 61.250570][ T3512] [ 61.250570][ T3512] ... which became SOFTIRQ-irq-unsafe at: [ 61.262923][ T3512] ... [ 61.262929][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.270080][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.275098][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.280213][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.285687][ T3512] kmalloc_trace+0x26/0xe0 [ 61.290193][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 61.295472][ T3512] wq_numa_init+0x122/0x4b0 [ 61.300073][ T3512] workqueue_init+0x22/0x59d [ 61.304745][ T3512] kernel_init_freeable+0x40a/0x61f [ 61.310038][ T3512] kernel_init+0x19/0x290 [ 61.314449][ T3512] ret_from_fork+0x1f/0x30 [ 61.318950][ T3512] [ 61.318950][ T3512] other info that might help us debug this: [ 61.318950][ T3512] [ 61.329166][ T3512] Possible interrupt unsafe locking scenario: [ 61.329166][ T3512] [ 61.337473][ T3512] CPU0 CPU1 [ 61.342827][ T3512] ---- ---- [ 61.348200][ T3512] lock(fs_reclaim); [ 61.352172][ T3512] local_irq_disable(); [ 61.358913][ T3512] lock(noop_qdisc.q.lock); [ 61.366025][ T3512] lock(fs_reclaim); [ 61.372523][ T3512] [ 61.375968][ T3512] lock(noop_qdisc.q.lock); [ 61.380729][ T3512] [ 61.380729][ T3512] *** DEADLOCK *** [ 61.380729][ T3512] [ 61.388868][ T3512] 2 locks held by syz-executor253/3512: [ 61.394409][ T3512] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 61.403901][ T3512] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 61.413567][ T3512] [ 61.413567][ T3512] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 61.423971][ T3512] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 61.429444][ T3512] HARDIRQ-ON-W at: [ 61.433428][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.439579][ T3512] _raw_spin_lock+0x2a/0x40 [ 61.445783][ T3512] __dev_queue_xmit+0xd50/0x3c90 [ 61.452368][ T3512] tx+0x66/0x100 [ 61.457563][ T3512] kthread+0x234/0x440 [ 61.463275][ T3512] kthread+0x26e/0x300 [ 61.468998][ T3512] ret_from_fork+0x1f/0x30 [ 61.475064][ T3512] IN-SOFTIRQ-W at: [ 61.479038][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.485183][ T3512] _raw_spin_lock+0x2a/0x40 [ 61.491338][ T3512] net_tx_action+0x752/0x970 [ 61.497571][ T3512] __do_softirq+0x2e9/0xa4c [ 61.503721][ T3512] do_softirq+0x162/0x240 [ 61.509697][ T3512] __local_bh_enable_ip+0x1b1/0x1f0 [ 61.516555][ T3512] dev_deactivate_many+0x3b4/0xaf0 [ 61.523314][ T3512] dev_deactivate+0x177/0x270 [ 61.529647][ T3512] linkwatch_do_dev+0x104/0x160 [ 61.536143][ T3512] __linkwatch_run_queue+0x448/0x6b0 [ 61.543073][ T3512] linkwatch_event+0x48/0x50 [ 61.549398][ T3512] process_one_work+0x8aa/0x11f0 [ 61.555986][ T3512] worker_thread+0xa5f/0x1210 [ 61.562322][ T3512] kthread+0x26e/0x300 [ 61.568035][ T3512] ret_from_fork+0x1f/0x30 [ 61.574103][ T3512] INITIAL USE at: [ 61.577987][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.584043][ T3512] _raw_spin_lock+0x2a/0x40 [ 61.590109][ T3512] __dev_queue_xmit+0xd50/0x3c90 [ 61.596608][ T3512] tx+0x66/0x100 [ 61.601714][ T3512] kthread+0x234/0x440 [ 61.607342][ T3512] kthread+0x26e/0x300 [ 61.612966][ T3512] ret_from_fork+0x1f/0x30 [ 61.619121][ T3512] } [ 61.621611][ T3512] ... key at: [] noop_qdisc+0x108/0x320 [ 61.629241][ T3512] [ 61.629241][ T3512] the dependencies between the lock to be acquired [ 61.629249][ T3512] and SOFTIRQ-irq-unsafe lock: [ 61.642782][ T3512] -> (fs_reclaim){+.+.}-{0:0} { [ 61.647661][ T3512] HARDIRQ-ON-W at: [ 61.651631][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.657777][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.664359][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.671028][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.678046][ T3512] kmalloc_trace+0x26/0xe0 [ 61.684108][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 61.690864][ T3512] wq_numa_init+0x122/0x4b0 [ 61.697017][ T3512] workqueue_init+0x22/0x59d [ 61.703257][ T3512] kernel_init_freeable+0x40a/0x61f [ 61.710107][ T3512] kernel_init+0x19/0x290 [ 61.716171][ T3512] ret_from_fork+0x1f/0x30 [ 61.722233][ T3512] SOFTIRQ-ON-W at: [ 61.726203][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.732348][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.738927][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.745624][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.752666][ T3512] kmalloc_trace+0x26/0xe0 [ 61.758722][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 61.765479][ T3512] wq_numa_init+0x122/0x4b0 [ 61.771689][ T3512] workqueue_init+0x22/0x59d [ 61.777925][ T3512] kernel_init_freeable+0x40a/0x61f [ 61.784766][ T3512] kernel_init+0x19/0x290 [ 61.790744][ T3512] ret_from_fork+0x1f/0x30 [ 61.796807][ T3512] INITIAL USE at: [ 61.800777][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.806935][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.813431][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.820032][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.826962][ T3512] kmalloc_trace+0x26/0xe0 [ 61.832944][ T3512] alloc_workqueue_attrs+0x46/0xc0 [ 61.839617][ T3512] wq_numa_init+0x122/0x4b0 [ 61.845680][ T3512] workqueue_init+0x22/0x59d [ 61.851826][ T3512] kernel_init_freeable+0x40a/0x61f [ 61.858580][ T3512] kernel_init+0x19/0x290 [ 61.864467][ T3512] ret_from_fork+0x1f/0x30 [ 61.870446][ T3512] } [ 61.873023][ T3512] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 61.881006][ T3512] ... acquired at: [ 61.884804][ T3512] lock_acquire+0x1f8/0x5a0 [ 61.889474][ T3512] fs_reclaim_acquire+0x83/0x120 [ 61.894609][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 61.899833][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 61.905387][ T3512] __kmalloc_node+0xa2/0x230 [ 61.910141][ T3512] kvmalloc_node+0x6e/0x180 [ 61.914811][ T3512] get_dist_table+0x91/0x380 [ 61.919605][ T3512] netem_change+0x947/0x1ea0 [ 61.924391][ T3512] netem_init+0x58/0xb0 [ 61.928725][ T3512] qdisc_create+0x8a1/0x1220 [ 61.933487][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 61.938532][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 61.943663][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 61.948598][ T3512] netlink_unicast+0x7bf/0x990 [ 61.953528][ T3512] netlink_sendmsg+0xa26/0xd60 [ 61.958471][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 61.963406][ T3512] __sys_sendmsg+0x2a9/0x390 [ 61.968168][ T3512] do_syscall_64+0x3d/0xb0 [ 61.972761][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 61.978827][ T3512] [ 61.981141][ T3512] [ 61.981141][ T3512] stack backtrace: [ 61.987019][ T3512] CPU: 1 PID: 3512 Comm: syz-executor253 Not tainted 6.1.45-syzkaller #0 [ 61.995424][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 62.005560][ T3512] Call Trace: [ 62.008833][ T3512] [ 62.011757][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 62.016458][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 62.021939][ T3512] ? panic+0x75d/0x75d [ 62.026014][ T3512] ? print_shortest_lock_dependencies+0xee/0x150 [ 62.032352][ T3512] validate_chain+0x4d2e/0x58e0 [ 62.037217][ T3512] ? reacquire_held_locks+0x660/0x660 [ 62.042594][ T3512] ? validate_chain+0x115/0x58e0 [ 62.047541][ T3512] ? mark_lock+0x9a/0x340 [ 62.051905][ T3512] __lock_acquire+0x125b/0x1f80 [ 62.056782][ T3512] lock_acquire+0x1f8/0x5a0 [ 62.061282][ T3512] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 62.066495][ T3512] ? read_lock_is_recursive+0x10/0x10 [ 62.071866][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 62.076896][ T3512] fs_reclaim_acquire+0x83/0x120 [ 62.081828][ T3512] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 62.087126][ T3512] slab_pre_alloc_hook+0x2a/0x2a0 [ 62.092150][ T3512] ? kvmalloc_node+0x6e/0x180 [ 62.096823][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 62.102199][ T3512] ? kvmalloc_node+0x6e/0x180 [ 62.106870][ T3512] __kmalloc_node+0xa2/0x230 [ 62.111457][ T3512] kvmalloc_node+0x6e/0x180 [ 62.115959][ T3512] get_dist_table+0x91/0x380 [ 62.120611][ T3512] netem_change+0x947/0x1ea0 [ 62.125205][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 62.131179][ T3512] ? netem_destroy+0xb0/0xb0 [ 62.135769][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 62.140967][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 62.146860][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 62.152058][ T3512] ? memset+0x1f/0x40 [ 62.156033][ T3512] ? __hrtimer_init+0x181/0x260 [ 62.160885][ T3512] netem_init+0x58/0xb0 [ 62.165042][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 62.170323][ T3512] qdisc_create+0x8a1/0x1220 [ 62.174916][ T3512] ? qdisc_notify+0x390/0x390 [ 62.179591][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 62.184548][ T3512] ? rcu_lock_release+0x20/0x20 [ 62.189413][ T3512] ? rcu_lock_release+0x20/0x20 [ 62.194260][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 62.199199][ T3512] ? rtnetlink_bind+0x80/0x80 [ 62.203870][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 62.208886][ T3512] ? kernel_text_address+0x9f/0xd0 [ 62.213994][ T3512] ? __kernel_text_address+0x9/0x40 [ 62.219196][ T3512] ? unwind_get_return_address+0x49/0x80 [ 62.224825][ T3512] ? arch_stack_walk+0xf3/0x140 [ 62.229705][ T3512] ? mark_lock+0x9a/0x340 [ 62.234031][ T3512] ? mark_lock+0x9a/0x340 [ 62.238358][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 62.243388][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 62.248148][ T3512] ? rtnetlink_bind+0x80/0x80 [ 62.252815][ T3512] ? netlink_ack+0xe60/0xe60 [ 62.257406][ T3512] netlink_unicast+0x7bf/0x990 [ 62.262166][ T3512] ? netlink_detachskb+0x90/0x90 [ 62.267092][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 62.272200][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 62.277221][ T3512] ? __check_object_size+0x4dd/0xa30 [ 62.282532][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 62.287639][ T3512] netlink_sendmsg+0xa26/0xd60 [ 62.292402][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 62.297597][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 62.302527][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 62.307803][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 62.313264][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 62.318464][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 62.323227][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 62.328250][ T3512] __sys_sendmsg+0x2a9/0x390 [ 62.332841][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 62.337779][ T3512] ? _copy_to_user+0xe9/0x130 [ 62.342457][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 62.348438][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 62.354504][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 62.359703][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 62.365676][ T3512] do_syscall_64+0x3d/0xb0 [ 62.370089][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.375981][ T3512] RIP: 0033:0x7fab318528b9 [ 62.380387][ T3512] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 62.400243][ T3512] RSP: 002b:00007ffd6cdd1d68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 62.408735][ T3512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fab318528b9 [ 62.416699][ T3512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 62.424673][ T3512] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd6cdd1de0 [ 62.432639][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 62.440603][ T3512] R13: 00007ffd6cdd1f68 R14: 0000000000000001 R15: 0000000000000001 [ 62.448571][ T3512] [ 62.451672][ T3512] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 62.461161][ T3512] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3512, name: syz-executor253 [ 62.470660][ T3512] preempt_count: 201, expected: 0 [ 62.475703][ T3512] RCU nest depth: 0, expected: 0 [ 62.480628][ T3512] INFO: lockdep is turned off. [ 62.485408][ T3512] Preemption disabled at: [ 62.485417][ T3512] [<0000000000000000>] 0x0 [ 62.494148][ T3512] CPU: 1 PID: 3512 Comm: syz-executor253 Not tainted 6.1.45-syzkaller #0 [ 62.502552][ T3512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 62.512598][ T3512] Call Trace: [ 62.515869][ T3512] [ 62.518790][ T3512] dump_stack_lvl+0x1e3/0x2cb [ 62.523474][ T3512] ? nf_tcp_handle_invalid+0x642/0x642 [ 62.528950][ T3512] ? panic+0x75d/0x75d [ 62.533011][ T3512] ? rcu_is_watching+0x11/0xb0 [ 62.537776][ T3512] __might_resched+0x5cb/0x780 [ 62.542554][ T3512] ? __might_sleep+0xb0/0xb0 [ 62.547171][ T3512] slab_pre_alloc_hook+0x4a/0x2a0 [ 62.552301][ T3512] ? kvmalloc_node+0x6e/0x180 [ 62.556977][ T3512] __kmem_cache_alloc_node+0x47/0x260 [ 62.562349][ T3512] ? kvmalloc_node+0x6e/0x180 [ 62.567016][ T3512] __kmalloc_node+0xa2/0x230 [ 62.571618][ T3512] kvmalloc_node+0x6e/0x180 [ 62.576115][ T3512] get_dist_table+0x91/0x380 [ 62.580703][ T3512] netem_change+0x947/0x1ea0 [ 62.585305][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 62.591280][ T3512] ? netem_destroy+0xb0/0xb0 [ 62.595874][ T3512] ? do_raw_spin_unlock+0x137/0x8a0 [ 62.601067][ T3512] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 62.607043][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 62.612270][ T3512] ? memset+0x1f/0x40 [ 62.616252][ T3512] ? __hrtimer_init+0x181/0x260 [ 62.621103][ T3512] netem_init+0x58/0xb0 [ 62.625256][ T3512] ? qdisc_peek_dequeued+0x220/0x220 [ 62.630538][ T3512] qdisc_create+0x8a1/0x1220 [ 62.635133][ T3512] ? qdisc_notify+0x390/0x390 [ 62.639814][ T3512] tc_modify_qdisc+0x9e0/0x1da0 [ 62.644680][ T3512] ? rcu_lock_release+0x20/0x20 [ 62.649554][ T3512] ? rcu_lock_release+0x20/0x20 [ 62.654402][ T3512] rtnetlink_rcv_msg+0x776/0xf00 [ 62.659528][ T3512] ? rtnetlink_bind+0x80/0x80 [ 62.664226][ T3512] ? stack_trace_save+0x1c0/0x1c0 [ 62.669258][ T3512] ? kernel_text_address+0x9f/0xd0 [ 62.674372][ T3512] ? __kernel_text_address+0x9/0x40 [ 62.679572][ T3512] ? unwind_get_return_address+0x49/0x80 [ 62.685201][ T3512] ? arch_stack_walk+0xf3/0x140 [ 62.690051][ T3512] ? mark_lock+0x9a/0x340 [ 62.694386][ T3512] ? mark_lock+0x9a/0x340 [ 62.698712][ T3512] ? __lock_acquire+0x125b/0x1f80 [ 62.703740][ T3512] netlink_rcv_skb+0x1cd/0x410 [ 62.708502][ T3512] ? rtnetlink_bind+0x80/0x80 [ 62.713180][ T3512] ? netlink_ack+0xe60/0xe60 [ 62.717788][ T3512] netlink_unicast+0x7bf/0x990 [ 62.722550][ T3512] ? netlink_detachskb+0x90/0x90 [ 62.727485][ T3512] ? __virt_addr_valid+0x22b/0x2e0 [ 62.732598][ T3512] ? __phys_addr_symbol+0x2b/0x70 [ 62.737625][ T3512] ? __check_object_size+0x4dd/0xa30 [ 62.742909][ T3512] ? bpf_lsm_netlink_send+0x5/0x10 [ 62.748020][ T3512] netlink_sendmsg+0xa26/0xd60 [ 62.752790][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 62.757984][ T3512] ? aa_sock_msg_perm+0x91/0x150 [ 62.762914][ T3512] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 62.768191][ T3512] ? security_socket_sendmsg+0x7d/0xa0 [ 62.773736][ T3512] ? netlink_getsockopt+0x5b0/0x5b0 [ 62.778943][ T3512] ____sys_sendmsg+0x59e/0x8f0 [ 62.783704][ T3512] ? __sys_sendmsg_sock+0x30/0x30 [ 62.788726][ T3512] __sys_sendmsg+0x2a9/0x390 [ 62.793320][ T3512] ? ____sys_sendmsg+0x8f0/0x8f0 [ 62.798276][ T3512] ? _copy_to_user+0xe9/0x130 [ 62.802958][ T3512] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 62.808935][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 62.814909][ T3512] ? lockdep_hardirqs_on+0x94/0x130 [ 62.820102][ T3512] ? syscall_enter_from_user_mode+0x2e/0x220 [ 62.826077][ T3512] do_syscall_64+0x3d/0xb0 [ 62.830494][ T3512] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 62.836499][ T3512] RIP: 0033:0x7fab318528b9 [ 62.840904][ T3512] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 62.860504][ T3512] RSP: 002b:00007ffd6cdd1d68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 62.868910][ T3512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fab318528b9 [ 62.876880][ T3512] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 62.884843][ T3512] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd6cdd1de0 [ 62.892804][ T3512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 62.900763][ T3512] R13: 00007ffd6cdd1f68 R14: 0000000000000001 R15: 0000000000000001 [ 62.908730][ T3512]