Warning: Permanently added '10.128.1.56' (ED25519) to the list of known hosts. executing program [ 65.624374][ T3510] [ 65.626753][ T3510] ===================================================== [ 65.633718][ T3510] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 65.641284][ T3510] 6.1.45-syzkaller #0 Not tainted [ 65.646339][ T3510] ----------------------------------------------------- [ 65.653317][ T3510] syz-executor418/3510 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 65.661564][ T3510] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 65.670676][ T3510] [ 65.670676][ T3510] and this task is already holding: [ 65.678145][ T3510] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 65.687475][ T3510] which would create a new lock dependency: [ 65.693385][ T3510] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 65.701185][ T3510] [ 65.701185][ T3510] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 65.710679][ T3510] (noop_qdisc.q.lock){+.-.}-{2:2} [ 65.710706][ T3510] [ 65.710706][ T3510] ... which became SOFTIRQ-irq-safe at: [ 65.723822][ T3510] lock_acquire+0x1f8/0x5a0 [ 65.728522][ T3510] _raw_spin_lock+0x2a/0x40 [ 65.733303][ T3510] net_tx_action+0x752/0x970 [ 65.738162][ T3510] __do_softirq+0x2e9/0xa4c [ 65.742779][ T3510] do_softirq+0x162/0x240 [ 65.747207][ T3510] __local_bh_enable_ip+0x1b1/0x1f0 [ 65.752515][ T3510] dev_deactivate_many+0x3b4/0xaf0 [ 65.757810][ T3510] dev_deactivate+0x177/0x270 [ 65.762580][ T3510] linkwatch_do_dev+0x104/0x160 [ 65.767522][ T3510] __linkwatch_run_queue+0x448/0x6b0 [ 65.772910][ T3510] linkwatch_event+0x48/0x50 [ 65.777615][ T3510] process_one_work+0x8aa/0x11f0 [ 65.782658][ T3510] worker_thread+0xa5f/0x1210 [ 65.789040][ T3510] kthread+0x26e/0x300 [ 65.793232][ T3510] ret_from_fork+0x1f/0x30 [ 65.798213][ T3510] [ 65.798213][ T3510] to a SOFTIRQ-irq-unsafe lock: [ 65.805239][ T3510] (fs_reclaim){+.+.}-{0:0} [ 65.805267][ T3510] [ 65.805267][ T3510] ... which became SOFTIRQ-irq-unsafe at: [ 65.817900][ T3510] ... [ 65.817907][ T3510] lock_acquire+0x1f8/0x5a0 [ 65.825374][ T3510] fs_reclaim_acquire+0x83/0x120 [ 65.830578][ T3510] slab_pre_alloc_hook+0x2a/0x2a0 [ 65.835701][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 65.841257][ T3510] kmalloc_trace+0x26/0xe0 [ 65.845762][ T3510] alloc_workqueue_attrs+0x46/0xc0 [ 65.851148][ T3510] wq_numa_init+0x122/0x4b0 [ 65.855762][ T3510] workqueue_init+0x22/0x59d [ 65.860453][ T3510] kernel_init_freeable+0x40a/0x61f [ 65.865833][ T3510] kernel_init+0x19/0x290 [ 65.870273][ T3510] ret_from_fork+0x1f/0x30 [ 65.874811][ T3510] [ 65.874811][ T3510] other info that might help us debug this: [ 65.874811][ T3510] [ 65.885507][ T3510] Possible interrupt unsafe locking scenario: [ 65.885507][ T3510] [ 65.893839][ T3510] CPU0 CPU1 [ 65.899207][ T3510] ---- ---- [ 65.904587][ T3510] lock(fs_reclaim); [ 65.908574][ T3510] local_irq_disable(); [ 65.915846][ T3510] lock(noop_qdisc.q.lock); [ 65.922975][ T3510] lock(fs_reclaim); [ 65.929491][ T3510] [ 65.932955][ T3510] lock(noop_qdisc.q.lock); [ 65.937730][ T3510] [ 65.937730][ T3510] *** DEADLOCK *** [ 65.937730][ T3510] [ 65.946047][ T3510] 2 locks held by syz-executor418/3510: [ 65.951768][ T3510] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 65.961269][ T3510] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 65.970942][ T3510] [ 65.970942][ T3510] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 65.981709][ T3510] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 65.987189][ T3510] HARDIRQ-ON-W at: [ 65.991169][ T3510] lock_acquire+0x1f8/0x5a0 [ 65.997342][ T3510] _raw_spin_lock+0x2a/0x40 [ 66.003614][ T3510] __dev_queue_xmit+0xd50/0x3c90 [ 66.010229][ T3510] tx+0x66/0x100 [ 66.015520][ T3510] kthread+0x234/0x440 [ 66.021265][ T3510] kthread+0x26e/0x300 [ 66.026989][ T3510] ret_from_fork+0x1f/0x30 [ 66.033086][ T3510] IN-SOFTIRQ-W at: [ 66.037076][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.043230][ T3510] _raw_spin_lock+0x2a/0x40 [ 66.049393][ T3510] net_tx_action+0x752/0x970 [ 66.055637][ T3510] __do_softirq+0x2e9/0xa4c [ 66.061821][ T3510] do_softirq+0x162/0x240 [ 66.067830][ T3510] __local_bh_enable_ip+0x1b1/0x1f0 [ 66.074709][ T3510] dev_deactivate_many+0x3b4/0xaf0 [ 66.081489][ T3510] dev_deactivate+0x177/0x270 [ 66.087825][ T3510] linkwatch_do_dev+0x104/0x160 [ 66.094336][ T3510] __linkwatch_run_queue+0x448/0x6b0 [ 66.101275][ T3510] linkwatch_event+0x48/0x50 [ 66.107517][ T3510] process_one_work+0x8aa/0x11f0 [ 66.114121][ T3510] worker_thread+0xa5f/0x1210 [ 66.120542][ T3510] kthread+0x26e/0x300 [ 66.126264][ T3510] ret_from_fork+0x1f/0x30 [ 66.132426][ T3510] INITIAL USE at: [ 66.136331][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.142400][ T3510] _raw_spin_lock+0x2a/0x40 [ 66.148492][ T3510] __dev_queue_xmit+0xd50/0x3c90 [ 66.155054][ T3510] tx+0x66/0x100 [ 66.160173][ T3510] kthread+0x234/0x440 [ 66.165812][ T3510] kthread+0x26e/0x300 [ 66.171446][ T3510] ret_from_fork+0x1f/0x30 [ 66.177443][ T3510] } [ 66.179942][ T3510] ... key at: [] noop_qdisc+0x108/0x320 [ 66.187578][ T3510] [ 66.187578][ T3510] the dependencies between the lock to be acquired [ 66.187586][ T3510] and SOFTIRQ-irq-unsafe lock: [ 66.201190][ T3510] -> (fs_reclaim){+.+.}-{0:0} { [ 66.206082][ T3510] HARDIRQ-ON-W at: [ 66.210081][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.216235][ T3510] fs_reclaim_acquire+0x83/0x120 [ 66.222823][ T3510] slab_pre_alloc_hook+0x2a/0x2a0 [ 66.229501][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 66.236534][ T3510] kmalloc_trace+0x26/0xe0 [ 66.242602][ T3510] alloc_workqueue_attrs+0x46/0xc0 [ 66.249453][ T3510] wq_numa_init+0x122/0x4b0 [ 66.255613][ T3510] workqueue_init+0x22/0x59d [ 66.261862][ T3510] kernel_init_freeable+0x40a/0x61f [ 66.268756][ T3510] kernel_init+0x19/0x290 [ 66.274767][ T3510] ret_from_fork+0x1f/0x30 [ 66.280931][ T3510] SOFTIRQ-ON-W at: [ 66.284916][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.291069][ T3510] fs_reclaim_acquire+0x83/0x120 [ 66.297657][ T3510] slab_pre_alloc_hook+0x2a/0x2a0 [ 66.304338][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 66.311463][ T3510] kmalloc_trace+0x26/0xe0 [ 66.317533][ T3510] alloc_workqueue_attrs+0x46/0xc0 [ 66.324300][ T3510] wq_numa_init+0x122/0x4b0 [ 66.330460][ T3510] workqueue_init+0x22/0x59d [ 66.336712][ T3510] kernel_init_freeable+0x40a/0x61f [ 66.343567][ T3510] kernel_init+0x19/0x290 [ 66.349553][ T3510] ret_from_fork+0x1f/0x30 [ 66.355633][ T3510] INITIAL USE at: [ 66.359534][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.365605][ T3510] fs_reclaim_acquire+0x83/0x120 [ 66.372134][ T3510] slab_pre_alloc_hook+0x2a/0x2a0 [ 66.378863][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 66.385837][ T3510] kmalloc_trace+0x26/0xe0 [ 66.391822][ T3510] alloc_workqueue_attrs+0x46/0xc0 [ 66.398501][ T3510] wq_numa_init+0x122/0x4b0 [ 66.404575][ T3510] workqueue_init+0x22/0x59d [ 66.410738][ T3510] kernel_init_freeable+0x40a/0x61f [ 66.417506][ T3510] kernel_init+0x19/0x290 [ 66.423431][ T3510] ret_from_fork+0x1f/0x30 [ 66.429450][ T3510] } [ 66.431959][ T3510] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 66.439957][ T3510] ... acquired at: [ 66.443760][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.448454][ T3510] fs_reclaim_acquire+0x83/0x120 [ 66.453661][ T3510] slab_pre_alloc_hook+0x2a/0x2a0 [ 66.458866][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 66.464420][ T3510] __kmalloc_node+0xa2/0x230 [ 66.469187][ T3510] kvmalloc_node+0x6e/0x180 [ 66.473865][ T3510] get_dist_table+0x91/0x380 [ 66.478636][ T3510] netem_change+0x947/0x1ea0 [ 66.483579][ T3510] netem_init+0x58/0xb0 [ 66.487914][ T3510] qdisc_create+0x8a1/0x1220 [ 66.492688][ T3510] tc_modify_qdisc+0x9e0/0x1da0 [ 66.497718][ T3510] rtnetlink_rcv_msg+0x776/0xf00 [ 66.502921][ T3510] netlink_rcv_skb+0x1cd/0x410 [ 66.507872][ T3510] netlink_unicast+0x7bf/0x990 [ 66.512817][ T3510] netlink_sendmsg+0xa26/0xd60 [ 66.517762][ T3510] ____sys_sendmsg+0x59e/0x8f0 [ 66.522710][ T3510] __sys_sendmsg+0x2a9/0x390 [ 66.527480][ T3510] do_syscall_64+0x3d/0xb0 [ 66.532079][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.538176][ T3510] [ 66.540508][ T3510] [ 66.540508][ T3510] stack backtrace: [ 66.546486][ T3510] CPU: 0 PID: 3510 Comm: syz-executor418 Not tainted 6.1.45-syzkaller #0 [ 66.554902][ T3510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 66.565403][ T3510] Call Trace: [ 66.568691][ T3510] [ 66.571628][ T3510] dump_stack_lvl+0x1e3/0x2cb [ 66.576323][ T3510] ? nf_tcp_handle_invalid+0x642/0x642 [ 66.581794][ T3510] ? panic+0x75d/0x75d [ 66.586216][ T3510] ? print_shortest_lock_dependencies+0xee/0x150 [ 66.592552][ T3510] validate_chain+0x4d2e/0x58e0 [ 66.597428][ T3510] ? reacquire_held_locks+0x660/0x660 [ 66.602831][ T3510] ? validate_chain+0x115/0x58e0 [ 66.607783][ T3510] ? mark_lock+0x9a/0x340 [ 66.612152][ T3510] __lock_acquire+0x125b/0x1f80 [ 66.617016][ T3510] lock_acquire+0x1f8/0x5a0 [ 66.621529][ T3510] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 66.626827][ T3510] ? read_lock_is_recursive+0x10/0x10 [ 66.632202][ T3510] ? __lock_acquire+0x125b/0x1f80 [ 66.637262][ T3510] fs_reclaim_acquire+0x83/0x120 [ 66.642230][ T3510] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 66.647521][ T3510] slab_pre_alloc_hook+0x2a/0x2a0 [ 66.652555][ T3510] ? kvmalloc_node+0x6e/0x180 [ 66.657244][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 66.662623][ T3510] ? kvmalloc_node+0x6e/0x180 [ 66.667299][ T3510] __kmalloc_node+0xa2/0x230 [ 66.671894][ T3510] kvmalloc_node+0x6e/0x180 [ 66.676414][ T3510] get_dist_table+0x91/0x380 [ 66.681026][ T3510] netem_change+0x947/0x1ea0 [ 66.685630][ T3510] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 66.691614][ T3510] ? netem_destroy+0xb0/0xb0 [ 66.696217][ T3510] ? do_raw_spin_unlock+0x137/0x8a0 [ 66.701438][ T3510] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 66.707341][ T3510] ? lockdep_hardirqs_on+0x94/0x130 [ 66.712552][ T3510] ? memset+0x1f/0x40 [ 66.716638][ T3510] ? __hrtimer_init+0x181/0x260 [ 66.721502][ T3510] netem_init+0x58/0xb0 [ 66.725668][ T3510] ? qdisc_peek_dequeued+0x220/0x220 [ 66.730961][ T3510] qdisc_create+0x8a1/0x1220 [ 66.735565][ T3510] ? qdisc_notify+0x390/0x390 [ 66.740252][ T3510] tc_modify_qdisc+0x9e0/0x1da0 [ 66.745134][ T3510] ? rcu_lock_release+0x20/0x20 [ 66.750000][ T3510] ? rcu_lock_release+0x20/0x20 [ 66.754859][ T3510] rtnetlink_rcv_msg+0x776/0xf00 [ 66.759805][ T3510] ? rtnetlink_bind+0x80/0x80 [ 66.764594][ T3510] ? stack_trace_save+0x1c0/0x1c0 [ 66.769640][ T3510] ? kernel_text_address+0x9f/0xd0 [ 66.774771][ T3510] ? __kernel_text_address+0x9/0x40 [ 66.779983][ T3510] ? unwind_get_return_address+0x49/0x80 [ 66.785640][ T3510] ? arch_stack_walk+0xf3/0x140 [ 66.790517][ T3510] ? mark_lock+0x9a/0x340 [ 66.794870][ T3510] ? mark_lock+0x9a/0x340 [ 66.799200][ T3510] ? __lock_acquire+0x125b/0x1f80 [ 66.804274][ T3510] netlink_rcv_skb+0x1cd/0x410 [ 66.809045][ T3510] ? rtnetlink_bind+0x80/0x80 [ 66.813726][ T3510] ? netlink_ack+0xe60/0xe60 [ 66.818326][ T3510] netlink_unicast+0x7bf/0x990 [ 66.823185][ T3510] ? netlink_detachskb+0x90/0x90 [ 66.828125][ T3510] ? __virt_addr_valid+0x22b/0x2e0 [ 66.833277][ T3510] ? __phys_addr_symbol+0x2b/0x70 [ 66.838417][ T3510] ? __check_object_size+0x4dd/0xa30 [ 66.843710][ T3510] ? bpf_lsm_netlink_send+0x5/0x10 [ 66.848827][ T3510] netlink_sendmsg+0xa26/0xd60 [ 66.853631][ T3510] ? netlink_getsockopt+0x5b0/0x5b0 [ 66.858835][ T3510] ? aa_sock_msg_perm+0x91/0x150 [ 66.863776][ T3510] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 66.869079][ T3510] ? security_socket_sendmsg+0x7d/0xa0 [ 66.874546][ T3510] ? netlink_getsockopt+0x5b0/0x5b0 [ 66.879768][ T3510] ____sys_sendmsg+0x59e/0x8f0 [ 66.884557][ T3510] ? __sys_sendmsg_sock+0x30/0x30 [ 66.889678][ T3510] __sys_sendmsg+0x2a9/0x390 [ 66.894294][ T3510] ? ____sys_sendmsg+0x8f0/0x8f0 [ 66.899272][ T3510] ? _copy_to_user+0xe9/0x130 [ 66.903963][ T3510] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 66.910046][ T3510] ? syscall_enter_from_user_mode+0x2e/0x220 [ 66.916143][ T3510] ? lockdep_hardirqs_on+0x94/0x130 [ 66.921348][ T3510] ? syscall_enter_from_user_mode+0x2e/0x220 [ 66.927339][ T3510] do_syscall_64+0x3d/0xb0 [ 66.931855][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 66.937783][ T3510] RIP: 0033:0x7f3ba51778b9 [ 66.942200][ T3510] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 66.961809][ T3510] RSP: 002b:00007fff5eea1348 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 66.970226][ T3510] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3ba51778b9 [ 66.978198][ T3510] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 66.986188][ T3510] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fff5eea13c0 [ 66.994189][ T3510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.002159][ T3510] R13: 00007fff5eea1548 R14: 0000000000000001 R15: 0000000000000001 [ 67.010153][ T3510] [ 67.013280][ T3510] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 67.022867][ T3510] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3510, name: syz-executor418 [ 67.032373][ T3510] preempt_count: 201, expected: 0 [ 67.037421][ T3510] RCU nest depth: 0, expected: 0 [ 67.042434][ T3510] INFO: lockdep is turned off. [ 67.047293][ T3510] Preemption disabled at: [ 67.047305][ T3510] [<0000000000000000>] 0x0 [ 67.056205][ T3510] CPU: 0 PID: 3510 Comm: syz-executor418 Not tainted 6.1.45-syzkaller #0 [ 67.064625][ T3510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 67.074676][ T3510] Call Trace: [ 67.077951][ T3510] [ 67.080885][ T3510] dump_stack_lvl+0x1e3/0x2cb [ 67.085616][ T3510] ? nf_tcp_handle_invalid+0x642/0x642 [ 67.091355][ T3510] ? panic+0x75d/0x75d [ 67.095436][ T3510] ? rcu_is_watching+0x11/0xb0 [ 67.100204][ T3510] __might_resched+0x5cb/0x780 [ 67.104976][ T3510] ? __might_sleep+0xb0/0xb0 [ 67.109583][ T3510] slab_pre_alloc_hook+0x4a/0x2a0 [ 67.114626][ T3510] ? kvmalloc_node+0x6e/0x180 [ 67.119304][ T3510] __kmem_cache_alloc_node+0x47/0x260 [ 67.124679][ T3510] ? kvmalloc_node+0x6e/0x180 [ 67.129379][ T3510] __kmalloc_node+0xa2/0x230 [ 67.135450][ T3510] kvmalloc_node+0x6e/0x180 [ 67.139957][ T3510] get_dist_table+0x91/0x380 [ 67.144551][ T3510] netem_change+0x947/0x1ea0 [ 67.149144][ T3510] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 67.155144][ T3510] ? netem_destroy+0xb0/0xb0 [ 67.159744][ T3510] ? do_raw_spin_unlock+0x137/0x8a0 [ 67.164952][ T3510] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 67.170864][ T3510] ? lockdep_hardirqs_on+0x94/0x130 [ 67.176078][ T3510] ? memset+0x1f/0x40 [ 67.180081][ T3510] ? __hrtimer_init+0x181/0x260 [ 67.184952][ T3510] netem_init+0x58/0xb0 [ 67.189115][ T3510] ? qdisc_peek_dequeued+0x220/0x220 [ 67.194442][ T3510] qdisc_create+0x8a1/0x1220 [ 67.199042][ T3510] ? qdisc_notify+0x390/0x390 [ 67.203763][ T3510] tc_modify_qdisc+0x9e0/0x1da0 [ 67.208632][ T3510] ? rcu_lock_release+0x20/0x20 [ 67.213500][ T3510] ? rcu_lock_release+0x20/0x20 [ 67.218451][ T3510] rtnetlink_rcv_msg+0x776/0xf00 [ 67.223412][ T3510] ? rtnetlink_bind+0x80/0x80 [ 67.228090][ T3510] ? stack_trace_save+0x1c0/0x1c0 [ 67.233116][ T3510] ? kernel_text_address+0x9f/0xd0 [ 67.238239][ T3510] ? __kernel_text_address+0x9/0x40 [ 67.243457][ T3510] ? unwind_get_return_address+0x49/0x80 [ 67.249101][ T3510] ? arch_stack_walk+0xf3/0x140 [ 67.253962][ T3510] ? mark_lock+0x9a/0x340 [ 67.258299][ T3510] ? mark_lock+0x9a/0x340 [ 67.262632][ T3510] ? __lock_acquire+0x125b/0x1f80 [ 67.267672][ T3510] netlink_rcv_skb+0x1cd/0x410 [ 67.272630][ T3510] ? rtnetlink_bind+0x80/0x80 [ 67.277322][ T3510] ? netlink_ack+0xe60/0xe60 [ 67.281927][ T3510] netlink_unicast+0x7bf/0x990 [ 67.286700][ T3510] ? netlink_detachskb+0x90/0x90 [ 67.291659][ T3510] ? __virt_addr_valid+0x22b/0x2e0 [ 67.296809][ T3510] ? __phys_addr_symbol+0x2b/0x70 [ 67.301851][ T3510] ? __check_object_size+0x4dd/0xa30 [ 67.307143][ T3510] ? bpf_lsm_netlink_send+0x5/0x10 [ 67.312529][ T3510] netlink_sendmsg+0xa26/0xd60 [ 67.317319][ T3510] ? netlink_getsockopt+0x5b0/0x5b0 [ 67.322553][ T3510] ? aa_sock_msg_perm+0x91/0x150 [ 67.327502][ T3510] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 67.332787][ T3510] ? security_socket_sendmsg+0x7d/0xa0 [ 67.338254][ T3510] ? netlink_getsockopt+0x5b0/0x5b0 [ 67.343456][ T3510] ____sys_sendmsg+0x59e/0x8f0 [ 67.348228][ T3510] ? __sys_sendmsg_sock+0x30/0x30 [ 67.353347][ T3510] __sys_sendmsg+0x2a9/0x390 [ 67.358030][ T3510] ? ____sys_sendmsg+0x8f0/0x8f0 [ 67.362975][ T3510] ? _copy_to_user+0xe9/0x130 [ 67.367658][ T3510] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 67.373649][ T3510] ? syscall_enter_from_user_mode+0x2e/0x220 [ 67.379640][ T3510] ? lockdep_hardirqs_on+0x94/0x130 [ 67.384932][ T3510] ? syscall_enter_from_user_mode+0x2e/0x220 [ 67.390917][ T3510] do_syscall_64+0x3d/0xb0 [ 67.395345][ T3510] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 67.401250][ T3510] RIP: 0033:0x7f3ba51778b9 [ 67.405668][ T3510] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 67.425276][ T3510] RSP: 002b:00007fff5eea1348 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 67.433693][ T3510] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f3ba51778b9 [ 67.441667][ T3510] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 67.449640][ T3510] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fff5eea13c0 [ 67.457614][ T3510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 67.465583][ T3510] R13: 00007fff5eea1548 R14: 0000000000000001 R15: 0000000000000001 [ 67.473595][ T3510]