Warning: Permanently added '10.128.1.73' (ED25519) to the list of known hosts. executing program [ 51.466548][ T3507] [ 51.468929][ T3507] ===================================================== [ 51.475861][ T3507] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 51.483304][ T3507] 6.1.45-syzkaller #0 Not tainted [ 51.488305][ T3507] ----------------------------------------------------- [ 51.495258][ T3507] syz-executor366/3507 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 51.503318][ T3507] ffffffff8d203400 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x2a/0x2a0 [ 51.512379][ T3507] [ 51.512379][ T3507] and this task is already holding: [ 51.519746][ T3507] ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 51.529934][ T3507] which would create a new lock dependency: [ 51.535810][ T3507] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 51.543398][ T3507] [ 51.543398][ T3507] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 51.552859][ T3507] (noop_qdisc.q.lock){+.-.}-{2:2} [ 51.552885][ T3507] [ 51.552885][ T3507] ... which became SOFTIRQ-irq-safe at: [ 51.565952][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.570652][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.575264][ T3507] net_tx_action+0x752/0x970 [ 51.580052][ T3507] __do_softirq+0x2e9/0xa4c [ 51.584644][ T3507] do_softirq+0x162/0x240 [ 51.589064][ T3507] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.594365][ T3507] dev_deactivate_many+0x3b4/0xaf0 [ 51.599649][ T3507] dev_deactivate+0x177/0x270 [ 51.604412][ T3507] linkwatch_do_dev+0x104/0x160 [ 51.609347][ T3507] __linkwatch_run_queue+0x448/0x6b0 [ 51.614711][ T3507] linkwatch_event+0x48/0x50 [ 51.619389][ T3507] process_one_work+0x8aa/0x11f0 [ 51.624422][ T3507] worker_thread+0xa5f/0x1210 [ 51.629199][ T3507] kthread+0x26e/0x300 [ 51.633447][ T3507] ret_from_fork+0x1f/0x30 [ 51.637948][ T3507] [ 51.637948][ T3507] to a SOFTIRQ-irq-unsafe lock: [ 51.644953][ T3507] (fs_reclaim){+.+.}-{0:0} [ 51.644976][ T3507] [ 51.644976][ T3507] ... which became SOFTIRQ-irq-unsafe at: [ 51.657332][ T3507] ... [ 51.657338][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.664662][ T3507] fs_reclaim_acquire+0x83/0x120 [ 51.669942][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 51.675586][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 51.681425][ T3507] kmalloc_trace+0x26/0xe0 [ 51.685966][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 51.691777][ T3507] wq_numa_init+0x122/0x4b0 [ 51.696445][ T3507] workqueue_init+0x22/0x59d [ 51.701323][ T3507] kernel_init_freeable+0x40a/0x61f [ 51.706635][ T3507] kernel_init+0x19/0x290 [ 51.711119][ T3507] ret_from_fork+0x1f/0x30 [ 51.715737][ T3507] [ 51.715737][ T3507] other info that might help us debug this: [ 51.715737][ T3507] [ 51.727717][ T3507] Possible interrupt unsafe locking scenario: [ 51.727717][ T3507] [ 51.736024][ T3507] CPU0 CPU1 [ 51.741378][ T3507] ---- ---- [ 51.746839][ T3507] lock(fs_reclaim); [ 51.750856][ T3507] local_irq_disable(); [ 51.758644][ T3507] lock(noop_qdisc.q.lock); [ 51.765748][ T3507] lock(fs_reclaim); [ 51.772238][ T3507] [ 51.775703][ T3507] lock(noop_qdisc.q.lock); [ 51.780481][ T3507] [ 51.780481][ T3507] *** DEADLOCK *** [ 51.780481][ T3507] [ 51.788625][ T3507] 2 locks held by syz-executor366/3507: [ 51.794156][ T3507] #0: ffffffff8e2988e8 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x720/0xf00 [ 51.803552][ T3507] #1: ffffffff8e2df488 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x17e/0x1ea0 [ 51.813290][ T3507] [ 51.813290][ T3507] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 51.823942][ T3507] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 51.829605][ T3507] HARDIRQ-ON-W at: [ 51.833570][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.839948][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.846266][ T3507] __dev_queue_xmit+0xd50/0x3c90 [ 51.852842][ T3507] tx+0x66/0x100 [ 51.858203][ T3507] kthread+0x234/0x440 [ 51.864013][ T3507] kthread+0x26e/0x300 [ 51.869745][ T3507] ret_from_fork+0x1f/0x30 [ 51.875803][ T3507] IN-SOFTIRQ-W at: [ 51.879784][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.885925][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.892070][ T3507] net_tx_action+0x752/0x970 [ 51.898302][ T3507] __do_softirq+0x2e9/0xa4c [ 51.904444][ T3507] do_softirq+0x162/0x240 [ 51.910500][ T3507] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.917349][ T3507] dev_deactivate_many+0x3b4/0xaf0 [ 51.924107][ T3507] dev_deactivate+0x177/0x270 [ 51.930428][ T3507] linkwatch_do_dev+0x104/0x160 [ 51.937180][ T3507] __linkwatch_run_queue+0x448/0x6b0 [ 51.944190][ T3507] linkwatch_event+0x48/0x50 [ 51.950467][ T3507] process_one_work+0x8aa/0x11f0 [ 51.957061][ T3507] worker_thread+0xa5f/0x1210 [ 51.963569][ T3507] kthread+0x26e/0x300 [ 51.969282][ T3507] ret_from_fork+0x1f/0x30 [ 51.975707][ T3507] INITIAL USE at: [ 51.979692][ T3507] lock_acquire+0x1f8/0x5a0 [ 51.985751][ T3507] _raw_spin_lock+0x2a/0x40 [ 51.992009][ T3507] __dev_queue_xmit+0xd50/0x3c90 [ 51.998523][ T3507] tx+0x66/0x100 [ 52.003750][ T3507] kthread+0x234/0x440 [ 52.009494][ T3507] kthread+0x26e/0x300 [ 52.015216][ T3507] ret_from_fork+0x1f/0x30 [ 52.021191][ T3507] } [ 52.023697][ T3507] ... key at: [] noop_qdisc+0x108/0x320 [ 52.031343][ T3507] [ 52.031343][ T3507] the dependencies between the lock to be acquired [ 52.031352][ T3507] and SOFTIRQ-irq-unsafe lock: [ 52.044850][ T3507] -> (fs_reclaim){+.+.}-{0:0} { [ 52.049979][ T3507] HARDIRQ-ON-W at: [ 52.059347][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.065845][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.072812][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.079567][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.086586][ T3507] kmalloc_trace+0x26/0xe0 [ 52.092645][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 52.099396][ T3507] wq_numa_init+0x122/0x4b0 [ 52.105549][ T3507] workqueue_init+0x22/0x59d [ 52.111826][ T3507] kernel_init_freeable+0x40a/0x61f [ 52.118684][ T3507] kernel_init+0x19/0x290 [ 52.125025][ T3507] ret_from_fork+0x1f/0x30 [ 52.131104][ T3507] SOFTIRQ-ON-W at: [ 52.135085][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.141231][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.147806][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.154471][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.161580][ T3507] kmalloc_trace+0x26/0xe0 [ 52.168162][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 52.175001][ T3507] wq_numa_init+0x122/0x4b0 [ 52.181149][ T3507] workqueue_init+0x22/0x59d [ 52.187489][ T3507] kernel_init_freeable+0x40a/0x61f [ 52.194341][ T3507] kernel_init+0x19/0x290 [ 52.200313][ T3507] ret_from_fork+0x1f/0x30 [ 52.206392][ T3507] INITIAL USE at: [ 52.210286][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.216363][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.222863][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.229454][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.236398][ T3507] kmalloc_trace+0x26/0xe0 [ 52.242379][ T3507] alloc_workqueue_attrs+0x46/0xc0 [ 52.249051][ T3507] wq_numa_init+0x122/0x4b0 [ 52.255227][ T3507] workqueue_init+0x22/0x59d [ 52.261495][ T3507] kernel_init_freeable+0x40a/0x61f [ 52.268345][ T3507] kernel_init+0x19/0x290 [ 52.274240][ T3507] ret_from_fork+0x1f/0x30 [ 52.280387][ T3507] } [ 52.282871][ T3507] ... key at: [] __fs_reclaim_map+0x0/0xe0 [ 52.291194][ T3507] ... acquired at: [ 52.294982][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.299648][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.304897][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.310101][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.315648][ T3507] __kmalloc_node+0xa2/0x230 [ 52.320403][ T3507] kvmalloc_node+0x6e/0x180 [ 52.325069][ T3507] get_dist_table+0x91/0x380 [ 52.329825][ T3507] netem_change+0x9a0/0x1ea0 [ 52.334595][ T3507] netem_init+0x58/0xb0 [ 52.338961][ T3507] qdisc_create+0x8a1/0x1220 [ 52.343724][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.348743][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.353848][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.358786][ T3507] netlink_unicast+0x7bf/0x990 [ 52.363712][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.368718][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.374251][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.379004][ T3507] do_syscall_64+0x3d/0xb0 [ 52.383675][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.389748][ T3507] [ 52.392071][ T3507] [ 52.392071][ T3507] stack backtrace: [ 52.398052][ T3507] CPU: 1 PID: 3507 Comm: syz-executor366 Not tainted 6.1.45-syzkaller #0 [ 52.406551][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.419879][ T3507] Call Trace: [ 52.423155][ T3507] [ 52.426084][ T3507] dump_stack_lvl+0x1e3/0x2cb [ 52.430769][ T3507] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.436226][ T3507] ? panic+0x75d/0x75d [ 52.445518][ T3507] ? print_shortest_lock_dependencies+0xee/0x150 [ 52.451852][ T3507] validate_chain+0x4d2e/0x58e0 [ 52.456886][ T3507] ? reacquire_held_locks+0x660/0x660 [ 52.462779][ T3507] ? validate_chain+0x115/0x58e0 [ 52.467806][ T3507] ? mark_lock+0x9a/0x340 [ 52.472324][ T3507] __lock_acquire+0x125b/0x1f80 [ 52.477280][ T3507] lock_acquire+0x1f8/0x5a0 [ 52.481809][ T3507] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 52.487211][ T3507] ? read_lock_is_recursive+0x10/0x10 [ 52.492692][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.497729][ T3507] fs_reclaim_acquire+0x83/0x120 [ 52.502672][ T3507] ? slab_pre_alloc_hook+0x2a/0x2a0 [ 52.508325][ T3507] slab_pre_alloc_hook+0x2a/0x2a0 [ 52.513372][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.518058][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.523438][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.528115][ T3507] __kmalloc_node+0xa2/0x230 [ 52.532697][ T3507] kvmalloc_node+0x6e/0x180 [ 52.537193][ T3507] get_dist_table+0x91/0x380 [ 52.541783][ T3507] netem_change+0x9a0/0x1ea0 [ 52.546372][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.552345][ T3507] ? netem_destroy+0xb0/0xb0 [ 52.556968][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 52.562280][ T3507] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 52.568173][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.573370][ T3507] ? memset+0x1f/0x40 [ 52.577348][ T3507] ? __hrtimer_init+0x181/0x260 [ 52.582248][ T3507] netem_init+0x58/0xb0 [ 52.586404][ T3507] ? qdisc_peek_dequeued+0x220/0x220 [ 52.591684][ T3507] qdisc_create+0x8a1/0x1220 [ 52.596272][ T3507] ? qdisc_notify+0x390/0x390 [ 52.600948][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 52.605812][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.610666][ T3507] ? rcu_lock_release+0x20/0x20 [ 52.615511][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 52.620454][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.625125][ T3507] ? stack_trace_save+0x1c0/0x1c0 [ 52.630141][ T3507] ? kernel_text_address+0x9f/0xd0 [ 52.635261][ T3507] ? __kernel_text_address+0x9/0x40 [ 52.640460][ T3507] ? unwind_get_return_address+0x49/0x80 [ 52.646176][ T3507] ? arch_stack_walk+0xf3/0x140 [ 52.651022][ T3507] ? mark_lock+0x9a/0x340 [ 52.655520][ T3507] ? mark_lock+0x9a/0x340 [ 52.660278][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 52.665405][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 52.670168][ T3507] ? rtnetlink_bind+0x80/0x80 [ 52.674837][ T3507] ? netlink_ack+0xe60/0xe60 [ 52.679424][ T3507] netlink_unicast+0x7bf/0x990 [ 52.684270][ T3507] ? netlink_detachskb+0x90/0x90 [ 52.689287][ T3507] ? __virt_addr_valid+0x22b/0x2e0 [ 52.694395][ T3507] ? __phys_addr_symbol+0x2b/0x70 [ 52.699414][ T3507] ? __check_object_size+0x4dd/0xa30 [ 52.704718][ T3507] ? bpf_lsm_netlink_send+0x5/0x10 [ 52.709871][ T3507] netlink_sendmsg+0xa26/0xd60 [ 52.714673][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.720240][ T3507] ? aa_sock_msg_perm+0x91/0x150 [ 52.725715][ T3507] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 52.731002][ T3507] ? security_socket_sendmsg+0x7d/0xa0 [ 52.736480][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.741692][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 52.746451][ T3507] ? __sys_sendmsg_sock+0x30/0x30 [ 52.751571][ T3507] __sys_sendmsg+0x2a9/0x390 [ 52.756175][ T3507] ? ____sys_sendmsg+0x8f0/0x8f0 [ 52.761126][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 52.767278][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.773253][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 52.778530][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 52.784500][ T3507] do_syscall_64+0x3d/0xb0 [ 52.788917][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 52.794845][ T3507] RIP: 0033:0x7f9706b6c4e9 [ 52.799355][ T3507] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.819140][ T3507] RSP: 002b:00007fffbc5b0148 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 52.828275][ T3507] RAX: ffffffffffffffda RBX: 00007fffbc5b0318 RCX: 00007f9706b6c4e9 [ 52.836414][ T3507] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 52.844494][ T3507] RBP: 00007f9706bdf610 R08: 00000000ffffffff R09: 00007fffbc5b0318 [ 52.853086][ T3507] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 52.861055][ T3507] R13: 00007fffbc5b0308 R14: 0000000000000001 R15: 0000000000000001 [ 52.869117][ T3507] [ 52.872424][ T3507] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 52.882159][ T3507] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3507, name: syz-executor366 [ 52.891735][ T3507] preempt_count: 201, expected: 0 [ 52.896869][ T3507] RCU nest depth: 0, expected: 0 [ 52.901939][ T3507] INFO: lockdep is turned off. [ 52.906686][ T3507] Preemption disabled at: [ 52.906692][ T3507] [<0000000000000000>] 0x0 [ 52.916511][ T3507] CPU: 1 PID: 3507 Comm: syz-executor366 Not tainted 6.1.45-syzkaller #0 [ 52.924921][ T3507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.934973][ T3507] Call Trace: [ 52.938430][ T3507] [ 52.941382][ T3507] dump_stack_lvl+0x1e3/0x2cb [ 52.946692][ T3507] ? nf_tcp_handle_invalid+0x642/0x642 [ 52.952160][ T3507] ? panic+0x75d/0x75d [ 52.956313][ T3507] ? rcu_is_watching+0x11/0xb0 [ 52.962327][ T3507] __might_resched+0x5cb/0x780 [ 52.967370][ T3507] ? __might_sleep+0xb0/0xb0 [ 52.972058][ T3507] slab_pre_alloc_hook+0x4a/0x2a0 [ 52.977076][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.981739][ T3507] __kmem_cache_alloc_node+0x47/0x260 [ 52.987101][ T3507] ? kvmalloc_node+0x6e/0x180 [ 52.991851][ T3507] __kmalloc_node+0xa2/0x230 [ 52.996466][ T3507] kvmalloc_node+0x6e/0x180 [ 53.001396][ T3507] get_dist_table+0x91/0x380 [ 53.006681][ T3507] netem_change+0x9a0/0x1ea0 [ 53.011302][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.017295][ T3507] ? netem_destroy+0xb0/0xb0 [ 53.021884][ T3507] ? do_raw_spin_unlock+0x137/0x8a0 [ 53.027079][ T3507] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 53.033064][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 53.038261][ T3507] ? memset+0x1f/0x40 [ 53.042244][ T3507] ? __hrtimer_init+0x181/0x260 [ 53.047091][ T3507] netem_init+0x58/0xb0 [ 53.051272][ T3507] ? qdisc_peek_dequeued+0x220/0x220 [ 53.056687][ T3507] qdisc_create+0x8a1/0x1220 [ 53.061553][ T3507] ? qdisc_notify+0x390/0x390 [ 53.066520][ T3507] tc_modify_qdisc+0x9e0/0x1da0 [ 53.071369][ T3507] ? rcu_lock_release+0x20/0x20 [ 53.076252][ T3507] ? rcu_lock_release+0x20/0x20 [ 53.081094][ T3507] rtnetlink_rcv_msg+0x776/0xf00 [ 53.086029][ T3507] ? rtnetlink_bind+0x80/0x80 [ 53.091827][ T3507] ? stack_trace_save+0x1c0/0x1c0 [ 53.096850][ T3507] ? kernel_text_address+0x9f/0xd0 [ 53.101954][ T3507] ? __kernel_text_address+0x9/0x40 [ 53.107148][ T3507] ? unwind_get_return_address+0x49/0x80 [ 53.112773][ T3507] ? arch_stack_walk+0xf3/0x140 [ 53.117642][ T3507] ? mark_lock+0x9a/0x340 [ 53.121967][ T3507] ? mark_lock+0x9a/0x340 [ 53.126286][ T3507] ? __lock_acquire+0x125b/0x1f80 [ 53.131317][ T3507] netlink_rcv_skb+0x1cd/0x410 [ 53.136269][ T3507] ? rtnetlink_bind+0x80/0x80 [ 53.140946][ T3507] ? netlink_ack+0xe60/0xe60 [ 53.145534][ T3507] netlink_unicast+0x7bf/0x990 [ 53.150392][ T3507] ? netlink_detachskb+0x90/0x90 [ 53.155418][ T3507] ? __virt_addr_valid+0x22b/0x2e0 [ 53.160873][ T3507] ? __phys_addr_symbol+0x2b/0x70 [ 53.165989][ T3507] ? __check_object_size+0x4dd/0xa30 [ 53.171277][ T3507] ? bpf_lsm_netlink_send+0x5/0x10 [ 53.176382][ T3507] netlink_sendmsg+0xa26/0xd60 [ 53.181144][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.187727][ T3507] ? aa_sock_msg_perm+0x91/0x150 [ 53.192721][ T3507] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 53.198251][ T3507] ? security_socket_sendmsg+0x7d/0xa0 [ 53.203880][ T3507] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.209074][ T3507] ____sys_sendmsg+0x59e/0x8f0 [ 53.213832][ T3507] ? __sys_sendmsg_sock+0x30/0x30 [ 53.219145][ T3507] __sys_sendmsg+0x2a9/0x390 [ 53.223747][ T3507] ? ____sys_sendmsg+0x8f0/0x8f0 [ 53.228697][ T3507] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 53.234680][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.240673][ T3507] ? lockdep_hardirqs_on+0x94/0x130 [ 53.245862][ T3507] ? syscall_enter_from_user_mode+0x2e/0x220 [ 53.256457][ T3507] do_syscall_64+0x3d/0xb0 [ 53.260980][ T3507] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 53.266889][ T3507] RIP: 0033:0x7f9706b6c4e9 [ 53.271297][ T3507] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.290990][ T3507] RSP: 002b:00007fffbc5b0148 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.299417][ T3507] RAX: ffffffffffffffda RBX: 00007fffbc5b0318 RCX: 00007f9706b6c4e9 [ 53.308871][ T3507] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 53.316846][ T3507] RBP: 00007f9706bdf610 R08: 00000000ffffffff R09: 00007fffbc5b0318 [ 53.324985][ T3507] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 53.332947][ T3507] R13: 00007fffbc5b0308 R14: 0000000000000001 R15: 0000000000000001 [ 53.340919][ T3507]