Warning: Permanently added '10.128.1.189' (ED25519) to the list of known hosts. executing program [ 51.330699][ T3488] netlink: 164 bytes leftover after parsing attributes in process `syz-executor347'. [ 51.340273][ T3488] [ 51.342600][ T3488] ===================================================== [ 51.349533][ T3488] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 51.356990][ T3488] 5.15.126-syzkaller #0 Not tainted [ 51.362168][ T3488] ----------------------------------------------------- [ 51.369079][ T3488] syz-executor347/3488 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 51.377129][ T3488] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 51.386091][ T3488] [ 51.386091][ T3488] and this task is already holding: [ 51.393537][ T3488] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 51.402740][ T3488] which would create a new lock dependency: [ 51.408608][ T3488] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 51.416157][ T3488] [ 51.416157][ T3488] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 51.425582][ T3488] (noop_qdisc.q.lock){+.-.}-{2:2} [ 51.425600][ T3488] [ 51.425600][ T3488] ... which became SOFTIRQ-irq-safe at: [ 51.438389][ T3488] lock_acquire+0x1db/0x4f0 [ 51.442969][ T3488] _raw_spin_lock+0x2a/0x40 [ 51.447544][ T3488] net_tx_action+0x6c5/0x8e0 [ 51.452294][ T3488] __do_softirq+0x3b3/0x93a [ 51.456874][ T3488] do_softirq+0x162/0x240 [ 51.461301][ T3488] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.466569][ T3488] dev_deactivate_many+0x524/0xbf0 [ 51.471752][ T3488] dev_deactivate+0x177/0x270 [ 51.476500][ T3488] linkwatch_do_dev+0x104/0x160 [ 51.481421][ T3488] __linkwatch_run_queue+0x4ca/0x7f0 [ 51.486775][ T3488] linkwatch_event+0x48/0x50 [ 51.491436][ T3488] process_one_work+0x8a1/0x10c0 [ 51.496447][ T3488] worker_thread+0xaca/0x1280 [ 51.501206][ T3488] kthread+0x3f6/0x4f0 [ 51.505349][ T3488] ret_from_fork+0x1f/0x30 [ 51.509986][ T3488] [ 51.509986][ T3488] to a SOFTIRQ-irq-unsafe lock: [ 51.516993][ T3488] (fs_reclaim){+.+.}-{0:0} [ 51.517015][ T3488] [ 51.517015][ T3488] ... which became SOFTIRQ-irq-unsafe at: [ 51.529364][ T3488] ... [ 51.529372][ T3488] lock_acquire+0x1db/0x4f0 [ 51.536623][ T3488] fs_reclaim_acquire+0x83/0x120 [ 51.541637][ T3488] slab_pre_alloc_hook+0x22/0xc0 [ 51.546647][ T3488] kmem_cache_alloc_trace+0x49/0x290 [ 51.552022][ T3488] wq_numa_init+0x122/0x49f [ 51.556604][ T3488] workqueue_init+0x18/0x5e1 [ 51.561261][ T3488] kernel_init_freeable+0x40a/0x5c5 [ 51.566526][ T3488] kernel_init+0x19/0x290 [ 51.570925][ T3488] ret_from_fork+0x1f/0x30 [ 51.575414][ T3488] [ 51.575414][ T3488] other info that might help us debug this: [ 51.575414][ T3488] [ 51.585647][ T3488] Possible interrupt unsafe locking scenario: [ 51.585647][ T3488] [ 51.594067][ T3488] CPU0 CPU1 [ 51.599419][ T3488] ---- ---- [ 51.604767][ T3488] lock(fs_reclaim); [ 51.608739][ T3488] local_irq_disable(); [ 51.615485][ T3488] lock(noop_qdisc.q.lock); [ 51.622586][ T3488] lock(fs_reclaim); [ 51.629083][ T3488] [ 51.632524][ T3488] lock(noop_qdisc.q.lock); [ 51.637273][ T3488] [ 51.637273][ T3488] *** DEADLOCK *** [ 51.637273][ T3488] [ 51.645401][ T3488] 2 locks held by syz-executor347/3488: [ 51.650935][ T3488] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 51.660330][ T3488] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 51.669976][ T3488] [ 51.669976][ T3488] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 51.680381][ T3488] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 51.685839][ T3488] HARDIRQ-ON-W at: [ 51.689801][ T3488] lock_acquire+0x1db/0x4f0 [ 51.695941][ T3488] _raw_spin_lock+0x2a/0x40 [ 51.702087][ T3488] __dev_queue_xmit+0xad6/0x3230 [ 51.708664][ T3488] tx+0x64/0x100 [ 51.713845][ T3488] kthread+0x234/0x440 [ 51.719548][ T3488] kthread+0x3f6/0x4f0 [ 51.725257][ T3488] ret_from_fork+0x1f/0x30 [ 51.731312][ T3488] IN-SOFTIRQ-W at: [ 51.735287][ T3488] lock_acquire+0x1db/0x4f0 [ 51.741428][ T3488] _raw_spin_lock+0x2a/0x40 [ 51.747660][ T3488] net_tx_action+0x6c5/0x8e0 [ 51.753885][ T3488] __do_softirq+0x3b3/0x93a [ 51.760023][ T3488] do_softirq+0x162/0x240 [ 51.765986][ T3488] __local_bh_enable_ip+0x1b1/0x1f0 [ 51.772826][ T3488] dev_deactivate_many+0x524/0xbf0 [ 51.779578][ T3488] dev_deactivate+0x177/0x270 [ 51.785893][ T3488] linkwatch_do_dev+0x104/0x160 [ 51.792378][ T3488] __linkwatch_run_queue+0x4ca/0x7f0 [ 51.799297][ T3488] linkwatch_event+0x48/0x50 [ 51.805520][ T3488] process_one_work+0x8a1/0x10c0 [ 51.812092][ T3488] worker_thread+0xaca/0x1280 [ 51.818418][ T3488] kthread+0x3f6/0x4f0 [ 51.824120][ T3488] ret_from_fork+0x1f/0x30 [ 51.830176][ T3488] INITIAL USE at: [ 51.834052][ T3488] lock_acquire+0x1db/0x4f0 [ 51.840104][ T3488] _raw_spin_lock+0x2a/0x40 [ 51.846250][ T3488] __dev_queue_xmit+0xad6/0x3230 [ 51.852734][ T3488] tx+0x64/0x100 [ 51.857826][ T3488] kthread+0x234/0x440 [ 51.863450][ T3488] kthread+0x3f6/0x4f0 [ 51.869064][ T3488] ret_from_fork+0x1f/0x30 [ 51.875043][ T3488] } [ 51.877543][ T3488] ... key at: [] noop_qdisc+0x108/0x320 [ 51.885269][ T3488] [ 51.885269][ T3488] the dependencies between the lock to be acquired [ 51.885279][ T3488] and SOFTIRQ-irq-unsafe lock: [ 51.898777][ T3488] -> (fs_reclaim){+.+.}-{0:0} { [ 51.903637][ T3488] HARDIRQ-ON-W at: [ 51.907600][ T3488] lock_acquire+0x1db/0x4f0 [ 51.913748][ T3488] fs_reclaim_acquire+0x83/0x120 [ 51.920331][ T3488] slab_pre_alloc_hook+0x22/0xc0 [ 51.926908][ T3488] kmem_cache_alloc_trace+0x49/0x290 [ 51.933829][ T3488] wq_numa_init+0x122/0x49f [ 51.939973][ T3488] workqueue_init+0x18/0x5e1 [ 51.946199][ T3488] kernel_init_freeable+0x40a/0x5c5 [ 51.953123][ T3488] kernel_init+0x19/0x290 [ 51.959087][ T3488] ret_from_fork+0x1f/0x30 [ 51.965141][ T3488] SOFTIRQ-ON-W at: [ 51.969108][ T3488] lock_acquire+0x1db/0x4f0 [ 51.975252][ T3488] fs_reclaim_acquire+0x83/0x120 [ 51.981831][ T3488] slab_pre_alloc_hook+0x22/0xc0 [ 51.988412][ T3488] kmem_cache_alloc_trace+0x49/0x290 [ 51.995333][ T3488] wq_numa_init+0x122/0x49f [ 52.001473][ T3488] workqueue_init+0x18/0x5e1 [ 52.007700][ T3488] kernel_init_freeable+0x40a/0x5c5 [ 52.014533][ T3488] kernel_init+0x19/0x290 [ 52.020498][ T3488] ret_from_fork+0x1f/0x30 [ 52.026556][ T3488] INITIAL USE at: [ 52.030436][ T3488] lock_acquire+0x1db/0x4f0 [ 52.036492][ T3488] fs_reclaim_acquire+0x83/0x120 [ 52.042982][ T3488] slab_pre_alloc_hook+0x22/0xc0 [ 52.049466][ T3488] kmem_cache_alloc_trace+0x49/0x290 [ 52.056298][ T3488] wq_numa_init+0x122/0x49f [ 52.062347][ T3488] workqueue_init+0x18/0x5e1 [ 52.068488][ T3488] kernel_init_freeable+0x40a/0x5c5 [ 52.075231][ T3488] kernel_init+0x19/0x290 [ 52.081105][ T3488] ret_from_fork+0x1f/0x30 [ 52.087092][ T3488] } [ 52.089573][ T3488] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 52.097552][ T3488] ... acquired at: [ 52.101335][ T3488] lock_acquire+0x1db/0x4f0 [ 52.106085][ T3488] fs_reclaim_acquire+0x83/0x120 [ 52.111275][ T3488] slab_pre_alloc_hook+0x22/0xc0 [ 52.116370][ T3488] __kmalloc_node+0x71/0x390 [ 52.121124][ T3488] kvmalloc_node+0x80/0x140 [ 52.125800][ T3488] get_dist_table+0x83/0x2c0 [ 52.130549][ T3488] netem_change+0xa05/0x20c0 [ 52.135297][ T3488] netem_init+0x58/0xb0 [ 52.139610][ T3488] qdisc_create+0x8ae/0x1390 [ 52.144356][ T3488] tc_modify_qdisc+0xac5/0x1710 [ 52.149365][ T3488] rtnetlink_rcv_msg+0x993/0xee0 [ 52.154464][ T3488] netlink_rcv_skb+0x1cf/0x410 [ 52.159386][ T3488] netlink_unicast+0x7b6/0x980 [ 52.164312][ T3488] netlink_sendmsg+0xa30/0xd60 [ 52.169239][ T3488] ____sys_sendmsg+0x59e/0x8f0 [ 52.174161][ T3488] ___sys_sendmsg+0x252/0x2e0 [ 52.179000][ T3488] __se_sys_sendmsg+0x19a/0x260 [ 52.184014][ T3488] do_syscall_64+0x3d/0xb0 [ 52.188590][ T3488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.194748][ T3488] [ 52.197062][ T3488] [ 52.197062][ T3488] stack backtrace: [ 52.202933][ T3488] CPU: 0 PID: 3488 Comm: syz-executor347 Not tainted 5.15.126-syzkaller #0 [ 52.211507][ T3488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.221546][ T3488] Call Trace: [ 52.224816][ T3488] [ 52.227744][ T3488] dump_stack_lvl+0x1e3/0x2cb [ 52.232423][ T3488] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 52.238069][ T3488] ? panic+0x84d/0x84d [ 52.242248][ T3488] ? print_shortest_lock_dependencies+0xee/0x150 [ 52.248610][ T3488] validate_chain+0x4cfe/0x58b0 [ 52.253469][ T3488] ? reacquire_held_locks+0x660/0x660 [ 52.258835][ T3488] ? validate_chain+0x112/0x58b0 [ 52.263877][ T3488] ? printk_parse_prefix+0x2c0/0x2c0 [ 52.269153][ T3488] ? console_trylock+0x70/0x70 [ 52.273913][ T3488] ? reacquire_held_locks+0x660/0x660 [ 52.279276][ T3488] ? mark_lock+0x98/0x340 [ 52.283592][ T3488] __lock_acquire+0x1295/0x1ff0 [ 52.288463][ T3488] lock_acquire+0x1db/0x4f0 [ 52.292958][ T3488] ? slab_pre_alloc_hook+0x22/0xc0 [ 52.298059][ T3488] ? read_lock_is_recursive+0x10/0x10 [ 52.303425][ T3488] fs_reclaim_acquire+0x83/0x120 [ 52.308354][ T3488] ? slab_pre_alloc_hook+0x22/0xc0 [ 52.313452][ T3488] slab_pre_alloc_hook+0x22/0xc0 [ 52.318376][ T3488] __kmalloc_node+0x71/0x390 [ 52.322952][ T3488] ? kvmalloc_node+0x80/0x140 [ 52.327627][ T3488] ? __bpf_trace_softirq+0x10/0x10 [ 52.332746][ T3488] kvmalloc_node+0x80/0x140 [ 52.337235][ T3488] get_dist_table+0x83/0x2c0 [ 52.341811][ T3488] netem_change+0xa05/0x20c0 [ 52.346475][ T3488] ? netem_destroy+0xb0/0xb0 [ 52.351050][ T3488] ? debug_object_init+0x10/0x10 [ 52.355976][ T3488] ? memset+0x1f/0x40 [ 52.359943][ T3488] ? lockdep_init_map_type+0x9d/0x8d0 [ 52.365326][ T3488] ? memset+0x1f/0x40 [ 52.369292][ T3488] ? __hrtimer_init+0x181/0x260 [ 52.374141][ T3488] netem_init+0x58/0xb0 [ 52.378283][ T3488] ? qdisc_peek_dequeued+0x220/0x220 [ 52.383549][ T3488] qdisc_create+0x8ae/0x1390 [ 52.388131][ T3488] ? qdisc_notify+0x380/0x380 [ 52.392787][ T3488] ? apparmor_capable+0x12e/0x190 [ 52.397801][ T3488] tc_modify_qdisc+0xac5/0x1710 [ 52.402645][ T3488] ? rcu_lock_release+0x20/0x20 [ 52.407511][ T3488] ? rcu_lock_release+0x20/0x20 [ 52.412348][ T3488] rtnetlink_rcv_msg+0x993/0xee0 [ 52.417271][ T3488] ? reacquire_held_locks+0x660/0x660 [ 52.422742][ T3488] ? rtnetlink_bind+0x80/0x80 [ 52.427424][ T3488] ? is_bpf_text_address+0x24f/0x260 [ 52.432712][ T3488] ? stack_trace_save+0x1c0/0x1c0 [ 52.437737][ T3488] ? __kernel_text_address+0x94/0x100 [ 52.443103][ T3488] ? unwind_get_return_address+0x49/0x80 [ 52.448731][ T3488] ? arch_stack_walk+0xf3/0x140 [ 52.453574][ T3488] ? mark_lock+0x98/0x340 [ 52.457917][ T3488] ? mark_lock+0x98/0x340 [ 52.462797][ T3488] ? __lock_acquire+0x1295/0x1ff0 [ 52.467860][ T3488] netlink_rcv_skb+0x1cf/0x410 [ 52.472630][ T3488] ? rtnetlink_bind+0x80/0x80 [ 52.477325][ T3488] ? netlink_ack+0xb10/0xb10 [ 52.481937][ T3488] netlink_unicast+0x7b6/0x980 [ 52.486725][ T3488] ? netlink_detachskb+0x90/0x90 [ 52.491678][ T3488] ? 0xffffffff81000000 [ 52.495848][ T3488] ? __check_object_size+0x300/0x410 [ 52.501291][ T3488] ? bpf_lsm_netlink_send+0x5/0x10 [ 52.506417][ T3488] netlink_sendmsg+0xa30/0xd60 [ 52.511296][ T3488] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.516501][ T3488] ? aa_sock_msg_perm+0x91/0x150 [ 52.521452][ T3488] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 52.526755][ T3488] ? security_socket_sendmsg+0x7d/0xa0 [ 52.532229][ T3488] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.537561][ T3488] ____sys_sendmsg+0x59e/0x8f0 [ 52.542367][ T3488] ? iovec_from_user+0x300/0x390 [ 52.547301][ T3488] ? __sys_sendmsg_sock+0x30/0x30 [ 52.552326][ T3488] ___sys_sendmsg+0x252/0x2e0 [ 52.556997][ T3488] ? __sys_sendmsg+0x260/0x260 [ 52.561750][ T3488] ? __lock_acquire+0x1295/0x1ff0 [ 52.566777][ T3488] ? read_lock_is_recursive+0x10/0x10 [ 52.572139][ T3488] ? __context_tracking_exit+0x4c/0x80 [ 52.577597][ T3488] ? __fdget+0x158/0x220 [ 52.581914][ T3488] __se_sys_sendmsg+0x19a/0x260 [ 52.586753][ T3488] ? __x64_sys_sendmsg+0x80/0x80 [ 52.591700][ T3488] ? syscall_enter_from_user_mode+0x2e/0x230 [ 52.597665][ T3488] ? lockdep_hardirqs_on+0x94/0x130 [ 52.602851][ T3488] ? syscall_enter_from_user_mode+0x2e/0x230 [ 52.608845][ T3488] do_syscall_64+0x3d/0xb0 [ 52.613251][ T3488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 52.619131][ T3488] RIP: 0033:0x7f31e427d779 [ 52.623545][ T3488] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 52.643160][ T3488] RSP: 002b:00007fffe33acb68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 52.651573][ T3488] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f31e427d779 [ 52.659531][ T3488] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 52.667502][ T3488] RBP: 00007fffe33acb80 R08: 00007fffe33acbe0 R09: 00007fffe33acbe0 [ 52.675462][ T3488] R10: 00007fffe33acbe0 R11: 0000000000000246 R12: 00007f31e42f05f0 [ 52.683431][ T3488] R13: 00007fffe33acd68 R14: 0000000000000001 R15: 0000000000000001 [ 52.691393][ T3488] [ 52.694478][ T3488] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 52.703949][ T3488] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3488, name: syz-executor347 [ 52.713445][ T3488] INFO: lockdep is turned off. [ 52.718203][ T3488] Preemption disabled at: [ 52.718213][ T3488] [<0000000000000000>] 0x0 [ 52.726956][ T3488] CPU: 0 PID: 3488 Comm: syz-executor347 Not tainted 5.15.126-syzkaller #0 [ 52.735538][ T3488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 52.745578][ T3488] Call Trace: [ 52.748843][ T3488] [ 52.751759][ T3488] dump_stack_lvl+0x1e3/0x2cb [ 52.756429][ T3488] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 52.762056][ T3488] ? panic+0x84d/0x84d [ 52.766111][ T3488] ? rcu_is_watching+0x11/0xa0 [ 52.770862][ T3488] ? rcu_is_watching+0x11/0xa0 [ 52.775612][ T3488] ___might_sleep+0x547/0x6a0 [ 52.780280][ T3488] ? __might_sleep+0xc0/0xc0 [ 52.784861][ T3488] slab_pre_alloc_hook+0x44/0xc0 [ 52.789787][ T3488] __kmalloc_node+0x71/0x390 [ 52.794366][ T3488] ? kvmalloc_node+0x80/0x140 [ 52.799029][ T3488] ? __bpf_trace_softirq+0x10/0x10 [ 52.804141][ T3488] kvmalloc_node+0x80/0x140 [ 52.808632][ T3488] get_dist_table+0x83/0x2c0 [ 52.813214][ T3488] netem_change+0xa05/0x20c0 [ 52.817831][ T3488] ? netem_destroy+0xb0/0xb0 [ 52.822411][ T3488] ? debug_object_init+0x10/0x10 [ 52.827354][ T3488] ? memset+0x1f/0x40 [ 52.831333][ T3488] ? lockdep_init_map_type+0x9d/0x8d0 [ 52.836707][ T3488] ? memset+0x1f/0x40 [ 52.840686][ T3488] ? __hrtimer_init+0x181/0x260 [ 52.845543][ T3488] netem_init+0x58/0xb0 [ 52.849703][ T3488] ? qdisc_peek_dequeued+0x220/0x220 [ 52.854984][ T3488] qdisc_create+0x8ae/0x1390 [ 52.859589][ T3488] ? qdisc_notify+0x380/0x380 [ 52.864257][ T3488] ? apparmor_capable+0x12e/0x190 [ 52.869281][ T3488] tc_modify_qdisc+0xac5/0x1710 [ 52.874132][ T3488] ? rcu_lock_release+0x20/0x20 [ 52.878980][ T3488] ? rcu_lock_release+0x20/0x20 [ 52.883856][ T3488] rtnetlink_rcv_msg+0x993/0xee0 [ 52.888781][ T3488] ? reacquire_held_locks+0x660/0x660 [ 52.894157][ T3488] ? rtnetlink_bind+0x80/0x80 [ 52.898823][ T3488] ? is_bpf_text_address+0x24f/0x260 [ 52.904099][ T3488] ? stack_trace_save+0x1c0/0x1c0 [ 52.909111][ T3488] ? __kernel_text_address+0x94/0x100 [ 52.914489][ T3488] ? unwind_get_return_address+0x49/0x80 [ 52.920113][ T3488] ? arch_stack_walk+0xf3/0x140 [ 52.924952][ T3488] ? mark_lock+0x98/0x340 [ 52.929271][ T3488] ? mark_lock+0x98/0x340 [ 52.933587][ T3488] ? __lock_acquire+0x1295/0x1ff0 [ 52.938612][ T3488] netlink_rcv_skb+0x1cf/0x410 [ 52.943365][ T3488] ? rtnetlink_bind+0x80/0x80 [ 52.948034][ T3488] ? netlink_ack+0xb10/0xb10 [ 52.952616][ T3488] netlink_unicast+0x7b6/0x980 [ 52.957387][ T3488] ? netlink_detachskb+0x90/0x90 [ 52.962323][ T3488] ? 0xffffffff81000000 [ 52.966491][ T3488] ? __check_object_size+0x300/0x410 [ 52.971787][ T3488] ? bpf_lsm_netlink_send+0x5/0x10 [ 52.976957][ T3488] netlink_sendmsg+0xa30/0xd60 [ 52.981725][ T3488] ? netlink_getsockopt+0x5b0/0x5b0 [ 52.986918][ T3488] ? aa_sock_msg_perm+0x91/0x150 [ 52.991859][ T3488] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 52.997151][ T3488] ? security_socket_sendmsg+0x7d/0xa0 [ 53.002604][ T3488] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.007798][ T3488] ____sys_sendmsg+0x59e/0x8f0 [ 53.012552][ T3488] ? iovec_from_user+0x300/0x390 [ 53.017481][ T3488] ? __sys_sendmsg_sock+0x30/0x30 [ 53.022499][ T3488] ___sys_sendmsg+0x252/0x2e0 [ 53.027175][ T3488] ? __sys_sendmsg+0x260/0x260 [ 53.031941][ T3488] ? __lock_acquire+0x1295/0x1ff0 [ 53.036967][ T3488] ? read_lock_is_recursive+0x10/0x10 [ 53.042360][ T3488] ? __context_tracking_exit+0x4c/0x80 [ 53.047808][ T3488] ? __fdget+0x158/0x220 [ 53.052059][ T3488] __se_sys_sendmsg+0x19a/0x260 [ 53.056925][ T3488] ? __x64_sys_sendmsg+0x80/0x80 [ 53.061860][ T3488] ? syscall_enter_from_user_mode+0x2e/0x230 [ 53.067841][ T3488] ? lockdep_hardirqs_on+0x94/0x130 [ 53.073033][ T3488] ? syscall_enter_from_user_mode+0x2e/0x230 [ 53.079003][ T3488] do_syscall_64+0x3d/0xb0 [ 53.083412][ T3488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.089309][ T3488] RIP: 0033:0x7f31e427d779 [ 53.093712][ T3488] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.113308][ T3488] RSP: 002b:00007fffe33acb68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.121709][ T3488] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f31e427d779 [ 53.129689][ T3488] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 53.137657][ T3488] RBP: 00007fffe33acb80 R08: 00007fffe33acbe0 R09: 00007fffe33acbe0 [ 53.145616][ T3488] R10: 00007fffe33acbe0 R11: 0000000000000246 R12: 00007f31e42f05f0 [ 53.153577][ T3488] R13: 00007fffe33acd68 R14: 0000000000000001 R15: 0000000000000001 [ 53.161557][ T3488]