Warning: Permanently added '10.128.1.37' (ED25519) to the list of known hosts. executing program [ 44.708117][ T3489] netlink: 164 bytes leftover after parsing attributes in process `syz-executor303'. [ 44.717853][ T3489] [ 44.720175][ T3489] ===================================================== [ 44.727075][ T3489] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 44.734500][ T3489] 5.15.126-syzkaller #0 Not tainted [ 44.739664][ T3489] ----------------------------------------------------- [ 44.746562][ T3489] syz-executor303/3489 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 44.754598][ T3489] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 44.763541][ T3489] [ 44.763541][ T3489] and this task is already holding: [ 44.770877][ T3489] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 44.780058][ T3489] which would create a new lock dependency: [ 44.785916][ T3489] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 44.793476][ T3489] [ 44.793476][ T3489] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 44.802894][ T3489] (noop_qdisc.q.lock){+.-.}-{2:2} [ 44.802908][ T3489] [ 44.802908][ T3489] ... which became SOFTIRQ-irq-safe at: [ 44.815750][ T3489] lock_acquire+0x1db/0x4f0 [ 44.820316][ T3489] _raw_spin_lock+0x2a/0x40 [ 44.824879][ T3489] net_tx_action+0x6c5/0x8e0 [ 44.829530][ T3489] __do_softirq+0x3b3/0x93a [ 44.834092][ T3489] do_softirq+0x162/0x240 [ 44.838482][ T3489] __local_bh_enable_ip+0x1b1/0x1f0 [ 44.843738][ T3489] dev_deactivate_many+0x524/0xbf0 [ 44.848909][ T3489] dev_deactivate+0x177/0x270 [ 44.853732][ T3489] linkwatch_do_dev+0x104/0x160 [ 44.858645][ T3489] __linkwatch_run_queue+0x4ca/0x7f0 [ 44.863993][ T3489] linkwatch_event+0x48/0x50 [ 44.868730][ T3489] process_one_work+0x8a1/0x10c0 [ 44.873726][ T3489] worker_thread+0xaca/0x1280 [ 44.878459][ T3489] kthread+0x3f6/0x4f0 [ 44.882592][ T3489] ret_from_fork+0x1f/0x30 [ 44.887067][ T3489] [ 44.887067][ T3489] to a SOFTIRQ-irq-unsafe lock: [ 44.894056][ T3489] (fs_reclaim){+.+.}-{0:0} [ 44.894071][ T3489] [ 44.894071][ T3489] ... which became SOFTIRQ-irq-unsafe at: [ 44.906388][ T3489] ... [ 44.906392][ T3489] lock_acquire+0x1db/0x4f0 [ 44.913518][ T3489] fs_reclaim_acquire+0x83/0x120 [ 44.918518][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 44.923519][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 44.928862][ T3489] wq_numa_init+0x122/0x49f [ 44.933427][ T3489] workqueue_init+0x18/0x5e1 [ 44.938085][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 44.943515][ T3489] kernel_init+0x19/0x290 [ 44.947909][ T3489] ret_from_fork+0x1f/0x30 [ 44.952387][ T3489] [ 44.952387][ T3489] other info that might help us debug this: [ 44.952387][ T3489] [ 44.962592][ T3489] Possible interrupt unsafe locking scenario: [ 44.962592][ T3489] [ 44.970880][ T3489] CPU0 CPU1 [ 44.976217][ T3489] ---- ---- [ 44.981551][ T3489] lock(fs_reclaim); [ 44.985508][ T3489] local_irq_disable(); [ 44.992236][ T3489] lock(noop_qdisc.q.lock); [ 44.999316][ T3489] lock(fs_reclaim); [ 45.005787][ T3489] [ 45.009214][ T3489] lock(noop_qdisc.q.lock); [ 45.013948][ T3489] [ 45.013948][ T3489] *** DEADLOCK *** [ 45.013948][ T3489] [ 45.022060][ T3489] 2 locks held by syz-executor303/3489: [ 45.027575][ T3489] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 45.036945][ T3489] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 45.046649][ T3489] [ 45.046649][ T3489] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 45.057025][ T3489] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 45.062468][ T3489] HARDIRQ-ON-W at: [ 45.066418][ T3489] lock_acquire+0x1db/0x4f0 [ 45.072545][ T3489] _raw_spin_lock+0x2a/0x40 [ 45.078670][ T3489] __dev_queue_xmit+0xad6/0x3230 [ 45.085232][ T3489] tx+0x64/0x100 [ 45.090403][ T3489] kthread+0x234/0x440 [ 45.096093][ T3489] kthread+0x3f6/0x4f0 [ 45.101914][ T3489] ret_from_fork+0x1f/0x30 [ 45.107973][ T3489] IN-SOFTIRQ-W at: [ 45.111941][ T3489] lock_acquire+0x1db/0x4f0 [ 45.118090][ T3489] _raw_spin_lock+0x2a/0x40 [ 45.124226][ T3489] net_tx_action+0x6c5/0x8e0 [ 45.130442][ T3489] __do_softirq+0x3b3/0x93a [ 45.136569][ T3489] do_softirq+0x162/0x240 [ 45.142519][ T3489] __local_bh_enable_ip+0x1b1/0x1f0 [ 45.149338][ T3489] dev_deactivate_many+0x524/0xbf0 [ 45.156079][ T3489] dev_deactivate+0x177/0x270 [ 45.162380][ T3489] linkwatch_do_dev+0x104/0x160 [ 45.168851][ T3489] __linkwatch_run_queue+0x4ca/0x7f0 [ 45.175759][ T3489] linkwatch_event+0x48/0x50 [ 45.181971][ T3489] process_one_work+0x8a1/0x10c0 [ 45.188532][ T3489] worker_thread+0xaca/0x1280 [ 45.194832][ T3489] kthread+0x3f6/0x4f0 [ 45.200526][ T3489] ret_from_fork+0x1f/0x30 [ 45.206565][ T3489] INITIAL USE at: [ 45.210431][ T3489] lock_acquire+0x1db/0x4f0 [ 45.216471][ T3489] _raw_spin_lock+0x2a/0x40 [ 45.222512][ T3489] __dev_queue_xmit+0xad6/0x3230 [ 45.228985][ T3489] tx+0x64/0x100 [ 45.234073][ T3489] kthread+0x234/0x440 [ 45.239675][ T3489] kthread+0x3f6/0x4f0 [ 45.245277][ T3489] ret_from_fork+0x1f/0x30 [ 45.251230][ T3489] } [ 45.253703][ T3489] ... key at: [] noop_qdisc+0x108/0x320 [ 45.261322][ T3489] [ 45.261322][ T3489] the dependencies between the lock to be acquired [ 45.261327][ T3489] and SOFTIRQ-irq-unsafe lock: [ 45.274795][ T3489] -> (fs_reclaim){+.+.}-{0:0} { [ 45.279628][ T3489] HARDIRQ-ON-W at: [ 45.283579][ T3489] lock_acquire+0x1db/0x4f0 [ 45.289731][ T3489] fs_reclaim_acquire+0x83/0x120 [ 45.296381][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 45.303125][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 45.310156][ T3489] wq_numa_init+0x122/0x49f [ 45.316392][ T3489] workqueue_init+0x18/0x5e1 [ 45.322614][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 45.329433][ T3489] kernel_init+0x19/0x290 [ 45.335388][ T3489] ret_from_fork+0x1f/0x30 [ 45.341603][ T3489] SOFTIRQ-ON-W at: [ 45.345739][ T3489] lock_acquire+0x1db/0x4f0 [ 45.351883][ T3489] fs_reclaim_acquire+0x83/0x120 [ 45.358458][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 45.365124][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 45.372051][ T3489] wq_numa_init+0x122/0x49f [ 45.378184][ T3489] workqueue_init+0x18/0x5e1 [ 45.384403][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 45.391318][ T3489] kernel_init+0x19/0x290 [ 45.397272][ T3489] ret_from_fork+0x1f/0x30 [ 45.403316][ T3489] INITIAL USE at: [ 45.407181][ T3489] lock_acquire+0x1db/0x4f0 [ 45.413220][ T3489] fs_reclaim_acquire+0x83/0x120 [ 45.419764][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 45.426254][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 45.433173][ T3489] wq_numa_init+0x122/0x49f [ 45.439218][ T3489] workqueue_init+0x18/0x5e1 [ 45.445347][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 45.452085][ T3489] kernel_init+0x19/0x290 [ 45.457951][ T3489] ret_from_fork+0x1f/0x30 [ 45.463907][ T3489] } [ 45.466389][ T3489] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 45.474358][ T3489] ... acquired at: [ 45.478153][ T3489] lock_acquire+0x1db/0x4f0 [ 45.482916][ T3489] fs_reclaim_acquire+0x83/0x120 [ 45.488015][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 45.493105][ T3489] __kmalloc_node+0x71/0x390 [ 45.497852][ T3489] kvmalloc_node+0x80/0x140 [ 45.502499][ T3489] get_dist_table+0x83/0x2c0 [ 45.507235][ T3489] netem_change+0xa05/0x20c0 [ 45.512086][ T3489] netem_init+0x58/0xb0 [ 45.516487][ T3489] qdisc_create+0x8ae/0x1390 [ 45.521225][ T3489] tc_modify_qdisc+0xac5/0x1710 [ 45.526221][ T3489] rtnetlink_rcv_msg+0x993/0xee0 [ 45.531303][ T3489] netlink_rcv_skb+0x1cf/0x410 [ 45.536219][ T3489] netlink_unicast+0x7b6/0x980 [ 45.541216][ T3489] netlink_sendmsg+0xa30/0xd60 [ 45.546125][ T3489] ____sys_sendmsg+0x59e/0x8f0 [ 45.551032][ T3489] ___sys_sendmsg+0x252/0x2e0 [ 45.555850][ T3489] __se_sys_sendmsg+0x19a/0x260 [ 45.560844][ T3489] do_syscall_64+0x3d/0xb0 [ 45.565406][ T3489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.571459][ T3489] [ 45.573755][ T3489] [ 45.573755][ T3489] stack backtrace: [ 45.579613][ T3489] CPU: 1 PID: 3489 Comm: syz-executor303 Not tainted 5.15.126-syzkaller #0 [ 45.588195][ T3489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 45.598321][ T3489] Call Trace: [ 45.601589][ T3489] [ 45.604500][ T3489] dump_stack_lvl+0x1e3/0x2cb [ 45.609161][ T3489] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 45.614769][ T3489] ? panic+0x84d/0x84d [ 45.618829][ T3489] ? print_shortest_lock_dependencies+0xee/0x150 [ 45.625150][ T3489] validate_chain+0x4cfe/0x58b0 [ 45.630015][ T3489] ? reacquire_held_locks+0x660/0x660 [ 45.635452][ T3489] ? validate_chain+0x112/0x58b0 [ 45.640376][ T3489] ? printk_parse_prefix+0x2c0/0x2c0 [ 45.645637][ T3489] ? console_trylock+0x70/0x70 [ 45.650376][ T3489] ? reacquire_held_locks+0x660/0x660 [ 45.655718][ T3489] ? mark_lock+0x98/0x340 [ 45.660023][ T3489] __lock_acquire+0x1295/0x1ff0 [ 45.664852][ T3489] lock_acquire+0x1db/0x4f0 [ 45.669330][ T3489] ? slab_pre_alloc_hook+0x22/0xc0 [ 45.674422][ T3489] ? read_lock_is_recursive+0x10/0x10 [ 45.679770][ T3489] fs_reclaim_acquire+0x83/0x120 [ 45.684682][ T3489] ? slab_pre_alloc_hook+0x22/0xc0 [ 45.689768][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 45.694690][ T3489] __kmalloc_node+0x71/0x390 [ 45.699254][ T3489] ? kvmalloc_node+0x80/0x140 [ 45.703899][ T3489] ? __bpf_trace_softirq+0x10/0x10 [ 45.708986][ T3489] kvmalloc_node+0x80/0x140 [ 45.713462][ T3489] get_dist_table+0x83/0x2c0 [ 45.718026][ T3489] netem_change+0xa05/0x20c0 [ 45.722676][ T3489] ? netem_destroy+0xb0/0xb0 [ 45.727238][ T3489] ? debug_object_init+0x10/0x10 [ 45.732150][ T3489] ? memset+0x1f/0x40 [ 45.736104][ T3489] ? lockdep_init_map_type+0x9d/0x8d0 [ 45.741455][ T3489] ? memset+0x1f/0x40 [ 45.745408][ T3489] ? __hrtimer_init+0x181/0x260 [ 45.750236][ T3489] netem_init+0x58/0xb0 [ 45.754366][ T3489] ? qdisc_peek_dequeued+0x220/0x220 [ 45.759624][ T3489] qdisc_create+0x8ae/0x1390 [ 45.764188][ T3489] ? qdisc_notify+0x380/0x380 [ 45.768835][ T3489] ? apparmor_capable+0x12e/0x190 [ 45.773835][ T3489] tc_modify_qdisc+0xac5/0x1710 [ 45.778667][ T3489] ? rcu_lock_release+0x20/0x20 [ 45.783497][ T3489] ? rcu_lock_release+0x20/0x20 [ 45.788323][ T3489] rtnetlink_rcv_msg+0x993/0xee0 [ 45.793234][ T3489] ? reacquire_held_locks+0x660/0x660 [ 45.798591][ T3489] ? rtnetlink_bind+0x80/0x80 [ 45.803240][ T3489] ? is_bpf_text_address+0x24f/0x260 [ 45.808502][ T3489] ? stack_trace_save+0x1c0/0x1c0 [ 45.813505][ T3489] ? __kernel_text_address+0x94/0x100 [ 45.818868][ T3489] ? unwind_get_return_address+0x49/0x80 [ 45.824475][ T3489] ? arch_stack_walk+0xf3/0x140 [ 45.829302][ T3489] ? mark_lock+0x98/0x340 [ 45.833605][ T3489] ? mark_lock+0x98/0x340 [ 45.837908][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 45.842911][ T3489] netlink_rcv_skb+0x1cf/0x410 [ 45.847654][ T3489] ? rtnetlink_bind+0x80/0x80 [ 45.852307][ T3489] ? netlink_ack+0xb10/0xb10 [ 45.856872][ T3489] netlink_unicast+0x7b6/0x980 [ 45.861611][ T3489] ? netlink_detachskb+0x90/0x90 [ 45.866520][ T3489] ? 0xffffffff81000000 [ 45.870646][ T3489] ? __check_object_size+0x300/0x410 [ 45.875903][ T3489] ? bpf_lsm_netlink_send+0x5/0x10 [ 45.880996][ T3489] netlink_sendmsg+0xa30/0xd60 [ 45.885744][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 45.890916][ T3489] ? aa_sock_msg_perm+0x91/0x150 [ 45.895832][ T3489] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 45.901089][ T3489] ? security_socket_sendmsg+0x7d/0xa0 [ 45.906521][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 45.911694][ T3489] ____sys_sendmsg+0x59e/0x8f0 [ 45.916431][ T3489] ? iovec_from_user+0x300/0x390 [ 45.921516][ T3489] ? __sys_sendmsg_sock+0x30/0x30 [ 45.926515][ T3489] ___sys_sendmsg+0x252/0x2e0 [ 45.931168][ T3489] ? __sys_sendmsg+0x260/0x260 [ 45.935905][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 45.940911][ T3489] ? read_lock_is_recursive+0x10/0x10 [ 45.946257][ T3489] ? __context_tracking_exit+0x4c/0x80 [ 45.951695][ T3489] ? __fdget+0x158/0x220 [ 45.955913][ T3489] __se_sys_sendmsg+0x19a/0x260 [ 45.960736][ T3489] ? __x64_sys_sendmsg+0x80/0x80 [ 45.965646][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 45.971600][ T3489] ? lockdep_hardirqs_on+0x94/0x130 [ 45.976771][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 45.982723][ T3489] do_syscall_64+0x3d/0xb0 [ 45.987115][ T3489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.992981][ T3489] RIP: 0033:0x7f16a38cb779 [ 45.997369][ T3489] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 46.016948][ T3489] RSP: 002b:00007fffe3d184b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.025337][ T3489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f16a38cb779 [ 46.033281][ T3489] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 46.041223][ T3489] RBP: 00007fffe3d184d0 R08: 00007fffe3d18530 R09: 00007fffe3d18530 [ 46.049170][ T3489] R10: 00007fffe3d18530 R11: 0000000000000246 R12: 00007f16a393e5f0 [ 46.057117][ T3489] R13: 00007fffe3d186b8 R14: 0000000000000001 R15: 0000000000000001 [ 46.065066][ T3489] [ 46.068185][ T3489] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 46.077661][ T3489] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3489, name: syz-executor303 [ 46.087134][ T3489] INFO: lockdep is turned off. [ 46.091869][ T3489] Preemption disabled at: [ 46.091873][ T3489] [<0000000000000000>] 0x0 [ 46.100593][ T3489] CPU: 1 PID: 3489 Comm: syz-executor303 Not tainted 5.15.126-syzkaller #0 [ 46.109155][ T3489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 46.119181][ T3489] Call Trace: [ 46.122435][ T3489] [ 46.125340][ T3489] dump_stack_lvl+0x1e3/0x2cb [ 46.129998][ T3489] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 46.135602][ T3489] ? panic+0x84d/0x84d [ 46.139643][ T3489] ? rcu_is_watching+0x11/0xa0 [ 46.144380][ T3489] ? rcu_is_watching+0x11/0xa0 [ 46.149117][ T3489] ___might_sleep+0x547/0x6a0 [ 46.153769][ T3489] ? __might_sleep+0xc0/0xc0 [ 46.158334][ T3489] slab_pre_alloc_hook+0x44/0xc0 [ 46.163243][ T3489] __kmalloc_node+0x71/0x390 [ 46.167806][ T3489] ? kvmalloc_node+0x80/0x140 [ 46.172452][ T3489] ? __bpf_trace_softirq+0x10/0x10 [ 46.177540][ T3489] kvmalloc_node+0x80/0x140 [ 46.182019][ T3489] get_dist_table+0x83/0x2c0 [ 46.186584][ T3489] netem_change+0xa05/0x20c0 [ 46.191150][ T3489] ? netem_destroy+0xb0/0xb0 [ 46.195709][ T3489] ? debug_object_init+0x10/0x10 [ 46.200618][ T3489] ? memset+0x1f/0x40 [ 46.204582][ T3489] ? lockdep_init_map_type+0x9d/0x8d0 [ 46.209945][ T3489] ? memset+0x1f/0x40 [ 46.213997][ T3489] ? __hrtimer_init+0x181/0x260 [ 46.218853][ T3489] netem_init+0x58/0xb0 [ 46.223000][ T3489] ? qdisc_peek_dequeued+0x220/0x220 [ 46.228266][ T3489] qdisc_create+0x8ae/0x1390 [ 46.232832][ T3489] ? qdisc_notify+0x380/0x380 [ 46.237478][ T3489] ? apparmor_capable+0x12e/0x190 [ 46.242477][ T3489] tc_modify_qdisc+0xac5/0x1710 [ 46.247303][ T3489] ? rcu_lock_release+0x20/0x20 [ 46.252133][ T3489] ? rcu_lock_release+0x20/0x20 [ 46.256989][ T3489] rtnetlink_rcv_msg+0x993/0xee0 [ 46.261906][ T3489] ? reacquire_held_locks+0x660/0x660 [ 46.267336][ T3489] ? rtnetlink_bind+0x80/0x80 [ 46.271985][ T3489] ? is_bpf_text_address+0x24f/0x260 [ 46.277239][ T3489] ? stack_trace_save+0x1c0/0x1c0 [ 46.282237][ T3489] ? __kernel_text_address+0x94/0x100 [ 46.287581][ T3489] ? unwind_get_return_address+0x49/0x80 [ 46.293188][ T3489] ? arch_stack_walk+0xf3/0x140 [ 46.298016][ T3489] ? mark_lock+0x98/0x340 [ 46.302321][ T3489] ? mark_lock+0x98/0x340 [ 46.306803][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 46.311808][ T3489] netlink_rcv_skb+0x1cf/0x410 [ 46.316566][ T3489] ? rtnetlink_bind+0x80/0x80 [ 46.321215][ T3489] ? netlink_ack+0xb10/0xb10 [ 46.325782][ T3489] netlink_unicast+0x7b6/0x980 [ 46.330523][ T3489] ? netlink_detachskb+0x90/0x90 [ 46.335456][ T3489] ? 0xffffffff81000000 [ 46.339591][ T3489] ? __check_object_size+0x300/0x410 [ 46.344847][ T3489] ? bpf_lsm_netlink_send+0x5/0x10 [ 46.349950][ T3489] netlink_sendmsg+0xa30/0xd60 [ 46.354691][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 46.359865][ T3489] ? aa_sock_msg_perm+0x91/0x150 [ 46.364779][ T3489] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 46.370036][ T3489] ? security_socket_sendmsg+0x7d/0xa0 [ 46.375468][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 46.380641][ T3489] ____sys_sendmsg+0x59e/0x8f0 [ 46.385464][ T3489] ? iovec_from_user+0x300/0x390 [ 46.390378][ T3489] ? __sys_sendmsg_sock+0x30/0x30 [ 46.395389][ T3489] ___sys_sendmsg+0x252/0x2e0 [ 46.400054][ T3489] ? __sys_sendmsg+0x260/0x260 [ 46.404796][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 46.409814][ T3489] ? read_lock_is_recursive+0x10/0x10 [ 46.415157][ T3489] ? __context_tracking_exit+0x4c/0x80 [ 46.420590][ T3489] ? __fdget+0x158/0x220 [ 46.424816][ T3489] __se_sys_sendmsg+0x19a/0x260 [ 46.429642][ T3489] ? __x64_sys_sendmsg+0x80/0x80 [ 46.434552][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 46.440502][ T3489] ? lockdep_hardirqs_on+0x94/0x130 [ 46.445671][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 46.451626][ T3489] do_syscall_64+0x3d/0xb0 [ 46.456020][ T3489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 46.461888][ T3489] RIP: 0033:0x7f16a38cb779 [ 46.466278][ T3489] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 46.485855][ T3489] RSP: 002b:00007fffe3d184b8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 46.494245][ T3489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f16a38cb779 [ 46.502207][ T3489] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 46.510164][ T3489] RBP: 00007fffe3d184d0 R08: 00007fffe3d18530 R09: 00007fffe3d18530 [ 46.518116][ T3489] R10: 00007fffe3d18530 R11: 0000000000000246 R12: 00007f16a393e5f0 [ 46.526092][ T3489] R13: 00007fffe3d186b8 R14: 0000000000000001 R15: 0000000000000001 [ 46.534043][ T3489]