[ 29.616576][ T242]
[ 29.617011][ T242] =============================
[ 29.617273][ T242] WARNING: suspicious RCU usage
[ 29.617542][ T242] 6.12.0-rc4-virtme #1 Not tainted
[ 29.617823][ T242] -----------------------------
[ 29.618072][ T242] net/ipv4/tcp_ao.c:2232 RCU-list traversed in non-reader section!!
[ 29.618462][ T242]
[ 29.618462][ T242] other info that might help us debug this:
[ 29.618462][ T242]
[ 29.618941][ T242]
[ 29.618941][ T242] rcu_scheduler_active = 2, debug_locks = 1
[ 29.619313][ T242] 1 lock held by key-management_/242:
[ 29.619950][ T242] #0: ffff888003681098 (sk_lock-AF_INET6){+.+.}-{0:0}, at: do_tcp_getsockopt+0x40b/0x2fe0
[ 29.620507][ T242]
[ 29.620507][ T242] stack backtrace:
[ 29.620858][ T242] CPU: 0 UID: 0 PID: 242 Comm: key-management_ Not tainted 6.12.0-rc4-virtme #1
[ 29.621296][ T242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 29.621839][ T242] Call Trace:
[ 29.622054][ T242]
[ 29.622191][ T242] dump_stack_lvl+0xb0/0xd0
[ 29.622457][ T242] lockdep_rcu_suspicious+0x1ea/0x280
[ 29.622727][ T242] tcp_ao_copy_mkts_to_user+0xded/0x1050
[ 29.622980][ T242] ? mark_held_locks+0x9e/0xe0
[ 29.623244][ T242] ? __pfx_tcp_ao_copy_mkts_to_user+0x10/0x10
[ 29.623557][ T242] ? stack_depot_save_flags+0x273/0x3a0
[ 29.623815][ T242] ? kasan_save_stack+0x24/0x50
[ 29.624056][ T242] ? kasan_save_track+0x14/0x30
[ 29.624309][ T242] ? kfree+0xf3/0x340
[ 29.624513][ T242] ? tcp_ao_parse_crypto+0x269/0x650
[ 29.624828][ T242] ? __lock_acquire+0xb3f/0x1580
[ 29.625102][ T242] ? lock_acquire.part.0+0xeb/0x330
[ 29.625351][ T242] ? find_held_lock+0x2c/0x110
[ 29.625611][ T242] ? __lock_release+0x103/0x460
[ 29.625866][ T242] ? do_tcp_getsockopt+0x40b/0x2fe0
[ 29.626111][ T242] ? hlock_class+0x4e/0x130
[ 29.626377][ T242] ? mark_lock+0x38/0x3e0
[ 29.626593][ T242] ? do_tcp_getsockopt+0x10dd/0x2fe0
[ 29.626852][ T242] do_tcp_getsockopt+0x10dd/0x2fe0
[ 29.627121][ T242] ? __pfx_do_tcp_getsockopt+0x10/0x10
[ 29.627358][ T242] ? tcp_ao_add_cmd+0xf22/0x1700
[ 29.627626][ T242] ? release_sock+0x1f/0x1d0
[ 29.627871][ T242] ? reacquire_held_locks+0x22f/0x4f0
[ 29.628113][ T242] ? release_sock+0x1f/0x1d0
[ 29.628385][ T242] ? rcu_read_lock_any_held+0x43/0xb0
[ 29.628641][ T242] ? validate_chain+0x1fe/0xae0
[ 29.628896][ T242] ? find_held_lock+0x2c/0x110
[ 29.629150][ T242] ? __pfx_validate_chain+0x10/0x10
[ 29.629410][ T242] ? __pfx_validate_chain+0x10/0x10
[ 29.630004][ T242] ? hlock_class+0x4e/0x130
[ 29.630272][ T242] ? mark_lock+0x38/0x3e0
[ 29.630497][ T242] ? __lock_acquire+0xb3f/0x1580
[ 29.630774][ T242] ? find_held_lock+0x2c/0x110
[ 29.631040][ T242] ? __lock_release+0x103/0x460
[ 29.631278][ T242] ? __might_fault+0x11b/0x170
[ 29.631529][ T242] ? __pfx___lock_release+0x10/0x10
[ 29.631766][ T242] ? trace_lock_acquire+0x14d/0x1f0
[ 29.632019][ T242] ? find_held_lock+0x2c/0x110
[ 29.632263][ T242] ? __might_fault+0xc3/0x170
[ 29.632511][ T242] ? __might_fault+0xc3/0x170
[ 29.632779][ T242] tcp_getsockopt+0x90/0xf0
[ 29.633035][ T242] do_sock_getsockopt+0x1c7/0x730
[ 29.633276][ T242] ? __fget_files+0x1af/0x3e0
[ 29.633527][ T242] ? __pfx_do_sock_getsockopt+0x10/0x10
[ 29.633796][ T242] ? fdget+0x175/0x1e0
[ 29.633999][ T242] __sys_getsockopt+0xfc/0x1b0
[ 29.634269][ T242] ? __pfx___sys_getsockopt+0x10/0x10
[ 29.634541][ T242] ? __pfx_task_work_run+0x10/0x10
[ 29.634809][ T242] __x64_sys_getsockopt+0xbd/0x160
[ 29.635053][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 29.635359][ T242] do_syscall_64+0xc1/0x1d0
[ 29.635628][ T242] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 29.635923][ T242] RIP: 0033:0x7f289c22146e
[ 29.636184][ T242] Code: 1f 44 00 00 48 8b 15 91 99 0a 00 f7 d8 64 89 02 b8 ff ff ff ff eb b8 0f 1f 44 00 00 f3 0f 1e fa 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 59
[ 29.637118][ T242] RSP: 002b:00007f289b8cc878 EFLAGS: 00000246 ORIG_RAX: 0000000000000037
[ 29.637513][ T242] RAX: ffffffffffffffda RBX: 00007f289b8ccb40 RCX: 00007f289c22146e
[ 29.637885][ T242] RDX: 0000000000000029 RSI: 0000000000000006 RDI: 000000000000000a
[ 29.638381][ T242] RBP: 00007f289b8cc890 R08: 00007f289b8cc88c R09: 0000000000000064
[ 29.638768][ T242] R10: 00007f289b8cc890 R11: 0000000000000246 R12: 000000000000000a
[ 29.639137][ T242] R13: 0000000000000064 R14: 0000000000000080 R15: 0000000000000064
[ 29.639539][ T242]
[ 29.639829][ T242]
[ 29.639964][ T242] =============================
[ 29.640211][ T242] WARNING: suspicious RCU usage
[ 29.640459][ T242] 6.12.0-rc4-virtme #1 Not tainted
[ 29.640697][ T242] -----------------------------
[ 29.640989][ T242] net/ipv4/tcp_ao.c:208 RCU-list traversed in non-reader section!!
[ 29.641334][ T242]
[ 29.641334][ T242] other info that might help us debug this:
[ 29.641334][ T242]
[ 29.641814][ T242]
[ 29.641814][ T242] rcu_scheduler_active = 2, debug_locks = 1
[ 29.642170][ T242] 1 lock held by key-management_/242:
[ 29.642399][ T242] #0: ffff888003681098 (sk_lock-AF_INET6){+.+.}-{0:0}, at: do_tcp_setsockopt+0x936/0x2320
[ 29.642945][ T242]
[ 29.642945][ T242] stack backtrace:
[ 29.643264][ T242] CPU: 0 UID: 0 PID: 242 Comm: key-management_ Not tainted 6.12.0-rc4-virtme #1
[ 29.643711][ T242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 29.644254][ T242] Call Trace:
[ 29.644445][ T242]
[ 29.644584][ T242] dump_stack_lvl+0xb0/0xd0
[ 29.644841][ T242] lockdep_rcu_suspicious+0x1ea/0x280
[ 29.645113][ T242] __tcp_ao_do_lookup.part.0+0x201/0x240
[ 29.645362][ T242] tcp_ao_add_cmd+0xe8b/0x1700
[ 29.645646][ T242] ? __pfx_tcp_ao_add_cmd+0x10/0x10
[ 29.645908][ T242] ? hlock_class+0x4e/0x130
[ 29.646234][ T242] ? mark_held_locks+0x9e/0xe0
[ 29.646522][ T242] ? do_tcp_setsockopt+0xa64/0x2320
[ 29.646780][ T242] do_tcp_setsockopt+0xa64/0x2320
[ 29.647048][ T242] ? __pfx_do_tcp_setsockopt+0x10/0x10
[ 29.647291][ T242] ? __lock_acquire+0xb3f/0x1580
[ 29.647570][ T242] ? find_held_lock+0x2c/0x110
[ 29.647841][ T242] ? __lock_release+0x103/0x460
[ 29.648092][ T242] ? __fget_files+0x1af/0x3e0
[ 29.648337][ T242] ? __pfx___lock_release+0x10/0x10
[ 29.648579][ T242] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 29.648803][ T242] ? trace_lock_acquire+0x14d/0x1f0
[ 29.649062][ T242] do_sock_setsockopt+0x149/0x3a0
[ 29.649309][ T242] ? __pfx_do_sock_setsockopt+0x10/0x10
[ 29.649570][ T242] ? fdget+0x175/0x1e0
[ 29.649772][ T242] __sys_setsockopt+0x104/0x1a0
[ 29.650044][ T242] ? __pfx___sys_setsockopt+0x10/0x10
[ 29.650297][ T242] ? __pfx_task_work_run+0x10/0x10
[ 29.650568][ T242] __x64_sys_setsockopt+0xbd/0x160
[ 29.650811][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 29.651131][ T242] do_syscall_64+0xc1/0x1d0
[ 29.651382][ T242] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 29.651685][ T242] RIP: 0033:0x7f289c22191e
[ 29.651944][ T242] Code: 0f 1f 40 00 48 8b 15 e1 94 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 a9
[ 29.652774][ T242] RSP: 002b:00007f289b8cca08 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 29.653200][ T242] RAX: ffffffffffffffda RBX: 00000000000000c8 RCX: 00007f289c22191e
[ 29.653589][ T242] RDX: 0000000000000026 RSI: 0000000000000006 RDI: 000000000000000a
[ 29.653961][ T242] RBP: 00000000000000c8 R08: 0000000000000120 R09: 0029383231736561
[ 29.654340][ T242] R10: 00007f289b8cca20 R11: 0000000000000246 R12: 000000000000000a
[ 29.654716][ T242] R13: 0000000000000000 R14: 00007f289b8ccb40 R15: 0000000000411c28
[ 29.655105][ T242]
[ 29.656327][ T242]
[ 29.656487][ T242] =============================
[ 29.656728][ T242] WARNING: suspicious RCU usage
[ 29.657160][ T242] 6.12.0-rc4-virtme #1 Not tainted
[ 29.657399][ T242] -----------------------------
[ 29.657620][ T242] net/ipv4/tcp_ao.c:1905 RCU-list traversed in non-reader section!!
[ 29.657959][ T242]
[ 29.657959][ T242] other info that might help us debug this:
[ 29.657959][ T242]
[ 29.658446][ T242]
[ 29.658446][ T242] rcu_scheduler_active = 2, debug_locks = 1
[ 29.658784][ T242] 1 lock held by key-management_/242:
[ 29.659016][ T242] #0: ffff888003681098 (sk_lock-AF_INET6){+.+.}-{0:0}, at: do_tcp_setsockopt+0x936/0x2320
[ 29.659485][ T242]
[ 29.659485][ T242] stack backtrace:
[ 29.659759][ T242] CPU: 0 UID: 0 PID: 242 Comm: key-management_ Not tainted 6.12.0-rc4-virtme #1
[ 29.660150][ T242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 29.660638][ T242] Call Trace:
[ 29.660809][ T242]
[ 29.660935][ T242] dump_stack_lvl+0xb0/0xd0
[ 29.661169][ T242] lockdep_rcu_suspicious+0x1ea/0x280
[ 29.661397][ T242] tcp_ao_del_cmd+0x810/0xbd0
[ 29.661650][ T242] ? __pfx_tcp_ao_del_cmd+0x10/0x10
[ 29.661923][ T242] ? find_held_lock+0x2c/0x110
[ 29.662198][ T242] ? mark_held_locks+0x9e/0xe0
[ 29.662468][ T242] do_tcp_setsockopt+0xa64/0x2320
[ 29.662725][ T242] ? __pfx_do_tcp_setsockopt+0x10/0x10
[ 29.662971][ T242] ? __lock_acquire+0xb3f/0x1580
[ 29.663215][ T242] ? find_held_lock+0x2c/0x110
[ 29.663458][ T242] ? __lock_release+0x103/0x460
[ 29.663696][ T242] ? __fget_files+0x1af/0x3e0
[ 29.663924][ T242] ? __pfx___lock_release+0x10/0x10
[ 29.664153][ T242] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 29.664390][ T242] ? trace_lock_acquire+0x14d/0x1f0
[ 29.664635][ T242] do_sock_setsockopt+0x149/0x3a0
[ 29.664881][ T242] ? __pfx_do_sock_setsockopt+0x10/0x10
[ 29.665180][ T242] ? fdget+0x175/0x1e0
[ 29.665377][ T242] __sys_setsockopt+0x104/0x1a0
[ 29.665628][ T242] ? __pfx___sys_setsockopt+0x10/0x10
[ 29.665877][ T242] ? __pfx_task_work_run+0x10/0x10
[ 29.666133][ T242] __x64_sys_setsockopt+0xbd/0x160
[ 29.666365][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 29.666658][ T242] do_syscall_64+0xc1/0x1d0
[ 29.666895][ T242] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 29.667191][ T242] RIP: 0033:0x7f289c22191e
[ 29.667440][ T242] Code: 0f 1f 40 00 48 8b 15 e1 94 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 a9
[ 29.668301][ T242] RSP: 002b:00007f289b8cca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 29.668647][ T242] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f289c22191e
[ 29.668873][ T242] RDX: 0000000000000027 RSI: 0000000000000006 RDI: 000000000000000a
[ 29.669096][ T242] RBP: 00000000ffffffff R08: 0000000000000090 R09: 00007f289b8ccaa0
[ 29.669311][ T242] R10: 00007f289b8ccaa0 R11: 0000000000000246 R12: 00000000000000c8
[ 29.669630][ T242] R13: 000000000000000a R14: 00000000000000c8 R15: 00007f289b8ccb30
[ 29.669865][ T242]
[ 29.695479][ T242]
[ 29.695689][ T242] =============================
[ 29.695958][ T242] WARNING: suspicious RCU usage
[ 29.696199][ T242] 6.12.0-rc4-virtme #1 Not tainted
[ 29.696439][ T242] -----------------------------
[ 29.696685][ T242] net/ipv4/tcp_ao.c:117 RCU-list traversed in non-reader section!!
[ 29.697060][ T242]
[ 29.697060][ T242] other info that might help us debug this:
[ 29.697060][ T242]
[ 29.697564][ T242]
[ 29.697564][ T242] rcu_scheduler_active = 2, debug_locks = 1
[ 29.697936][ T242] 1 lock held by key-management_/242:
[ 29.698190][ T242] #0: ffff888003681e98 (sk_lock-AF_INET6){+.+.}-{0:0}, at: do_tcp_setsockopt+0x936/0x2320
[ 29.698734][ T242]
[ 29.698734][ T242] stack backtrace:
[ 29.699045][ T242] CPU: 0 UID: 0 PID: 242 Comm: key-management_ Not tainted 6.12.0-rc4-virtme #1
[ 29.699478][ T242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 29.700013][ T242] Call Trace:
[ 29.700206][ T242]
[ 29.700339][ T242] dump_stack_lvl+0xb0/0xd0
[ 29.700590][ T242] lockdep_rcu_suspicious+0x1ea/0x280
[ 29.700852][ T242] tcp_ao_established_key+0x13e/0x190
[ 29.701099][ T242] tcp_ao_info_cmd.constprop.0+0x341/0x770
[ 29.701404][ T242] ? __pfx_tcp_ao_info_cmd.constprop.0+0x10/0x10
[ 29.701621][ T242] ? mark_lock+0x38/0x3e0
[ 29.701759][ T242] ? mark_held_locks+0x9e/0xe0
[ 29.701912][ T242] do_tcp_setsockopt+0xa64/0x2320
[ 29.702063][ T242] ? __pfx_do_tcp_setsockopt+0x10/0x10
[ 29.702207][ T242] ? __lock_acquire+0xb3f/0x1580
[ 29.702363][ T242] ? find_held_lock+0x2c/0x110
[ 29.702513][ T242] ? __lock_release+0x103/0x460
[ 29.702678][ T242] ? __fget_files+0x1af/0x3e0
[ 29.702826][ T242] ? __pfx___lock_release+0x10/0x10
[ 29.702970][ T242] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 29.703118][ T242] ? trace_lock_acquire+0x14d/0x1f0
[ 29.703277][ T242] do_sock_setsockopt+0x149/0x3a0
[ 29.703429][ T242] ? __pfx_do_sock_setsockopt+0x10/0x10
[ 29.703583][ T242] ? fdget+0x175/0x1e0
[ 29.703713][ T242] __sys_setsockopt+0x104/0x1a0
[ 29.703872][ T242] ? __pfx___sys_setsockopt+0x10/0x10
[ 29.704017][ T242] ? __sys_socket+0x168/0x1e0
[ 29.704177][ T242] ? __pfx___sys_socket+0x10/0x10
[ 29.704325][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 29.704515][ T242] __x64_sys_setsockopt+0xbd/0x160
[ 29.704668][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 29.704865][ T242] do_syscall_64+0xc1/0x1d0
[ 29.705015][ T242] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 29.705200][ T242] RIP: 0033:0x7f289c22191e
[ 29.705353][ T242] Code: 0f 1f 40 00 48 8b 15 e1 94 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 a9
[ 29.705872][ T242] RSP: 002b:00007f289b8ccc68 EFLAGS: 00000206 ORIG_RAX: 0000000000000036
[ 29.706096][ T242] RAX: ffffffffffffffda RBX: 0000000000000064 RCX: 00007f289c22191e
[ 29.706328][ T242] RDX: 0000000000000028 RSI: 0000000000000006 RDI: 0000000000000009
[ 29.706545][ T242] RBP: 00000000000000c8 R08: 0000000000000030 R09: 00000000000000c8
[ 29.706777][ T242] R10: 00007f289b8ccc80 R11: 0000000000000206 R12: 0000000000000009
[ 29.707010][ T242] R13: 0000000000000000 R14: 00007f289c171520 R15: 0000000000000000
[ 29.707241][ T242]
[ 31.250931][ T242]
[ 31.251144][ T242] =============================
[ 31.251399][ T242] WARNING: suspicious RCU usage
[ 31.251662][ T242] 6.12.0-rc4-virtme #1 Not tainted
[ 31.251939][ T242] -----------------------------
[ 31.252203][ T242] net/ipv4/tcp_ao.c:1183 RCU-list traversed in non-reader section!!
[ 31.252566][ T242]
[ 31.252566][ T242] other info that might help us debug this:
[ 31.252566][ T242]
[ 31.253061][ T242]
[ 31.253061][ T242] rcu_scheduler_active = 2, debug_locks = 1
[ 31.253428][ T242] 1 lock held by key-management_/242:
[ 31.253684][ T242] #0: ffff888007791e98 (sk_lock-AF_INET6){+.+.}-{0:0}, at: inet_stream_connect+0x43/0xa0
[ 31.254175][ T242]
[ 31.254175][ T242] stack backtrace:
[ 31.254493][ T242] CPU: 0 UID: 0 PID: 242 Comm: key-management_ Not tainted 6.12.0-rc4-virtme #1
[ 31.254939][ T242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 31.255493][ T242] Call Trace:
[ 31.255689][ T242]
[ 31.255827][ T242] dump_stack_lvl+0xb0/0xd0
[ 31.256092][ T242] lockdep_rcu_suspicious+0x1ea/0x280
[ 31.256356][ T242] tcp_ao_finish_connect+0x206/0x2f0
[ 31.256616][ T242] tcp_finish_connect+0x25/0x510
[ 31.256879][ T242] tcp_rcv_synsent_state_process+0xa6d/0x26f0
[ 31.257189][ T242] ? hlock_class+0x4e/0x130
[ 31.257456][ T242] ? mark_lock+0x38/0x3e0
[ 31.257662][ T242] ? __pfx_tcp_rcv_synsent_state_process+0x10/0x10
[ 31.257986][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 31.258316][ T242] ? kvm_clock_get_cycles+0x18/0x30
[ 31.258573][ T242] ? ktime_get+0xb7/0x200
[ 31.258777][ T242] tcp_rcv_state_process+0x336/0x1e30
[ 31.259037][ T242] ? __lock_release+0x103/0x460
[ 31.259296][ T242] ? __release_sock+0xc8/0x390
[ 31.259565][ T242] ? __pfx_tcp_rcv_state_process+0x10/0x10
[ 31.259880][ T242] ? hlock_class+0x4e/0x130
[ 31.260137][ T242] ? mark_lock+0x38/0x3e0
[ 31.260338][ T242] tcp_v6_do_rcv+0x346/0x1330
[ 31.260608][ T242] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 31.260931][ T242] __release_sock+0x128/0x390
[ 31.261206][ T242] release_sock+0x53/0x1d0
[ 31.261472][ T242] inet_stream_connect+0x7a/0xa0
[ 31.261740][ T242] __sys_connect+0x205/0x280
[ 31.261999][ T242] ? __pfx___sys_connect+0x10/0x10
[ 31.262261][ T242] ? do_fcntl+0x5cc/0x8b0
[ 31.262464][ T242] ? __fget_files+0x1b9/0x3e0
[ 31.262745][ T242] __x64_sys_connect+0x72/0xb0
[ 31.262998][ T242] do_syscall_64+0xc1/0x1d0
[ 31.263279][ T242] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 31.263603][ T242] RIP: 0033:0x7f289c22140b
[ 31.263877][ T242] Code: 83 ec 18 89 54 24 0c 48 89 34 24 89 7c 24 08 e8 eb c7 f4 ff 8b 54 24 0c 48 8b 34 24 41 89 c0 8b 7c 24 08 b8 2a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 08 e8 41 c8 f4 ff 8b 44
[ 31.264797][ T242] RSP: 002b:00007f289b8ccbb0 EFLAGS: 00000293 ORIG_RAX: 000000000000002a
[ 31.265203][ T242] RAX: ffffffffffffffda RBX: 000000000000001c RCX: 00007f289c22140b
[ 31.265590][ T242] RDX: 000000000000001c RSI: 00007f289b8ccc00 RDI: 0000000000000009
[ 31.266000][ T242] RBP: 0000000000000009 R08: 0000000000000000 R09: 00000000ffffffff
[ 31.266392][ T242] R10: 00007f289c0d9598 R11: 0000000000000293 R12: 00000000004141f0
[ 31.266800][ T242] R13: 0000000000000005 R14: 00007f289b8ccc00 R15: 0000000000001b66
[ 31.267198][ T242]
[ 32.754641][ T235] TCP: AO key ifindex 200 != sk bound ifindex 3
[ 32.756374][ T235] TCP: AO key ifindex 200 != sk bound ifindex 3
[ 32.757875][ T235] TCP: AO key ifindex 200 != sk bound ifindex 3
[ 32.759432][ T235] TCP: AO key ifindex 200 != sk bound ifindex 3
[ 32.761112][ T235] TCP: AO key ifindex 200 != sk bound ifindex 3