Warning: Permanently added '10.128.0.76' (ED25519) to the list of known hosts. executing program [ 49.253402][ T3493] [ 49.255735][ T3493] ===================================================== [ 49.262635][ T3493] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 49.270060][ T3493] 5.15.126-syzkaller #0 Not tainted [ 49.275223][ T3493] ----------------------------------------------------- [ 49.282120][ T3493] syz-executor308/3493 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 49.290168][ T3493] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 49.299106][ T3493] [ 49.299106][ T3493] and this task is already holding: [ 49.306440][ T3493] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 49.315621][ T3493] which would create a new lock dependency: [ 49.321485][ T3493] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 49.329363][ T3493] [ 49.329363][ T3493] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 49.338786][ T3493] (noop_qdisc.q.lock){+.-.}-{2:2} [ 49.338805][ T3493] [ 49.338805][ T3493] ... which became SOFTIRQ-irq-safe at: [ 49.351575][ T3493] lock_acquire+0x1db/0x4f0 [ 49.356152][ T3493] _raw_spin_lock+0x2a/0x40 [ 49.360714][ T3493] net_tx_action+0x6c5/0x8e0 [ 49.365367][ T3493] __do_softirq+0x3b3/0x93a [ 49.369984][ T3493] do_softirq+0x162/0x240 [ 49.374397][ T3493] __local_bh_enable_ip+0x1b1/0x1f0 [ 49.379743][ T3493] dev_deactivate_many+0x524/0xbf0 [ 49.384913][ T3493] dev_deactivate+0x177/0x270 [ 49.389821][ T3493] linkwatch_do_dev+0x104/0x160 [ 49.394728][ T3493] __linkwatch_run_queue+0x4ca/0x7f0 [ 49.400069][ T3493] linkwatch_event+0x48/0x50 [ 49.404722][ T3493] process_one_work+0x8a1/0x10c0 [ 49.409733][ T3493] worker_thread+0xaca/0x1280 [ 49.414475][ T3493] kthread+0x3f6/0x4f0 [ 49.418663][ T3493] ret_from_fork+0x1f/0x30 [ 49.423151][ T3493] [ 49.423151][ T3493] to a SOFTIRQ-irq-unsafe lock: [ 49.430147][ T3493] (fs_reclaim){+.+.}-{0:0} [ 49.430168][ T3493] [ 49.430168][ T3493] ... which became SOFTIRQ-irq-unsafe at: [ 49.442517][ T3493] ... [ 49.442521][ T3493] lock_acquire+0x1db/0x4f0 [ 49.449650][ T3493] fs_reclaim_acquire+0x83/0x120 [ 49.454655][ T3493] slab_pre_alloc_hook+0x22/0xc0 [ 49.459652][ T3493] kmem_cache_alloc_trace+0x49/0x290 [ 49.465008][ T3493] wq_numa_init+0x122/0x49f [ 49.469585][ T3493] workqueue_init+0x18/0x5e1 [ 49.474241][ T3493] kernel_init_freeable+0x40a/0x5c5 [ 49.479596][ T3493] kernel_init+0x19/0x290 [ 49.483988][ T3493] ret_from_fork+0x1f/0x30 [ 49.488551][ T3493] [ 49.488551][ T3493] other info that might help us debug this: [ 49.488551][ T3493] [ 49.498753][ T3493] Possible interrupt unsafe locking scenario: [ 49.498753][ T3493] [ 49.507056][ T3493] CPU0 CPU1 [ 49.512406][ T3493] ---- ---- [ 49.517747][ T3493] lock(fs_reclaim); [ 49.521706][ T3493] local_irq_disable(); [ 49.528432][ T3493] lock(noop_qdisc.q.lock); [ 49.535515][ T3493] lock(fs_reclaim); [ 49.541992][ T3493] [ 49.545420][ T3493] lock(noop_qdisc.q.lock); [ 49.550150][ T3493] [ 49.550150][ T3493] *** DEADLOCK *** [ 49.550150][ T3493] [ 49.558263][ T3493] 2 locks held by syz-executor308/3493: [ 49.563778][ T3493] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 49.573138][ T3493] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 49.582753][ T3493] [ 49.582753][ T3493] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 49.593125][ T3493] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 49.598563][ T3493] HARDIRQ-ON-W at: [ 49.602513][ T3493] lock_acquire+0x1db/0x4f0 [ 49.608643][ T3493] _raw_spin_lock+0x2a/0x40 [ 49.614772][ T3493] __dev_queue_xmit+0xad6/0x3230 [ 49.621349][ T3493] tx+0x64/0x100 [ 49.626530][ T3493] kthread+0x234/0x440 [ 49.632221][ T3493] kthread+0x3f6/0x4f0 [ 49.637915][ T3493] ret_from_fork+0x1f/0x30 [ 49.643964][ T3493] IN-SOFTIRQ-W at: [ 49.647922][ T3493] lock_acquire+0x1db/0x4f0 [ 49.654058][ T3493] _raw_spin_lock+0x2a/0x40 [ 49.660370][ T3493] net_tx_action+0x6c5/0x8e0 [ 49.666594][ T3493] __do_softirq+0x3b3/0x93a [ 49.672734][ T3493] do_softirq+0x162/0x240 [ 49.678687][ T3493] __local_bh_enable_ip+0x1b1/0x1f0 [ 49.685512][ T3493] dev_deactivate_many+0x524/0xbf0 [ 49.692251][ T3493] dev_deactivate+0x177/0x270 [ 49.698554][ T3493] linkwatch_do_dev+0x104/0x160 [ 49.705027][ T3493] __linkwatch_run_queue+0x4ca/0x7f0 [ 49.711933][ T3493] linkwatch_event+0x48/0x50 [ 49.718144][ T3493] process_one_work+0x8a1/0x10c0 [ 49.724704][ T3493] worker_thread+0xaca/0x1280 [ 49.731010][ T3493] kthread+0x3f6/0x4f0 [ 49.736699][ T3493] ret_from_fork+0x1f/0x30 [ 49.742739][ T3493] INITIAL USE at: [ 49.746606][ T3493] lock_acquire+0x1db/0x4f0 [ 49.752651][ T3493] _raw_spin_lock+0x2a/0x40 [ 49.758705][ T3493] __dev_queue_xmit+0xad6/0x3230 [ 49.765195][ T3493] tx+0x64/0x100 [ 49.770291][ T3493] kthread+0x234/0x440 [ 49.775903][ T3493] kthread+0x3f6/0x4f0 [ 49.781506][ T3493] ret_from_fork+0x1f/0x30 [ 49.787461][ T3493] } [ 49.789934][ T3493] ... key at: [] noop_qdisc+0x108/0x320 [ 49.797552][ T3493] [ 49.797552][ T3493] the dependencies between the lock to be acquired [ 49.797558][ T3493] and SOFTIRQ-irq-unsafe lock: [ 49.811056][ T3493] -> (fs_reclaim){+.+.}-{0:0} { [ 49.815888][ T3493] HARDIRQ-ON-W at: [ 49.819838][ T3493] lock_acquire+0x1db/0x4f0 [ 49.825964][ T3493] fs_reclaim_acquire+0x83/0x120 [ 49.832531][ T3493] slab_pre_alloc_hook+0x22/0xc0 [ 49.839088][ T3493] kmem_cache_alloc_trace+0x49/0x290 [ 49.845999][ T3493] wq_numa_init+0x122/0x49f [ 49.852138][ T3493] workqueue_init+0x18/0x5e1 [ 49.858356][ T3493] kernel_init_freeable+0x40a/0x5c5 [ 49.865179][ T3493] kernel_init+0x19/0x290 [ 49.871139][ T3493] ret_from_fork+0x1f/0x30 [ 49.877187][ T3493] SOFTIRQ-ON-W at: [ 49.881149][ T3493] lock_acquire+0x1db/0x4f0 [ 49.887281][ T3493] fs_reclaim_acquire+0x83/0x120 [ 49.893842][ T3493] slab_pre_alloc_hook+0x22/0xc0 [ 49.900403][ T3493] kmem_cache_alloc_trace+0x49/0x290 [ 49.907312][ T3493] wq_numa_init+0x122/0x49f [ 49.913442][ T3493] workqueue_init+0x18/0x5e1 [ 49.919653][ T3493] kernel_init_freeable+0x40a/0x5c5 [ 49.926471][ T3493] kernel_init+0x19/0x290 [ 49.932422][ T3493] ret_from_fork+0x1f/0x30 [ 49.938471][ T3493] INITIAL USE at: [ 49.942336][ T3493] lock_acquire+0x1db/0x4f0 [ 49.948375][ T3493] fs_reclaim_acquire+0x83/0x120 [ 49.954845][ T3493] slab_pre_alloc_hook+0x22/0xc0 [ 49.961315][ T3493] kmem_cache_alloc_trace+0x49/0x290 [ 49.968132][ T3493] wq_numa_init+0x122/0x49f [ 49.974168][ T3493] workqueue_init+0x18/0x5e1 [ 49.980293][ T3493] kernel_init_freeable+0x40a/0x5c5 [ 49.987035][ T3493] kernel_init+0x19/0x290 [ 49.992904][ T3493] ret_from_fork+0x1f/0x30 [ 49.998855][ T3493] } [ 50.001325][ T3493] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 50.009274][ T3493] ... acquired at: [ 50.013084][ T3493] lock_acquire+0x1db/0x4f0 [ 50.017732][ T3493] fs_reclaim_acquire+0x83/0x120 [ 50.022815][ T3493] slab_pre_alloc_hook+0x22/0xc0 [ 50.027898][ T3493] __kmalloc_node+0x71/0x390 [ 50.032632][ T3493] kvmalloc_node+0x80/0x140 [ 50.037282][ T3493] get_dist_table+0x83/0x2c0 [ 50.042017][ T3493] netem_change+0xa05/0x20c0 [ 50.046751][ T3493] netem_init+0x58/0xb0 [ 50.051050][ T3493] qdisc_create+0x8ae/0x1390 [ 50.055785][ T3493] tc_modify_qdisc+0xac5/0x1710 [ 50.060789][ T3493] rtnetlink_rcv_msg+0x993/0xee0 [ 50.065873][ T3493] netlink_rcv_skb+0x1cf/0x410 [ 50.070782][ T3493] netlink_unicast+0x7b6/0x980 [ 50.075691][ T3493] netlink_sendmsg+0xa30/0xd60 [ 50.080609][ T3493] ____sys_sendmsg+0x59e/0x8f0 [ 50.085519][ T3493] ___sys_sendmsg+0x252/0x2e0 [ 50.090340][ T3493] __se_sys_sendmsg+0x19a/0x260 [ 50.095335][ T3493] do_syscall_64+0x3d/0xb0 [ 50.099894][ T3493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.105930][ T3493] [ 50.108226][ T3493] [ 50.108226][ T3493] stack backtrace: [ 50.114084][ T3493] CPU: 1 PID: 3493 Comm: syz-executor308 Not tainted 5.15.126-syzkaller #0 [ 50.122636][ T3493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 50.132666][ T3493] Call Trace: [ 50.135930][ T3493] [ 50.138845][ T3493] dump_stack_lvl+0x1e3/0x2cb [ 50.143506][ T3493] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 50.149121][ T3493] ? panic+0x84d/0x84d [ 50.153166][ T3493] ? print_shortest_lock_dependencies+0xee/0x150 [ 50.159470][ T3493] validate_chain+0x4cfe/0x58b0 [ 50.164301][ T3493] ? reacquire_held_locks+0x660/0x660 [ 50.169666][ T3493] ? validate_chain+0x112/0x58b0 [ 50.174582][ T3493] ? reacquire_held_locks+0x660/0x660 [ 50.179931][ T3493] ? mark_lock+0x98/0x340 [ 50.184232][ T3493] __lock_acquire+0x1295/0x1ff0 [ 50.189070][ T3493] lock_acquire+0x1db/0x4f0 [ 50.193560][ T3493] ? slab_pre_alloc_hook+0x22/0xc0 [ 50.198648][ T3493] ? read_lock_is_recursive+0x10/0x10 [ 50.204010][ T3493] fs_reclaim_acquire+0x83/0x120 [ 50.208935][ T3493] ? slab_pre_alloc_hook+0x22/0xc0 [ 50.214028][ T3493] slab_pre_alloc_hook+0x22/0xc0 [ 50.218948][ T3493] __kmalloc_node+0x71/0x390 [ 50.223518][ T3493] ? kvmalloc_node+0x80/0x140 [ 50.228172][ T3493] ? __bpf_trace_softirq+0x10/0x10 [ 50.233261][ T3493] kvmalloc_node+0x80/0x140 [ 50.237742][ T3493] get_dist_table+0x83/0x2c0 [ 50.242397][ T3493] netem_change+0xa05/0x20c0 [ 50.246972][ T3493] ? netem_destroy+0xb0/0xb0 [ 50.251532][ T3493] ? debug_object_init+0x10/0x10 [ 50.256444][ T3493] ? memset+0x1f/0x40 [ 50.260398][ T3493] ? lockdep_init_map_type+0x9d/0x8d0 [ 50.265751][ T3493] ? memset+0x1f/0x40 [ 50.269711][ T3493] ? __hrtimer_init+0x181/0x260 [ 50.274548][ T3493] netem_init+0x58/0xb0 [ 50.278687][ T3493] ? qdisc_peek_dequeued+0x220/0x220 [ 50.283952][ T3493] qdisc_create+0x8ae/0x1390 [ 50.288520][ T3493] ? qdisc_notify+0x380/0x380 [ 50.293175][ T3493] ? apparmor_capable+0x12e/0x190 [ 50.298175][ T3493] tc_modify_qdisc+0xac5/0x1710 [ 50.303003][ T3493] ? rcu_lock_release+0x20/0x20 [ 50.307834][ T3493] ? rcu_lock_release+0x20/0x20 [ 50.312658][ T3493] rtnetlink_rcv_msg+0x993/0xee0 [ 50.317580][ T3493] ? reacquire_held_locks+0x660/0x660 [ 50.322943][ T3493] ? rtnetlink_bind+0x80/0x80 [ 50.327598][ T3493] ? is_bpf_text_address+0x24f/0x260 [ 50.332861][ T3493] ? stack_trace_save+0x1c0/0x1c0 [ 50.337858][ T3493] ? __kernel_text_address+0x94/0x100 [ 50.343299][ T3493] ? unwind_get_return_address+0x49/0x80 [ 50.348909][ T3493] ? arch_stack_walk+0xf3/0x140 [ 50.353734][ T3493] ? mark_lock+0x98/0x340 [ 50.358039][ T3493] ? mark_lock+0x98/0x340 [ 50.362387][ T3493] ? __lock_acquire+0x1295/0x1ff0 [ 50.367391][ T3493] netlink_rcv_skb+0x1cf/0x410 [ 50.372138][ T3493] ? rtnetlink_bind+0x80/0x80 [ 50.376789][ T3493] ? netlink_ack+0xb10/0xb10 [ 50.381352][ T3493] netlink_unicast+0x7b6/0x980 [ 50.386099][ T3493] ? netlink_detachskb+0x90/0x90 [ 50.391013][ T3493] ? 0xffffffff81000000 [ 50.395138][ T3493] ? __check_object_size+0x300/0x410 [ 50.400393][ T3493] ? bpf_lsm_netlink_send+0x5/0x10 [ 50.405479][ T3493] netlink_sendmsg+0xa30/0xd60 [ 50.410215][ T3493] ? netlink_getsockopt+0x5b0/0x5b0 [ 50.415383][ T3493] ? aa_sock_msg_perm+0x91/0x150 [ 50.420293][ T3493] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 50.425566][ T3493] ? security_socket_sendmsg+0x7d/0xa0 [ 50.431012][ T3493] ? netlink_getsockopt+0x5b0/0x5b0 [ 50.436191][ T3493] ____sys_sendmsg+0x59e/0x8f0 [ 50.440938][ T3493] ? iovec_from_user+0x300/0x390 [ 50.445859][ T3493] ? __sys_sendmsg_sock+0x30/0x30 [ 50.450863][ T3493] ___sys_sendmsg+0x252/0x2e0 [ 50.455516][ T3493] ? __sys_sendmsg+0x260/0x260 [ 50.460252][ T3493] ? __lock_acquire+0x1295/0x1ff0 [ 50.465258][ T3493] ? read_lock_is_recursive+0x10/0x10 [ 50.470608][ T3493] ? __context_tracking_exit+0x4c/0x80 [ 50.476038][ T3493] ? __fdget+0x158/0x220 [ 50.480255][ T3493] __se_sys_sendmsg+0x19a/0x260 [ 50.485077][ T3493] ? __x64_sys_sendmsg+0x80/0x80 [ 50.490001][ T3493] ? syscall_enter_from_user_mode+0x2e/0x230 [ 50.495969][ T3493] ? lockdep_hardirqs_on+0x94/0x130 [ 50.501142][ T3493] ? syscall_enter_from_user_mode+0x2e/0x230 [ 50.507095][ T3493] do_syscall_64+0x3d/0xb0 [ 50.511489][ T3493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.517361][ T3493] RIP: 0033:0x7fc802d018b9 [ 50.521754][ T3493] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 50.541332][ T3493] RSP: 002b:00007ffecba52538 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 50.549727][ T3493] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc802d018b9 [ 50.557686][ T3493] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 50.565637][ T3493] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffecba525b0 [ 50.573583][ T3493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 50.581535][ T3493] R13: 00007ffecba52738 R14: 0000000000000001 R15: 0000000000000001 [ 50.589492][ T3493] [ 50.592586][ T3493] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 50.602048][ T3493] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3493, name: syz-executor308 [ 50.611530][ T3493] INFO: lockdep is turned off. [ 50.616285][ T3493] Preemption disabled at: [ 50.616294][ T3493] [<0000000000000000>] 0x0 [ 50.625012][ T3493] CPU: 1 PID: 3493 Comm: syz-executor308 Not tainted 5.15.126-syzkaller #0 [ 50.633572][ T3493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 50.643602][ T3493] Call Trace: [ 50.646864][ T3493] [ 50.649771][ T3493] dump_stack_lvl+0x1e3/0x2cb [ 50.654457][ T3493] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 50.660061][ T3493] ? panic+0x84d/0x84d [ 50.664102][ T3493] ? rcu_is_watching+0x11/0xa0 [ 50.668839][ T3493] ? rcu_is_watching+0x11/0xa0 [ 50.673574][ T3493] ___might_sleep+0x547/0x6a0 [ 50.678223][ T3493] ? __might_sleep+0xc0/0xc0 [ 50.682786][ T3493] slab_pre_alloc_hook+0x44/0xc0 [ 50.687700][ T3493] __kmalloc_node+0x71/0x390 [ 50.692259][ T3493] ? kvmalloc_node+0x80/0x140 [ 50.696909][ T3493] ? __bpf_trace_softirq+0x10/0x10 [ 50.701991][ T3493] kvmalloc_node+0x80/0x140 [ 50.706475][ T3493] get_dist_table+0x83/0x2c0 [ 50.711055][ T3493] netem_change+0xa05/0x20c0 [ 50.715637][ T3493] ? netem_destroy+0xb0/0xb0 [ 50.720205][ T3493] ? debug_object_init+0x10/0x10 [ 50.725119][ T3493] ? memset+0x1f/0x40 [ 50.729085][ T3493] ? lockdep_init_map_type+0x9d/0x8d0 [ 50.734448][ T3493] ? memset+0x1f/0x40 [ 50.738423][ T3493] ? __hrtimer_init+0x181/0x260 [ 50.743253][ T3493] netem_init+0x58/0xb0 [ 50.747395][ T3493] ? qdisc_peek_dequeued+0x220/0x220 [ 50.752746][ T3493] qdisc_create+0x8ae/0x1390 [ 50.757321][ T3493] ? qdisc_notify+0x380/0x380 [ 50.761991][ T3493] ? apparmor_capable+0x12e/0x190 [ 50.766993][ T3493] tc_modify_qdisc+0xac5/0x1710 [ 50.771827][ T3493] ? rcu_lock_release+0x20/0x20 [ 50.776657][ T3493] ? rcu_lock_release+0x20/0x20 [ 50.781483][ T3493] rtnetlink_rcv_msg+0x993/0xee0 [ 50.786423][ T3493] ? reacquire_held_locks+0x660/0x660 [ 50.791772][ T3493] ? rtnetlink_bind+0x80/0x80 [ 50.796422][ T3493] ? is_bpf_text_address+0x24f/0x260 [ 50.801678][ T3493] ? stack_trace_save+0x1c0/0x1c0 [ 50.806678][ T3493] ? __kernel_text_address+0x94/0x100 [ 50.812029][ T3493] ? unwind_get_return_address+0x49/0x80 [ 50.817653][ T3493] ? arch_stack_walk+0xf3/0x140 [ 50.822486][ T3493] ? mark_lock+0x98/0x340 [ 50.826793][ T3493] ? mark_lock+0x98/0x340 [ 50.831096][ T3493] ? __lock_acquire+0x1295/0x1ff0 [ 50.836104][ T3493] netlink_rcv_skb+0x1cf/0x410 [ 50.840858][ T3493] ? rtnetlink_bind+0x80/0x80 [ 50.845517][ T3493] ? netlink_ack+0xb10/0xb10 [ 50.850089][ T3493] netlink_unicast+0x7b6/0x980 [ 50.854837][ T3493] ? netlink_detachskb+0x90/0x90 [ 50.859751][ T3493] ? 0xffffffff81000000 [ 50.863878][ T3493] ? __check_object_size+0x300/0x410 [ 50.869140][ T3493] ? bpf_lsm_netlink_send+0x5/0x10 [ 50.874231][ T3493] netlink_sendmsg+0xa30/0xd60 [ 50.878976][ T3493] ? netlink_getsockopt+0x5b0/0x5b0 [ 50.884152][ T3493] ? aa_sock_msg_perm+0x91/0x150 [ 50.889067][ T3493] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 50.894322][ T3493] ? security_socket_sendmsg+0x7d/0xa0 [ 50.899758][ T3493] ? netlink_getsockopt+0x5b0/0x5b0 [ 50.904930][ T3493] ____sys_sendmsg+0x59e/0x8f0 [ 50.909668][ T3493] ? iovec_from_user+0x300/0x390 [ 50.914580][ T3493] ? __sys_sendmsg_sock+0x30/0x30 [ 50.919579][ T3493] ___sys_sendmsg+0x252/0x2e0 [ 50.924226][ T3493] ? __sys_sendmsg+0x260/0x260 [ 50.928964][ T3493] ? __lock_acquire+0x1295/0x1ff0 [ 50.933966][ T3493] ? read_lock_is_recursive+0x10/0x10 [ 50.939311][ T3493] ? __context_tracking_exit+0x4c/0x80 [ 50.944740][ T3493] ? __fdget+0x158/0x220 [ 50.948955][ T3493] __se_sys_sendmsg+0x19a/0x260 [ 50.953782][ T3493] ? __x64_sys_sendmsg+0x80/0x80 [ 50.958694][ T3493] ? syscall_enter_from_user_mode+0x2e/0x230 [ 50.964644][ T3493] ? lockdep_hardirqs_on+0x94/0x130 [ 50.969812][ T3493] ? syscall_enter_from_user_mode+0x2e/0x230 [ 50.975762][ T3493] do_syscall_64+0x3d/0xb0 [ 50.980158][ T3493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 50.986022][ T3493] RIP: 0033:0x7fc802d018b9 [ 50.990411][ T3493] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 51.009986][ T3493] RSP: 002b:00007ffecba52538 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 51.018370][ T3493] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc802d018b9 [ 51.026313][ T3493] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 51.034264][ T3493] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffecba525b0 [ 51.042209][ T3493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 51.050150][ T3493] R13: 00007ffecba52738 R14: 0000000000000001 R15: 0000000000000001 [ 51.058096][ T3493]