Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. executing program [ 42.345443][ T3497] [ 42.347770][ T3497] ===================================================== [ 42.354670][ T3497] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 42.362117][ T3497] 5.15.119-syzkaller #0 Not tainted [ 42.367282][ T3497] ----------------------------------------------------- [ 42.374185][ T3497] syz-executor305/3497 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 42.382222][ T3497] ffffffff8c9dcce0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 42.391159][ T3497] [ 42.391159][ T3497] and this task is already holding: [ 42.398492][ T3497] ffffffff8da1d808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 42.407677][ T3497] which would create a new lock dependency: [ 42.413624][ T3497] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 42.421243][ T3497] [ 42.421243][ T3497] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 42.430660][ T3497] (noop_qdisc.q.lock){+.-.}-{2:2} [ 42.430674][ T3497] [ 42.430674][ T3497] ... which became SOFTIRQ-irq-safe at: [ 42.443424][ T3497] lock_acquire+0x1db/0x4f0 [ 42.447991][ T3497] _raw_spin_lock+0x2a/0x40 [ 42.452549][ T3497] net_tx_action+0x6c5/0x8e0 [ 42.457199][ T3497] __do_softirq+0x3b3/0x93a [ 42.461759][ T3497] do_softirq+0x162/0x240 [ 42.466148][ T3497] __local_bh_enable_ip+0x1b1/0x1f0 [ 42.471403][ T3497] dev_deactivate_many+0x524/0xbf0 [ 42.476573][ T3497] dev_deactivate+0x177/0x270 [ 42.481306][ T3497] linkwatch_do_dev+0x104/0x160 [ 42.486215][ T3497] __linkwatch_run_queue+0x4ca/0x7f0 [ 42.491554][ T3497] linkwatch_event+0x48/0x50 [ 42.496199][ T3497] process_one_work+0x8a1/0x10c0 [ 42.501195][ T3497] worker_thread+0xaca/0x1280 [ 42.505933][ T3497] kthread+0x3f6/0x4f0 [ 42.510059][ T3497] ret_from_fork+0x1f/0x30 [ 42.514536][ T3497] [ 42.514536][ T3497] to a SOFTIRQ-irq-unsafe lock: [ 42.521540][ T3497] (fs_reclaim){+.+.}-{0:0} [ 42.521556][ T3497] [ 42.521556][ T3497] ... which became SOFTIRQ-irq-unsafe at: [ 42.533872][ T3497] ... [ 42.533877][ T3497] lock_acquire+0x1db/0x4f0 [ 42.540991][ T3497] fs_reclaim_acquire+0x83/0x120 [ 42.545991][ T3497] slab_pre_alloc_hook+0x22/0xc0 [ 42.550988][ T3497] kmem_cache_alloc_trace+0x49/0x290 [ 42.556339][ T3497] wq_numa_init+0x122/0x49f [ 42.560902][ T3497] workqueue_init+0x18/0x5e1 [ 42.565550][ T3497] kernel_init_freeable+0x40a/0x5c5 [ 42.570805][ T3497] kernel_init+0x19/0x290 [ 42.575190][ T3497] ret_from_fork+0x1f/0x30 [ 42.579666][ T3497] [ 42.579666][ T3497] other info that might help us debug this: [ 42.579666][ T3497] [ 42.589866][ T3497] Possible interrupt unsafe locking scenario: [ 42.589866][ T3497] [ 42.598155][ T3497] CPU0 CPU1 [ 42.603491][ T3497] ---- ---- [ 42.608829][ T3497] lock(fs_reclaim); [ 42.612781][ T3497] local_irq_disable(); [ 42.619504][ T3497] lock(noop_qdisc.q.lock); [ 42.626582][ T3497] lock(fs_reclaim); [ 42.633063][ T3497] [ 42.636492][ T3497] lock(noop_qdisc.q.lock); [ 42.641225][ T3497] [ 42.641225][ T3497] *** DEADLOCK *** [ 42.641225][ T3497] [ 42.649335][ T3497] 2 locks held by syz-executor305/3497: [ 42.654849][ T3497] #0: ffffffff8d9de208 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 42.664316][ T3497] #1: ffffffff8da1d808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 42.673950][ T3497] [ 42.673950][ T3497] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 42.684332][ T3497] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 42.689775][ T3497] HARDIRQ-ON-W at: [ 42.693726][ T3497] lock_acquire+0x1db/0x4f0 [ 42.699857][ T3497] _raw_spin_lock+0x2a/0x40 [ 42.705978][ T3497] __dev_queue_xmit+0xad6/0x3230 [ 42.712540][ T3497] tx+0x64/0x100 [ 42.717708][ T3497] kthread+0x234/0x440 [ 42.723403][ T3497] kthread+0x3f6/0x4f0 [ 42.729106][ T3497] ret_from_fork+0x1f/0x30 [ 42.735154][ T3497] IN-SOFTIRQ-W at: [ 42.739111][ T3497] lock_acquire+0x1db/0x4f0 [ 42.745243][ T3497] _raw_spin_lock+0x2a/0x40 [ 42.751374][ T3497] net_tx_action+0x6c5/0x8e0 [ 42.757587][ T3497] __do_softirq+0x3b3/0x93a [ 42.763711][ T3497] do_softirq+0x162/0x240 [ 42.769664][ T3497] __local_bh_enable_ip+0x1b1/0x1f0 [ 42.776496][ T3497] dev_deactivate_many+0x524/0xbf0 [ 42.783230][ T3497] dev_deactivate+0x177/0x270 [ 42.789528][ T3497] linkwatch_do_dev+0x104/0x160 [ 42.795998][ T3497] __linkwatch_run_queue+0x4ca/0x7f0 [ 42.802909][ T3497] linkwatch_event+0x48/0x50 [ 42.809122][ T3497] process_one_work+0x8a1/0x10c0 [ 42.815681][ T3497] worker_thread+0xaca/0x1280 [ 42.821979][ T3497] kthread+0x3f6/0x4f0 [ 42.827681][ T3497] ret_from_fork+0x1f/0x30 [ 42.833718][ T3497] INITIAL USE at: [ 42.837586][ T3497] lock_acquire+0x1db/0x4f0 [ 42.843623][ T3497] _raw_spin_lock+0x2a/0x40 [ 42.849658][ T3497] __dev_queue_xmit+0xad6/0x3230 [ 42.856128][ T3497] tx+0x64/0x100 [ 42.861209][ T3497] kthread+0x234/0x440 [ 42.866816][ T3497] kthread+0x3f6/0x4f0 [ 42.872415][ T3497] ret_from_fork+0x1f/0x30 [ 42.878375][ T3497] } [ 42.880846][ T3497] ... key at: [] noop_qdisc+0x108/0x320 [ 42.888454][ T3497] [ 42.888454][ T3497] the dependencies between the lock to be acquired [ 42.888458][ T3497] and SOFTIRQ-irq-unsafe lock: [ 42.901926][ T3497] -> (fs_reclaim){+.+.}-{0:0} { [ 42.906757][ T3497] HARDIRQ-ON-W at: [ 42.910705][ T3497] lock_acquire+0x1db/0x4f0 [ 42.916831][ T3497] fs_reclaim_acquire+0x83/0x120 [ 42.923389][ T3497] slab_pre_alloc_hook+0x22/0xc0 [ 42.929948][ T3497] kmem_cache_alloc_trace+0x49/0x290 [ 42.936851][ T3497] wq_numa_init+0x122/0x49f [ 42.942978][ T3497] workqueue_init+0x18/0x5e1 [ 42.949190][ T3497] kernel_init_freeable+0x40a/0x5c5 [ 42.956011][ T3497] kernel_init+0x19/0x290 [ 42.961965][ T3497] ret_from_fork+0x1f/0x30 [ 42.968015][ T3497] SOFTIRQ-ON-W at: [ 42.971970][ T3497] lock_acquire+0x1db/0x4f0 [ 42.978096][ T3497] fs_reclaim_acquire+0x83/0x120 [ 42.984654][ T3497] slab_pre_alloc_hook+0x22/0xc0 [ 42.991215][ T3497] kmem_cache_alloc_trace+0x49/0x290 [ 42.998121][ T3497] wq_numa_init+0x122/0x49f [ 43.004246][ T3497] workqueue_init+0x18/0x5e1 [ 43.010458][ T3497] kernel_init_freeable+0x40a/0x5c5 [ 43.017275][ T3497] kernel_init+0x19/0x290 [ 43.023225][ T3497] ret_from_fork+0x1f/0x30 [ 43.029263][ T3497] INITIAL USE at: [ 43.033130][ T3497] lock_acquire+0x1db/0x4f0 [ 43.039168][ T3497] fs_reclaim_acquire+0x83/0x120 [ 43.045640][ T3497] slab_pre_alloc_hook+0x22/0xc0 [ 43.052117][ T3497] kmem_cache_alloc_trace+0x49/0x290 [ 43.058936][ T3497] wq_numa_init+0x122/0x49f [ 43.064972][ T3497] workqueue_init+0x18/0x5e1 [ 43.071099][ T3497] kernel_init_freeable+0x40a/0x5c5 [ 43.077829][ T3497] kernel_init+0x19/0x290 [ 43.083690][ T3497] ret_from_fork+0x1f/0x30 [ 43.089640][ T3497] } [ 43.092113][ T3497] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 43.100064][ T3497] ... acquired at: [ 43.103836][ T3497] lock_acquire+0x1db/0x4f0 [ 43.108487][ T3497] fs_reclaim_acquire+0x83/0x120 [ 43.113569][ T3497] slab_pre_alloc_hook+0x22/0xc0 [ 43.118656][ T3497] __kmalloc_node+0x71/0x390 [ 43.123393][ T3497] kvmalloc_node+0x80/0x140 [ 43.128042][ T3497] get_dist_table+0x83/0x2c0 [ 43.132774][ T3497] netem_change+0xa05/0x20c0 [ 43.137510][ T3497] netem_init+0x58/0xb0 [ 43.141807][ T3497] qdisc_create+0x8ae/0x1390 [ 43.146543][ T3497] tc_modify_qdisc+0xac5/0x1710 [ 43.151537][ T3497] rtnetlink_rcv_msg+0x993/0xee0 [ 43.156617][ T3497] netlink_rcv_skb+0x1cf/0x410 [ 43.161525][ T3497] netlink_unicast+0x7b6/0x980 [ 43.166433][ T3497] netlink_sendmsg+0xa30/0xd60 [ 43.171341][ T3497] ____sys_sendmsg+0x59e/0x8f0 [ 43.176254][ T3497] ___sys_sendmsg+0x252/0x2e0 [ 43.181076][ T3497] __se_sys_sendmsg+0x19a/0x260 [ 43.186071][ T3497] do_syscall_64+0x3d/0xb0 [ 43.190630][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.196668][ T3497] [ 43.198969][ T3497] [ 43.198969][ T3497] stack backtrace: [ 43.204826][ T3497] CPU: 0 PID: 3497 Comm: syz-executor305 Not tainted 5.15.119-syzkaller #0 [ 43.213382][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 43.223409][ T3497] Call Trace: [ 43.226667][ T3497] [ 43.229571][ T3497] dump_stack_lvl+0x1e3/0x2cb [ 43.234223][ T3497] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 43.239828][ T3497] ? panic+0x84d/0x84d [ 43.243868][ T3497] ? print_shortest_lock_dependencies+0xee/0x150 [ 43.250175][ T3497] validate_chain+0x4cfe/0x58b0 [ 43.255005][ T3497] ? reacquire_held_locks+0x660/0x660 [ 43.260350][ T3497] ? validate_chain+0x112/0x58b0 [ 43.265274][ T3497] ? reacquire_held_locks+0x660/0x660 [ 43.270619][ T3497] ? mark_lock+0x98/0x340 [ 43.274920][ T3497] __lock_acquire+0x1295/0x1ff0 [ 43.279747][ T3497] lock_acquire+0x1db/0x4f0 [ 43.284223][ T3497] ? slab_pre_alloc_hook+0x22/0xc0 [ 43.289308][ T3497] ? read_lock_is_recursive+0x10/0x10 [ 43.294658][ T3497] fs_reclaim_acquire+0x83/0x120 [ 43.299569][ T3497] ? slab_pre_alloc_hook+0x22/0xc0 [ 43.304656][ T3497] slab_pre_alloc_hook+0x22/0xc0 [ 43.309564][ T3497] __kmalloc_node+0x71/0x390 [ 43.314126][ T3497] ? kvmalloc_node+0x80/0x140 [ 43.318775][ T3497] ? __bpf_trace_softirq+0x10/0x10 [ 43.323861][ T3497] kvmalloc_node+0x80/0x140 [ 43.328337][ T3497] get_dist_table+0x83/0x2c0 [ 43.332898][ T3497] netem_change+0xa05/0x20c0 [ 43.337465][ T3497] ? netem_destroy+0xb0/0xb0 [ 43.342024][ T3497] ? debug_object_init+0x10/0x10 [ 43.346939][ T3497] ? memset+0x1f/0x40 [ 43.350891][ T3497] ? lockdep_init_map_type+0x9d/0x8d0 [ 43.356241][ T3497] ? memset+0x1f/0x40 [ 43.360193][ T3497] ? __hrtimer_init+0x181/0x260 [ 43.365017][ T3497] netem_init+0x58/0xb0 [ 43.369157][ T3497] ? qdisc_peek_dequeued+0x220/0x220 [ 43.374413][ T3497] qdisc_create+0x8ae/0x1390 [ 43.378978][ T3497] ? qdisc_notify+0x380/0x380 [ 43.383631][ T3497] ? apparmor_capable+0x12e/0x190 [ 43.388629][ T3497] tc_modify_qdisc+0xac5/0x1710 [ 43.393455][ T3497] ? rcu_lock_release+0x20/0x20 [ 43.398281][ T3497] ? rcu_lock_release+0x20/0x20 [ 43.403103][ T3497] rtnetlink_rcv_msg+0x993/0xee0 [ 43.408016][ T3497] ? reacquire_held_locks+0x660/0x660 [ 43.413363][ T3497] ? rtnetlink_bind+0x80/0x80 [ 43.418012][ T3497] ? is_bpf_text_address+0x24f/0x260 [ 43.423268][ T3497] ? stack_trace_save+0x1c0/0x1c0 [ 43.428263][ T3497] ? __kernel_text_address+0x94/0x100 [ 43.433608][ T3497] ? unwind_get_return_address+0x49/0x80 [ 43.439213][ T3497] ? arch_stack_walk+0xf3/0x140 [ 43.444037][ T3497] ? mark_lock+0x98/0x340 [ 43.448341][ T3497] ? mark_lock+0x98/0x340 [ 43.452642][ T3497] ? __lock_acquire+0x1295/0x1ff0 [ 43.457642][ T3497] netlink_rcv_skb+0x1cf/0x410 [ 43.462379][ T3497] ? rtnetlink_bind+0x80/0x80 [ 43.467028][ T3497] ? netlink_ack+0xb10/0xb10 [ 43.471590][ T3497] netlink_unicast+0x7b6/0x980 [ 43.476328][ T3497] ? netlink_detachskb+0x90/0x90 [ 43.481236][ T3497] ? 0xffffffff81000000 [ 43.485361][ T3497] ? __check_object_size+0x300/0x410 [ 43.490617][ T3497] ? bpf_lsm_netlink_send+0x5/0x10 [ 43.495703][ T3497] netlink_sendmsg+0xa30/0xd60 [ 43.500442][ T3497] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.505613][ T3497] ? aa_sock_msg_perm+0x91/0x150 [ 43.510524][ T3497] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 43.515782][ T3497] ? security_socket_sendmsg+0x7d/0xa0 [ 43.521210][ T3497] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.526381][ T3497] ____sys_sendmsg+0x59e/0x8f0 [ 43.531121][ T3497] ? iovec_from_user+0x300/0x390 [ 43.536034][ T3497] ? __sys_sendmsg_sock+0x30/0x30 [ 43.541034][ T3497] ___sys_sendmsg+0x252/0x2e0 [ 43.545685][ T3497] ? __sys_sendmsg+0x260/0x260 [ 43.550432][ T3497] ? __lock_acquire+0x1295/0x1ff0 [ 43.555446][ T3497] ? __context_tracking_enter+0x5f/0x90 [ 43.560967][ T3497] ? __context_tracking_exit+0x4c/0x80 [ 43.566398][ T3497] ? __fdget+0x158/0x220 [ 43.570613][ T3497] __se_sys_sendmsg+0x19a/0x260 [ 43.575439][ T3497] ? __x64_sys_sendmsg+0x80/0x80 [ 43.580351][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 43.586319][ T3497] ? lockdep_hardirqs_on+0x94/0x130 [ 43.591490][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 43.597442][ T3497] do_syscall_64+0x3d/0xb0 [ 43.601829][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.607693][ T3497] RIP: 0033:0x7f2c07fd01f9 [ 43.612168][ T3497] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 43.631834][ T3497] RSP: 002b:00007ffc4a9bb2e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 43.640218][ T3497] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2c07fd01f9 [ 43.648168][ T3497] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 43.656121][ T3497] RBP: 00007f2c07f941e0 R08: 00000000ffffffff R09: 0000000000000000 [ 43.664066][ T3497] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f2c07f94270 [ 43.672012][ T3497] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 43.679968][ T3497] [ 43.683014][ T3497] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 43.692467][ T3497] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3497, name: syz-executor305 [ 43.701935][ T3497] INFO: lockdep is turned off. [ 43.706680][ T3497] Preemption disabled at: [ 43.706685][ T3497] [<0000000000000000>] 0x0 [ 43.715408][ T3497] CPU: 0 PID: 3497 Comm: syz-executor305 Not tainted 5.15.119-syzkaller #0 [ 43.723964][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 [ 43.733993][ T3497] Call Trace: [ 43.737244][ T3497] [ 43.740149][ T3497] dump_stack_lvl+0x1e3/0x2cb [ 43.744802][ T3497] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 43.750410][ T3497] ? panic+0x84d/0x84d [ 43.754453][ T3497] ? rcu_is_watching+0x11/0xa0 [ 43.759186][ T3497] ? rcu_is_watching+0x11/0xa0 [ 43.763921][ T3497] ___might_sleep+0x547/0x6a0 [ 43.768575][ T3497] ? __might_sleep+0xc0/0xc0 [ 43.773138][ T3497] slab_pre_alloc_hook+0x44/0xc0 [ 43.778050][ T3497] __kmalloc_node+0x71/0x390 [ 43.782612][ T3497] ? kvmalloc_node+0x80/0x140 [ 43.787262][ T3497] ? __bpf_trace_softirq+0x10/0x10 [ 43.792352][ T3497] kvmalloc_node+0x80/0x140 [ 43.796839][ T3497] get_dist_table+0x83/0x2c0 [ 43.801403][ T3497] netem_change+0xa05/0x20c0 [ 43.805970][ T3497] ? netem_destroy+0xb0/0xb0 [ 43.810529][ T3497] ? debug_object_init+0x10/0x10 [ 43.815442][ T3497] ? memset+0x1f/0x40 [ 43.819394][ T3497] ? lockdep_init_map_type+0x9d/0x8d0 [ 43.824742][ T3497] ? memset+0x1f/0x40 [ 43.828706][ T3497] ? __hrtimer_init+0x181/0x260 [ 43.833530][ T3497] netem_init+0x58/0xb0 [ 43.837658][ T3497] ? qdisc_peek_dequeued+0x220/0x220 [ 43.842915][ T3497] qdisc_create+0x8ae/0x1390 [ 43.847482][ T3497] ? qdisc_notify+0x380/0x380 [ 43.852130][ T3497] ? apparmor_capable+0x12e/0x190 [ 43.857139][ T3497] tc_modify_qdisc+0xac5/0x1710 [ 43.861975][ T3497] ? rcu_lock_release+0x20/0x20 [ 43.866801][ T3497] ? rcu_lock_release+0x20/0x20 [ 43.871621][ T3497] rtnetlink_rcv_msg+0x993/0xee0 [ 43.876531][ T3497] ? reacquire_held_locks+0x660/0x660 [ 43.881873][ T3497] ? rtnetlink_bind+0x80/0x80 [ 43.886519][ T3497] ? is_bpf_text_address+0x24f/0x260 [ 43.891774][ T3497] ? stack_trace_save+0x1c0/0x1c0 [ 43.896768][ T3497] ? __kernel_text_address+0x94/0x100 [ 43.902114][ T3497] ? unwind_get_return_address+0x49/0x80 [ 43.907721][ T3497] ? arch_stack_walk+0xf3/0x140 [ 43.912546][ T3497] ? mark_lock+0x98/0x340 [ 43.916845][ T3497] ? mark_lock+0x98/0x340 [ 43.921149][ T3497] ? __lock_acquire+0x1295/0x1ff0 [ 43.926153][ T3497] netlink_rcv_skb+0x1cf/0x410 [ 43.930893][ T3497] ? rtnetlink_bind+0x80/0x80 [ 43.935542][ T3497] ? netlink_ack+0xb10/0xb10 [ 43.940105][ T3497] netlink_unicast+0x7b6/0x980 [ 43.944843][ T3497] ? netlink_detachskb+0x90/0x90 [ 43.949752][ T3497] ? 0xffffffff81000000 [ 43.953878][ T3497] ? __check_object_size+0x300/0x410 [ 43.959138][ T3497] ? bpf_lsm_netlink_send+0x5/0x10 [ 43.964222][ T3497] netlink_sendmsg+0xa30/0xd60 [ 43.968966][ T3497] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.974135][ T3497] ? aa_sock_msg_perm+0x91/0x150 [ 43.979047][ T3497] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 43.984390][ T3497] ? security_socket_sendmsg+0x7d/0xa0 [ 43.989821][ T3497] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.994995][ T3497] ____sys_sendmsg+0x59e/0x8f0 [ 43.999733][ T3497] ? iovec_from_user+0x300/0x390 [ 44.004645][ T3497] ? __sys_sendmsg_sock+0x30/0x30 [ 44.009646][ T3497] ___sys_sendmsg+0x252/0x2e0 [ 44.014296][ T3497] ? __sys_sendmsg+0x260/0x260 [ 44.019034][ T3497] ? __lock_acquire+0x1295/0x1ff0 [ 44.024038][ T3497] ? __context_tracking_enter+0x5f/0x90 [ 44.029555][ T3497] ? __context_tracking_exit+0x4c/0x80 [ 44.034984][ T3497] ? __fdget+0x158/0x220 [ 44.039198][ T3497] __se_sys_sendmsg+0x19a/0x260 [ 44.044019][ T3497] ? __x64_sys_sendmsg+0x80/0x80 [ 44.048934][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.054892][ T3497] ? lockdep_hardirqs_on+0x94/0x130 [ 44.060066][ T3497] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.066016][ T3497] do_syscall_64+0x3d/0xb0 [ 44.070409][ T3497] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.076276][ T3497] RIP: 0033:0x7f2c07fd01f9 [ 44.080665][ T3497] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 44.100242][ T3497] RSP: 002b:00007ffc4a9bb2e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.108632][ T3497] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2c07fd01f9 [ 44.116581][ T3497] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 44.124526][ T3497] RBP: 00007f2c07f941e0 R08: 00000000ffffffff R09: 0000000000000000 [ 44.132470][ T3497] R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f2c07f94270 [ 44.140424][ T3497] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 44.148375][ T3497]