Warning: Permanently added '10.128.0.103' (ED25519) to the list of known hosts. executing program [ 60.071195][ T3492] [ 60.073558][ T3492] ===================================================== [ 60.080562][ T3492] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 60.088009][ T3492] 5.15.126-syzkaller #0 Not tainted [ 60.093188][ T3492] ----------------------------------------------------- [ 60.100099][ T3492] syz-executor174/3492 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 60.108149][ T3492] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 60.117105][ T3492] [ 60.117105][ T3492] and this task is already holding: [ 60.124453][ T3492] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 60.133677][ T3492] which would create a new lock dependency: [ 60.139642][ T3492] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 60.147283][ T3492] [ 60.147283][ T3492] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 60.156901][ T3492] (noop_qdisc.q.lock){+.-.}-{2:2} [ 60.156921][ T3492] [ 60.156921][ T3492] ... which became SOFTIRQ-irq-safe at: [ 60.169955][ T3492] lock_acquire+0x1db/0x4f0 [ 60.174543][ T3492] _raw_spin_lock+0x2a/0x40 [ 60.179123][ T3492] net_tx_action+0x6c5/0x8e0 [ 60.183893][ T3492] __do_softirq+0x3b3/0x93a [ 60.188470][ T3492] do_softirq+0x162/0x240 [ 60.192885][ T3492] __local_bh_enable_ip+0x1b1/0x1f0 [ 60.198162][ T3492] dev_deactivate_many+0x524/0xbf0 [ 60.203575][ T3492] dev_deactivate+0x177/0x270 [ 60.208346][ T3492] linkwatch_do_dev+0x104/0x160 [ 60.213283][ T3492] __linkwatch_run_queue+0x4ca/0x7f0 [ 60.218653][ T3492] linkwatch_event+0x48/0x50 [ 60.223321][ T3492] process_one_work+0x8a1/0x10c0 [ 60.228341][ T3492] worker_thread+0xaca/0x1280 [ 60.233098][ T3492] kthread+0x3f6/0x4f0 [ 60.237248][ T3492] ret_from_fork+0x1f/0x30 [ 60.241741][ T3492] [ 60.241741][ T3492] to a SOFTIRQ-irq-unsafe lock: [ 60.248743][ T3492] (fs_reclaim){+.+.}-{0:0} [ 60.248773][ T3492] [ 60.248773][ T3492] ... which became SOFTIRQ-irq-unsafe at: [ 60.261109][ T3492] ... [ 60.261115][ T3492] lock_acquire+0x1db/0x4f0 [ 60.268276][ T3492] fs_reclaim_acquire+0x83/0x120 [ 60.273313][ T3492] slab_pre_alloc_hook+0x22/0xc0 [ 60.278334][ T3492] kmem_cache_alloc_trace+0x49/0x290 [ 60.283698][ T3492] wq_numa_init+0x122/0x49f [ 60.288818][ T3492] workqueue_init+0x18/0x5e1 [ 60.293492][ T3492] kernel_init_freeable+0x40a/0x5c5 [ 60.298769][ T3492] kernel_init+0x19/0x290 [ 60.303202][ T3492] ret_from_fork+0x1f/0x30 [ 60.307707][ T3492] [ 60.307707][ T3492] other info that might help us debug this: [ 60.307707][ T3492] [ 60.318012][ T3492] Possible interrupt unsafe locking scenario: [ 60.318012][ T3492] [ 60.326317][ T3492] CPU0 CPU1 [ 60.331804][ T3492] ---- ---- [ 60.337156][ T3492] lock(fs_reclaim); [ 60.341137][ T3492] local_irq_disable(); [ 60.347876][ T3492] lock(noop_qdisc.q.lock); [ 60.354973][ T3492] lock(fs_reclaim); [ 60.361456][ T3492] [ 60.364900][ T3492] lock(noop_qdisc.q.lock); [ 60.369750][ T3492] [ 60.369750][ T3492] *** DEADLOCK *** [ 60.369750][ T3492] [ 60.377879][ T3492] 2 locks held by syz-executor174/3492: [ 60.383401][ T3492] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 60.392791][ T3492] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 60.402444][ T3492] [ 60.402444][ T3492] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 60.412841][ T3492] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 60.418393][ T3492] HARDIRQ-ON-W at: [ 60.422353][ T3492] lock_acquire+0x1db/0x4f0 [ 60.428499][ T3492] _raw_spin_lock+0x2a/0x40 [ 60.434641][ T3492] __dev_queue_xmit+0xad6/0x3230 [ 60.441214][ T3492] tx+0x64/0x100 [ 60.446401][ T3492] kthread+0x234/0x440 [ 60.452115][ T3492] kthread+0x3f6/0x4f0 [ 60.457994][ T3492] ret_from_fork+0x1f/0x30 [ 60.464074][ T3492] IN-SOFTIRQ-W at: [ 60.468046][ T3492] lock_acquire+0x1db/0x4f0 [ 60.474194][ T3492] _raw_spin_lock+0x2a/0x40 [ 60.480357][ T3492] net_tx_action+0x6c5/0x8e0 [ 60.486585][ T3492] __do_softirq+0x3b3/0x93a [ 60.492838][ T3492] do_softirq+0x162/0x240 [ 60.498812][ T3492] __local_bh_enable_ip+0x1b1/0x1f0 [ 60.505650][ T3492] dev_deactivate_many+0x524/0xbf0 [ 60.512513][ T3492] dev_deactivate+0x177/0x270 [ 60.518838][ T3492] linkwatch_do_dev+0x104/0x160 [ 60.525333][ T3492] __linkwatch_run_queue+0x4ca/0x7f0 [ 60.532349][ T3492] linkwatch_event+0x48/0x50 [ 60.538576][ T3492] process_one_work+0x8a1/0x10c0 [ 60.545239][ T3492] worker_thread+0xaca/0x1280 [ 60.551553][ T3492] kthread+0x3f6/0x4f0 [ 60.557269][ T3492] ret_from_fork+0x1f/0x30 [ 60.563326][ T3492] INITIAL USE at: [ 60.567203][ T3492] lock_acquire+0x1db/0x4f0 [ 60.573261][ T3492] _raw_spin_lock+0x2a/0x40 [ 60.579331][ T3492] __dev_queue_xmit+0xad6/0x3230 [ 60.585851][ T3492] tx+0x64/0x100 [ 60.590991][ T3492] kthread+0x234/0x440 [ 60.596607][ T3492] kthread+0x3f6/0x4f0 [ 60.602225][ T3492] ret_from_fork+0x1f/0x30 [ 60.608216][ T3492] } [ 60.610700][ T3492] ... key at: [] noop_qdisc+0x108/0x320 [ 60.618441][ T3492] [ 60.618441][ T3492] the dependencies between the lock to be acquired [ 60.618448][ T3492] and SOFTIRQ-irq-unsafe lock: [ 60.631939][ T3492] -> (fs_reclaim){+.+.}-{0:0} { [ 60.636819][ T3492] HARDIRQ-ON-W at: [ 60.640790][ T3492] lock_acquire+0x1db/0x4f0 [ 60.646938][ T3492] fs_reclaim_acquire+0x83/0x120 [ 60.653613][ T3492] slab_pre_alloc_hook+0x22/0xc0 [ 60.660284][ T3492] kmem_cache_alloc_trace+0x49/0x290 [ 60.667305][ T3492] wq_numa_init+0x122/0x49f [ 60.673533][ T3492] workqueue_init+0x18/0x5e1 [ 60.679784][ T3492] kernel_init_freeable+0x40a/0x5c5 [ 60.686629][ T3492] kernel_init+0x19/0x290 [ 60.692622][ T3492] ret_from_fork+0x1f/0x30 [ 60.698701][ T3492] SOFTIRQ-ON-W at: [ 60.702666][ T3492] lock_acquire+0x1db/0x4f0 [ 60.708934][ T3492] fs_reclaim_acquire+0x83/0x120 [ 60.715516][ T3492] slab_pre_alloc_hook+0x22/0xc0 [ 60.722093][ T3492] kmem_cache_alloc_trace+0x49/0x290 [ 60.729014][ T3492] wq_numa_init+0x122/0x49f [ 60.735151][ T3492] workqueue_init+0x18/0x5e1 [ 60.741375][ T3492] kernel_init_freeable+0x40a/0x5c5 [ 60.748207][ T3492] kernel_init+0x19/0x290 [ 60.754181][ T3492] ret_from_fork+0x1f/0x30 [ 60.760261][ T3492] INITIAL USE at: [ 60.764145][ T3492] lock_acquire+0x1db/0x4f0 [ 60.770196][ T3492] fs_reclaim_acquire+0x83/0x120 [ 60.776685][ T3492] slab_pre_alloc_hook+0x22/0xc0 [ 60.783176][ T3492] kmem_cache_alloc_trace+0x49/0x290 [ 60.790009][ T3492] wq_numa_init+0x122/0x49f [ 60.796067][ T3492] workqueue_init+0x18/0x5e1 [ 60.802206][ T3492] kernel_init_freeable+0x40a/0x5c5 [ 60.808952][ T3492] kernel_init+0x19/0x290 [ 60.814916][ T3492] ret_from_fork+0x1f/0x30 [ 60.820877][ T3492] } [ 60.823377][ T3492] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 60.831431][ T3492] ... acquired at: [ 60.835216][ T3492] lock_acquire+0x1db/0x4f0 [ 60.839882][ T3492] fs_reclaim_acquire+0x83/0x120 [ 60.844988][ T3492] slab_pre_alloc_hook+0x22/0xc0 [ 60.850085][ T3492] __kmalloc_node+0x71/0x390 [ 60.854841][ T3492] kvmalloc_node+0x80/0x140 [ 60.859504][ T3492] get_dist_table+0x83/0x2c0 [ 60.864264][ T3492] netem_change+0xa05/0x20c0 [ 60.869017][ T3492] netem_init+0x58/0xb0 [ 60.873414][ T3492] qdisc_create+0x8ae/0x1390 [ 60.878160][ T3492] tc_modify_qdisc+0xac5/0x1710 [ 60.883168][ T3492] rtnetlink_rcv_msg+0x993/0xee0 [ 60.888290][ T3492] netlink_rcv_skb+0x1cf/0x410 [ 60.893214][ T3492] netlink_unicast+0x7b6/0x980 [ 60.898151][ T3492] netlink_sendmsg+0xa30/0xd60 [ 60.903072][ T3492] ____sys_sendmsg+0x59e/0x8f0 [ 60.908033][ T3492] ___sys_sendmsg+0x252/0x2e0 [ 60.912957][ T3492] __se_sys_sendmsg+0x19a/0x260 [ 60.917972][ T3492] do_syscall_64+0x3d/0xb0 [ 60.922552][ T3492] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 60.928608][ T3492] [ 60.930916][ T3492] [ 60.930916][ T3492] stack backtrace: [ 60.936792][ T3492] CPU: 1 PID: 3492 Comm: syz-executor174 Not tainted 5.15.126-syzkaller #0 [ 60.945363][ T3492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 60.955404][ T3492] Call Trace: [ 60.958695][ T3492] [ 60.961715][ T3492] dump_stack_lvl+0x1e3/0x2cb [ 60.966394][ T3492] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 60.972015][ T3492] ? panic+0x84d/0x84d [ 60.976079][ T3492] ? print_shortest_lock_dependencies+0xee/0x150 [ 60.982636][ T3492] validate_chain+0x4cfe/0x58b0 [ 60.987498][ T3492] ? reacquire_held_locks+0x660/0x660 [ 60.992861][ T3492] ? validate_chain+0x112/0x58b0 [ 60.997797][ T3492] ? reacquire_held_locks+0x660/0x660 [ 61.003162][ T3492] ? mark_lock+0x98/0x340 [ 61.007486][ T3492] __lock_acquire+0x1295/0x1ff0 [ 61.012333][ T3492] lock_acquire+0x1db/0x4f0 [ 61.016829][ T3492] ? slab_pre_alloc_hook+0x22/0xc0 [ 61.021935][ T3492] ? read_lock_is_recursive+0x10/0x10 [ 61.027316][ T3492] fs_reclaim_acquire+0x83/0x120 [ 61.032256][ T3492] ? slab_pre_alloc_hook+0x22/0xc0 [ 61.037371][ T3492] slab_pre_alloc_hook+0x22/0xc0 [ 61.042444][ T3492] __kmalloc_node+0x71/0x390 [ 61.047029][ T3492] ? kvmalloc_node+0x80/0x140 [ 61.051712][ T3492] ? __bpf_trace_softirq+0x10/0x10 [ 61.056816][ T3492] kvmalloc_node+0x80/0x140 [ 61.061311][ T3492] get_dist_table+0x83/0x2c0 [ 61.065905][ T3492] netem_change+0xa05/0x20c0 [ 61.070492][ T3492] ? netem_destroy+0xb0/0xb0 [ 61.075068][ T3492] ? debug_object_init+0x10/0x10 [ 61.079995][ T3492] ? memset+0x1f/0x40 [ 61.083965][ T3492] ? lockdep_init_map_type+0x9d/0x8d0 [ 61.089349][ T3492] ? memset+0x1f/0x40 [ 61.093329][ T3492] ? __hrtimer_init+0x181/0x260 [ 61.098295][ T3492] netem_init+0x58/0xb0 [ 61.102441][ T3492] ? qdisc_peek_dequeued+0x220/0x220 [ 61.107718][ T3492] qdisc_create+0x8ae/0x1390 [ 61.112309][ T3492] ? qdisc_notify+0x380/0x380 [ 61.116974][ T3492] ? apparmor_capable+0x12e/0x190 [ 61.121997][ T3492] tc_modify_qdisc+0xac5/0x1710 [ 61.126858][ T3492] ? rcu_lock_release+0x20/0x20 [ 61.131738][ T3492] ? rcu_lock_release+0x20/0x20 [ 61.136578][ T3492] rtnetlink_rcv_msg+0x993/0xee0 [ 61.141505][ T3492] ? reacquire_held_locks+0x660/0x660 [ 61.146871][ T3492] ? rtnetlink_bind+0x80/0x80 [ 61.151542][ T3492] ? is_bpf_text_address+0x24f/0x260 [ 61.156814][ T3492] ? stack_trace_save+0x1c0/0x1c0 [ 61.161913][ T3492] ? __kernel_text_address+0x94/0x100 [ 61.167623][ T3492] ? unwind_get_return_address+0x49/0x80 [ 61.173243][ T3492] ? arch_stack_walk+0xf3/0x140 [ 61.178097][ T3492] ? mark_lock+0x98/0x340 [ 61.182420][ T3492] ? mark_lock+0x98/0x340 [ 61.186741][ T3492] ? __lock_acquire+0x1295/0x1ff0 [ 61.191769][ T3492] netlink_rcv_skb+0x1cf/0x410 [ 61.196549][ T3492] ? rtnetlink_bind+0x80/0x80 [ 61.201215][ T3492] ? netlink_ack+0xb10/0xb10 [ 61.205808][ T3492] netlink_unicast+0x7b6/0x980 [ 61.210578][ T3492] ? netlink_detachskb+0x90/0x90 [ 61.215511][ T3492] ? 0xffffffff81000000 [ 61.219658][ T3492] ? __check_object_size+0x300/0x410 [ 61.224953][ T3492] ? bpf_lsm_netlink_send+0x5/0x10 [ 61.230148][ T3492] netlink_sendmsg+0xa30/0xd60 [ 61.234944][ T3492] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.240213][ T3492] ? aa_sock_msg_perm+0x91/0x150 [ 61.245276][ T3492] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 61.250556][ T3492] ? security_socket_sendmsg+0x7d/0xa0 [ 61.256009][ T3492] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.261202][ T3492] ____sys_sendmsg+0x59e/0x8f0 [ 61.265961][ T3492] ? iovec_from_user+0x300/0x390 [ 61.270889][ T3492] ? __sys_sendmsg_sock+0x30/0x30 [ 61.275908][ T3492] ___sys_sendmsg+0x252/0x2e0 [ 61.280585][ T3492] ? __sys_sendmsg+0x260/0x260 [ 61.285435][ T3492] ? __lock_acquire+0x1295/0x1ff0 [ 61.290475][ T3492] ? read_lock_is_recursive+0x10/0x10 [ 61.295832][ T3492] ? __context_tracking_exit+0x4c/0x80 [ 61.301277][ T3492] ? __fdget+0x158/0x220 [ 61.305504][ T3492] __se_sys_sendmsg+0x19a/0x260 [ 61.310344][ T3492] ? __x64_sys_sendmsg+0x80/0x80 [ 61.315272][ T3492] ? syscall_enter_from_user_mode+0x2e/0x230 [ 61.321241][ T3492] ? lockdep_hardirqs_on+0x94/0x130 [ 61.326429][ T3492] ? syscall_enter_from_user_mode+0x2e/0x230 [ 61.332399][ T3492] do_syscall_64+0x3d/0xb0 [ 61.336829][ T3492] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 61.342736][ T3492] RIP: 0033:0x7f2d98cc68b9 [ 61.347143][ T3492] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 61.366736][ T3492] RSP: 002b:00007fffdd70bb88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.375143][ T3492] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d98cc68b9 [ 61.383189][ T3492] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 61.391243][ T3492] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fffdd70bc00 [ 61.399200][ T3492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 61.407156][ T3492] R13: 00007fffdd70bd88 R14: 0000000000000001 R15: 0000000000000001 [ 61.415119][ T3492] [ 61.418228][ T3492] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 61.427700][ T3492] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3492, name: syz-executor174 [ 61.437182][ T3492] INFO: lockdep is turned off. [ 61.441948][ T3492] Preemption disabled at: [ 61.441956][ T3492] [<0000000000000000>] 0x0 [ 61.450710][ T3492] CPU: 1 PID: 3492 Comm: syz-executor174 Not tainted 5.15.126-syzkaller #0 [ 61.459329][ T3492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 61.469365][ T3492] Call Trace: [ 61.472631][ T3492] [ 61.475550][ T3492] dump_stack_lvl+0x1e3/0x2cb [ 61.480223][ T3492] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 61.485853][ T3492] ? panic+0x84d/0x84d [ 61.489910][ T3492] ? rcu_is_watching+0x11/0xa0 [ 61.494657][ T3492] ? rcu_is_watching+0x11/0xa0 [ 61.499439][ T3492] ___might_sleep+0x547/0x6a0 [ 61.504108][ T3492] ? __might_sleep+0xc0/0xc0 [ 61.508688][ T3492] slab_pre_alloc_hook+0x44/0xc0 [ 61.513610][ T3492] __kmalloc_node+0x71/0x390 [ 61.518290][ T3492] ? kvmalloc_node+0x80/0x140 [ 61.522950][ T3492] ? __bpf_trace_softirq+0x10/0x10 [ 61.528046][ T3492] kvmalloc_node+0x80/0x140 [ 61.532532][ T3492] get_dist_table+0x83/0x2c0 [ 61.537107][ T3492] netem_change+0xa05/0x20c0 [ 61.541692][ T3492] ? netem_destroy+0xb0/0xb0 [ 61.546266][ T3492] ? debug_object_init+0x10/0x10 [ 61.551193][ T3492] ? memset+0x1f/0x40 [ 61.555160][ T3492] ? lockdep_init_map_type+0x9d/0x8d0 [ 61.560871][ T3492] ? memset+0x1f/0x40 [ 61.564838][ T3492] ? __hrtimer_init+0x181/0x260 [ 61.569713][ T3492] netem_init+0x58/0xb0 [ 61.573980][ T3492] ? qdisc_peek_dequeued+0x220/0x220 [ 61.579256][ T3492] qdisc_create+0x8ae/0x1390 [ 61.584884][ T3492] ? qdisc_notify+0x380/0x380 [ 61.589562][ T3492] ? apparmor_capable+0x12e/0x190 [ 61.594704][ T3492] tc_modify_qdisc+0xac5/0x1710 [ 61.599572][ T3492] ? rcu_lock_release+0x20/0x20 [ 61.604427][ T3492] ? rcu_lock_release+0x20/0x20 [ 61.609268][ T3492] rtnetlink_rcv_msg+0x993/0xee0 [ 61.614204][ T3492] ? reacquire_held_locks+0x660/0x660 [ 61.619583][ T3492] ? rtnetlink_bind+0x80/0x80 [ 61.624244][ T3492] ? is_bpf_text_address+0x24f/0x260 [ 61.629543][ T3492] ? stack_trace_save+0x1c0/0x1c0 [ 61.634557][ T3492] ? __kernel_text_address+0x94/0x100 [ 61.639928][ T3492] ? unwind_get_return_address+0x49/0x80 [ 61.645549][ T3492] ? arch_stack_walk+0xf3/0x140 [ 61.650998][ T3492] ? mark_lock+0x98/0x340 [ 61.655316][ T3492] ? mark_lock+0x98/0x340 [ 61.659636][ T3492] ? __lock_acquire+0x1295/0x1ff0 [ 61.664661][ T3492] netlink_rcv_skb+0x1cf/0x410 [ 61.669416][ T3492] ? rtnetlink_bind+0x80/0x80 [ 61.674081][ T3492] ? netlink_ack+0xb10/0xb10 [ 61.678665][ T3492] netlink_unicast+0x7b6/0x980 [ 61.683421][ T3492] ? netlink_detachskb+0x90/0x90 [ 61.688374][ T3492] ? 0xffffffff81000000 [ 61.692531][ T3492] ? __check_object_size+0x300/0x410 [ 61.697828][ T3492] ? bpf_lsm_netlink_send+0x5/0x10 [ 61.702928][ T3492] netlink_sendmsg+0xa30/0xd60 [ 61.707691][ T3492] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.712909][ T3492] ? aa_sock_msg_perm+0x91/0x150 [ 61.717833][ T3492] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 61.723200][ T3492] ? security_socket_sendmsg+0x7d/0xa0 [ 61.728658][ T3492] ? netlink_getsockopt+0x5b0/0x5b0 [ 61.733846][ T3492] ____sys_sendmsg+0x59e/0x8f0 [ 61.738598][ T3492] ? iovec_from_user+0x300/0x390 [ 61.743541][ T3492] ? __sys_sendmsg_sock+0x30/0x30 [ 61.748558][ T3492] ___sys_sendmsg+0x252/0x2e0 [ 61.753227][ T3492] ? __sys_sendmsg+0x260/0x260 [ 61.757977][ T3492] ? __lock_acquire+0x1295/0x1ff0 [ 61.763017][ T3492] ? read_lock_is_recursive+0x10/0x10 [ 61.768381][ T3492] ? __context_tracking_exit+0x4c/0x80 [ 61.773829][ T3492] ? __fdget+0x158/0x220 [ 61.778059][ T3492] __se_sys_sendmsg+0x19a/0x260 [ 61.784288][ T3492] ? __x64_sys_sendmsg+0x80/0x80 [ 61.789227][ T3492] ? syscall_enter_from_user_mode+0x2e/0x230 [ 61.795195][ T3492] ? lockdep_hardirqs_on+0x94/0x130 [ 61.800384][ T3492] ? syscall_enter_from_user_mode+0x2e/0x230 [ 61.806442][ T3492] do_syscall_64+0x3d/0xb0 [ 61.810849][ T3492] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 61.816732][ T3492] RIP: 0033:0x7f2d98cc68b9 [ 61.821223][ T3492] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 61.840811][ T3492] RSP: 002b:00007fffdd70bb88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 61.849210][ T3492] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2d98cc68b9 [ 61.857167][ T3492] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 61.865127][ T3492] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fffdd70bc00 [ 61.873096][ T3492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 61.881052][ T3492] R13: 00007fffdd70bd88 R14: 0000000000000001 R15: 0000000000000001 [ 61.889013][ T3492]