Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.37' (ECDSA) to the list of known hosts. syzkaller login: [ 35.194775] IPVS: ftp: loaded support on port[0] = 21 [ 35.270489] chnl_net:caif_netlink_parms(): no params data found [ 35.374172] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.380751] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.388716] device bridge_slave_0 entered promiscuous mode [ 35.396385] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.403115] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.410123] device bridge_slave_1 entered promiscuous mode [ 35.428344] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 35.437371] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 35.455889] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 35.463860] team0: Port device team_slave_0 added [ 35.469342] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 35.476971] team0: Port device team_slave_1 added [ 35.492085] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.498820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.524153] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.535592] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.541841] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 35.567112] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.577844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 35.585566] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 35.605119] device hsr_slave_0 entered promiscuous mode [ 35.611147] device hsr_slave_1 entered promiscuous mode [ 35.619497] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 35.626982] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 35.696108] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.702704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.709523] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.715941] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.745817] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 35.751903] 8021q: adding VLAN 0 to HW filter on device bond0 [ 35.762121] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 35.770879] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.780038] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.787592] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.794928] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 35.806149] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 35.813718] 8021q: adding VLAN 0 to HW filter on device team0 [ 35.824412] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 35.833299] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.839678] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.853494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 35.862050] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.868469] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.880340] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 35.889409] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 35.900577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 35.912902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 35.923665] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 35.932202] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 35.939199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 35.952783] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 35.961736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 35.968640] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 35.980281] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 35.993490] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 36.003652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.034794] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 36.042115] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 36.050850] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 36.061062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.069445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 36.076996] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 36.086581] device veth0_vlan entered promiscuous mode [ 36.095982] device veth1_vlan entered promiscuous mode [ 36.102033] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 36.111299] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 36.123274] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 36.133572] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 36.140837] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 36.149176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.159128] device veth0_macvtap entered promiscuous mode [ 36.166324] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 36.175450] device veth1_macvtap entered promiscuous mode [ 36.185511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 36.195595] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 36.206319] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 36.214002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.224640] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 36.235147] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 36.242674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 36.339477] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 36.374756] [ 36.376438] ===================================================== [ 36.382834] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 36.389893] 4.19.171-syzkaller #0 Not tainted [ 36.394689] ----------------------------------------------------- [ 36.400942] syz-executor700/8090 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 36.408288] 00000000ee3510d6 (hugetlb_lock){+.+.}, at: free_huge_page+0x482/0xd20 [ 36.415943] [ 36.415943] and this task is already holding: [ 36.421951] 00000000334add8c (slock-AF_INET){+.-.}, at: tcp_close+0x5bd/0xfd0 [ 36.429521] which would create a new lock dependency: [ 36.435973] (slock-AF_INET){+.-.} -> (hugetlb_lock){+.+.} [ 36.441977] [ 36.441977] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 36.450061] (slock-AF_INET){+.-.} [ 36.450068] [ 36.450068] ... which became SOFTIRQ-irq-safe at: [ 36.459905] _raw_spin_lock+0x2a/0x40 [ 36.463787] sk_clone_lock+0x40b/0x1430 [ 36.467840] inet_csk_clone_lock+0x1f/0x3e0 [ 36.472241] tcp_create_openreq_child+0x2c/0x19f0 [ 36.477158] tcp_v4_syn_recv_sock+0xb6/0x1030 [ 36.481788] tcp_check_req+0x601/0x16b0 [ 36.485843] tcp_v4_rcv+0x1e3c/0x3b80 [ 36.489721] ip_local_deliver_finish+0x495/0xc00 [ 36.494561] ip_local_deliver+0x188/0x500 [ 36.498783] ip_rcv_finish+0x1ca/0x2e0 [ 36.503024] ip_rcv+0xca/0x3c0 [ 36.506426] __netif_receive_skb_one_core+0x114/0x180 [ 36.512032] __netif_receive_skb+0x27/0x1c0 [ 36.516934] netif_receive_skb_internal+0xf0/0x3f0 [ 36.521990] napi_gro_receive+0x2e6/0x450 [ 36.526282] receive_buf+0xf1d/0x6120 [ 36.530160] virtnet_poll+0x568/0xd70 [ 36.534166] net_rx_action+0x4ac/0xfb0 [ 36.538158] __do_softirq+0x26c/0x9a0 [ 36.542035] irq_exit+0x215/0x260 [ 36.545561] do_IRQ+0x10c/0x1c0 [ 36.548913] ret_from_intr+0x0/0x1e [ 36.552614] lock_acquire+0x1ec/0x3c0 [ 36.556650] down_write+0x34/0x90 [ 36.560383] unlink_file_vma+0x71/0xb0 [ 36.564365] free_pgtables+0x1b3/0x2f0 [ 36.568331] exit_mmap+0x2c8/0x530 [ 36.571954] mmput+0x14e/0x4a0 [ 36.575223] flush_old_exec+0x966/0x1cc0 [ 36.579363] load_elf_binary+0x956/0x5050 [ 36.584895] search_binary_handler.part.0+0xf9/0x4e0 [ 36.590164] __do_execve_file+0x1357/0x2360 [ 36.594731] do_execve+0x35/0x50 [ 36.598316] __x64_sys_execve+0x7c/0xa0 [ 36.602432] do_syscall_64+0xf9/0x620 [ 36.606529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.611917] [ 36.611917] to a SOFTIRQ-irq-unsafe lock: [ 36.617526] (hugetlb_lock){+.+.} [ 36.617532] [ 36.617532] ... which became SOFTIRQ-irq-unsafe at: [ 36.627716] ... [ 36.627732] _raw_spin_lock+0x2a/0x40 [ 36.633529] hugetlb_overcommit_handler+0x2d4/0x460 [ 36.638710] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 36.644020] __vfs_write+0xf7/0x770 [ 36.647721] vfs_write+0x1f3/0x540 [ 36.651341] ksys_write+0x12b/0x2a0 [ 36.655045] do_syscall_64+0xf9/0x620 [ 36.659077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.664544] [ 36.664544] other info that might help us debug this: [ 36.664544] [ 36.672953] Possible interrupt unsafe locking scenario: [ 36.672953] [ 36.680161] CPU0 CPU1 [ 36.685000] ---- ---- [ 36.689764] lock(hugetlb_lock); [ 36.693206] local_irq_disable(); [ 36.699558] lock(slock-AF_INET); [ 36.705672] lock(hugetlb_lock); [ 36.711633] [ 36.714472] lock(slock-AF_INET); [ 36.718212] [ 36.718212] *** DEADLOCK *** [ 36.718212] [ 36.724271] 3 locks held by syz-executor700/8090: [ 36.729415] #0: 00000000cfab4b51 (&sb->s_type->i_mutex_key#13){+.+.}, at: __sock_release+0x86/0x2a0 [ 36.738779] #1: 000000004fd1fdd2 (sk_lock-AF_INET){+.+.}, at: tcp_close+0x25/0xfd0 [ 36.746840] #2: 00000000334add8c (slock-AF_INET){+.-.}, at: tcp_close+0x5bd/0xfd0 [ 36.754703] [ 36.754703] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 36.763961] -> (slock-AF_INET){+.-.} ops: 6222 { [ 36.768977] HARDIRQ-ON-W at: [ 36.772382] _raw_spin_lock_bh+0x2f/0x40 [ 36.778794] lock_sock_nested+0x3b/0x110 [ 36.784549] inet_autobind+0x1a/0x190 [ 36.790144] inet_dgram_connect+0x245/0x2d0 [ 36.796261] __sys_connect+0x265/0x2c0 [ 36.801977] __x64_sys_connect+0x6f/0xb0 [ 36.808017] do_syscall_64+0xf9/0x620 [ 36.813677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.820782] IN-SOFTIRQ-W at: [ 36.824278] _raw_spin_lock+0x2a/0x40 [ 36.829716] sk_clone_lock+0x40b/0x1430 [ 36.835514] inet_csk_clone_lock+0x1f/0x3e0 [ 36.841540] tcp_create_openreq_child+0x2c/0x19f0 [ 36.848196] tcp_v4_syn_recv_sock+0xb6/0x1030 [ 36.854380] tcp_check_req+0x601/0x16b0 [ 36.860015] tcp_v4_rcv+0x1e3c/0x3b80 [ 36.865498] ip_local_deliver_finish+0x495/0xc00 [ 36.871901] ip_local_deliver+0x188/0x500 [ 36.878009] ip_rcv_finish+0x1ca/0x2e0 [ 36.883541] ip_rcv+0xca/0x3c0 [ 36.888660] __netif_receive_skb_one_core+0x114/0x180 [ 36.895725] __netif_receive_skb+0x27/0x1c0 [ 36.902031] netif_receive_skb_internal+0xf0/0x3f0 [ 36.908621] napi_gro_receive+0x2e6/0x450 [ 36.914442] receive_buf+0xf1d/0x6120 [ 36.920315] virtnet_poll+0x568/0xd70 [ 36.926579] net_rx_action+0x4ac/0xfb0 [ 36.932118] __do_softirq+0x26c/0x9a0 [ 36.937598] irq_exit+0x215/0x260 [ 36.942854] do_IRQ+0x10c/0x1c0 [ 36.947928] ret_from_intr+0x0/0x1e [ 36.953349] lock_acquire+0x1ec/0x3c0 [ 36.959084] down_write+0x34/0x90 [ 36.964249] unlink_file_vma+0x71/0xb0 [ 36.969893] free_pgtables+0x1b3/0x2f0 [ 36.975508] exit_mmap+0x2c8/0x530 [ 36.980734] mmput+0x14e/0x4a0 [ 36.985723] flush_old_exec+0x966/0x1cc0 [ 36.991520] load_elf_binary+0x956/0x5050 [ 36.997312] search_binary_handler.part.0+0xf9/0x4e0 [ 37.004097] __do_execve_file+0x1357/0x2360 [ 37.010053] do_execve+0x35/0x50 [ 37.015057] __x64_sys_execve+0x7c/0xa0 [ 37.021014] do_syscall_64+0xf9/0x620 [ 37.026460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.033381] INITIAL USE at: [ 37.036608] _raw_spin_lock_bh+0x2f/0x40 [ 37.042240] lock_sock_nested+0x3b/0x110 [ 37.047854] inet_autobind+0x1a/0x190 [ 37.053261] inet_dgram_connect+0x245/0x2d0 [ 37.059133] __sys_connect+0x265/0x2c0 [ 37.064581] __x64_sys_connect+0x6f/0xb0 [ 37.070234] do_syscall_64+0xf9/0x620 [ 37.075592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.082327] } [ 37.084337] ... key at: [] af_family_slock_keys+0x10/0x1a0 [ 37.092231] ... acquired at: [ 37.095329] _raw_spin_lock+0x2a/0x40 [ 37.099457] free_huge_page+0x482/0xd20 [ 37.103602] __put_page+0xe2/0x3a0 [ 37.107306] skb_release_data+0x2f3/0x920 [ 37.111616] __kfree_skb+0x46/0x60 [ 37.115318] tcp_write_queue_purge+0x24d/0x800 [ 37.120106] tcp_v4_destroy_sock+0x101/0x770 [ 37.124679] inet_csk_destroy_sock+0x189/0x400 [ 37.129418] tcp_close+0x95f/0xfd0 [ 37.133105] inet_release+0xd7/0x1e0 [ 37.136975] __sock_release+0xcd/0x2a0 [ 37.141020] sock_close+0x15/0x20 [ 37.144680] __fput+0x2ce/0x890 [ 37.148163] task_work_run+0x148/0x1c0 [ 37.152218] exit_to_usermode_loop+0x251/0x2a0 [ 37.157226] do_syscall_64+0x538/0x620 [ 37.161282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.166745] [ 37.168361] [ 37.168361] the dependencies between the lock to be acquired [ 37.168364] and SOFTIRQ-irq-unsafe lock: [ 37.179892] -> (hugetlb_lock){+.+.} ops: 26 { [ 37.184381] HARDIRQ-ON-W at: [ 37.187689] _raw_spin_lock+0x2a/0x40 [ 37.193136] hugetlb_overcommit_handler+0x2d4/0x460 [ 37.199796] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 37.206631] __vfs_write+0xf7/0x770 [ 37.212208] vfs_write+0x1f3/0x540 [ 37.217397] ksys_write+0x12b/0x2a0 [ 37.222727] do_syscall_64+0xf9/0x620 [ 37.228334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.235353] SOFTIRQ-ON-W at: [ 37.238939] _raw_spin_lock+0x2a/0x40 [ 37.244419] hugetlb_overcommit_handler+0x2d4/0x460 [ 37.251084] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 37.258006] __vfs_write+0xf7/0x770 [ 37.263275] vfs_write+0x1f3/0x540 [ 37.268490] ksys_write+0x12b/0x2a0 [ 37.273886] do_syscall_64+0xf9/0x620 [ 37.279330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.286155] INITIAL USE at: [ 37.289347] _raw_spin_lock+0x2a/0x40 [ 37.294853] hugetlb_overcommit_handler+0x2d4/0x460 [ 37.301520] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 37.308368] __vfs_write+0xf7/0x770 [ 37.321631] vfs_write+0x1f3/0x540 [ 37.326728] ksys_write+0x12b/0x2a0 [ 37.332009] do_syscall_64+0xf9/0x620 [ 37.337538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.344460] } [ 37.346261] ... key at: [] hugetlb_lock+0x18/0x17a0 [ 37.353369] ... acquired at: [ 37.356466] _raw_spin_lock+0x2a/0x40 [ 37.360428] free_huge_page+0x482/0xd20 [ 37.365038] __put_page+0xe2/0x3a0 [ 37.368800] skb_release_data+0x2f3/0x920 [ 37.373121] __kfree_skb+0x46/0x60 [ 37.376879] tcp_write_queue_purge+0x24d/0x800 [ 37.381829] tcp_v4_destroy_sock+0x101/0x770 [ 37.387201] inet_csk_destroy_sock+0x189/0x400 [ 37.392229] tcp_close+0x95f/0xfd0 [ 37.396217] inet_release+0xd7/0x1e0 [ 37.400444] __sock_release+0xcd/0x2a0 [ 37.404512] sock_close+0x15/0x20 [ 37.408180] __fput+0x2ce/0x890 [ 37.411626] task_work_run+0x148/0x1c0 [ 37.415852] exit_to_usermode_loop+0x251/0x2a0 [ 37.420841] do_syscall_64+0x538/0x620 [ 37.424954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.430528] [ 37.432190] [ 37.432190] stack backtrace: [ 37.436684] CPU: 1 PID: 8090 Comm: syz-executor700 Not tainted 4.19.171-syzkaller #0 [ 37.444642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.453994] Call Trace: [ 37.456587] dump_stack+0x1fc/0x2ef [ 37.460211] check_usage.cold+0x7ea/0xbad [ 37.464363] ? check_usage_backwards+0x300/0x300 [ 37.469113] ? __save_stack_trace+0x72/0x190 [ 37.473524] ? deref_stack_reg+0x134/0x1d0 [ 37.477863] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 37.483746] ? lock_downgrade+0x720/0x720 [ 37.487885] ? lock_acquire+0x170/0x3c0 [ 37.492032] __lock_acquire+0x1da1/0x3ff0 [ 37.496350] ? trace_hardirqs_off+0x64/0x200 [ 37.500758] ? mark_held_locks+0xf0/0xf0 [ 37.504851] ? __kasan_slab_free+0x186/0x1f0 [ 37.509302] ? tcp_write_queue_purge+0x24d/0x800 [ 37.514319] ? tcp_v4_destroy_sock+0x101/0x770 [ 37.519140] ? inet_csk_destroy_sock+0x189/0x400 [ 37.523926] ? tcp_close+0x95f/0xfd0 [ 37.527632] ? inet_release+0xd7/0x1e0 [ 37.531633] ? __sock_release+0xcd/0x2a0 [ 37.535691] ? sock_close+0x15/0x20 [ 37.539315] ? task_work_run+0x148/0x1c0 [ 37.543377] ? exit_to_usermode_loop+0x251/0x2a0 [ 37.548121] ? do_syscall_64+0x538/0x620 [ 37.552315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.557890] ? lock_downgrade+0x720/0x720 [ 37.562119] lock_acquire+0x170/0x3c0 [ 37.565912] ? free_huge_page+0x482/0xd20 [ 37.570116] ? PageHuge+0xc7/0x160 [ 37.573936] _raw_spin_lock+0x2a/0x40 [ 37.577769] ? free_huge_page+0x482/0xd20 [ 37.581926] free_huge_page+0x482/0xd20 [ 37.585893] ? PageHuge+0xc7/0x160 [ 37.589441] __put_page+0xe2/0x3a0 [ 37.593218] skb_release_data+0x2f3/0x920 [ 37.597357] __kfree_skb+0x46/0x60 [ 37.600934] tcp_write_queue_purge+0x24d/0x800 [ 37.605517] tcp_v4_destroy_sock+0x101/0x770 [ 37.609980] inet_csk_destroy_sock+0x189/0x400 [ 37.614553] tcp_close+0x95f/0xfd0 [ 37.618091] inet_release+0xd7/0x1e0 [ 37.621988] __sock_release+0xcd/0x2a0 [ 37.625867] ? __sock_release+0x2a0/0x2a0 [ 37.630040] sock_close+0x15/0x20 [ 37.633544] __fput+0x2ce/0x890 [ 37.636830] task_work_run+0x148/0x1c0 [ 37.641054] exit_to_usermode_loop+0x251/0x2a0 [ 37.645633] do_syscall_64+0x538/0x620 [ 37.649553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 37.654869] RIP: 0033:0x408111 [ 37.658059] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 24 1a 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 37.677421] RSP: 002b:00007ffd9388b8d0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 37.685493] RAX: 0000000000000000 RBX: 00007ffd9388b900 RCX: 0000000000408111 [ 37.692842] RDX: 000000000000