Warning: Permanently added '10.128.1.111' (ED25519) to the list of known hosts. executing program [ 52.470537][ T3491] [ 52.472917][ T3491] ===================================================== [ 52.479840][ T3491] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 52.487279][ T3491] 5.15.126-syzkaller #0 Not tainted [ 52.492471][ T3491] ----------------------------------------------------- [ 52.499382][ T3491] syz-executor315/3491 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 52.507432][ T3491] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 52.516394][ T3491] [ 52.516394][ T3491] and this task is already holding: [ 52.523748][ T3491] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 52.532951][ T3491] which would create a new lock dependency: [ 52.538820][ T3491] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 52.546378][ T3491] [ 52.546378][ T3491] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 52.555837][ T3491] (noop_qdisc.q.lock){+.-.}-{2:2} [ 52.555856][ T3491] [ 52.555856][ T3491] ... which became SOFTIRQ-irq-safe at: [ 52.568634][ T3491] lock_acquire+0x1db/0x4f0 [ 52.573213][ T3491] _raw_spin_lock+0x2a/0x40 [ 52.577789][ T3491] net_tx_action+0x6c5/0x8e0 [ 52.582461][ T3491] __do_softirq+0x3b3/0x93a [ 52.587040][ T3491] do_softirq+0x162/0x240 [ 52.591441][ T3491] __local_bh_enable_ip+0x1b1/0x1f0 [ 52.596713][ T3491] dev_deactivate_many+0x524/0xbf0 [ 52.601900][ T3491] dev_deactivate+0x177/0x270 [ 52.606647][ T3491] linkwatch_do_dev+0x104/0x160 [ 52.611575][ T3491] __linkwatch_run_queue+0x4ca/0x7f0 [ 52.616936][ T3491] linkwatch_event+0x48/0x50 [ 52.621598][ T3491] process_one_work+0x8a1/0x10c0 [ 52.626608][ T3491] worker_thread+0xaca/0x1280 [ 52.631358][ T3491] kthread+0x3f6/0x4f0 [ 52.635499][ T3491] ret_from_fork+0x1f/0x30 [ 52.639998][ T3491] [ 52.639998][ T3491] to a SOFTIRQ-irq-unsafe lock: [ 52.646998][ T3491] (fs_reclaim){+.+.}-{0:0} [ 52.647017][ T3491] [ 52.647017][ T3491] ... which became SOFTIRQ-irq-unsafe at: [ 52.659363][ T3491] ... [ 52.659368][ T3491] lock_acquire+0x1db/0x4f0 [ 52.666511][ T3491] fs_reclaim_acquire+0x83/0x120 [ 52.671527][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 52.676549][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 52.681905][ T3491] wq_numa_init+0x122/0x49f [ 52.686480][ T3491] workqueue_init+0x18/0x5e1 [ 52.691144][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 52.696416][ T3491] kernel_init+0x19/0x290 [ 52.700816][ T3491] ret_from_fork+0x1f/0x30 [ 52.705313][ T3491] [ 52.705313][ T3491] other info that might help us debug this: [ 52.705313][ T3491] [ 52.715521][ T3491] Possible interrupt unsafe locking scenario: [ 52.715521][ T3491] [ 52.723824][ T3491] CPU0 CPU1 [ 52.729180][ T3491] ---- ---- [ 52.734625][ T3491] lock(fs_reclaim); [ 52.738593][ T3491] local_irq_disable(); [ 52.745327][ T3491] lock(noop_qdisc.q.lock); [ 52.752423][ T3491] lock(fs_reclaim); [ 52.758907][ T3491] [ 52.762338][ T3491] lock(noop_qdisc.q.lock); [ 52.767086][ T3491] [ 52.767086][ T3491] *** DEADLOCK *** [ 52.767086][ T3491] [ 52.775209][ T3491] 2 locks held by syz-executor315/3491: [ 52.780730][ T3491] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 52.790110][ T3491] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 52.799776][ T3491] [ 52.799776][ T3491] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 52.810158][ T3491] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 52.815699][ T3491] HARDIRQ-ON-W at: [ 52.819659][ T3491] lock_acquire+0x1db/0x4f0 [ 52.825802][ T3491] _raw_spin_lock+0x2a/0x40 [ 52.831943][ T3491] __dev_queue_xmit+0xad6/0x3230 [ 52.838515][ T3491] tx+0x64/0x100 [ 52.843704][ T3491] kthread+0x234/0x440 [ 52.849417][ T3491] kthread+0x3f6/0x4f0 [ 52.855123][ T3491] ret_from_fork+0x1f/0x30 [ 52.861175][ T3491] IN-SOFTIRQ-W at: [ 52.865138][ T3491] lock_acquire+0x1db/0x4f0 [ 52.871281][ T3491] _raw_spin_lock+0x2a/0x40 [ 52.877428][ T3491] net_tx_action+0x6c5/0x8e0 [ 52.883665][ T3491] __do_softirq+0x3b3/0x93a [ 52.889811][ T3491] do_softirq+0x162/0x240 [ 52.895773][ T3491] __local_bh_enable_ip+0x1b1/0x1f0 [ 52.902607][ T3491] dev_deactivate_many+0x524/0xbf0 [ 52.909367][ T3491] dev_deactivate+0x177/0x270 [ 52.915693][ T3491] linkwatch_do_dev+0x104/0x160 [ 52.922181][ T3491] __linkwatch_run_queue+0x4ca/0x7f0 [ 52.929115][ T3491] linkwatch_event+0x48/0x50 [ 52.935346][ T3491] process_one_work+0x8a1/0x10c0 [ 52.941949][ T3491] worker_thread+0xaca/0x1280 [ 52.948276][ T3491] kthread+0x3f6/0x4f0 [ 52.953983][ T3491] ret_from_fork+0x1f/0x30 [ 52.960060][ T3491] INITIAL USE at: [ 52.963953][ T3491] lock_acquire+0x1db/0x4f0 [ 52.970016][ T3491] _raw_spin_lock+0x2a/0x40 [ 52.976076][ T3491] __dev_queue_xmit+0xad6/0x3230 [ 52.982563][ T3491] tx+0x64/0x100 [ 52.987746][ T3491] kthread+0x234/0x440 [ 52.993359][ T3491] kthread+0x3f6/0x4f0 [ 52.998990][ T3491] ret_from_fork+0x1f/0x30 [ 53.004955][ T3491] } [ 53.007455][ T3491] ... key at: [] noop_qdisc+0x108/0x320 [ 53.015087][ T3491] [ 53.015087][ T3491] the dependencies between the lock to be acquired [ 53.015093][ T3491] and SOFTIRQ-irq-unsafe lock: [ 53.028597][ T3491] -> (fs_reclaim){+.+.}-{0:0} { [ 53.033454][ T3491] HARDIRQ-ON-W at: [ 53.037435][ T3491] lock_acquire+0x1db/0x4f0 [ 53.043584][ T3491] fs_reclaim_acquire+0x83/0x120 [ 53.050163][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 53.056734][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 53.063657][ T3491] wq_numa_init+0x122/0x49f [ 53.069796][ T3491] workqueue_init+0x18/0x5e1 [ 53.076047][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 53.082911][ T3491] kernel_init+0x19/0x290 [ 53.088910][ T3491] ret_from_fork+0x1f/0x30 [ 53.095001][ T3491] SOFTIRQ-ON-W at: [ 53.098977][ T3491] lock_acquire+0x1db/0x4f0 [ 53.105119][ T3491] fs_reclaim_acquire+0x83/0x120 [ 53.111695][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 53.118374][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 53.125295][ T3491] wq_numa_init+0x122/0x49f [ 53.131433][ T3491] workqueue_init+0x18/0x5e1 [ 53.137656][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 53.144486][ T3491] kernel_init+0x19/0x290 [ 53.150449][ T3491] ret_from_fork+0x1f/0x30 [ 53.156502][ T3491] INITIAL USE at: [ 53.160379][ T3491] lock_acquire+0x1db/0x4f0 [ 53.166430][ T3491] fs_reclaim_acquire+0x83/0x120 [ 53.172921][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 53.179411][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 53.186245][ T3491] wq_numa_init+0x122/0x49f [ 53.192301][ T3491] workqueue_init+0x18/0x5e1 [ 53.198441][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 53.205187][ T3491] kernel_init+0x19/0x290 [ 53.211067][ T3491] ret_from_fork+0x1f/0x30 [ 53.217034][ T3491] } [ 53.219517][ T3491] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 53.227569][ T3491] ... acquired at: [ 53.231356][ T3491] lock_acquire+0x1db/0x4f0 [ 53.236042][ T3491] fs_reclaim_acquire+0x83/0x120 [ 53.241141][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 53.246234][ T3491] __kmalloc_node+0x71/0x390 [ 53.250985][ T3491] kvmalloc_node+0x80/0x140 [ 53.255644][ T3491] get_dist_table+0x83/0x2c0 [ 53.260413][ T3491] netem_change+0xa05/0x20c0 [ 53.265175][ T3491] netem_init+0x58/0xb0 [ 53.269493][ T3491] qdisc_create+0x8ae/0x1390 [ 53.274252][ T3491] tc_modify_qdisc+0xac5/0x1710 [ 53.279265][ T3491] rtnetlink_rcv_msg+0x993/0xee0 [ 53.284369][ T3491] netlink_rcv_skb+0x1cf/0x410 [ 53.289293][ T3491] netlink_unicast+0x7b6/0x980 [ 53.294215][ T3491] netlink_sendmsg+0xa30/0xd60 [ 53.299157][ T3491] ____sys_sendmsg+0x59e/0x8f0 [ 53.304101][ T3491] ___sys_sendmsg+0x252/0x2e0 [ 53.308957][ T3491] __se_sys_sendmsg+0x19a/0x260 [ 53.313963][ T3491] do_syscall_64+0x3d/0xb0 [ 53.318544][ T3491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.324600][ T3491] [ 53.326908][ T3491] [ 53.326908][ T3491] stack backtrace: [ 53.332796][ T3491] CPU: 0 PID: 3491 Comm: syz-executor315 Not tainted 5.15.126-syzkaller #0 [ 53.341410][ T3491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.351452][ T3491] Call Trace: [ 53.354746][ T3491] [ 53.357668][ T3491] dump_stack_lvl+0x1e3/0x2cb [ 53.362339][ T3491] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 53.367992][ T3491] ? panic+0x84d/0x84d [ 53.372139][ T3491] ? print_shortest_lock_dependencies+0xee/0x150 [ 53.378459][ T3491] validate_chain+0x4cfe/0x58b0 [ 53.383305][ T3491] ? reacquire_held_locks+0x660/0x660 [ 53.388661][ T3491] ? validate_chain+0x112/0x58b0 [ 53.393589][ T3491] ? reacquire_held_locks+0x660/0x660 [ 53.398965][ T3491] ? mark_lock+0x98/0x340 [ 53.403279][ T3491] __lock_acquire+0x1295/0x1ff0 [ 53.408128][ T3491] lock_acquire+0x1db/0x4f0 [ 53.412620][ T3491] ? slab_pre_alloc_hook+0x22/0xc0 [ 53.417735][ T3491] ? read_lock_is_recursive+0x10/0x10 [ 53.423106][ T3491] fs_reclaim_acquire+0x83/0x120 [ 53.428040][ T3491] ? slab_pre_alloc_hook+0x22/0xc0 [ 53.433133][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 53.438055][ T3491] __kmalloc_node+0x71/0x390 [ 53.442645][ T3491] ? kvmalloc_node+0x80/0x140 [ 53.447306][ T3491] ? __bpf_trace_softirq+0x10/0x10 [ 53.452408][ T3491] kvmalloc_node+0x80/0x140 [ 53.456901][ T3491] get_dist_table+0x83/0x2c0 [ 53.461482][ T3491] netem_change+0xa05/0x20c0 [ 53.466083][ T3491] ? netem_destroy+0xb0/0xb0 [ 53.470658][ T3491] ? debug_object_init+0x10/0x10 [ 53.475585][ T3491] ? memset+0x1f/0x40 [ 53.479551][ T3491] ? lockdep_init_map_type+0x9d/0x8d0 [ 53.484926][ T3491] ? memset+0x1f/0x40 [ 53.488930][ T3491] ? __hrtimer_init+0x181/0x260 [ 53.493775][ T3491] netem_init+0x58/0xb0 [ 53.497946][ T3491] ? qdisc_peek_dequeued+0x220/0x220 [ 53.503222][ T3491] qdisc_create+0x8ae/0x1390 [ 53.507809][ T3491] ? qdisc_notify+0x380/0x380 [ 53.512481][ T3491] ? apparmor_capable+0x12e/0x190 [ 53.517499][ T3491] tc_modify_qdisc+0xac5/0x1710 [ 53.522346][ T3491] ? rcu_lock_release+0x20/0x20 [ 53.527208][ T3491] ? rcu_lock_release+0x20/0x20 [ 53.532067][ T3491] rtnetlink_rcv_msg+0x993/0xee0 [ 53.536998][ T3491] ? reacquire_held_locks+0x660/0x660 [ 53.542370][ T3491] ? rtnetlink_bind+0x80/0x80 [ 53.547049][ T3491] ? is_bpf_text_address+0x24f/0x260 [ 53.552332][ T3491] ? stack_trace_save+0x1c0/0x1c0 [ 53.557355][ T3491] ? __kernel_text_address+0x94/0x100 [ 53.562737][ T3491] ? unwind_get_return_address+0x49/0x80 [ 53.568365][ T3491] ? arch_stack_walk+0xf3/0x140 [ 53.573217][ T3491] ? mark_lock+0x98/0x340 [ 53.577543][ T3491] ? mark_lock+0x98/0x340 [ 53.581865][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 53.586989][ T3491] netlink_rcv_skb+0x1cf/0x410 [ 53.591748][ T3491] ? rtnetlink_bind+0x80/0x80 [ 53.596522][ T3491] ? netlink_ack+0xb10/0xb10 [ 53.601122][ T3491] netlink_unicast+0x7b6/0x980 [ 53.605918][ T3491] ? netlink_detachskb+0x90/0x90 [ 53.610857][ T3491] ? 0xffffffff81000000 [ 53.615006][ T3491] ? __check_object_size+0x300/0x410 [ 53.620289][ T3491] ? bpf_lsm_netlink_send+0x5/0x10 [ 53.625394][ T3491] netlink_sendmsg+0xa30/0xd60 [ 53.630156][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.635349][ T3491] ? aa_sock_msg_perm+0x91/0x150 [ 53.640287][ T3491] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 53.645561][ T3491] ? security_socket_sendmsg+0x7d/0xa0 [ 53.651018][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 53.656293][ T3491] ____sys_sendmsg+0x59e/0x8f0 [ 53.661046][ T3491] ? iovec_from_user+0x300/0x390 [ 53.665972][ T3491] ? __sys_sendmsg_sock+0x30/0x30 [ 53.671006][ T3491] ___sys_sendmsg+0x252/0x2e0 [ 53.675667][ T3491] ? __sys_sendmsg+0x260/0x260 [ 53.680439][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 53.685478][ T3491] ? read_lock_is_recursive+0x10/0x10 [ 53.690835][ T3491] ? __context_tracking_exit+0x4c/0x80 [ 53.696279][ T3491] ? __fdget+0x158/0x220 [ 53.700507][ T3491] __se_sys_sendmsg+0x19a/0x260 [ 53.705347][ T3491] ? __x64_sys_sendmsg+0x80/0x80 [ 53.710299][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 53.716265][ T3491] ? lockdep_hardirqs_on+0x94/0x130 [ 53.721448][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 53.727417][ T3491] do_syscall_64+0x3d/0xb0 [ 53.731922][ T3491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 53.737836][ T3491] RIP: 0033:0x7f5b71f339b9 [ 53.742245][ T3491] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 53.761839][ T3491] RSP: 002b:00007ffe5ecf9758 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 53.770244][ T3491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b71f339b9 [ 53.778201][ T3491] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000004 [ 53.786155][ T3491] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffe5ecf97d0 [ 53.794112][ T3491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.802195][ T3491] R13: 00007ffe5ecf9958 R14: 0000000000000001 R15: 0000000000000001 [ 53.810161][ T3491] [ 53.813268][ T3491] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 53.822749][ T3491] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3491, name: syz-executor315 [ 53.832340][ T3491] INFO: lockdep is turned off. [ 53.837107][ T3491] Preemption disabled at: [ 53.837117][ T3491] [<0000000000000000>] 0x0 [ 53.845864][ T3491] CPU: 0 PID: 3491 Comm: syz-executor315 Not tainted 5.15.126-syzkaller #0 [ 53.854529][ T3491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 53.864571][ T3491] Call Trace: [ 53.867837][ T3491] [ 53.870754][ T3491] dump_stack_lvl+0x1e3/0x2cb [ 53.875423][ T3491] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 53.881044][ T3491] ? panic+0x84d/0x84d [ 53.885100][ T3491] ? rcu_is_watching+0x11/0xa0 [ 53.889852][ T3491] ? rcu_is_watching+0x11/0xa0 [ 53.894614][ T3491] ___might_sleep+0x547/0x6a0 [ 53.899281][ T3491] ? __might_sleep+0xc0/0xc0 [ 53.903860][ T3491] slab_pre_alloc_hook+0x44/0xc0 [ 53.908938][ T3491] __kmalloc_node+0x71/0x390 [ 53.913511][ T3491] ? kvmalloc_node+0x80/0x140 [ 53.918173][ T3491] ? __bpf_trace_softirq+0x10/0x10 [ 53.923270][ T3491] kvmalloc_node+0x80/0x140 [ 53.927761][ T3491] get_dist_table+0x83/0x2c0 [ 53.932335][ T3491] netem_change+0xa05/0x20c0 [ 53.936915][ T3491] ? netem_destroy+0xb0/0xb0 [ 53.941489][ T3491] ? debug_object_init+0x10/0x10 [ 53.946413][ T3491] ? memset+0x1f/0x40 [ 53.950380][ T3491] ? lockdep_init_map_type+0x9d/0x8d0 [ 53.955747][ T3491] ? memset+0x1f/0x40 [ 53.959710][ T3491] ? __hrtimer_init+0x181/0x260 [ 53.964568][ T3491] netem_init+0x58/0xb0 [ 53.968706][ T3491] ? qdisc_peek_dequeued+0x220/0x220 [ 53.973978][ T3491] qdisc_create+0x8ae/0x1390 [ 53.978554][ T3491] ? qdisc_notify+0x380/0x380 [ 53.983217][ T3491] ? apparmor_capable+0x12e/0x190 [ 53.988232][ T3491] tc_modify_qdisc+0xac5/0x1710 [ 53.993073][ T3491] ? rcu_lock_release+0x20/0x20 [ 53.997918][ T3491] ? rcu_lock_release+0x20/0x20 [ 54.002768][ T3491] rtnetlink_rcv_msg+0x993/0xee0 [ 54.007691][ T3491] ? reacquire_held_locks+0x660/0x660 [ 54.013068][ T3491] ? rtnetlink_bind+0x80/0x80 [ 54.017739][ T3491] ? is_bpf_text_address+0x24f/0x260 [ 54.023008][ T3491] ? stack_trace_save+0x1c0/0x1c0 [ 54.028019][ T3491] ? __kernel_text_address+0x94/0x100 [ 54.033378][ T3491] ? unwind_get_return_address+0x49/0x80 [ 54.038997][ T3491] ? arch_stack_walk+0xf3/0x140 [ 54.043853][ T3491] ? mark_lock+0x98/0x340 [ 54.048179][ T3491] ? mark_lock+0x98/0x340 [ 54.052488][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 54.057602][ T3491] netlink_rcv_skb+0x1cf/0x410 [ 54.062383][ T3491] ? rtnetlink_bind+0x80/0x80 [ 54.067052][ T3491] ? netlink_ack+0xb10/0xb10 [ 54.071657][ T3491] netlink_unicast+0x7b6/0x980 [ 54.076418][ T3491] ? netlink_detachskb+0x90/0x90 [ 54.081374][ T3491] ? 0xffffffff81000000 [ 54.085512][ T3491] ? __check_object_size+0x300/0x410 [ 54.090805][ T3491] ? bpf_lsm_netlink_send+0x5/0x10 [ 54.095920][ T3491] netlink_sendmsg+0xa30/0xd60 [ 54.100685][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 54.105865][ T3491] ? aa_sock_msg_perm+0x91/0x150 [ 54.110785][ T3491] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 54.116093][ T3491] ? security_socket_sendmsg+0x7d/0xa0 [ 54.121553][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 54.126825][ T3491] ____sys_sendmsg+0x59e/0x8f0 [ 54.131577][ T3491] ? iovec_from_user+0x300/0x390 [ 54.136501][ T3491] ? __sys_sendmsg_sock+0x30/0x30 [ 54.141609][ T3491] ___sys_sendmsg+0x252/0x2e0 [ 54.146293][ T3491] ? __sys_sendmsg+0x260/0x260 [ 54.151044][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 54.156085][ T3491] ? read_lock_is_recursive+0x10/0x10 [ 54.161442][ T3491] ? __context_tracking_exit+0x4c/0x80 [ 54.166884][ T3491] ? __fdget+0x158/0x220 [ 54.171202][ T3491] __se_sys_sendmsg+0x19a/0x260 [ 54.176050][ T3491] ? __x64_sys_sendmsg+0x80/0x80 [ 54.180974][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 54.186936][ T3491] ? lockdep_hardirqs_on+0x94/0x130 [ 54.192121][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 54.198104][ T3491] do_syscall_64+0x3d/0xb0 [ 54.202603][ T3491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.208485][ T3491] RIP: 0033:0x7f5b71f339b9 [ 54.212886][ T3491] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.232473][ T3491] RSP: 002b:00007ffe5ecf9758 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 54.240979][ T3491] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b71f339b9 [ 54.248934][ T3491] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000004 [ 54.256899][ T3491] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffe5ecf97d0 [ 54.264893][ T3491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 54.273121][ T3491] R13: 00007ffe5ecf9958 R14: 0000000000000001 R15: 0000000000000001 [ 54.281168][ T3491]