Warning: Permanently added '10.128.0.24' (ED25519) to the list of known hosts. executing program [ 43.696285][ T3486] [ 43.698623][ T3486] ===================================================== [ 43.705523][ T3486] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 43.712944][ T3486] 5.15.126-syzkaller #0 Not tainted [ 43.718199][ T3486] ----------------------------------------------------- [ 43.725103][ T3486] syz-executor138/3486 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 43.733140][ T3486] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 43.742083][ T3486] [ 43.742083][ T3486] and this task is already holding: [ 43.749416][ T3486] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 43.758615][ T3486] which would create a new lock dependency: [ 43.764481][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 43.772011][ T3486] [ 43.772011][ T3486] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 43.781433][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} [ 43.781447][ T3486] [ 43.781447][ T3486] ... which became SOFTIRQ-irq-safe at: [ 43.794213][ T3486] lock_acquire+0x1db/0x4f0 [ 43.798780][ T3486] _raw_spin_lock+0x2a/0x40 [ 43.803341][ T3486] net_tx_action+0x6c5/0x8e0 [ 43.807989][ T3486] __do_softirq+0x3b3/0x93a [ 43.812551][ T3486] do_softirq+0x162/0x240 [ 43.816939][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 43.822209][ T3486] dev_deactivate_many+0x524/0xbf0 [ 43.827381][ T3486] dev_deactivate+0x177/0x270 [ 43.832116][ T3486] linkwatch_do_dev+0x104/0x160 [ 43.837024][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 43.842370][ T3486] linkwatch_event+0x48/0x50 [ 43.847018][ T3486] process_one_work+0x8a1/0x10c0 [ 43.852018][ T3486] worker_thread+0xaca/0x1280 [ 43.857013][ T3486] kthread+0x3f6/0x4f0 [ 43.861155][ T3486] ret_from_fork+0x1f/0x30 [ 43.865636][ T3486] [ 43.865636][ T3486] to a SOFTIRQ-irq-unsafe lock: [ 43.872626][ T3486] (fs_reclaim){+.+.}-{0:0} [ 43.872642][ T3486] [ 43.872642][ T3486] ... which became SOFTIRQ-irq-unsafe at: [ 43.884961][ T3486] ... [ 43.884965][ T3486] lock_acquire+0x1db/0x4f0 [ 43.892082][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.897088][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.902086][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 43.907430][ T3486] wq_numa_init+0x122/0x49f [ 43.911999][ T3486] workqueue_init+0x18/0x5e1 [ 43.916645][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 43.921916][ T3486] kernel_init+0x19/0x290 [ 43.926321][ T3486] ret_from_fork+0x1f/0x30 [ 43.930800][ T3486] [ 43.930800][ T3486] other info that might help us debug this: [ 43.930800][ T3486] [ 43.941003][ T3486] Possible interrupt unsafe locking scenario: [ 43.941003][ T3486] [ 43.949308][ T3486] CPU0 CPU1 [ 43.954741][ T3486] ---- ---- [ 43.960075][ T3486] lock(fs_reclaim); [ 43.964045][ T3486] local_irq_disable(); [ 43.970771][ T3486] lock(noop_qdisc.q.lock); [ 43.977853][ T3486] lock(fs_reclaim); [ 43.984586][ T3486] [ 43.988027][ T3486] lock(noop_qdisc.q.lock); [ 43.992776][ T3486] [ 43.992776][ T3486] *** DEADLOCK *** [ 43.992776][ T3486] [ 44.000894][ T3486] 2 locks held by syz-executor138/3486: [ 44.006415][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 44.015779][ T3486] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 44.025421][ T3486] [ 44.025421][ T3486] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 44.035798][ T3486] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 44.041239][ T3486] HARDIRQ-ON-W at: [ 44.045196][ T3486] lock_acquire+0x1db/0x4f0 [ 44.051329][ T3486] _raw_spin_lock+0x2a/0x40 [ 44.057460][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 44.064031][ T3486] tx+0x64/0x100 [ 44.069202][ T3486] kthread+0x234/0x440 [ 44.074896][ T3486] kthread+0x3f6/0x4f0 [ 44.080591][ T3486] ret_from_fork+0x1f/0x30 [ 44.086632][ T3486] IN-SOFTIRQ-W at: [ 44.090586][ T3486] lock_acquire+0x1db/0x4f0 [ 44.096716][ T3486] _raw_spin_lock+0x2a/0x40 [ 44.102841][ T3486] net_tx_action+0x6c5/0x8e0 [ 44.109054][ T3486] __do_softirq+0x3b3/0x93a [ 44.115182][ T3486] do_softirq+0x162/0x240 [ 44.121134][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 44.127957][ T3486] dev_deactivate_many+0x524/0xbf0 [ 44.134696][ T3486] dev_deactivate+0x177/0x270 [ 44.140997][ T3486] linkwatch_do_dev+0x104/0x160 [ 44.147475][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 44.154385][ T3486] linkwatch_event+0x48/0x50 [ 44.160597][ T3486] process_one_work+0x8a1/0x10c0 [ 44.167158][ T3486] worker_thread+0xaca/0x1280 [ 44.173461][ T3486] kthread+0x3f6/0x4f0 [ 44.179153][ T3486] ret_from_fork+0x1f/0x30 [ 44.185197][ T3486] INITIAL USE at: [ 44.189070][ T3486] lock_acquire+0x1db/0x4f0 [ 44.195113][ T3486] _raw_spin_lock+0x2a/0x40 [ 44.201151][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 44.207626][ T3486] tx+0x64/0x100 [ 44.212709][ T3486] kthread+0x234/0x440 [ 44.218400][ T3486] kthread+0x3f6/0x4f0 [ 44.224026][ T3486] ret_from_fork+0x1f/0x30 [ 44.230063][ T3486] } [ 44.232535][ T3486] ... key at: [] noop_qdisc+0x108/0x320 [ 44.240165][ T3486] [ 44.240165][ T3486] the dependencies between the lock to be acquired [ 44.240170][ T3486] and SOFTIRQ-irq-unsafe lock: [ 44.253653][ T3486] -> (fs_reclaim){+.+.}-{0:0} { [ 44.258486][ T3486] HARDIRQ-ON-W at: [ 44.262438][ T3486] lock_acquire+0x1db/0x4f0 [ 44.268566][ T3486] fs_reclaim_acquire+0x83/0x120 [ 44.275129][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 44.281687][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 44.288598][ T3486] wq_numa_init+0x122/0x49f [ 44.294725][ T3486] workqueue_init+0x18/0x5e1 [ 44.300938][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 44.307762][ T3486] kernel_init+0x19/0x290 [ 44.313720][ T3486] ret_from_fork+0x1f/0x30 [ 44.319763][ T3486] SOFTIRQ-ON-W at: [ 44.323718][ T3486] lock_acquire+0x1db/0x4f0 [ 44.329850][ T3486] fs_reclaim_acquire+0x83/0x120 [ 44.336417][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 44.342995][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 44.349904][ T3486] wq_numa_init+0x122/0x49f [ 44.356032][ T3486] workqueue_init+0x18/0x5e1 [ 44.362241][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 44.369062][ T3486] kernel_init+0x19/0x290 [ 44.375013][ T3486] ret_from_fork+0x1f/0x30 [ 44.381060][ T3486] INITIAL USE at: [ 44.384926][ T3486] lock_acquire+0x1db/0x4f0 [ 44.390964][ T3486] fs_reclaim_acquire+0x83/0x120 [ 44.397457][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 44.403932][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 44.410754][ T3486] wq_numa_init+0x122/0x49f [ 44.416800][ T3486] workqueue_init+0x18/0x5e1 [ 44.422936][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 44.429673][ T3486] kernel_init+0x19/0x290 [ 44.435555][ T3486] ret_from_fork+0x1f/0x30 [ 44.441509][ T3486] } [ 44.443985][ T3486] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 44.451962][ T3486] ... acquired at: [ 44.455741][ T3486] lock_acquire+0x1db/0x4f0 [ 44.460397][ T3486] fs_reclaim_acquire+0x83/0x120 [ 44.465486][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 44.470568][ T3486] __kmalloc_node+0x71/0x390 [ 44.475311][ T3486] kvmalloc_node+0x80/0x140 [ 44.479973][ T3486] get_dist_table+0x83/0x2c0 [ 44.484725][ T3486] netem_change+0xa05/0x20c0 [ 44.489470][ T3486] netem_init+0x58/0xb0 [ 44.493868][ T3486] qdisc_create+0x8ae/0x1390 [ 44.498610][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 44.503618][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 44.508704][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 44.513617][ T3486] netlink_unicast+0x7b6/0x980 [ 44.518538][ T3486] netlink_sendmsg+0xa30/0xd60 [ 44.523454][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 44.528363][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 44.533187][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 44.538181][ T3486] do_syscall_64+0x3d/0xb0 [ 44.542840][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.548878][ T3486] [ 44.551179][ T3486] [ 44.551179][ T3486] stack backtrace: [ 44.557057][ T3486] CPU: 0 PID: 3486 Comm: syz-executor138 Not tainted 5.15.126-syzkaller #0 [ 44.566065][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 44.576447][ T3486] Call Trace: [ 44.579707][ T3486] [ 44.582614][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 44.587267][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 44.592874][ T3486] ? panic+0x84d/0x84d [ 44.596927][ T3486] ? print_shortest_lock_dependencies+0xee/0x150 [ 44.603232][ T3486] validate_chain+0x4cfe/0x58b0 [ 44.608080][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.613467][ T3486] ? validate_chain+0x112/0x58b0 [ 44.618399][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.623754][ T3486] ? mark_lock+0x98/0x340 [ 44.628146][ T3486] __lock_acquire+0x1295/0x1ff0 [ 44.632981][ T3486] lock_acquire+0x1db/0x4f0 [ 44.637462][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 44.642548][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 44.647895][ T3486] fs_reclaim_acquire+0x83/0x120 [ 44.652806][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 44.657889][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 44.662802][ T3486] __kmalloc_node+0x71/0x390 [ 44.667371][ T3486] ? kvmalloc_node+0x80/0x140 [ 44.672022][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 44.677107][ T3486] kvmalloc_node+0x80/0x140 [ 44.681589][ T3486] get_dist_table+0x83/0x2c0 [ 44.686153][ T3486] netem_change+0xa05/0x20c0 [ 44.690722][ T3486] ? netem_destroy+0xb0/0xb0 [ 44.695287][ T3486] ? debug_object_init+0x10/0x10 [ 44.700205][ T3486] ? memset+0x1f/0x40 [ 44.704172][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 44.709529][ T3486] ? memset+0x1f/0x40 [ 44.713489][ T3486] ? __hrtimer_init+0x181/0x260 [ 44.718327][ T3486] netem_init+0x58/0xb0 [ 44.722470][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 44.727817][ T3486] qdisc_create+0x8ae/0x1390 [ 44.732386][ T3486] ? qdisc_notify+0x380/0x380 [ 44.737035][ T3486] ? apparmor_capable+0x12e/0x190 [ 44.742041][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 44.746868][ T3486] ? rcu_lock_release+0x20/0x20 [ 44.751699][ T3486] ? rcu_lock_release+0x20/0x20 [ 44.756523][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 44.761433][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.766780][ T3486] ? rtnetlink_bind+0x80/0x80 [ 44.771440][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 44.776703][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 44.781701][ T3486] ? __kernel_text_address+0x94/0x100 [ 44.787056][ T3486] ? unwind_get_return_address+0x49/0x80 [ 44.792678][ T3486] ? arch_stack_walk+0xf3/0x140 [ 44.797517][ T3486] ? mark_lock+0x98/0x340 [ 44.801823][ T3486] ? mark_lock+0x98/0x340 [ 44.806142][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 44.811161][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 44.815914][ T3486] ? rtnetlink_bind+0x80/0x80 [ 44.820570][ T3486] ? netlink_ack+0xb10/0xb10 [ 44.825153][ T3486] netlink_unicast+0x7b6/0x980 [ 44.829895][ T3486] ? netlink_detachskb+0x90/0x90 [ 44.834808][ T3486] ? 0xffffffff81000000 [ 44.839019][ T3486] ? __check_object_size+0x300/0x410 [ 44.844288][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 44.849379][ T3486] netlink_sendmsg+0xa30/0xd60 [ 44.854123][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 44.859315][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 44.864228][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 44.869489][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 44.874922][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 44.880095][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 44.884840][ T3486] ? iovec_from_user+0x300/0x390 [ 44.889754][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 44.894757][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 44.899409][ T3486] ? __sys_sendmsg+0x260/0x260 [ 44.904144][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 44.909155][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 44.914588][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 44.922027][ T3486] ? __fdget+0x158/0x220 [ 44.926261][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 44.931093][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 44.936032][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.941989][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 44.947163][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.953116][ T3486] do_syscall_64+0x3d/0xb0 [ 44.957509][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.963375][ T3486] RIP: 0033:0x7fb5f81128b9 [ 44.967766][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 44.987346][ T3486] RSP: 002b:00007ffec7125ac8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.995742][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb5f81128b9 [ 45.003686][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 45.011633][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffec7125b40 [ 45.019580][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.027523][ T3486] R13: 00007ffec7125cc8 R14: 0000000000000001 R15: 0000000000000001 [ 45.035563][ T3486] [ 45.038643][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 45.048121][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor138 [ 45.057610][ T3486] INFO: lockdep is turned off. [ 45.062365][ T3486] Preemption disabled at: [ 45.062372][ T3486] [<0000000000000000>] 0x0 [ 45.071116][ T3486] CPU: 0 PID: 3486 Comm: syz-executor138 Not tainted 5.15.126-syzkaller #0 [ 45.079705][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 45.089738][ T3486] Call Trace: [ 45.092997][ T3486] [ 45.095905][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 45.100561][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 45.106168][ T3486] ? panic+0x84d/0x84d [ 45.110210][ T3486] ? rcu_is_watching+0x11/0xa0 [ 45.114962][ T3486] ? rcu_is_watching+0x11/0xa0 [ 45.119714][ T3486] ___might_sleep+0x547/0x6a0 [ 45.124367][ T3486] ? __might_sleep+0xc0/0xc0 [ 45.128934][ T3486] slab_pre_alloc_hook+0x44/0xc0 [ 45.133847][ T3486] __kmalloc_node+0x71/0x390 [ 45.138417][ T3486] ? kvmalloc_node+0x80/0x140 [ 45.143066][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 45.148147][ T3486] kvmalloc_node+0x80/0x140 [ 45.152626][ T3486] get_dist_table+0x83/0x2c0 [ 45.157188][ T3486] netem_change+0xa05/0x20c0 [ 45.161754][ T3486] ? netem_destroy+0xb0/0xb0 [ 45.166314][ T3486] ? debug_object_init+0x10/0x10 [ 45.171223][ T3486] ? memset+0x1f/0x40 [ 45.175199][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 45.180550][ T3486] ? memset+0x1f/0x40 [ 45.184507][ T3486] ? __hrtimer_init+0x181/0x260 [ 45.189433][ T3486] netem_init+0x58/0xb0 [ 45.193581][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 45.198841][ T3486] qdisc_create+0x8ae/0x1390 [ 45.203414][ T3486] ? qdisc_notify+0x380/0x380 [ 45.208062][ T3486] ? apparmor_capable+0x12e/0x190 [ 45.213072][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 45.217902][ T3486] ? rcu_lock_release+0x20/0x20 [ 45.222729][ T3486] ? rcu_lock_release+0x20/0x20 [ 45.227554][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 45.232466][ T3486] ? reacquire_held_locks+0x660/0x660 [ 45.237811][ T3486] ? rtnetlink_bind+0x80/0x80 [ 45.242458][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 45.247734][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 45.252734][ T3486] ? __kernel_text_address+0x94/0x100 [ 45.258080][ T3486] ? unwind_get_return_address+0x49/0x80 [ 45.263688][ T3486] ? arch_stack_walk+0xf3/0x140 [ 45.268512][ T3486] ? mark_lock+0x98/0x340 [ 45.272815][ T3486] ? mark_lock+0x98/0x340 [ 45.277158][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 45.282176][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 45.286934][ T3486] ? rtnetlink_bind+0x80/0x80 [ 45.291599][ T3486] ? netlink_ack+0xb10/0xb10 [ 45.296169][ T3486] netlink_unicast+0x7b6/0x980 [ 45.300911][ T3486] ? netlink_detachskb+0x90/0x90 [ 45.305823][ T3486] ? 0xffffffff81000000 [ 45.309949][ T3486] ? __check_object_size+0x300/0x410 [ 45.315207][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 45.320297][ T3486] netlink_sendmsg+0xa30/0xd60 [ 45.325038][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 45.330212][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 45.335130][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 45.340386][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 45.345819][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 45.350991][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 45.355729][ T3486] ? iovec_from_user+0x300/0x390 [ 45.360655][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 45.365656][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 45.370306][ T3486] ? __sys_sendmsg+0x260/0x260 [ 45.375044][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 45.380317][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 45.385679][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 45.391129][ T3486] ? __fdget+0x158/0x220 [ 45.395352][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 45.400179][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 45.405098][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 45.411049][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 45.418130][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 45.424088][ T3486] do_syscall_64+0x3d/0xb0 [ 45.428481][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 45.434349][ T3486] RIP: 0033:0x7fb5f81128b9 [ 45.438757][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 45.458342][ T3486] RSP: 002b:00007ffec7125ac8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 45.466741][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb5f81128b9 [ 45.474688][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 45.482634][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffec7125b40 [ 45.490579][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.498536][ T3486] R13: 00007ffec7125cc8 R14: 0000000000000001 R15: 0000000000000001 [ 45.506507][ T3486]