Warning: Permanently added '10.128.1.0' (ED25519) to the list of known hosts. executing program [ 53.417703][ T3489] [ 53.420111][ T3489] ===================================================== [ 53.427036][ T3489] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 53.434488][ T3489] 5.15.126-syzkaller #0 Not tainted [ 53.439688][ T3489] ----------------------------------------------------- [ 53.446610][ T3489] syz-executor311/3489 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 53.454673][ T3489] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 53.463641][ T3489] [ 53.463641][ T3489] and this task is already holding: [ 53.470989][ T3489] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 53.480283][ T3489] which would create a new lock dependency: [ 53.486158][ T3489] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 53.493812][ T3489] [ 53.493812][ T3489] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 53.503292][ T3489] (noop_qdisc.q.lock){+.-.}-{2:2} [ 53.503313][ T3489] [ 53.503313][ T3489] ... which became SOFTIRQ-irq-safe at: [ 53.516104][ T3489] lock_acquire+0x1db/0x4f0 [ 53.520696][ T3489] _raw_spin_lock+0x2a/0x40 [ 53.525354][ T3489] net_tx_action+0x6c5/0x8e0 [ 53.530044][ T3489] __do_softirq+0x3b3/0x93a [ 53.534855][ T3489] do_softirq+0x162/0x240 [ 53.539293][ T3489] __local_bh_enable_ip+0x1b1/0x1f0 [ 53.544566][ T3489] dev_deactivate_many+0x524/0xbf0 [ 53.549757][ T3489] dev_deactivate+0x177/0x270 [ 53.554517][ T3489] linkwatch_do_dev+0x104/0x160 [ 53.559451][ T3489] __linkwatch_run_queue+0x4ca/0x7f0 [ 53.564827][ T3489] linkwatch_event+0x48/0x50 [ 53.569507][ T3489] process_one_work+0x8a1/0x10c0 [ 53.574649][ T3489] worker_thread+0xaca/0x1280 [ 53.579414][ T3489] kthread+0x3f6/0x4f0 [ 53.583568][ T3489] ret_from_fork+0x1f/0x30 [ 53.588084][ T3489] [ 53.588084][ T3489] to a SOFTIRQ-irq-unsafe lock: [ 53.595120][ T3489] (fs_reclaim){+.+.}-{0:0} [ 53.595147][ T3489] [ 53.595147][ T3489] ... which became SOFTIRQ-irq-unsafe at: [ 53.607497][ T3489] ... [ 53.607504][ T3489] lock_acquire+0x1db/0x4f0 [ 53.614677][ T3489] fs_reclaim_acquire+0x83/0x120 [ 53.619695][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 53.624710][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 53.630072][ T3489] wq_numa_init+0x122/0x49f [ 53.634650][ T3489] workqueue_init+0x18/0x5e1 [ 53.639317][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 53.644590][ T3489] kernel_init+0x19/0x290 [ 53.649030][ T3489] ret_from_fork+0x1f/0x30 [ 53.653525][ T3489] [ 53.653525][ T3489] other info that might help us debug this: [ 53.653525][ T3489] [ 53.663739][ T3489] Possible interrupt unsafe locking scenario: [ 53.663739][ T3489] [ 53.672060][ T3489] CPU0 CPU1 [ 53.677416][ T3489] ---- ---- [ 53.682764][ T3489] lock(fs_reclaim); [ 53.686734][ T3489] local_irq_disable(); [ 53.693643][ T3489] lock(noop_qdisc.q.lock); [ 53.700739][ T3489] lock(fs_reclaim); [ 53.707233][ T3489] [ 53.710673][ T3489] lock(noop_qdisc.q.lock); [ 53.715425][ T3489] [ 53.715425][ T3489] *** DEADLOCK *** [ 53.715425][ T3489] [ 53.723554][ T3489] 2 locks held by syz-executor311/3489: [ 53.729174][ T3489] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 53.738649][ T3489] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 53.748308][ T3489] [ 53.748308][ T3489] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 53.758695][ T3489] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 53.764158][ T3489] HARDIRQ-ON-W at: [ 53.768127][ T3489] lock_acquire+0x1db/0x4f0 [ 53.774280][ T3489] _raw_spin_lock+0x2a/0x40 [ 53.780448][ T3489] __dev_queue_xmit+0xad6/0x3230 [ 53.787286][ T3489] tx+0x64/0x100 [ 53.792471][ T3489] kthread+0x234/0x440 [ 53.798189][ T3489] kthread+0x3f6/0x4f0 [ 53.803893][ T3489] ret_from_fork+0x1f/0x30 [ 53.809969][ T3489] IN-SOFTIRQ-W at: [ 53.813938][ T3489] lock_acquire+0x1db/0x4f0 [ 53.820083][ T3489] _raw_spin_lock+0x2a/0x40 [ 53.826227][ T3489] net_tx_action+0x6c5/0x8e0 [ 53.832455][ T3489] __do_softirq+0x3b3/0x93a [ 53.838598][ T3489] do_softirq+0x162/0x240 [ 53.844563][ T3489] __local_bh_enable_ip+0x1b1/0x1f0 [ 53.851398][ T3489] dev_deactivate_many+0x524/0xbf0 [ 53.858149][ T3489] dev_deactivate+0x177/0x270 [ 53.864466][ T3489] linkwatch_do_dev+0x104/0x160 [ 53.870957][ T3489] __linkwatch_run_queue+0x4ca/0x7f0 [ 53.877973][ T3489] linkwatch_event+0x48/0x50 [ 53.884204][ T3489] process_one_work+0x8a1/0x10c0 [ 53.890782][ T3489] worker_thread+0xaca/0x1280 [ 53.897097][ T3489] kthread+0x3f6/0x4f0 [ 53.902807][ T3489] ret_from_fork+0x1f/0x30 [ 53.908861][ T3489] INITIAL USE at: [ 53.912760][ T3489] lock_acquire+0x1db/0x4f0 [ 53.918817][ T3489] _raw_spin_lock+0x2a/0x40 [ 53.924873][ T3489] __dev_queue_xmit+0xad6/0x3230 [ 53.931371][ T3489] tx+0x64/0x100 [ 53.936471][ T3489] kthread+0x234/0x440 [ 53.942091][ T3489] kthread+0x3f6/0x4f0 [ 53.947731][ T3489] ret_from_fork+0x1f/0x30 [ 53.953785][ T3489] } [ 53.956270][ T3489] ... key at: [] noop_qdisc+0x108/0x320 [ 53.963903][ T3489] [ 53.963903][ T3489] the dependencies between the lock to be acquired [ 53.963911][ T3489] and SOFTIRQ-irq-unsafe lock: [ 53.977404][ T3489] -> (fs_reclaim){+.+.}-{0:0} { [ 53.982254][ T3489] HARDIRQ-ON-W at: [ 53.986222][ T3489] lock_acquire+0x1db/0x4f0 [ 53.992372][ T3489] fs_reclaim_acquire+0x83/0x120 [ 53.998954][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 54.005533][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 54.012455][ T3489] wq_numa_init+0x122/0x49f [ 54.018595][ T3489] workqueue_init+0x18/0x5e1 [ 54.024822][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 54.031660][ T3489] kernel_init+0x19/0x290 [ 54.037634][ T3489] ret_from_fork+0x1f/0x30 [ 54.043709][ T3489] SOFTIRQ-ON-W at: [ 54.047675][ T3489] lock_acquire+0x1db/0x4f0 [ 54.053818][ T3489] fs_reclaim_acquire+0x83/0x120 [ 54.060405][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 54.066980][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 54.073914][ T3489] wq_numa_init+0x122/0x49f [ 54.080067][ T3489] workqueue_init+0x18/0x5e1 [ 54.086301][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 54.093259][ T3489] kernel_init+0x19/0x290 [ 54.099232][ T3489] ret_from_fork+0x1f/0x30 [ 54.105291][ T3489] INITIAL USE at: [ 54.109168][ T3489] lock_acquire+0x1db/0x4f0 [ 54.115239][ T3489] fs_reclaim_acquire+0x83/0x120 [ 54.121732][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 54.128224][ T3489] kmem_cache_alloc_trace+0x49/0x290 [ 54.135082][ T3489] wq_numa_init+0x122/0x49f [ 54.141142][ T3489] workqueue_init+0x18/0x5e1 [ 54.147285][ T3489] kernel_init_freeable+0x40a/0x5c5 [ 54.154034][ T3489] kernel_init+0x19/0x290 [ 54.159917][ T3489] ret_from_fork+0x1f/0x30 [ 54.165885][ T3489] } [ 54.168369][ T3489] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 54.176339][ T3489] ... acquired at: [ 54.180128][ T3489] lock_acquire+0x1db/0x4f0 [ 54.184793][ T3489] fs_reclaim_acquire+0x83/0x120 [ 54.189894][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 54.195004][ T3489] __kmalloc_node+0x71/0x390 [ 54.199759][ T3489] kvmalloc_node+0x80/0x140 [ 54.204428][ T3489] get_dist_table+0x83/0x2c0 [ 54.209206][ T3489] netem_change+0xa05/0x20c0 [ 54.213976][ T3489] netem_init+0x58/0xb0 [ 54.218292][ T3489] qdisc_create+0x8ae/0x1390 [ 54.223128][ T3489] tc_modify_qdisc+0xac5/0x1710 [ 54.228145][ T3489] rtnetlink_rcv_msg+0x993/0xee0 [ 54.233246][ T3489] netlink_rcv_skb+0x1cf/0x410 [ 54.238183][ T3489] netlink_unicast+0x7b6/0x980 [ 54.243113][ T3489] netlink_sendmsg+0xa30/0xd60 [ 54.248041][ T3489] ____sys_sendmsg+0x59e/0x8f0 [ 54.252972][ T3489] ___sys_sendmsg+0x252/0x2e0 [ 54.257812][ T3489] __se_sys_sendmsg+0x19a/0x260 [ 54.262821][ T3489] do_syscall_64+0x3d/0xb0 [ 54.267404][ T3489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.273465][ T3489] [ 54.275775][ T3489] [ 54.275775][ T3489] stack backtrace: [ 54.281648][ T3489] CPU: 1 PID: 3489 Comm: syz-executor311 Not tainted 5.15.126-syzkaller #0 [ 54.290222][ T3489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 54.300283][ T3489] Call Trace: [ 54.303573][ T3489] [ 54.306509][ T3489] dump_stack_lvl+0x1e3/0x2cb [ 54.311198][ T3489] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 54.316824][ T3489] ? panic+0x84d/0x84d [ 54.320884][ T3489] ? print_shortest_lock_dependencies+0xee/0x150 [ 54.327215][ T3489] validate_chain+0x4cfe/0x58b0 [ 54.332075][ T3489] ? reacquire_held_locks+0x660/0x660 [ 54.337437][ T3489] ? validate_chain+0x112/0x58b0 [ 54.342370][ T3489] ? reacquire_held_locks+0x660/0x660 [ 54.347769][ T3489] ? mark_lock+0x98/0x340 [ 54.352089][ T3489] __lock_acquire+0x1295/0x1ff0 [ 54.356938][ T3489] lock_acquire+0x1db/0x4f0 [ 54.361441][ T3489] ? slab_pre_alloc_hook+0x22/0xc0 [ 54.366541][ T3489] ? read_lock_is_recursive+0x10/0x10 [ 54.371923][ T3489] fs_reclaim_acquire+0x83/0x120 [ 54.376859][ T3489] ? slab_pre_alloc_hook+0x22/0xc0 [ 54.381986][ T3489] slab_pre_alloc_hook+0x22/0xc0 [ 54.386952][ T3489] __kmalloc_node+0x71/0x390 [ 54.391550][ T3489] ? kvmalloc_node+0x80/0x140 [ 54.396225][ T3489] ? __bpf_trace_softirq+0x10/0x10 [ 54.401328][ T3489] kvmalloc_node+0x80/0x140 [ 54.405823][ T3489] get_dist_table+0x83/0x2c0 [ 54.410416][ T3489] netem_change+0xa05/0x20c0 [ 54.415009][ T3489] ? netem_destroy+0xb0/0xb0 [ 54.419609][ T3489] ? debug_object_init+0x10/0x10 [ 54.424538][ T3489] ? memset+0x1f/0x40 [ 54.428511][ T3489] ? lockdep_init_map_type+0x9d/0x8d0 [ 54.433878][ T3489] ? memset+0x1f/0x40 [ 54.437852][ T3489] ? __hrtimer_init+0x181/0x260 [ 54.442710][ T3489] netem_init+0x58/0xb0 [ 54.446953][ T3489] ? qdisc_peek_dequeued+0x220/0x220 [ 54.452400][ T3489] qdisc_create+0x8ae/0x1390 [ 54.456997][ T3489] ? qdisc_notify+0x380/0x380 [ 54.461683][ T3489] ? apparmor_capable+0x12e/0x190 [ 54.466704][ T3489] tc_modify_qdisc+0xac5/0x1710 [ 54.471557][ T3489] ? rcu_lock_release+0x20/0x20 [ 54.476405][ T3489] ? rcu_lock_release+0x20/0x20 [ 54.481248][ T3489] rtnetlink_rcv_msg+0x993/0xee0 [ 54.486213][ T3489] ? reacquire_held_locks+0x660/0x660 [ 54.491594][ T3489] ? rtnetlink_bind+0x80/0x80 [ 54.496265][ T3489] ? is_bpf_text_address+0x24f/0x260 [ 54.501543][ T3489] ? stack_trace_save+0x1c0/0x1c0 [ 54.506560][ T3489] ? __kernel_text_address+0x94/0x100 [ 54.511929][ T3489] ? unwind_get_return_address+0x49/0x80 [ 54.517551][ T3489] ? arch_stack_walk+0xf3/0x140 [ 54.522419][ T3489] ? mark_lock+0x98/0x340 [ 54.526743][ T3489] ? mark_lock+0x98/0x340 [ 54.531061][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 54.536089][ T3489] netlink_rcv_skb+0x1cf/0x410 [ 54.540847][ T3489] ? rtnetlink_bind+0x80/0x80 [ 54.545515][ T3489] ? netlink_ack+0xb10/0xb10 [ 54.550100][ T3489] netlink_unicast+0x7b6/0x980 [ 54.554861][ T3489] ? netlink_detachskb+0x90/0x90 [ 54.559795][ T3489] ? 0xffffffff81000000 [ 54.563940][ T3489] ? __check_object_size+0x300/0x410 [ 54.569224][ T3489] ? bpf_lsm_netlink_send+0x5/0x10 [ 54.574332][ T3489] netlink_sendmsg+0xa30/0xd60 [ 54.579093][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 54.584287][ T3489] ? aa_sock_msg_perm+0x91/0x150 [ 54.589221][ T3489] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 54.594497][ T3489] ? security_socket_sendmsg+0x7d/0xa0 [ 54.599959][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 54.605428][ T3489] ____sys_sendmsg+0x59e/0x8f0 [ 54.610196][ T3489] ? iovec_from_user+0x300/0x390 [ 54.615134][ T3489] ? __sys_sendmsg_sock+0x30/0x30 [ 54.620154][ T3489] ___sys_sendmsg+0x252/0x2e0 [ 54.624948][ T3489] ? __sys_sendmsg+0x260/0x260 [ 54.629726][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 54.634764][ T3489] ? read_lock_is_recursive+0x10/0x10 [ 54.640142][ T3489] ? __context_tracking_exit+0x4c/0x80 [ 54.645606][ T3489] ? __fdget+0x158/0x220 [ 54.649841][ T3489] __se_sys_sendmsg+0x19a/0x260 [ 54.654695][ T3489] ? __x64_sys_sendmsg+0x80/0x80 [ 54.659631][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 54.665601][ T3489] ? lockdep_hardirqs_on+0x94/0x130 [ 54.670791][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 54.676764][ T3489] do_syscall_64+0x3d/0xb0 [ 54.681176][ T3489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 54.687064][ T3489] RIP: 0033:0x7f0f9ce4f879 [ 54.691470][ T3489] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 54.711063][ T3489] RSP: 002b:00007ffc1523cac8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 54.719475][ T3489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f9ce4f879 [ 54.727440][ T3489] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 54.735402][ T3489] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffc1523cb40 [ 54.743363][ T3489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 54.751327][ T3489] R13: 00007ffc1523ccc8 R14: 0000000000000001 R15: 0000000000000001 [ 54.759294][ T3489] [ 54.762428][ T3489] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 54.771926][ T3489] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3489, name: syz-executor311 [ 54.781394][ T3489] INFO: lockdep is turned off. [ 54.786201][ T3489] Preemption disabled at: [ 54.786209][ T3489] [<0000000000000000>] 0x0 [ 54.794955][ T3489] CPU: 1 PID: 3489 Comm: syz-executor311 Not tainted 5.15.126-syzkaller #0 [ 54.803547][ T3489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 54.813648][ T3489] Call Trace: [ 54.816924][ T3489] [ 54.819843][ T3489] dump_stack_lvl+0x1e3/0x2cb [ 54.824543][ T3489] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 54.830214][ T3489] ? panic+0x84d/0x84d [ 54.834275][ T3489] ? rcu_is_watching+0x11/0xa0 [ 54.839046][ T3489] ? rcu_is_watching+0x11/0xa0 [ 54.843803][ T3489] ___might_sleep+0x547/0x6a0 [ 54.848476][ T3489] ? __might_sleep+0xc0/0xc0 [ 54.853063][ T3489] slab_pre_alloc_hook+0x44/0xc0 [ 54.858036][ T3489] __kmalloc_node+0x71/0x390 [ 54.862617][ T3489] ? kvmalloc_node+0x80/0x140 [ 54.867288][ T3489] ? __bpf_trace_softirq+0x10/0x10 [ 54.872389][ T3489] kvmalloc_node+0x80/0x140 [ 54.876885][ T3489] get_dist_table+0x83/0x2c0 [ 54.881469][ T3489] netem_change+0xa05/0x20c0 [ 54.886059][ T3489] ? netem_destroy+0xb0/0xb0 [ 54.890637][ T3489] ? debug_object_init+0x10/0x10 [ 54.895580][ T3489] ? memset+0x1f/0x40 [ 54.899551][ T3489] ? lockdep_init_map_type+0x9d/0x8d0 [ 54.904921][ T3489] ? memset+0x1f/0x40 [ 54.908902][ T3489] ? __hrtimer_init+0x181/0x260 [ 54.913759][ T3489] netem_init+0x58/0xb0 [ 54.917928][ T3489] ? qdisc_peek_dequeued+0x220/0x220 [ 54.923225][ T3489] qdisc_create+0x8ae/0x1390 [ 54.927810][ T3489] ? qdisc_notify+0x380/0x380 [ 54.932483][ T3489] ? apparmor_capable+0x12e/0x190 [ 54.937505][ T3489] tc_modify_qdisc+0xac5/0x1710 [ 54.942648][ T3489] ? rcu_lock_release+0x20/0x20 [ 54.947503][ T3489] ? rcu_lock_release+0x20/0x20 [ 54.952349][ T3489] rtnetlink_rcv_msg+0x993/0xee0 [ 54.957278][ T3489] ? reacquire_held_locks+0x660/0x660 [ 54.962643][ T3489] ? rtnetlink_bind+0x80/0x80 [ 54.967310][ T3489] ? is_bpf_text_address+0x24f/0x260 [ 54.972584][ T3489] ? stack_trace_save+0x1c0/0x1c0 [ 54.977601][ T3489] ? __kernel_text_address+0x94/0x100 [ 54.982965][ T3489] ? unwind_get_return_address+0x49/0x80 [ 54.988592][ T3489] ? arch_stack_walk+0xf3/0x140 [ 54.993433][ T3489] ? mark_lock+0x98/0x340 [ 54.997755][ T3489] ? mark_lock+0x98/0x340 [ 55.002073][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 55.007104][ T3489] netlink_rcv_skb+0x1cf/0x410 [ 55.011888][ T3489] ? rtnetlink_bind+0x80/0x80 [ 55.016598][ T3489] ? netlink_ack+0xb10/0xb10 [ 55.021183][ T3489] netlink_unicast+0x7b6/0x980 [ 55.025941][ T3489] ? netlink_detachskb+0x90/0x90 [ 55.030870][ T3489] ? 0xffffffff81000000 [ 55.035015][ T3489] ? __check_object_size+0x300/0x410 [ 55.040290][ T3489] ? bpf_lsm_netlink_send+0x5/0x10 [ 55.045395][ T3489] netlink_sendmsg+0xa30/0xd60 [ 55.050158][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 55.055384][ T3489] ? aa_sock_msg_perm+0x91/0x150 [ 55.060315][ T3489] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 55.065590][ T3489] ? security_socket_sendmsg+0x7d/0xa0 [ 55.071061][ T3489] ? netlink_getsockopt+0x5b0/0x5b0 [ 55.076253][ T3489] ____sys_sendmsg+0x59e/0x8f0 [ 55.081093][ T3489] ? iovec_from_user+0x300/0x390 [ 55.086022][ T3489] ? __sys_sendmsg_sock+0x30/0x30 [ 55.091039][ T3489] ___sys_sendmsg+0x252/0x2e0 [ 55.095708][ T3489] ? __sys_sendmsg+0x260/0x260 [ 55.100465][ T3489] ? __lock_acquire+0x1295/0x1ff0 [ 55.105492][ T3489] ? read_lock_is_recursive+0x10/0x10 [ 55.110860][ T3489] ? __context_tracking_exit+0x4c/0x80 [ 55.116316][ T3489] ? __fdget+0x158/0x220 [ 55.120547][ T3489] __se_sys_sendmsg+0x19a/0x260 [ 55.125390][ T3489] ? __x64_sys_sendmsg+0x80/0x80 [ 55.130321][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 55.136380][ T3489] ? lockdep_hardirqs_on+0x94/0x130 [ 55.141569][ T3489] ? syscall_enter_from_user_mode+0x2e/0x230 [ 55.147538][ T3489] do_syscall_64+0x3d/0xb0 [ 55.151950][ T3489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.157837][ T3489] RIP: 0033:0x7f0f9ce4f879 [ 55.162244][ T3489] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 55.181843][ T3489] RSP: 002b:00007ffc1523cac8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.190265][ T3489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f9ce4f879 [ 55.198228][ T3489] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 55.206190][ T3489] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffc1523cb40 [ 55.214152][ T3489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.222111][ T3489] R13: 00007ffc1523ccc8 R14: 0000000000000001 R15: 0000000000000001 [ 55.230076][ T3489]