Warning: Permanently added '10.128.0.35' (ED25519) to the list of known hosts. executing program [ 54.242836][ T3486] [ 54.245192][ T3486] ===================================================== [ 54.252103][ T3486] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 54.259542][ T3486] 5.15.126-syzkaller #0 Not tainted [ 54.264711][ T3486] ----------------------------------------------------- [ 54.271703][ T3486] syz-executor628/3486 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 54.279752][ T3486] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 54.288712][ T3486] [ 54.288712][ T3486] and this task is already holding: [ 54.296054][ T3486] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 54.305250][ T3486] which would create a new lock dependency: [ 54.311114][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 54.318664][ T3486] [ 54.318664][ T3486] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 54.328087][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} [ 54.328106][ T3486] [ 54.328106][ T3486] ... which became SOFTIRQ-irq-safe at: [ 54.340886][ T3486] lock_acquire+0x1db/0x4f0 [ 54.345459][ T3486] _raw_spin_lock+0x2a/0x40 [ 54.350032][ T3486] net_tx_action+0x6c5/0x8e0 [ 54.354690][ T3486] __do_softirq+0x3b3/0x93a [ 54.359266][ T3486] do_softirq+0x162/0x240 [ 54.363666][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 54.368932][ T3486] dev_deactivate_many+0x524/0xbf0 [ 54.374115][ T3486] dev_deactivate+0x177/0x270 [ 54.378882][ T3486] linkwatch_do_dev+0x104/0x160 [ 54.383804][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 54.389158][ T3486] linkwatch_event+0x48/0x50 [ 54.393820][ T3486] process_one_work+0x8a1/0x10c0 [ 54.398832][ T3486] worker_thread+0xaca/0x1280 [ 54.403581][ T3486] kthread+0x3f6/0x4f0 [ 54.407713][ T3486] ret_from_fork+0x1f/0x30 [ 54.412199][ T3486] [ 54.412199][ T3486] to a SOFTIRQ-irq-unsafe lock: [ 54.419282][ T3486] (fs_reclaim){+.+.}-{0:0} [ 54.419318][ T3486] [ 54.419318][ T3486] ... which became SOFTIRQ-irq-unsafe at: [ 54.431655][ T3486] ... [ 54.431660][ T3486] lock_acquire+0x1db/0x4f0 [ 54.438797][ T3486] fs_reclaim_acquire+0x83/0x120 [ 54.443806][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 54.448812][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 54.454166][ T3486] wq_numa_init+0x122/0x49f [ 54.458740][ T3486] workqueue_init+0x18/0x5e1 [ 54.463398][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 54.468769][ T3486] kernel_init+0x19/0x290 [ 54.473168][ T3486] ret_from_fork+0x1f/0x30 [ 54.477662][ T3486] [ 54.477662][ T3486] other info that might help us debug this: [ 54.477662][ T3486] [ 54.487870][ T3486] Possible interrupt unsafe locking scenario: [ 54.487870][ T3486] [ 54.496166][ T3486] CPU0 CPU1 [ 54.501508][ T3486] ---- ---- [ 54.506852][ T3486] lock(fs_reclaim); [ 54.510815][ T3486] local_irq_disable(); [ 54.517547][ T3486] lock(noop_qdisc.q.lock); [ 54.524641][ T3486] lock(fs_reclaim); [ 54.531122][ T3486] [ 54.534564][ T3486] lock(noop_qdisc.q.lock); [ 54.539307][ T3486] [ 54.539307][ T3486] *** DEADLOCK *** [ 54.539307][ T3486] [ 54.547422][ T3486] 2 locks held by syz-executor628/3486: [ 54.552942][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 54.562324][ T3486] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 54.571979][ T3486] [ 54.571979][ T3486] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 54.582362][ T3486] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 54.587818][ T3486] HARDIRQ-ON-W at: [ 54.591779][ T3486] lock_acquire+0x1db/0x4f0 [ 54.597944][ T3486] _raw_spin_lock+0x2a/0x40 [ 54.604081][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 54.610654][ T3486] tx+0x64/0x100 [ 54.615829][ T3486] kthread+0x234/0x440 [ 54.621525][ T3486] kthread+0x3f6/0x4f0 [ 54.627221][ T3486] ret_from_fork+0x1f/0x30 [ 54.633266][ T3486] IN-SOFTIRQ-W at: [ 54.637225][ T3486] lock_acquire+0x1db/0x4f0 [ 54.643373][ T3486] _raw_spin_lock+0x2a/0x40 [ 54.649503][ T3486] net_tx_action+0x6c5/0x8e0 [ 54.655724][ T3486] __do_softirq+0x3b3/0x93a [ 54.661863][ T3486] do_softirq+0x162/0x240 [ 54.667821][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 54.674648][ T3486] dev_deactivate_many+0x524/0xbf0 [ 54.681391][ T3486] dev_deactivate+0x177/0x270 [ 54.687697][ T3486] linkwatch_do_dev+0x104/0x160 [ 54.694182][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 54.701098][ T3486] linkwatch_event+0x48/0x50 [ 54.707315][ T3486] process_one_work+0x8a1/0x10c0 [ 54.713881][ T3486] worker_thread+0xaca/0x1280 [ 54.720192][ T3486] kthread+0x3f6/0x4f0 [ 54.725888][ T3486] ret_from_fork+0x1f/0x30 [ 54.731938][ T3486] INITIAL USE at: [ 54.735828][ T3486] lock_acquire+0x1db/0x4f0 [ 54.741872][ T3486] _raw_spin_lock+0x2a/0x40 [ 54.747923][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 54.754414][ T3486] tx+0x64/0x100 [ 54.759511][ T3486] kthread+0x234/0x440 [ 54.765125][ T3486] kthread+0x3f6/0x4f0 [ 54.770739][ T3486] ret_from_fork+0x1f/0x30 [ 54.776700][ T3486] } [ 54.779177][ T3486] ... key at: [] noop_qdisc+0x108/0x320 [ 54.786795][ T3486] [ 54.786795][ T3486] the dependencies between the lock to be acquired [ 54.786802][ T3486] and SOFTIRQ-irq-unsafe lock: [ 54.800279][ T3486] -> (fs_reclaim){+.+.}-{0:0} { [ 54.805126][ T3486] HARDIRQ-ON-W at: [ 54.809088][ T3486] lock_acquire+0x1db/0x4f0 [ 54.815231][ T3486] fs_reclaim_acquire+0x83/0x120 [ 54.821810][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 54.828403][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 54.835317][ T3486] wq_numa_init+0x122/0x49f [ 54.841451][ T3486] workqueue_init+0x18/0x5e1 [ 54.847669][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 54.854499][ T3486] kernel_init+0x19/0x290 [ 54.860483][ T3486] ret_from_fork+0x1f/0x30 [ 54.866543][ T3486] SOFTIRQ-ON-W at: [ 54.870524][ T3486] lock_acquire+0x1db/0x4f0 [ 54.876668][ T3486] fs_reclaim_acquire+0x83/0x120 [ 54.883241][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 54.889808][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 54.896726][ T3486] wq_numa_init+0x122/0x49f [ 54.902864][ T3486] workqueue_init+0x18/0x5e1 [ 54.909088][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 54.915920][ T3486] kernel_init+0x19/0x290 [ 54.921879][ T3486] ret_from_fork+0x1f/0x30 [ 54.927930][ T3486] INITIAL USE at: [ 54.931808][ T3486] lock_acquire+0x1db/0x4f0 [ 54.937867][ T3486] fs_reclaim_acquire+0x83/0x120 [ 54.944352][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 54.950835][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 54.957670][ T3486] wq_numa_init+0x122/0x49f [ 54.963721][ T3486] workqueue_init+0x18/0x5e1 [ 54.969944][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 54.976692][ T3486] kernel_init+0x19/0x290 [ 54.982570][ T3486] ret_from_fork+0x1f/0x30 [ 54.988623][ T3486] } [ 54.991102][ T3486] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 54.999083][ T3486] ... acquired at: [ 55.002867][ T3486] lock_acquire+0x1db/0x4f0 [ 55.007541][ T3486] fs_reclaim_acquire+0x83/0x120 [ 55.012641][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 55.017738][ T3486] __kmalloc_node+0x71/0x390 [ 55.022488][ T3486] kvmalloc_node+0x80/0x140 [ 55.027152][ T3486] get_dist_table+0x83/0x2c0 [ 55.031899][ T3486] netem_change+0xa05/0x20c0 [ 55.036643][ T3486] netem_init+0x58/0xb0 [ 55.040947][ T3486] qdisc_create+0x8ae/0x1390 [ 55.045712][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 55.050735][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 55.055829][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 55.060747][ T3486] netlink_unicast+0x7b6/0x980 [ 55.065662][ T3486] netlink_sendmsg+0xa30/0xd60 [ 55.070583][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 55.075505][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 55.080342][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 55.085344][ T3486] do_syscall_64+0x3d/0xb0 [ 55.089916][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.095967][ T3486] [ 55.098274][ T3486] [ 55.098274][ T3486] stack backtrace: [ 55.104142][ T3486] CPU: 1 PID: 3486 Comm: syz-executor628 Not tainted 5.15.126-syzkaller #0 [ 55.112716][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 55.122763][ T3486] Call Trace: [ 55.126034][ T3486] [ 55.128954][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 55.133633][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 55.139256][ T3486] ? panic+0x84d/0x84d [ 55.143313][ T3486] ? print_shortest_lock_dependencies+0xee/0x150 [ 55.149632][ T3486] validate_chain+0x4cfe/0x58b0 [ 55.154481][ T3486] ? reacquire_held_locks+0x660/0x660 [ 55.159840][ T3486] ? validate_chain+0x112/0x58b0 [ 55.164773][ T3486] ? reacquire_held_locks+0x660/0x660 [ 55.170131][ T3486] ? mark_lock+0x98/0x340 [ 55.174458][ T3486] __lock_acquire+0x1295/0x1ff0 [ 55.179311][ T3486] lock_acquire+0x1db/0x4f0 [ 55.183817][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 55.188922][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 55.194297][ T3486] fs_reclaim_acquire+0x83/0x120 [ 55.199229][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 55.204347][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 55.209276][ T3486] __kmalloc_node+0x71/0x390 [ 55.213872][ T3486] ? kvmalloc_node+0x80/0x140 [ 55.218533][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 55.223629][ T3486] kvmalloc_node+0x80/0x140 [ 55.228116][ T3486] get_dist_table+0x83/0x2c0 [ 55.232695][ T3486] netem_change+0xa05/0x20c0 [ 55.237277][ T3486] ? netem_destroy+0xb0/0xb0 [ 55.241852][ T3486] ? debug_object_init+0x10/0x10 [ 55.246785][ T3486] ? memset+0x1f/0x40 [ 55.250749][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 55.256106][ T3486] ? memset+0x1f/0x40 [ 55.260064][ T3486] ? __hrtimer_init+0x181/0x260 [ 55.264895][ T3486] netem_init+0x58/0xb0 [ 55.269029][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 55.274295][ T3486] qdisc_create+0x8ae/0x1390 [ 55.278866][ T3486] ? qdisc_notify+0x380/0x380 [ 55.283549][ T3486] ? apparmor_capable+0x12e/0x190 [ 55.288556][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 55.293397][ T3486] ? rcu_lock_release+0x20/0x20 [ 55.298336][ T3486] ? rcu_lock_release+0x20/0x20 [ 55.303176][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 55.308104][ T3486] ? reacquire_held_locks+0x660/0x660 [ 55.313456][ T3486] ? rtnetlink_bind+0x80/0x80 [ 55.318112][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 55.323384][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 55.328390][ T3486] ? __kernel_text_address+0x94/0x100 [ 55.333756][ T3486] ? unwind_get_return_address+0x49/0x80 [ 55.339373][ T3486] ? arch_stack_walk+0xf3/0x140 [ 55.344203][ T3486] ? mark_lock+0x98/0x340 [ 55.348515][ T3486] ? mark_lock+0x98/0x340 [ 55.352828][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 55.357851][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 55.362602][ T3486] ? rtnetlink_bind+0x80/0x80 [ 55.367262][ T3486] ? netlink_ack+0xb10/0xb10 [ 55.371841][ T3486] netlink_unicast+0x7b6/0x980 [ 55.376589][ T3486] ? netlink_detachskb+0x90/0x90 [ 55.381504][ T3486] ? 0xffffffff81000000 [ 55.385636][ T3486] ? __check_object_size+0x300/0x410 [ 55.390908][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 55.396010][ T3486] netlink_sendmsg+0xa30/0xd60 [ 55.400761][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 55.405944][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 55.410868][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 55.416132][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 55.421578][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 55.426762][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 55.431512][ T3486] ? iovec_from_user+0x300/0x390 [ 55.436434][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 55.441479][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 55.446142][ T3486] ? __sys_sendmsg+0x260/0x260 [ 55.450890][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 55.455907][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 55.461263][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 55.466724][ T3486] ? __fdget+0x158/0x220 [ 55.470950][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 55.475810][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 55.480744][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 55.486714][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 55.491901][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 55.497871][ T3486] do_syscall_64+0x3d/0xb0 [ 55.502283][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.508167][ T3486] RIP: 0033:0x7fbf3f8e8939 [ 55.512571][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 55.532160][ T3486] RSP: 002b:00007ffd21da4988 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 55.540580][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbf3f8e8939 [ 55.548537][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 55.556491][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd21da4a00 [ 55.564443][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 55.572396][ T3486] R13: 00007ffd21da4b88 R14: 0000000000000001 R15: 0000000000000001 [ 55.580358][ T3486] [ 55.583463][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 55.592935][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor628 [ 55.602425][ T3486] INFO: lockdep is turned off. [ 55.607183][ T3486] Preemption disabled at: [ 55.607193][ T3486] [<0000000000000000>] 0x0 [ 55.615955][ T3486] CPU: 1 PID: 3486 Comm: syz-executor628 Not tainted 5.15.126-syzkaller #0 [ 55.624538][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 55.634585][ T3486] Call Trace: [ 55.637864][ T3486] [ 55.640785][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 55.645458][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 55.651080][ T3486] ? panic+0x84d/0x84d [ 55.655132][ T3486] ? rcu_is_watching+0x11/0xa0 [ 55.659877][ T3486] ? rcu_is_watching+0x11/0xa0 [ 55.664620][ T3486] ___might_sleep+0x547/0x6a0 [ 55.669279][ T3486] ? __might_sleep+0xc0/0xc0 [ 55.673858][ T3486] slab_pre_alloc_hook+0x44/0xc0 [ 55.678782][ T3486] __kmalloc_node+0x71/0x390 [ 55.683363][ T3486] ? kvmalloc_node+0x80/0x140 [ 55.688018][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 55.693119][ T3486] kvmalloc_node+0x80/0x140 [ 55.697609][ T3486] get_dist_table+0x83/0x2c0 [ 55.702187][ T3486] netem_change+0xa05/0x20c0 [ 55.706770][ T3486] ? netem_destroy+0xb0/0xb0 [ 55.711340][ T3486] ? debug_object_init+0x10/0x10 [ 55.716259][ T3486] ? memset+0x1f/0x40 [ 55.720249][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 55.725628][ T3486] ? memset+0x1f/0x40 [ 55.729601][ T3486] ? __hrtimer_init+0x181/0x260 [ 55.734441][ T3486] netem_init+0x58/0xb0 [ 55.738582][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 55.743869][ T3486] qdisc_create+0x8ae/0x1390 [ 55.748479][ T3486] ? qdisc_notify+0x380/0x380 [ 55.753139][ T3486] ? apparmor_capable+0x12e/0x190 [ 55.758180][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 55.763022][ T3486] ? rcu_lock_release+0x20/0x20 [ 55.767862][ T3486] ? rcu_lock_release+0x20/0x20 [ 55.772692][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 55.777614][ T3486] ? reacquire_held_locks+0x660/0x660 [ 55.782967][ T3486] ? rtnetlink_bind+0x80/0x80 [ 55.787627][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 55.792890][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 55.797900][ T3486] ? __kernel_text_address+0x94/0x100 [ 55.803256][ T3486] ? unwind_get_return_address+0x49/0x80 [ 55.808868][ T3486] ? arch_stack_walk+0xf3/0x140 [ 55.813705][ T3486] ? mark_lock+0x98/0x340 [ 55.818020][ T3486] ? mark_lock+0x98/0x340 [ 55.822332][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 55.827352][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 55.832100][ T3486] ? rtnetlink_bind+0x80/0x80 [ 55.836762][ T3486] ? netlink_ack+0xb10/0xb10 [ 55.841349][ T3486] netlink_unicast+0x7b6/0x980 [ 55.846095][ T3486] ? netlink_detachskb+0x90/0x90 [ 55.851016][ T3486] ? 0xffffffff81000000 [ 55.855152][ T3486] ? __check_object_size+0x300/0x410 [ 55.860415][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 55.865526][ T3486] netlink_sendmsg+0xa30/0xd60 [ 55.870286][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 55.875475][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 55.880398][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 55.885667][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 55.891111][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 55.896301][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 55.901048][ T3486] ? iovec_from_user+0x300/0x390 [ 55.905964][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 55.910976][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 55.915632][ T3486] ? __sys_sendmsg+0x260/0x260 [ 55.920372][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 55.925389][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 55.930746][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 55.936185][ T3486] ? __fdget+0x158/0x220 [ 55.940447][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 55.945275][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 55.950195][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 55.956151][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 55.961325][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 55.967280][ T3486] do_syscall_64+0x3d/0xb0 [ 55.971675][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 55.977554][ T3486] RIP: 0033:0x7fbf3f8e8939 [ 55.981970][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 56.001560][ T3486] RSP: 002b:00007ffd21da4988 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 56.009960][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fbf3f8e8939 [ 56.017922][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 56.025885][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd21da4a00 [ 56.033850][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 56.041813][ T3486] R13: 00007ffd21da4b88 R14: 0000000000000001 R15: 0000000000000001 [ 56.049787][ T3486]