Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts. executing program [ 43.184957][ T3486] [ 43.187294][ T3486] ===================================================== [ 43.194198][ T3486] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 43.201625][ T3486] 5.15.126-syzkaller #0 Not tainted [ 43.206791][ T3486] ----------------------------------------------------- [ 43.213693][ T3486] syz-executor111/3486 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 43.221731][ T3486] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 43.230673][ T3486] [ 43.230673][ T3486] and this task is already holding: [ 43.238182][ T3486] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 43.247366][ T3486] which would create a new lock dependency: [ 43.253313][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 43.260846][ T3486] [ 43.260846][ T3486] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 43.270264][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} [ 43.270279][ T3486] [ 43.270279][ T3486] ... which became SOFTIRQ-irq-safe at: [ 43.283036][ T3486] lock_acquire+0x1db/0x4f0 [ 43.287605][ T3486] _raw_spin_lock+0x2a/0x40 [ 43.293035][ T3486] net_tx_action+0x6c5/0x8e0 [ 43.297686][ T3486] __do_softirq+0x3b3/0x93a [ 43.302252][ T3486] do_softirq+0x162/0x240 [ 43.306645][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 43.311907][ T3486] dev_deactivate_many+0x524/0xbf0 [ 43.317089][ T3486] dev_deactivate+0x177/0x270 [ 43.321827][ T3486] linkwatch_do_dev+0x104/0x160 [ 43.326738][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 43.332088][ T3486] linkwatch_event+0x48/0x50 [ 43.336738][ T3486] process_one_work+0x8a1/0x10c0 [ 43.341825][ T3486] worker_thread+0xaca/0x1280 [ 43.346561][ T3486] kthread+0x3f6/0x4f0 [ 43.350697][ T3486] ret_from_fork+0x1f/0x30 [ 43.355171][ T3486] [ 43.355171][ T3486] to a SOFTIRQ-irq-unsafe lock: [ 43.362162][ T3486] (fs_reclaim){+.+.}-{0:0} [ 43.362178][ T3486] [ 43.362178][ T3486] ... which became SOFTIRQ-irq-unsafe at: [ 43.374498][ T3486] ... [ 43.374503][ T3486] lock_acquire+0x1db/0x4f0 [ 43.381622][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.386631][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.391631][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 43.396974][ T3486] wq_numa_init+0x122/0x49f [ 43.401539][ T3486] workqueue_init+0x18/0x5e1 [ 43.406189][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 43.411534][ T3486] kernel_init+0x19/0x290 [ 43.415924][ T3486] ret_from_fork+0x1f/0x30 [ 43.420405][ T3486] [ 43.420405][ T3486] other info that might help us debug this: [ 43.420405][ T3486] [ 43.430606][ T3486] Possible interrupt unsafe locking scenario: [ 43.430606][ T3486] [ 43.438898][ T3486] CPU0 CPU1 [ 43.444247][ T3486] ---- ---- [ 43.449584][ T3486] lock(fs_reclaim); [ 43.453540][ T3486] local_irq_disable(); [ 43.460273][ T3486] lock(noop_qdisc.q.lock); [ 43.467358][ T3486] lock(fs_reclaim); [ 43.473833][ T3486] [ 43.477261][ T3486] lock(noop_qdisc.q.lock); [ 43.481996][ T3486] [ 43.481996][ T3486] *** DEADLOCK *** [ 43.481996][ T3486] [ 43.490111][ T3486] 2 locks held by syz-executor111/3486: [ 43.495626][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 43.504991][ T3486] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 43.514616][ T3486] [ 43.514616][ T3486] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 43.524991][ T3486] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 43.531732][ T3486] HARDIRQ-ON-W at: [ 43.535689][ T3486] lock_acquire+0x1db/0x4f0 [ 43.541818][ T3486] _raw_spin_lock+0x2a/0x40 [ 43.547950][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 43.554512][ T3486] tx+0x64/0x100 [ 43.559682][ T3486] kthread+0x234/0x440 [ 43.565401][ T3486] kthread+0x3f6/0x4f0 [ 43.571093][ T3486] ret_from_fork+0x1f/0x30 [ 43.577134][ T3486] IN-SOFTIRQ-W at: [ 43.581088][ T3486] lock_acquire+0x1db/0x4f0 [ 43.587475][ T3486] _raw_spin_lock+0x2a/0x40 [ 43.593603][ T3486] net_tx_action+0x6c5/0x8e0 [ 43.599816][ T3486] __do_softirq+0x3b3/0x93a [ 43.605952][ T3486] do_softirq+0x162/0x240 [ 43.611911][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 43.618740][ T3486] dev_deactivate_many+0x524/0xbf0 [ 43.625476][ T3486] dev_deactivate+0x177/0x270 [ 43.631785][ T3486] linkwatch_do_dev+0x104/0x160 [ 43.638258][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 43.645169][ T3486] linkwatch_event+0x48/0x50 [ 43.651393][ T3486] process_one_work+0x8a1/0x10c0 [ 43.657967][ T3486] worker_thread+0xaca/0x1280 [ 43.664268][ T3486] kthread+0x3f6/0x4f0 [ 43.669960][ T3486] ret_from_fork+0x1f/0x30 [ 43.676007][ T3486] INITIAL USE at: [ 43.679898][ T3486] lock_acquire+0x1db/0x4f0 [ 43.685939][ T3486] _raw_spin_lock+0x2a/0x40 [ 43.691987][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 43.698463][ T3486] tx+0x64/0x100 [ 43.703546][ T3486] kthread+0x234/0x440 [ 43.709173][ T3486] kthread+0x3f6/0x4f0 [ 43.714796][ T3486] ret_from_fork+0x1f/0x30 [ 43.720751][ T3486] } [ 43.723225][ T3486] ... key at: [] noop_qdisc+0x108/0x320 [ 43.730844][ T3486] [ 43.730844][ T3486] the dependencies between the lock to be acquired [ 43.730849][ T3486] and SOFTIRQ-irq-unsafe lock: [ 43.744448][ T3486] -> (fs_reclaim){+.+.}-{0:0} { [ 43.749289][ T3486] HARDIRQ-ON-W at: [ 43.753266][ T3486] lock_acquire+0x1db/0x4f0 [ 43.759407][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.765973][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.772623][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 43.779533][ T3486] wq_numa_init+0x122/0x49f [ 43.785663][ T3486] workqueue_init+0x18/0x5e1 [ 43.791963][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 43.798798][ T3486] kernel_init+0x19/0x290 [ 43.804768][ T3486] ret_from_fork+0x1f/0x30 [ 43.810812][ T3486] SOFTIRQ-ON-W at: [ 43.814773][ T3486] lock_acquire+0x1db/0x4f0 [ 43.820904][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.827468][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.834041][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 43.840954][ T3486] wq_numa_init+0x122/0x49f [ 43.847082][ T3486] workqueue_init+0x18/0x5e1 [ 43.853296][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 43.860205][ T3486] kernel_init+0x19/0x290 [ 43.866161][ T3486] ret_from_fork+0x1f/0x30 [ 43.872205][ T3486] INITIAL USE at: [ 43.876073][ T3486] lock_acquire+0x1db/0x4f0 [ 43.882118][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.888594][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.895072][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 43.901897][ T3486] wq_numa_init+0x122/0x49f [ 43.907950][ T3486] workqueue_init+0x18/0x5e1 [ 43.914075][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 43.920812][ T3486] kernel_init+0x19/0x290 [ 43.926678][ T3486] ret_from_fork+0x1f/0x30 [ 43.932634][ T3486] } [ 43.935107][ T3486] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 43.943057][ T3486] ... acquired at: [ 43.946832][ T3486] lock_acquire+0x1db/0x4f0 [ 43.951482][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.956564][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.961645][ T3486] __kmalloc_node+0x71/0x390 [ 43.966381][ T3486] kvmalloc_node+0x80/0x140 [ 43.971029][ T3486] get_dist_table+0x83/0x2c0 [ 43.975762][ T3486] netem_change+0xa05/0x20c0 [ 43.980495][ T3486] netem_init+0x58/0xb0 [ 43.984796][ T3486] qdisc_create+0x8ae/0x1390 [ 43.989531][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 43.994530][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 43.999611][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 44.004521][ T3486] netlink_unicast+0x7b6/0x980 [ 44.009433][ T3486] netlink_sendmsg+0xa30/0xd60 [ 44.014341][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 44.019252][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 44.024077][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 44.029075][ T3486] do_syscall_64+0x3d/0xb0 [ 44.033641][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.039682][ T3486] [ 44.041989][ T3486] [ 44.041989][ T3486] stack backtrace: [ 44.047853][ T3486] CPU: 0 PID: 3486 Comm: syz-executor111 Not tainted 5.15.126-syzkaller #0 [ 44.056414][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 44.066445][ T3486] Call Trace: [ 44.069705][ T3486] [ 44.072613][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 44.077275][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 44.082884][ T3486] ? panic+0x84d/0x84d [ 44.086929][ T3486] ? print_shortest_lock_dependencies+0xee/0x150 [ 44.093233][ T3486] validate_chain+0x4cfe/0x58b0 [ 44.098063][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.103409][ T3486] ? validate_chain+0x112/0x58b0 [ 44.108354][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.113702][ T3486] ? mark_lock+0x98/0x340 [ 44.118012][ T3486] __lock_acquire+0x1295/0x1ff0 [ 44.122841][ T3486] lock_acquire+0x1db/0x4f0 [ 44.127327][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 44.132415][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 44.137775][ T3486] fs_reclaim_acquire+0x83/0x120 [ 44.142690][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 44.147781][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 44.152700][ T3486] __kmalloc_node+0x71/0x390 [ 44.157266][ T3486] ? kvmalloc_node+0x80/0x140 [ 44.161920][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 44.167007][ T3486] kvmalloc_node+0x80/0x140 [ 44.171484][ T3486] get_dist_table+0x83/0x2c0 [ 44.176048][ T3486] netem_change+0xa05/0x20c0 [ 44.180618][ T3486] ? netem_destroy+0xb0/0xb0 [ 44.185181][ T3486] ? debug_object_init+0x10/0x10 [ 44.190092][ T3486] ? memset+0x1f/0x40 [ 44.194048][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 44.199401][ T3486] ? memset+0x1f/0x40 [ 44.203357][ T3486] ? __hrtimer_init+0x181/0x260 [ 44.208192][ T3486] netem_init+0x58/0xb0 [ 44.212327][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 44.217586][ T3486] qdisc_create+0x8ae/0x1390 [ 44.222151][ T3486] ? qdisc_notify+0x380/0x380 [ 44.226801][ T3486] ? apparmor_capable+0x12e/0x190 [ 44.231806][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 44.236635][ T3486] ? rcu_lock_release+0x20/0x20 [ 44.241477][ T3486] ? rcu_lock_release+0x20/0x20 [ 44.246301][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 44.251214][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.256658][ T3486] ? rtnetlink_bind+0x80/0x80 [ 44.261323][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 44.266590][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 44.271588][ T3486] ? __kernel_text_address+0x94/0x100 [ 44.276936][ T3486] ? unwind_get_return_address+0x49/0x80 [ 44.282569][ T3486] ? arch_stack_walk+0xf3/0x140 [ 44.287397][ T3486] ? mark_lock+0x98/0x340 [ 44.291701][ T3486] ? mark_lock+0x98/0x340 [ 44.296016][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 44.301023][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 44.305763][ T3486] ? rtnetlink_bind+0x80/0x80 [ 44.310415][ T3486] ? netlink_ack+0xb10/0xb10 [ 44.314983][ T3486] netlink_unicast+0x7b6/0x980 [ 44.319725][ T3486] ? netlink_detachskb+0x90/0x90 [ 44.324636][ T3486] ? 0xffffffff81000000 [ 44.328764][ T3486] ? __check_object_size+0x300/0x410 [ 44.334024][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 44.339110][ T3486] netlink_sendmsg+0xa30/0xd60 [ 44.343850][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 44.349021][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 44.353935][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 44.359196][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 44.364627][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 44.369803][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 44.374539][ T3486] ? iovec_from_user+0x300/0x390 [ 44.379553][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 44.384550][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 44.389201][ T3486] ? __sys_sendmsg+0x260/0x260 [ 44.393935][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 44.398940][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 44.404285][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 44.409739][ T3486] ? __fdget+0x158/0x220 [ 44.413955][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 44.418887][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 44.423803][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.429757][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 44.434954][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.441080][ T3486] do_syscall_64+0x3d/0xb0 [ 44.445470][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.451340][ T3486] RIP: 0033:0x7f483003f8f9 [ 44.455730][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 44.475322][ T3486] RSP: 002b:00007fff5a9a3b48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.483715][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f483003f8f9 [ 44.493573][ T3486] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 44.501525][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fff5a9a3bc0 [ 44.509471][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.517416][ T3486] R13: 00007fff5a9a3d48 R14: 0000000000000001 R15: 0000000000000001 [ 44.525364][ T3486] [ 44.528430][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 44.537871][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor111 [ 44.547311][ T3486] INFO: lockdep is turned off. [ 44.552057][ T3486] Preemption disabled at: [ 44.552063][ T3486] [<0000000000000000>] 0x0 [ 44.560767][ T3486] CPU: 0 PID: 3486 Comm: syz-executor111 Not tainted 5.15.126-syzkaller #0 [ 44.569342][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 44.579467][ T3486] Call Trace: [ 44.582742][ T3486] [ 44.585651][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 44.590310][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 44.595920][ T3486] ? panic+0x84d/0x84d [ 44.599981][ T3486] ? rcu_is_watching+0x11/0xa0 [ 44.604809][ T3486] ? rcu_is_watching+0x11/0xa0 [ 44.609545][ T3486] ___might_sleep+0x547/0x6a0 [ 44.614200][ T3486] ? __might_sleep+0xc0/0xc0 [ 44.618767][ T3486] slab_pre_alloc_hook+0x44/0xc0 [ 44.623678][ T3486] __kmalloc_node+0x71/0x390 [ 44.628242][ T3486] ? kvmalloc_node+0x80/0x140 [ 44.632891][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 44.637978][ T3486] kvmalloc_node+0x80/0x140 [ 44.642455][ T3486] get_dist_table+0x83/0x2c0 [ 44.647023][ T3486] netem_change+0xa05/0x20c0 [ 44.651589][ T3486] ? netem_destroy+0xb0/0xb0 [ 44.656241][ T3486] ? debug_object_init+0x10/0x10 [ 44.661152][ T3486] ? memset+0x1f/0x40 [ 44.665233][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 44.670584][ T3486] ? memset+0x1f/0x40 [ 44.674566][ T3486] ? __hrtimer_init+0x181/0x260 [ 44.679393][ T3486] netem_init+0x58/0xb0 [ 44.683520][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 44.688792][ T3486] qdisc_create+0x8ae/0x1390 [ 44.693360][ T3486] ? qdisc_notify+0x380/0x380 [ 44.698016][ T3486] ? apparmor_capable+0x12e/0x190 [ 44.703186][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 44.708119][ T3486] ? rcu_lock_release+0x20/0x20 [ 44.712945][ T3486] ? rcu_lock_release+0x20/0x20 [ 44.717866][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 44.723473][ T3486] ? reacquire_held_locks+0x660/0x660 [ 44.728908][ T3486] ? rtnetlink_bind+0x80/0x80 [ 44.733732][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 44.738991][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 44.743990][ T3486] ? __kernel_text_address+0x94/0x100 [ 44.749597][ T3486] ? unwind_get_return_address+0x49/0x80 [ 44.755276][ T3486] ? arch_stack_walk+0xf3/0x140 [ 44.760172][ T3486] ? mark_lock+0x98/0x340 [ 44.764533][ T3486] ? mark_lock+0x98/0x340 [ 44.768860][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 44.773866][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 44.778608][ T3486] ? rtnetlink_bind+0x80/0x80 [ 44.783256][ T3486] ? netlink_ack+0xb10/0xb10 [ 44.787820][ T3486] netlink_unicast+0x7b6/0x980 [ 44.792560][ T3486] ? netlink_detachskb+0x90/0x90 [ 44.797479][ T3486] ? 0xffffffff81000000 [ 44.801602][ T3486] ? __check_object_size+0x300/0x410 [ 44.806858][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 44.811945][ T3486] netlink_sendmsg+0xa30/0xd60 [ 44.816688][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 44.821856][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 44.826767][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 44.832022][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 44.837462][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 44.842640][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 44.847377][ T3486] ? iovec_from_user+0x300/0x390 [ 44.852301][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 44.857306][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 44.862046][ T3486] ? __sys_sendmsg+0x260/0x260 [ 44.866787][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 44.871787][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 44.877129][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 44.882562][ T3486] ? __fdget+0x158/0x220 [ 44.886788][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 44.891612][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 44.896521][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.902565][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 44.907747][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 44.913701][ T3486] do_syscall_64+0x3d/0xb0 [ 44.918090][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 44.923957][ T3486] RIP: 0033:0x7f483003f8f9 [ 44.928435][ T3486] Code: 48 83 c4 28 c3 e8 27 18 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 44.948011][ T3486] RSP: 002b:00007fff5a9a3b48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.956405][ T3486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f483003f8f9 [ 44.964361][ T3486] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 44.972309][ T3486] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007fff5a9a3bc0 [ 44.980260][ T3486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 44.988203][ T3486] R13: 00007fff5a9a3d48 R14: 0000000000000001 R15: 0000000000000001 [ 44.996152][ T3486]