Warning: Permanently added '10.128.0.142' (ED25519) to the list of known hosts. executing program [ 42.022062][ T3486] [ 42.024506][ T3486] ===================================================== [ 42.031482][ T3486] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 42.039271][ T3486] 5.15.126-syzkaller #0 Not tainted [ 42.044725][ T3486] ----------------------------------------------------- [ 42.051663][ T3486] syz-executor253/3486 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 42.059710][ T3486] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 42.068663][ T3486] [ 42.068663][ T3486] and this task is already holding: [ 42.076012][ T3486] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 42.085239][ T3486] which would create a new lock dependency: [ 42.091110][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 42.098672][ T3486] [ 42.098672][ T3486] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 42.108355][ T3486] (noop_qdisc.q.lock){+.-.}-{2:2} [ 42.108376][ T3486] [ 42.108376][ T3486] ... which became SOFTIRQ-irq-safe at: [ 42.122016][ T3486] lock_acquire+0x1db/0x4f0 [ 42.126730][ T3486] _raw_spin_lock+0x2a/0x40 [ 42.131339][ T3486] net_tx_action+0x6c5/0x8e0 [ 42.136144][ T3486] __do_softirq+0x3b3/0x93a [ 42.140727][ T3486] do_softirq+0x162/0x240 [ 42.145150][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 42.150425][ T3486] dev_deactivate_many+0x524/0xbf0 [ 42.155604][ T3486] dev_deactivate+0x177/0x270 [ 42.160347][ T3486] linkwatch_do_dev+0x104/0x160 [ 42.165257][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 42.170752][ T3486] linkwatch_event+0x48/0x50 [ 42.175416][ T3486] process_one_work+0x8a1/0x10c0 [ 42.180526][ T3486] worker_thread+0xaca/0x1280 [ 42.185369][ T3486] kthread+0x3f6/0x4f0 [ 42.189597][ T3486] ret_from_fork+0x1f/0x30 [ 42.194268][ T3486] [ 42.194268][ T3486] to a SOFTIRQ-irq-unsafe lock: [ 42.201274][ T3486] (fs_reclaim){+.+.}-{0:0} [ 42.201294][ T3486] [ 42.201294][ T3486] ... which became SOFTIRQ-irq-unsafe at: [ 42.214243][ T3486] ... [ 42.214252][ T3486] lock_acquire+0x1db/0x4f0 [ 42.222116][ T3486] fs_reclaim_acquire+0x83/0x120 [ 42.227319][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 42.232524][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 42.238743][ T3486] wq_numa_init+0x122/0x49f [ 42.243572][ T3486] workqueue_init+0x18/0x5e1 [ 42.248241][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 42.253518][ T3486] kernel_init+0x19/0x290 [ 42.257921][ T3486] ret_from_fork+0x1f/0x30 [ 42.262607][ T3486] [ 42.262607][ T3486] other info that might help us debug this: [ 42.262607][ T3486] [ 42.272829][ T3486] Possible interrupt unsafe locking scenario: [ 42.272829][ T3486] [ 42.281215][ T3486] CPU0 CPU1 [ 42.286557][ T3486] ---- ---- [ 42.291896][ T3486] lock(fs_reclaim); [ 42.295851][ T3486] local_irq_disable(); [ 42.302581][ T3486] lock(noop_qdisc.q.lock); [ 42.309687][ T3486] lock(fs_reclaim); [ 42.317138][ T3486] [ 42.323477][ T3486] lock(noop_qdisc.q.lock); [ 42.328549][ T3486] [ 42.328549][ T3486] *** DEADLOCK *** [ 42.328549][ T3486] [ 42.337025][ T3486] 2 locks held by syz-executor253/3486: [ 42.342591][ T3486] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 42.351962][ T3486] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 42.361614][ T3486] [ 42.361614][ T3486] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 42.371991][ T3486] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 42.377433][ T3486] HARDIRQ-ON-W at: [ 42.381390][ T3486] lock_acquire+0x1db/0x4f0 [ 42.387548][ T3486] _raw_spin_lock+0x2a/0x40 [ 42.393687][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 42.400255][ T3486] tx+0x64/0x100 [ 42.405444][ T3486] kthread+0x234/0x440 [ 42.411754][ T3486] kthread+0x3f6/0x4f0 [ 42.419566][ T3486] ret_from_fork+0x1f/0x30 [ 42.425968][ T3486] IN-SOFTIRQ-W at: [ 42.430105][ T3486] lock_acquire+0x1db/0x4f0 [ 42.438320][ T3486] _raw_spin_lock+0x2a/0x40 [ 42.444826][ T3486] net_tx_action+0x6c5/0x8e0 [ 42.451082][ T3486] __do_softirq+0x3b3/0x93a [ 42.457238][ T3486] do_softirq+0x162/0x240 [ 42.463205][ T3486] __local_bh_enable_ip+0x1b1/0x1f0 [ 42.470028][ T3486] dev_deactivate_many+0x524/0xbf0 [ 42.476766][ T3486] dev_deactivate+0x177/0x270 [ 42.483069][ T3486] linkwatch_do_dev+0x104/0x160 [ 42.489644][ T3486] __linkwatch_run_queue+0x4ca/0x7f0 [ 42.496584][ T3486] linkwatch_event+0x48/0x50 [ 42.502902][ T3486] process_one_work+0x8a1/0x10c0 [ 42.509470][ T3486] worker_thread+0xaca/0x1280 [ 42.515793][ T3486] kthread+0x3f6/0x4f0 [ 42.521577][ T3486] ret_from_fork+0x1f/0x30 [ 42.527636][ T3486] INITIAL USE at: [ 42.531521][ T3486] lock_acquire+0x1db/0x4f0 [ 42.537570][ T3486] _raw_spin_lock+0x2a/0x40 [ 42.543615][ T3486] __dev_queue_xmit+0xad6/0x3230 [ 42.550098][ T3486] tx+0x64/0x100 [ 42.555184][ T3486] kthread+0x234/0x440 [ 42.560800][ T3486] kthread+0x3f6/0x4f0 [ 42.566431][ T3486] ret_from_fork+0x1f/0x30 [ 42.572391][ T3486] } [ 42.574865][ T3486] ... key at: [] noop_qdisc+0x108/0x320 [ 42.582526][ T3486] [ 42.582526][ T3486] the dependencies between the lock to be acquired [ 42.582532][ T3486] and SOFTIRQ-irq-unsafe lock: [ 42.596039][ T3486] -> (fs_reclaim){+.+.}-{0:0} { [ 42.600879][ T3486] HARDIRQ-ON-W at: [ 42.606818][ T3486] lock_acquire+0x1db/0x4f0 [ 42.616262][ T3486] fs_reclaim_acquire+0x83/0x120 [ 42.623292][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 42.630096][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 42.637279][ T3486] wq_numa_init+0x122/0x49f [ 42.643414][ T3486] workqueue_init+0x18/0x5e1 [ 42.649730][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 42.656708][ T3486] kernel_init+0x19/0x290 [ 42.662776][ T3486] ret_from_fork+0x1f/0x30 [ 42.668840][ T3486] SOFTIRQ-ON-W at: [ 42.672804][ T3486] lock_acquire+0x1db/0x4f0 [ 42.678950][ T3486] fs_reclaim_acquire+0x83/0x120 [ 42.685519][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 42.692196][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 42.699198][ T3486] wq_numa_init+0x122/0x49f [ 42.705327][ T3486] workqueue_init+0x18/0x5e1 [ 42.712415][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 42.723223][ T3486] kernel_init+0x19/0x290 [ 42.732292][ T3486] ret_from_fork+0x1f/0x30 [ 42.738370][ T3486] INITIAL USE at: [ 42.742271][ T3486] lock_acquire+0x1db/0x4f0 [ 42.748324][ T3486] fs_reclaim_acquire+0x83/0x120 [ 42.754803][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 42.761279][ T3486] kmem_cache_alloc_trace+0x49/0x290 [ 42.768101][ T3486] wq_numa_init+0x122/0x49f [ 42.774143][ T3486] workqueue_init+0x18/0x5e1 [ 42.780272][ T3486] kernel_init_freeable+0x40a/0x5c5 [ 42.787008][ T3486] kernel_init+0x19/0x290 [ 42.792877][ T3486] ret_from_fork+0x1f/0x30 [ 42.798831][ T3486] } [ 42.801313][ T3486] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 42.809354][ T3486] ... acquired at: [ 42.813158][ T3486] lock_acquire+0x1db/0x4f0 [ 42.818744][ T3486] fs_reclaim_acquire+0x83/0x120 [ 42.824039][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 42.829308][ T3486] __kmalloc_node+0x71/0x390 [ 42.834282][ T3486] kvmalloc_node+0x80/0x140 [ 42.839223][ T3486] get_dist_table+0x83/0x2c0 [ 42.844079][ T3486] netem_change+0xa6a/0x20c0 [ 42.848908][ T3486] netem_init+0x58/0xb0 [ 42.853212][ T3486] qdisc_create+0x8ae/0x1390 [ 42.858036][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 42.863248][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 42.868714][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 42.873727][ T3486] netlink_unicast+0x7b6/0x980 [ 42.878647][ T3486] netlink_sendmsg+0xa30/0xd60 [ 42.883568][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 42.888491][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 42.893425][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 42.898693][ T3486] do_syscall_64+0x3d/0xb0 [ 42.903256][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 42.909384][ T3486] [ 42.911770][ T3486] [ 42.911770][ T3486] stack backtrace: [ 42.917635][ T3486] CPU: 1 PID: 3486 Comm: syz-executor253 Not tainted 5.15.126-syzkaller #0 [ 42.926693][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 42.936825][ T3486] Call Trace: [ 42.940103][ T3486] [ 42.943011][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 42.947690][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 42.954471][ T3486] ? panic+0x84d/0x84d [ 42.958889][ T3486] ? print_shortest_lock_dependencies+0xee/0x150 [ 42.965203][ T3486] validate_chain+0x4cfe/0x58b0 [ 42.970057][ T3486] ? reacquire_held_locks+0x660/0x660 [ 42.975413][ T3486] ? validate_chain+0x112/0x58b0 [ 42.980332][ T3486] ? reacquire_held_locks+0x660/0x660 [ 42.985680][ T3486] ? mark_lock+0x98/0x340 [ 42.989985][ T3486] __lock_acquire+0x1295/0x1ff0 [ 42.994817][ T3486] lock_acquire+0x1db/0x4f0 [ 42.999384][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 43.004485][ T3486] ? read_lock_is_recursive+0x10/0x10 [ 43.009942][ T3486] fs_reclaim_acquire+0x83/0x120 [ 43.015233][ T3486] ? slab_pre_alloc_hook+0x22/0xc0 [ 43.020342][ T3486] slab_pre_alloc_hook+0x22/0xc0 [ 43.025431][ T3486] __kmalloc_node+0x71/0x390 [ 43.029996][ T3486] ? kvmalloc_node+0x80/0x140 [ 43.034930][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 43.040020][ T3486] kvmalloc_node+0x80/0x140 [ 43.044506][ T3486] get_dist_table+0x83/0x2c0 [ 43.049074][ T3486] netem_change+0xa6a/0x20c0 [ 43.053656][ T3486] ? netem_destroy+0xb0/0xb0 [ 43.058261][ T3486] ? debug_object_init+0x10/0x10 [ 43.063175][ T3486] ? memset+0x1f/0x40 [ 43.067240][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 43.072605][ T3486] ? memset+0x1f/0x40 [ 43.076575][ T3486] ? __hrtimer_init+0x181/0x260 [ 43.081404][ T3486] netem_init+0x58/0xb0 [ 43.085631][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 43.090905][ T3486] qdisc_create+0x8ae/0x1390 [ 43.095484][ T3486] ? qdisc_notify+0x380/0x380 [ 43.100136][ T3486] ? apparmor_capable+0x12e/0x190 [ 43.105234][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 43.113583][ T3486] ? rcu_lock_release+0x20/0x20 [ 43.119502][ T3486] ? rcu_lock_release+0x20/0x20 [ 43.124621][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 43.129656][ T3486] ? reacquire_held_locks+0x660/0x660 [ 43.135778][ T3486] ? rtnetlink_bind+0x80/0x80 [ 43.140448][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 43.145711][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 43.150713][ T3486] ? __kernel_text_address+0x94/0x100 [ 43.156069][ T3486] ? unwind_get_return_address+0x49/0x80 [ 43.161679][ T3486] ? arch_stack_walk+0xf3/0x140 [ 43.166528][ T3486] ? mark_lock+0x98/0x340 [ 43.170834][ T3486] ? mark_lock+0x98/0x340 [ 43.175150][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 43.180155][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 43.184898][ T3486] ? rtnetlink_bind+0x80/0x80 [ 43.189647][ T3486] ? netlink_ack+0xb10/0xb10 [ 43.194227][ T3486] netlink_unicast+0x7b6/0x980 [ 43.199074][ T3486] ? netlink_detachskb+0x90/0x90 [ 43.204268][ T3486] ? 0xffffffff81000000 [ 43.208405][ T3486] ? __check_object_size+0x300/0x410 [ 43.220274][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 43.225581][ T3486] netlink_sendmsg+0xa30/0xd60 [ 43.230567][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.236086][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 43.241397][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 43.246795][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 43.252348][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.257638][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 43.263356][ T3486] ? iovec_from_user+0x300/0x390 [ 43.272382][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 43.278791][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 43.284064][ T3486] ? __sys_sendmsg+0x260/0x260 [ 43.289082][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 43.294377][ T3486] ? __context_tracking_enter+0x5f/0x90 [ 43.301214][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 43.307709][ T3486] ? __fdget+0x158/0x220 [ 43.313298][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 43.318566][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 43.324393][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 43.331305][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 43.336661][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 43.343112][ T3486] do_syscall_64+0x3d/0xb0 [ 43.347529][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.353542][ T3486] RIP: 0033:0x7f17457c74e9 [ 43.358187][ T3486] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 43.378393][ T3486] RSP: 002b:00007ffd02010218 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 43.386986][ T3486] RAX: ffffffffffffffda RBX: 00007ffd020103e8 RCX: 00007f17457c74e9 [ 43.395063][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 43.406867][ T3486] RBP: 00007f174583a610 R08: 00000000ffffffff R09: 00007ffd020103e8 [ 43.415297][ T3486] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 43.424388][ T3486] R13: 00007ffd020103d8 R14: 0000000000000001 R15: 0000000000000001 [ 43.435083][ T3486] [ 43.438385][ T3486] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 43.448619][ T3486] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3486, name: syz-executor253 [ 43.458497][ T3486] INFO: lockdep is turned off. [ 43.463313][ T3486] Preemption disabled at: [ 43.463322][ T3486] [<0000000000000000>] 0x0 [ 43.472062][ T3486] CPU: 1 PID: 3486 Comm: syz-executor253 Not tainted 5.15.126-syzkaller #0 [ 43.480630][ T3486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 43.490849][ T3486] Call Trace: [ 43.494118][ T3486] [ 43.499995][ T3486] dump_stack_lvl+0x1e3/0x2cb [ 43.507105][ T3486] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 43.512909][ T3486] ? panic+0x84d/0x84d [ 43.516961][ T3486] ? rcu_is_watching+0x11/0xa0 [ 43.521744][ T3486] ? rcu_is_watching+0x11/0xa0 [ 43.526494][ T3486] ___might_sleep+0x547/0x6a0 [ 43.531168][ T3486] ? __might_sleep+0xc0/0xc0 [ 43.535752][ T3486] slab_pre_alloc_hook+0x44/0xc0 [ 43.540910][ T3486] __kmalloc_node+0x71/0x390 [ 43.545500][ T3486] ? kvmalloc_node+0x80/0x140 [ 43.550156][ T3486] ? __bpf_trace_softirq+0x10/0x10 [ 43.555417][ T3486] kvmalloc_node+0x80/0x140 [ 43.559985][ T3486] get_dist_table+0x83/0x2c0 [ 43.564551][ T3486] netem_change+0xa6a/0x20c0 [ 43.569235][ T3486] ? netem_destroy+0xb0/0xb0 [ 43.573886][ T3486] ? debug_object_init+0x10/0x10 [ 43.578806][ T3486] ? memset+0x1f/0x40 [ 43.582760][ T3486] ? lockdep_init_map_type+0x9d/0x8d0 [ 43.588110][ T3486] ? memset+0x1f/0x40 [ 43.592065][ T3486] ? __hrtimer_init+0x181/0x260 [ 43.597189][ T3486] netem_init+0x58/0xb0 [ 43.603333][ T3486] ? qdisc_peek_dequeued+0x220/0x220 [ 43.608959][ T3486] qdisc_create+0x8ae/0x1390 [ 43.613637][ T3486] ? qdisc_notify+0x380/0x380 [ 43.618822][ T3486] ? apparmor_capable+0x12e/0x190 [ 43.624448][ T3486] tc_modify_qdisc+0xac5/0x1710 [ 43.630102][ T3486] ? rcu_lock_release+0x20/0x20 [ 43.635115][ T3486] ? rcu_lock_release+0x20/0x20 [ 43.640122][ T3486] rtnetlink_rcv_msg+0x993/0xee0 [ 43.645037][ T3486] ? reacquire_held_locks+0x660/0x660 [ 43.650383][ T3486] ? rtnetlink_bind+0x80/0x80 [ 43.655047][ T3486] ? is_bpf_text_address+0x24f/0x260 [ 43.660398][ T3486] ? stack_trace_save+0x1c0/0x1c0 [ 43.665403][ T3486] ? __kernel_text_address+0x94/0x100 [ 43.670751][ T3486] ? unwind_get_return_address+0x49/0x80 [ 43.676363][ T3486] ? arch_stack_walk+0xf3/0x140 [ 43.681366][ T3486] ? mark_lock+0x98/0x340 [ 43.685672][ T3486] ? mark_lock+0x98/0x340 [ 43.691116][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 43.697637][ T3486] netlink_rcv_skb+0x1cf/0x410 [ 43.703024][ T3486] ? rtnetlink_bind+0x80/0x80 [ 43.708194][ T3486] ? netlink_ack+0xb10/0xb10 [ 43.712786][ T3486] netlink_unicast+0x7b6/0x980 [ 43.717706][ T3486] ? netlink_detachskb+0x90/0x90 [ 43.722649][ T3486] ? 0xffffffff81000000 [ 43.727120][ T3486] ? __check_object_size+0x300/0x410 [ 43.732408][ T3486] ? bpf_lsm_netlink_send+0x5/0x10 [ 43.737617][ T3486] netlink_sendmsg+0xa30/0xd60 [ 43.742378][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.747558][ T3486] ? aa_sock_msg_perm+0x91/0x150 [ 43.752475][ T3486] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 43.758028][ T3486] ? security_socket_sendmsg+0x7d/0xa0 [ 43.763740][ T3486] ? netlink_getsockopt+0x5b0/0x5b0 [ 43.769251][ T3486] ____sys_sendmsg+0x59e/0x8f0 [ 43.774619][ T3486] ? iovec_from_user+0x300/0x390 [ 43.779552][ T3486] ? __sys_sendmsg_sock+0x30/0x30 [ 43.784653][ T3486] ___sys_sendmsg+0x252/0x2e0 [ 43.789324][ T3486] ? __sys_sendmsg+0x260/0x260 [ 43.794197][ T3486] ? __lock_acquire+0x1295/0x1ff0 [ 43.799383][ T3486] ? __context_tracking_enter+0x5f/0x90 [ 43.805303][ T3486] ? __context_tracking_exit+0x4c/0x80 [ 43.811398][ T3486] ? __fdget+0x158/0x220 [ 43.815895][ T3486] __se_sys_sendmsg+0x19a/0x260 [ 43.821949][ T3486] ? __x64_sys_sendmsg+0x80/0x80 [ 43.826898][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 43.834271][ T3486] ? lockdep_hardirqs_on+0x94/0x130 [ 43.840127][ T3486] ? syscall_enter_from_user_mode+0x2e/0x230 [ 43.846625][ T3486] do_syscall_64+0x3d/0xb0 [ 43.851035][ T3486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 43.857198][ T3486] RIP: 0033:0x7f17457c74e9 [ 43.861618][ T3486] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 43.881201][ T3486] RSP: 002b:00007ffd02010218 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 43.889623][ T3486] RAX: ffffffffffffffda RBX: 00007ffd020103e8 RCX: 00007f17457c74e9 [ 43.897670][ T3486] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 43.906155][ T3486] RBP: 00007f174583a610 R08: 00000000ffffffff R09: 00007ffd020103e8 [ 43.915633][ T3486] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 43.924202][ T3486] R13: 00007ffd020103d8 R14: 0000000000000001 R15: 0000000000000001 [ 43.932343][ T3486]