Warning: Permanently added '10.128.0.28' (ED25519) to the list of known hosts. executing program [ 38.972126][ T3491] [ 38.974479][ T3491] ===================================================== [ 38.981385][ T3491] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 38.988818][ T3491] 5.15.126-syzkaller #0 Not tainted [ 38.993983][ T3491] ----------------------------------------------------- [ 39.000881][ T3491] syz-executor760/3491 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 39.008917][ T3491] ffffffff8c9dfba0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 [ 39.017857][ T3491] [ 39.017857][ T3491] and this task is already holding: [ 39.025193][ T3491] ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 39.034378][ T3491] which would create a new lock dependency: [ 39.040244][ T3491] (noop_qdisc.q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} [ 39.047775][ T3491] [ 39.047775][ T3491] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 39.057192][ T3491] (noop_qdisc.q.lock){+.-.}-{2:2} [ 39.057206][ T3491] [ 39.057206][ T3491] ... which became SOFTIRQ-irq-safe at: [ 39.069968][ T3491] lock_acquire+0x1db/0x4f0 [ 39.074551][ T3491] _raw_spin_lock+0x2a/0x40 [ 39.079127][ T3491] net_tx_action+0x6c5/0x8e0 [ 39.083874][ T3491] __do_softirq+0x3b3/0x93a [ 39.088800][ T3491] do_softirq+0x162/0x240 [ 39.093202][ T3491] __local_bh_enable_ip+0x1b1/0x1f0 [ 39.098462][ T3491] dev_deactivate_many+0x524/0xbf0 [ 39.103637][ T3491] dev_deactivate+0x177/0x270 [ 39.108383][ T3491] linkwatch_do_dev+0x104/0x160 [ 39.113301][ T3491] __linkwatch_run_queue+0x4ca/0x7f0 [ 39.118647][ T3491] linkwatch_event+0x48/0x50 [ 39.123296][ T3491] process_one_work+0x8a1/0x10c0 [ 39.128290][ T3491] worker_thread+0xaca/0x1280 [ 39.133025][ T3491] kthread+0x3f6/0x4f0 [ 39.137161][ T3491] ret_from_fork+0x1f/0x30 [ 39.141634][ T3491] [ 39.141634][ T3491] to a SOFTIRQ-irq-unsafe lock: [ 39.148622][ T3491] (fs_reclaim){+.+.}-{0:0} [ 39.148637][ T3491] [ 39.148637][ T3491] ... which became SOFTIRQ-irq-unsafe at: [ 39.160954][ T3491] ... [ 39.160958][ T3491] lock_acquire+0x1db/0x4f0 [ 39.168071][ T3491] fs_reclaim_acquire+0x83/0x120 [ 39.173069][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 39.178067][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 39.183407][ T3491] wq_numa_init+0x122/0x49f [ 39.187971][ T3491] workqueue_init+0x18/0x5e1 [ 39.192618][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 39.197875][ T3491] kernel_init+0x19/0x290 [ 39.202267][ T3491] ret_from_fork+0x1f/0x30 [ 39.206740][ T3491] [ 39.206740][ T3491] other info that might help us debug this: [ 39.206740][ T3491] [ 39.216937][ T3491] Possible interrupt unsafe locking scenario: [ 39.216937][ T3491] [ 39.225226][ T3491] CPU0 CPU1 [ 39.230559][ T3491] ---- ---- [ 39.235892][ T3491] lock(fs_reclaim); [ 39.239845][ T3491] local_irq_disable(); [ 39.246568][ T3491] lock(noop_qdisc.q.lock); [ 39.253646][ T3491] lock(fs_reclaim); [ 39.260117][ T3491] [ 39.263542][ T3491] lock(noop_qdisc.q.lock); [ 39.268278][ T3491] [ 39.268278][ T3491] *** DEADLOCK *** [ 39.268278][ T3491] [ 39.276393][ T3491] 2 locks held by syz-executor760/3491: [ 39.281905][ T3491] #0: ffffffff8d9e1148 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 39.291274][ T3491] #1: ffffffff8da20808 (noop_qdisc.q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 [ 39.300892][ T3491] [ 39.300892][ T3491] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 39.311270][ T3491] -> (noop_qdisc.q.lock){+.-.}-{2:2} { [ 39.316742][ T3491] HARDIRQ-ON-W at: [ 39.320697][ T3491] lock_acquire+0x1db/0x4f0 [ 39.326825][ T3491] _raw_spin_lock+0x2a/0x40 [ 39.332952][ T3491] __dev_queue_xmit+0xad6/0x3230 [ 39.339511][ T3491] tx+0x64/0x100 [ 39.344678][ T3491] kthread+0x234/0x440 [ 39.350378][ T3491] kthread+0x3f6/0x4f0 [ 39.356067][ T3491] ret_from_fork+0x1f/0x30 [ 39.362111][ T3491] IN-SOFTIRQ-W at: [ 39.366066][ T3491] lock_acquire+0x1db/0x4f0 [ 39.372191][ T3491] _raw_spin_lock+0x2a/0x40 [ 39.378409][ T3491] net_tx_action+0x6c5/0x8e0 [ 39.384621][ T3491] __do_softirq+0x3b3/0x93a [ 39.390744][ T3491] do_softirq+0x162/0x240 [ 39.396691][ T3491] __local_bh_enable_ip+0x1b1/0x1f0 [ 39.403512][ T3491] dev_deactivate_many+0x524/0xbf0 [ 39.410248][ T3491] dev_deactivate+0x177/0x270 [ 39.416545][ T3491] linkwatch_do_dev+0x104/0x160 [ 39.423017][ T3491] __linkwatch_run_queue+0x4ca/0x7f0 [ 39.429922][ T3491] linkwatch_event+0x48/0x50 [ 39.436130][ T3491] process_one_work+0x8a1/0x10c0 [ 39.442692][ T3491] worker_thread+0xaca/0x1280 [ 39.448988][ T3491] kthread+0x3f6/0x4f0 [ 39.454674][ T3491] ret_from_fork+0x1f/0x30 [ 39.460713][ T3491] INITIAL USE at: [ 39.464577][ T3491] lock_acquire+0x1db/0x4f0 [ 39.470613][ T3491] _raw_spin_lock+0x2a/0x40 [ 39.476649][ T3491] __dev_queue_xmit+0xad6/0x3230 [ 39.483122][ T3491] tx+0x64/0x100 [ 39.488203][ T3491] kthread+0x234/0x440 [ 39.493806][ T3491] kthread+0x3f6/0x4f0 [ 39.499410][ T3491] ret_from_fork+0x1f/0x30 [ 39.505364][ T3491] } [ 39.507834][ T3491] ... key at: [] noop_qdisc+0x108/0x320 [ 39.515443][ T3491] [ 39.515443][ T3491] the dependencies between the lock to be acquired [ 39.515448][ T3491] and SOFTIRQ-irq-unsafe lock: [ 39.528910][ T3491] -> (fs_reclaim){+.+.}-{0:0} { [ 39.533741][ T3491] HARDIRQ-ON-W at: [ 39.537693][ T3491] lock_acquire+0x1db/0x4f0 [ 39.543818][ T3491] fs_reclaim_acquire+0x83/0x120 [ 39.550377][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 39.556947][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 39.563851][ T3491] wq_numa_init+0x122/0x49f [ 39.569976][ T3491] workqueue_init+0x18/0x5e1 [ 39.576185][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 39.583009][ T3491] kernel_init+0x19/0x290 [ 39.588962][ T3491] ret_from_fork+0x1f/0x30 [ 39.595000][ T3491] SOFTIRQ-ON-W at: [ 39.598952][ T3491] lock_acquire+0x1db/0x4f0 [ 39.605078][ T3491] fs_reclaim_acquire+0x83/0x120 [ 39.611636][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 39.618193][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 39.625103][ T3491] wq_numa_init+0x122/0x49f [ 39.631231][ T3491] workqueue_init+0x18/0x5e1 [ 39.637439][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 39.644256][ T3491] kernel_init+0x19/0x290 [ 39.650207][ T3491] ret_from_fork+0x1f/0x30 [ 39.656246][ T3491] INITIAL USE at: [ 39.660114][ T3491] lock_acquire+0x1db/0x4f0 [ 39.666151][ T3491] fs_reclaim_acquire+0x83/0x120 [ 39.672622][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 39.679096][ T3491] kmem_cache_alloc_trace+0x49/0x290 [ 39.685910][ T3491] wq_numa_init+0x122/0x49f [ 39.691950][ T3491] workqueue_init+0x18/0x5e1 [ 39.698074][ T3491] kernel_init_freeable+0x40a/0x5c5 [ 39.704805][ T3491] kernel_init+0x19/0x290 [ 39.710668][ T3491] ret_from_fork+0x1f/0x30 [ 39.716618][ T3491] } [ 39.719088][ T3491] ... key at: [] __fs_reclaim_map+0x0/0x160 [ 39.727036][ T3491] ... acquired at: [ 39.730810][ T3491] lock_acquire+0x1db/0x4f0 [ 39.735462][ T3491] fs_reclaim_acquire+0x83/0x120 [ 39.740544][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 39.745625][ T3491] __kmalloc_node+0x71/0x390 [ 39.750360][ T3491] kvmalloc_node+0x80/0x140 [ 39.755006][ T3491] get_dist_table+0x83/0x2c0 [ 39.760538][ T3491] netem_change+0xa6a/0x20c0 [ 39.765288][ T3491] netem_init+0x58/0xb0 [ 39.769602][ T3491] qdisc_create+0x8ae/0x1390 [ 39.774345][ T3491] tc_modify_qdisc+0xac5/0x1710 [ 39.779343][ T3491] rtnetlink_rcv_msg+0x993/0xee0 [ 39.784425][ T3491] netlink_rcv_skb+0x1cf/0x410 [ 39.789340][ T3491] netlink_unicast+0x7b6/0x980 [ 39.794249][ T3491] netlink_sendmsg+0xa30/0xd60 [ 39.799163][ T3491] ____sys_sendmsg+0x59e/0x8f0 [ 39.804080][ T3491] ___sys_sendmsg+0x252/0x2e0 [ 39.808903][ T3491] __se_sys_sendmsg+0x19a/0x260 [ 39.813895][ T3491] do_syscall_64+0x3d/0xb0 [ 39.818462][ T3491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 39.824500][ T3491] [ 39.826798][ T3491] [ 39.826798][ T3491] stack backtrace: [ 39.832658][ T3491] CPU: 0 PID: 3491 Comm: syz-executor760 Not tainted 5.15.126-syzkaller #0 [ 39.841279][ T3491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 39.851325][ T3491] Call Trace: [ 39.854609][ T3491] [ 39.857518][ T3491] dump_stack_lvl+0x1e3/0x2cb [ 39.862177][ T3491] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 39.867789][ T3491] ? panic+0x84d/0x84d [ 39.871855][ T3491] ? print_shortest_lock_dependencies+0xee/0x150 [ 39.878172][ T3491] validate_chain+0x4cfe/0x58b0 [ 39.883020][ T3491] ? reacquire_held_locks+0x660/0x660 [ 39.888377][ T3491] ? validate_chain+0x112/0x58b0 [ 39.893295][ T3491] ? reacquire_held_locks+0x660/0x660 [ 39.898652][ T3491] ? mark_lock+0x98/0x340 [ 39.902961][ T3491] __lock_acquire+0x1295/0x1ff0 [ 39.907821][ T3491] lock_acquire+0x1db/0x4f0 [ 39.912298][ T3491] ? slab_pre_alloc_hook+0x22/0xc0 [ 39.917397][ T3491] ? read_lock_is_recursive+0x10/0x10 [ 39.922746][ T3491] fs_reclaim_acquire+0x83/0x120 [ 39.927666][ T3491] ? slab_pre_alloc_hook+0x22/0xc0 [ 39.932753][ T3491] slab_pre_alloc_hook+0x22/0xc0 [ 39.937662][ T3491] __kmalloc_node+0x71/0x390 [ 39.942224][ T3491] ? kvmalloc_node+0x80/0x140 [ 39.946879][ T3491] ? __bpf_trace_softirq+0x10/0x10 [ 39.951963][ T3491] kvmalloc_node+0x80/0x140 [ 39.956440][ T3491] get_dist_table+0x83/0x2c0 [ 39.961004][ T3491] netem_change+0xa6a/0x20c0 [ 39.965587][ T3491] ? netem_destroy+0xb0/0xb0 [ 39.970154][ T3491] ? debug_object_init+0x10/0x10 [ 39.975062][ T3491] ? memset+0x1f/0x40 [ 39.979015][ T3491] ? lockdep_init_map_type+0x9d/0x8d0 [ 39.984375][ T3491] ? memset+0x1f/0x40 [ 39.988345][ T3491] ? __hrtimer_init+0x181/0x260 [ 39.993170][ T3491] netem_init+0x58/0xb0 [ 39.997310][ T3491] ? qdisc_peek_dequeued+0x220/0x220 [ 40.002572][ T3491] qdisc_create+0x8ae/0x1390 [ 40.007164][ T3491] ? qdisc_notify+0x380/0x380 [ 40.011816][ T3491] ? apparmor_capable+0x12e/0x190 [ 40.016818][ T3491] tc_modify_qdisc+0xac5/0x1710 [ 40.021646][ T3491] ? rcu_lock_release+0x20/0x20 [ 40.026472][ T3491] ? rcu_lock_release+0x20/0x20 [ 40.031292][ T3491] rtnetlink_rcv_msg+0x993/0xee0 [ 40.036206][ T3491] ? reacquire_held_locks+0x660/0x660 [ 40.041555][ T3491] ? rtnetlink_bind+0x80/0x80 [ 40.046203][ T3491] ? is_bpf_text_address+0x24f/0x260 [ 40.051460][ T3491] ? stack_trace_save+0x1c0/0x1c0 [ 40.056458][ T3491] ? __kernel_text_address+0x94/0x100 [ 40.061804][ T3491] ? unwind_get_return_address+0x49/0x80 [ 40.067410][ T3491] ? arch_stack_walk+0xf3/0x140 [ 40.072233][ T3491] ? mark_lock+0x98/0x340 [ 40.076540][ T3491] ? mark_lock+0x98/0x340 [ 40.080840][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 40.085849][ T3491] netlink_rcv_skb+0x1cf/0x410 [ 40.090605][ T3491] ? rtnetlink_bind+0x80/0x80 [ 40.095263][ T3491] ? netlink_ack+0xb10/0xb10 [ 40.099845][ T3491] netlink_unicast+0x7b6/0x980 [ 40.104638][ T3491] ? netlink_detachskb+0x90/0x90 [ 40.109557][ T3491] ? 0xffffffff81000000 [ 40.113689][ T3491] ? __check_object_size+0x300/0x410 [ 40.118973][ T3491] ? bpf_lsm_netlink_send+0x5/0x10 [ 40.124061][ T3491] netlink_sendmsg+0xa30/0xd60 [ 40.128813][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 40.134000][ T3491] ? aa_sock_msg_perm+0x91/0x150 [ 40.138921][ T3491] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 40.144186][ T3491] ? security_socket_sendmsg+0x7d/0xa0 [ 40.149619][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 40.154793][ T3491] ____sys_sendmsg+0x59e/0x8f0 [ 40.159530][ T3491] ? iovec_from_user+0x300/0x390 [ 40.164444][ T3491] ? __sys_sendmsg_sock+0x30/0x30 [ 40.169445][ T3491] ___sys_sendmsg+0x252/0x2e0 [ 40.174095][ T3491] ? __sys_sendmsg+0x260/0x260 [ 40.178833][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 40.183856][ T3491] ? __context_tracking_enter+0x5f/0x90 [ 40.189378][ T3491] ? __context_tracking_exit+0x4c/0x80 [ 40.194807][ T3491] ? __fdget+0x158/0x220 [ 40.199024][ T3491] __se_sys_sendmsg+0x19a/0x260 [ 40.203852][ T3491] ? __x64_sys_sendmsg+0x80/0x80 [ 40.208766][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 40.214718][ T3491] ? lockdep_hardirqs_on+0x94/0x130 [ 40.219909][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 40.225864][ T3491] do_syscall_64+0x3d/0xb0 [ 40.230255][ T3491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.236231][ T3491] RIP: 0033:0x7fad77e954e9 [ 40.240624][ T3491] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 40.260201][ T3491] RSP: 002b:00007ffffd6344c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 40.268589][ T3491] RAX: ffffffffffffffda RBX: 00007ffffd634698 RCX: 00007fad77e954e9 [ 40.276534][ T3491] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 40.284479][ T3491] RBP: 00007fad77f08610 R08: 00000000ffffffff R09: 00007ffffd634698 [ 40.292597][ T3491] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 40.300542][ T3491] R13: 00007ffffd634688 R14: 0000000000000001 R15: 0000000000000001 [ 40.308504][ T3491] [ 40.311570][ T3491] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 [ 40.320994][ T3491] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3491, name: syz-executor760 [ 40.330471][ T3491] INFO: lockdep is turned off. [ 40.335249][ T3491] Preemption disabled at: [ 40.335258][ T3491] [<0000000000000000>] 0x0 [ 40.343998][ T3491] CPU: 0 PID: 3491 Comm: syz-executor760 Not tainted 5.15.126-syzkaller #0 [ 40.352557][ T3491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 [ 40.362587][ T3491] Call Trace: [ 40.365854][ T3491] [ 40.368765][ T3491] dump_stack_lvl+0x1e3/0x2cb [ 40.373428][ T3491] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 40.379048][ T3491] ? panic+0x84d/0x84d [ 40.383089][ T3491] ? rcu_is_watching+0x11/0xa0 [ 40.387831][ T3491] ? rcu_is_watching+0x11/0xa0 [ 40.392575][ T3491] ___might_sleep+0x547/0x6a0 [ 40.397229][ T3491] ? __might_sleep+0xc0/0xc0 [ 40.401792][ T3491] slab_pre_alloc_hook+0x44/0xc0 [ 40.406702][ T3491] __kmalloc_node+0x71/0x390 [ 40.411266][ T3491] ? kvmalloc_node+0x80/0x140 [ 40.416001][ T3491] ? __bpf_trace_softirq+0x10/0x10 [ 40.421104][ T3491] kvmalloc_node+0x80/0x140 [ 40.425597][ T3491] get_dist_table+0x83/0x2c0 [ 40.430173][ T3491] netem_change+0xa6a/0x20c0 [ 40.434745][ T3491] ? netem_destroy+0xb0/0xb0 [ 40.439316][ T3491] ? debug_object_init+0x10/0x10 [ 40.444231][ T3491] ? memset+0x1f/0x40 [ 40.448206][ T3491] ? lockdep_init_map_type+0x9d/0x8d0 [ 40.453648][ T3491] ? memset+0x1f/0x40 [ 40.457612][ T3491] ? __hrtimer_init+0x181/0x260 [ 40.462445][ T3491] netem_init+0x58/0xb0 [ 40.466590][ T3491] ? qdisc_peek_dequeued+0x220/0x220 [ 40.471849][ T3491] qdisc_create+0x8ae/0x1390 [ 40.476421][ T3491] ? qdisc_notify+0x380/0x380 [ 40.481072][ T3491] ? apparmor_capable+0x12e/0x190 [ 40.486078][ T3491] tc_modify_qdisc+0xac5/0x1710 [ 40.491026][ T3491] ? rcu_lock_release+0x20/0x20 [ 40.495870][ T3491] ? rcu_lock_release+0x20/0x20 [ 40.500696][ T3491] rtnetlink_rcv_msg+0x993/0xee0 [ 40.505610][ T3491] ? reacquire_held_locks+0x660/0x660 [ 40.510962][ T3491] ? rtnetlink_bind+0x80/0x80 [ 40.515613][ T3491] ? is_bpf_text_address+0x24f/0x260 [ 40.520873][ T3491] ? stack_trace_save+0x1c0/0x1c0 [ 40.525872][ T3491] ? __kernel_text_address+0x94/0x100 [ 40.531308][ T3491] ? unwind_get_return_address+0x49/0x80 [ 40.536922][ T3491] ? arch_stack_walk+0xf3/0x140 [ 40.541760][ T3491] ? mark_lock+0x98/0x340 [ 40.546067][ T3491] ? mark_lock+0x98/0x340 [ 40.550372][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 40.555378][ T3491] netlink_rcv_skb+0x1cf/0x410 [ 40.560125][ T3491] ? rtnetlink_bind+0x80/0x80 [ 40.564780][ T3491] ? netlink_ack+0xb10/0xb10 [ 40.569347][ T3491] netlink_unicast+0x7b6/0x980 [ 40.574087][ T3491] ? netlink_detachskb+0x90/0x90 [ 40.579001][ T3491] ? 0xffffffff81000000 [ 40.583155][ T3491] ? __check_object_size+0x300/0x410 [ 40.588439][ T3491] ? bpf_lsm_netlink_send+0x5/0x10 [ 40.593531][ T3491] netlink_sendmsg+0xa30/0xd60 [ 40.598271][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 40.603440][ T3491] ? aa_sock_msg_perm+0x91/0x150 [ 40.608361][ T3491] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 40.613627][ T3491] ? security_socket_sendmsg+0x7d/0xa0 [ 40.619076][ T3491] ? netlink_getsockopt+0x5b0/0x5b0 [ 40.624263][ T3491] ____sys_sendmsg+0x59e/0x8f0 [ 40.629005][ T3491] ? iovec_from_user+0x300/0x390 [ 40.633924][ T3491] ? __sys_sendmsg_sock+0x30/0x30 [ 40.638928][ T3491] ___sys_sendmsg+0x252/0x2e0 [ 40.643578][ T3491] ? __sys_sendmsg+0x260/0x260 [ 40.648319][ T3491] ? __lock_acquire+0x1295/0x1ff0 [ 40.653322][ T3491] ? __context_tracking_enter+0x5f/0x90 [ 40.658854][ T3491] ? __context_tracking_exit+0x4c/0x80 [ 40.664289][ T3491] ? __fdget+0x158/0x220 [ 40.668511][ T3491] __se_sys_sendmsg+0x19a/0x260 [ 40.673334][ T3491] ? __x64_sys_sendmsg+0x80/0x80 [ 40.678248][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 40.684208][ T3491] ? lockdep_hardirqs_on+0x94/0x130 [ 40.689377][ T3491] ? syscall_enter_from_user_mode+0x2e/0x230 [ 40.695350][ T3491] do_syscall_64+0x3d/0xb0 [ 40.699771][ T3491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 40.706072][ T3491] RIP: 0033:0x7fad77e954e9 [ 40.710468][ T3491] Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 40.730050][ T3491] RSP: 002b:00007ffffd6344c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 40.738440][ T3491] RAX: ffffffffffffffda RBX: 00007ffffd634698 RCX: 00007fad77e954e9 [ 40.746393][ T3491] RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 [ 40.754338][ T3491] RBP: 00007fad77f08610 R08: 00000000ffffffff R09: 00007ffffd634698 [ 40.762285][ T3491] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 40.770230][ T3491] R13: 00007ffffd634688 R14: 0000000000000001 R15: 0000000000000001 [ 40.778180][ T3491]