============================================ WARNING: possible recursive locking detected 4.16.0-rc2+ #237 Not tainted -------------------------------------------- syz-executor0/7610 is trying to acquire lock: (&mm->mmap_sem){++++}, at: [<00000000c04093cf>] __get_user_pages_locked mm/gup.c:909 [inline] (&mm->mmap_sem){++++}, at: [<00000000c04093cf>] get_user_pages_unlocked+0x218/0x4f0 mm/gup.c:990 but task is already holding lock: (&mm->mmap_sem){++++}, at: [<000000001b057aa1>] get_user_pages_unlocked+0xff/0x4f0 mm/gup.c:989 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(&mm->mmap_sem); lock(&mm->mmap_sem); *** DEADLOCK *** May be due to missing lock nesting notation 3 locks held by syz-executor0/7610: #0: (&vcpu->mutex){+.+.}, at: [<00000000ea3fb9f0>] kvm_vcpu_ioctl+0x1d1/0xff0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2543 #1: (&kvm->srcu){....}, at: [<00000000daec1f09>] vcpu_enter_guest arch/x86/kvm/x86.c:7218 [inline] #1: (&kvm->srcu){....}, at: [<00000000daec1f09>] vcpu_run arch/x86/kvm/x86.c:7297 [inline] #1: (&kvm->srcu){....}, at: [<00000000daec1f09>] kvm_arch_vcpu_ioctl_run+0x1b3b/0x5c80 arch/x86/kvm/x86.c:7464 #2: (&mm->mmap_sem){++++}, at: [<000000001b057aa1>] get_user_pages_unlocked+0xff/0x4f0 mm/gup.c:989 stack backtrace: CPU: 0 PID: 7610 Comm: syz-executor0 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 print_deadlock_bug kernel/locking/lockdep.c:1761 [inline] check_deadlock kernel/locking/lockdep.c:1805 [inline] validate_chain kernel/locking/lockdep.c:2401 [inline] __lock_acquire+0xe8f/0x3e00 kernel/locking/lockdep.c:3431 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3920 down_read+0x96/0x150 kernel/locking/rwsem.c:24 __get_user_pages_locked mm/gup.c:909 [inline] get_user_pages_unlocked+0x218/0x4f0 mm/gup.c:990 hva_to_pfn_slow arch/x86/kvm/../../../virt/kvm/kvm_main.c:1382 [inline] hva_to_pfn arch/x86/kvm/../../../virt/kvm/kvm_main.c:1490 [inline] __gfn_to_pfn_memslot+0x386/0xff0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1546 try_async_pf+0x13b/0xc40 arch/x86/kvm/mmu.c:3814 tdp_page_fault+0x40a/0xa70 arch/x86/kvm/mmu.c:3910 kvm_mmu_page_fault+0x10d/0x310 arch/x86/kvm/mmu.c:4940 handle_ept_violation+0x198/0x550 arch/x86/kvm/vmx.c:6753 vmx_handle_exit+0x25d/0x1ce0 arch/x86/kvm/vmx.c:8957 vcpu_enter_guest arch/x86/kvm/x86.c:7235 [inline] vcpu_run arch/x86/kvm/x86.c:7297 [inline] kvm_arch_vcpu_ioctl_run+0x1c93/0x5c80 arch/x86/kvm/x86.c:7464 kvm_vcpu_ioctl+0x6f1/0xff0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2561 kvm_vcpu_compat_ioctl+0x364/0x450 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2756 C_SYSC_ioctl fs/compat_ioctl.c:1461 [inline] compat_SyS_ioctl+0x151/0x2a30 fs/compat_ioctl.c:1407 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f43c99 RSP: 002b:00000000f771e09c EFLAGS: 00000286 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 0000000000000017 RCX: 000000000000ae80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 IPv6: veth0: IPv6 duplicate address fe80::4:e used by aa:aa:aa:aa:04:0e detected! mmap: syz-executor3 (7631) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. audit: type=1400 audit(1519519463.458:52): avc: denied { setfcap } for pid=7644 comm="syz-executor5" capability=31 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 device syz2 entered promiscuous mode device syz2 left promiscuous mode audit: type=1400 audit(1519519463.908:53): avc: denied { getattr } for pid=7823 comm="syz-executor6" path="socket:[20469]" dev="sockfs" ino=20469 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(1519519464.022:54): avc: denied { setgid } for pid=7865 comm="syz-executor3" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 binder_alloc: 7964: binder_alloc_buf, no vma binder: 7964:7969 transaction failed 29189/-3, size 0-0 line 2963 binder: BINDER_SET_CONTEXT_MGR already set binder: 7964:7984 ioctl 40046207 0 returned -16 binder_alloc: 7964: binder_alloc_buf, no vma binder: 7964:7969 transaction failed 29189/-3, size 0-0 line 2963 Cannot find add_set index 0 as target Cannot find add_set index 0 as target QAT: Invalid ioctl FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 8182 Comm: syz-executor4 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2959 [inline] prepare_alloc_pages mm/page_alloc.c:4198 [inline] __alloc_pages_nodemask+0x327/0xdd0 mm/page_alloc.c:4237 alloc_pages_current+0xb6/0x1e0 mm/mempolicy.c:2055 alloc_pages include/linux/gfp.h:492 [inline] skb_page_frag_refill+0x358/0x5f0 net/core/sock.c:2208 tun_build_skb.isra.50+0x2f0/0x1850 drivers/net/tun.c:1627 tun_get_user+0x18fa/0x3810 drivers/net/tun.c:1798 tun_chr_write_iter+0xbd/0x1c0 drivers/net/tun.c:1984 call_write_iter include/linux/fs.h:1781 [inline] do_iter_readv_writev+0x55c/0x830 fs/read_write.c:653 do_iter_write+0x154/0x540 fs/read_write.c:932 compat_writev+0x225/0x420 fs/read_write.c:1246 do_compat_writev+0x115/0x220 fs/read_write.c:1267 C_SYSC_writev fs/read_write.c:1278 [inline] compat_SyS_writev+0x26/0x30 fs/read_write.c:1274 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7fdac99 RSP: 002b:00000000f77d6034 EFLAGS: 00000296 ORIG_RAX: 0000000000000092 RAX: ffffffffffffffda RBX: 0000000000000012 RCX: 00000000f77d6084 RDX: 0000000000000001 RSI: 000000000813af00 RDI: 0000000000000014 RBP: 00000000f77d6158 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl audit: type=1400 audit(1519519466.244:55): avc: denied { map } for pid=8408 comm="syz-executor0" path=2F6D656D66643A706F7369785F61636C5F6163636573737B59202864656C6574656429 dev="tmpfs" ino=22718 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 PPPIOCDETACH file->f_count=2 PPPIOCDETACH file->f_count=2 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 1 PID: 8595 Comm: syz-executor7 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3703 [inline] __kmalloc_track_caller+0x5f/0x760 mm/slab.c:3720 memdup_user+0x2c/0x90 mm/util.c:160 do_ipv6_setsockopt.isra.8+0x2133/0x39d0 net/ipv6/ipv6_sockglue.c:745 ipv6_setsockopt+0xd7/0x130 net/ipv6/ipv6_sockglue.c:922 sctp_setsockopt+0x2b6/0x61d0 net/sctp/socket.c:4104 compat_sock_common_setsockopt+0x104/0x140 net/core/sock.c:2988 C_SYSC_setsockopt net/compat.c:403 [inline] compat_SyS_setsockopt+0x17c/0x410 net/compat.c:386 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f1ec99 RSP: 002b:00000000f771a09c EFLAGS: 00000286 ORIG_RAX: 000000000000016e RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 0000000000000029 RDX: 0000000000000030 RSI: 000000002060a000 RDI: 0000000000000090 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 xt_physdev: --physdev-out and --physdev-is-out only supported in the FORWARD and POSTROUTING chains with bridged traffic Cannot find add_set index 0 as target ion_ioctl: ioctl validate failed FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8762 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3703 [inline] __kmalloc_track_caller+0x5f/0x760 mm/slab.c:3720 memdup_user+0x2c/0x90 mm/util.c:160 strndup_user+0x62/0xb0 mm/util.c:217 copy_mount_string+0x24/0x40 fs/namespace.c:2746 C_SYSC_mount fs/compat.c:170 [inline] compat_SyS_mount+0x2d/0x1070 fs/compat.c:160 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f83c99 RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00000000208deff8 RCX: 0000000020343ff8 RDX: 00000000207fc000 RSI: 0000000000000000 RDI: 000000002000a000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 8785 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3703 [inline] __kmalloc_track_caller+0x5f/0x760 mm/slab.c:3720 memdup_user+0x2c/0x90 mm/util.c:160 strndup_user+0x62/0xb0 mm/util.c:217 copy_mount_string+0x24/0x40 fs/namespace.c:2746 C_SYSC_mount fs/compat.c:175 [inline] compat_SyS_mount+0x49/0x1070 fs/compat.c:160 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f83c99 RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00000000208deff8 RCX: 0000000020343ff8 RDX: 00000000207fc000 RSI: 0000000000000000 RDI: 000000002000a000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 8817 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc_trace+0x4b/0x740 mm/slab.c:3605 kmalloc include/linux/slab.h:512 [inline] copy_mount_options+0x5f/0x2e0 fs/namespace.c:2721 C_SYSC_mount fs/compat.c:180 [inline] compat_SyS_mount+0x65/0x1070 fs/compat.c:160 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f83c99 RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00000000208deff8 RCX: 0000000020343ff8 RDX: 00000000207fc000 RSI: 0000000000000000 RDI: 000000002000a000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 8845 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3539 getname_flags+0xcb/0x580 fs/namei.c:138 user_path_at_empty+0x2d/0x50 fs/namei.c:2568 user_path include/linux/namei.h:62 [inline] do_mount+0x15f/0x2bb0 fs/namespace.c:2782 C_SYSC_mount fs/compat.c:195 [inline] compat_SyS_mount+0xd0/0x1070 fs/compat.c:160 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f83c99 RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00000000208deff8 RCX: 0000000020343ff8 RDX: 00000000207fc000 RSI: 0000000000000000 RDI: 000000002000a000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 8863 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2959 [inline] prepare_alloc_pages mm/page_alloc.c:4198 [inline] __alloc_pages_nodemask+0x327/0xdd0 mm/page_alloc.c:4237 __alloc_pages include/linux/gfp.h:456 [inline] __alloc_pages_node include/linux/gfp.h:469 [inline] kmem_getpages mm/slab.c:1410 [inline] cache_grow_begin+0x72/0x640 mm/slab.c:2665 cache_alloc_refill mm/slab.c:3032 [inline] ____cache_alloc mm/slab.c:3114 [inline] __do_cache_alloc mm/slab.c:3336 [inline] slab_alloc mm/slab.c:3371 [inline] kmem_cache_alloc+0x400/0x760 mm/slab.c:3539 getname_flags+0xcb/0x580 fs/namei.c:138 user_path_at_empty+0x2d/0x50 fs/namei.c:2568 user_path include/linux/namei.h:62 [inline] do_mount+0x15f/0x2bb0 fs/namespace.c:2782 C_SYSC_mount fs/compat.c:195 [inline] compat_SyS_mount+0xd0/0x1070 fs/compat.c:160 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7f83c99 RSP: 002b:00000000f777f09c EFLAGS: 00000286 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00000000208deff8 RCX: 0000000020343ff8 RDX: 00000000207fc000 RSI: 0000000000000000 RDI: 000000002000a000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 audit: type=1400 audit(1519519469.467:56): avc: denied { map } for pid=8929 comm="syz-executor7" path="socket:[23986]" dev="sockfs" ino=23986 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 9095 Comm: syz-executor2 Not tainted 4.16.0-rc2+ #237 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x24d lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:422 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc_trace+0x4b/0x740 mm/slab.c:3605 kmalloc include/linux/slab.h:512 [inline] kzalloc include/linux/slab.h:701 [inline] alloc_pipe_info+0x159/0x4b0 fs/pipe.c:633 splice_direct_to_actor+0x64a/0x820 fs/splice.c:920 do_splice_direct+0x29b/0x3c0 fs/splice.c:1061 do_sendfile+0x5c9/0xe80 fs/read_write.c:1413 C_SYSC_sendfile fs/read_write.c:1489 [inline] compat_SyS_sendfile+0xea/0x1a0 fs/read_write.c:1478 do_syscall_32_irqs_on arch/x86/entry/common.c:330 [inline] do_fast_syscall_32+0x3ec/0xf9f arch/x86/entry/common.c:392 entry_SYSENTER_compat+0x70/0x7f arch/x86/entry/entry_64_compat.S:139 RIP: 0023:0xf7fc3c99 RSP: 002b:00000000f77bf09c EFLAGS: 00000286 ORIG_RAX: 00000000000000bb RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000000014 RDX: 0000000020057ff8 RSI: 0000000000010002 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000