====================================================== WARNING: possible circular locking dependency detected 4.14.0-next-20171124+ #51 Not tainted ------------------------------------------------------ syz-executor4/10286 is trying to acquire lock: (console_lock){+.+.}, at: [] vcs_write+0x14d/0xca0 drivers/tty/vt/vc_screen.c:397 but task is already holding lock: (&pipe->mutex/1){+.+.}, at: [] pipe_lock_nested fs/pipe.c:67 [inline] (&pipe->mutex/1){+.+.}, at: [] pipe_lock+0x56/0x70 fs/pipe.c:75 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&pipe->mutex/1){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 __mutex_lock_common kernel/locking/mutex.c:756 [inline] __mutex_lock+0x16f/0x1a80 kernel/locking/mutex.c:893 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:908 pipe_lock_nested fs/pipe.c:67 [inline] pipe_lock+0x56/0x70 fs/pipe.c:75 iter_file_splice_write+0x264/0xf30 fs/splice.c:699 do_splice_from fs/splice.c:851 [inline] do_splice fs/splice.c:1147 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x7d5/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 -> #2 (sb_writers){.+.+}: spin_lock include/linux/spinlock.h:315 [inline] fsnotify_destroy_marks+0xe7/0x190 fs/notify/mark.c:718 -> #1 ((completion)&req.done){+.+.}: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 complete_acquire include/linux/completion.h:40 [inline] __wait_for_common kernel/sched/completion.c:109 [inline] wait_for_common kernel/sched/completion.c:123 [inline] wait_for_completion+0xcb/0x7b0 kernel/sched/completion.c:144 devtmpfs_create_node+0x32b/0x4a0 drivers/base/devtmpfs.c:115 device_add+0x120f/0x1640 drivers/base/core.c:1824 device_create_groups_vargs+0x1f3/0x250 drivers/base/core.c:2430 device_create_vargs drivers/base/core.c:2470 [inline] device_create+0xda/0x110 drivers/base/core.c:2506 vcs_make_sysfs+0x35/0x60 drivers/tty/vt/vc_screen.c:629 vc_allocate+0x4b7/0x6b0 drivers/tty/vt/vt.c:797 con_install+0x52/0x440 drivers/tty/vt/vt.c:2876 tty_driver_install_tty drivers/tty/tty_io.c:1215 [inline] tty_init_dev+0xf6/0x4a0 drivers/tty/tty_io.c:1315 tty_open_by_driver drivers/tty/tty_io.c:1942 [inline] tty_open+0x608/0xab0 drivers/tty/tty_io.c:1990 chrdev_open+0x257/0x730 fs/char_dev.c:417 do_dentry_open+0x682/0xd70 fs/open.c:752 vfs_open+0x107/0x230 fs/open.c:866 do_last fs/namei.c:3388 [inline] path_openat+0x1157/0x3530 fs/namei.c:3528 do_filp_open+0x25b/0x3b0 fs/namei.c:3563 do_sys_open+0x502/0x6d0 fs/open.c:1059 SYSC_open fs/open.c:1077 [inline] SyS_open+0x2d/0x40 fs/open.c:1072 entry_SYSCALL_64_fastpath+0x1f/0x96 -> #0 (console_lock){+.+.}: check_prevs_add kernel/locking/lockdep.c:2031 [inline] validate_chain kernel/locking/lockdep.c:2473 [inline] __lock_acquire+0x3498/0x47f0 kernel/locking/lockdep.c:3500 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 console_lock+0x4b/0x80 kernel/printk/printk.c:2047 vcs_write+0x14d/0xca0 drivers/tty/vt/vc_screen.c:397 __vfs_write+0xef/0x970 fs/read_write.c:480 __kernel_write+0xfe/0x350 fs/read_write.c:501 write_pipe_buf+0x175/0x220 fs/splice.c:797 splice_from_pipe_feed fs/splice.c:502 [inline] __splice_from_pipe+0x328/0x730 fs/splice.c:626 splice_from_pipe+0x1e9/0x330 fs/splice.c:661 default_file_splice_write+0x40/0x90 fs/splice.c:809 do_splice_from fs/splice.c:851 [inline] do_splice fs/splice.c:1147 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x7d5/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 other info that might help us debug this: Chain exists of: console_lock --> sb_writers --> &pipe->mutex/1 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&pipe->mutex/1); lock(sb_writers); lock(&pipe->mutex/1); lock(console_lock); *** DEADLOCK *** 1 lock held by syz-executor4/10286: #0: (&pipe->mutex/1){+.+.}, at: [] pipe_lock_nested fs/pipe.c:67 [inline] #0: (&pipe->mutex/1){+.+.}, at: [] pipe_lock+0x56/0x70 fs/pipe.c:75 stack backtrace: CPU: 0 PID: 10286 Comm: syz-executor4 Not tainted 4.14.0-next-20171124+ #51 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_circular_bug+0x42d/0x610 kernel/locking/lockdep.c:1271 check_prev_add+0x666/0x15f0 kernel/locking/lockdep.c:1914 check_prevs_add kernel/locking/lockdep.c:2031 [inline] validate_chain kernel/locking/lockdep.c:2473 [inline] __lock_acquire+0x3498/0x47f0 kernel/locking/lockdep.c:3500 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4004 console_lock+0x4b/0x80 kernel/printk/printk.c:2047 vcs_write+0x14d/0xca0 drivers/tty/vt/vc_screen.c:397 __vfs_write+0xef/0x970 fs/read_write.c:480 __kernel_write+0xfe/0x350 fs/read_write.c:501 write_pipe_buf+0x175/0x220 fs/splice.c:797 splice_from_pipe_feed fs/splice.c:502 [inline] __splice_from_pipe+0x328/0x730 fs/splice.c:626 splice_from_pipe+0x1e9/0x330 fs/splice.c:661 default_file_splice_write+0x40/0x90 fs/splice.c:809 do_splice_from fs/splice.c:851 [inline] do_splice fs/splice.c:1147 [inline] SYSC_splice fs/splice.c:1402 [inline] SyS_splice+0x7d5/0x1630 fs/splice.c:1382 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007fc1139a1be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000013 RSI: 0000000000000000 RDI: 0000000000000014 RBP: 0000000000000086 R08: 00000000fffff5fc R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f2608 R13: 00000000ffffffff R14: 00007fc1139a26d4 R15: 0000000000000000 kauditd_printk_skb: 312 callbacks suppressed audit: type=1326 audit(1511573777.133:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=10295 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 PID: 11778 Comm: syz-executor4 Not tainted 4.14.0-next-20171124+ #51 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3546 sctp_bucket_create net/sctp/socket.c:7564 [inline] sctp_get_port_local+0x9d6/0x13c0 net/sctp/socket.c:7323 sctp_get_port+0x127/0x190 net/sctp/socket.c:7372 inet_autobind+0xaa/0x180 net/ipv4/af_inet.c:181 inet_sendmsg+0x4de/0x5e0 net/ipv4/af_inet.c:760 sock_sendmsg_nosec net/socket.c:632 [inline] sock_sendmsg+0xca/0x110 net/socket.c:642 SYSC_sendto+0x358/0x5a0 net/socket.c:1749 SyS_sendto+0x40/0x50 net/socket.c:1717 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007fc1139a1be8 EFLAGS: 00000212 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000001 RSI: 0000000020ab7000 RDI: 0000000000000014 RBP: 00007fc1139a1a20 R08: 0000000020ab8000 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b757e R13: 00007fc1139a1b58 R14: 00000000004b758e R15: 0000000000000000 device gre0 entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 11817 Comm: syz-executor7 Not tainted 4.14.0-next-20171124+ #51 device gre0 entered promiscuous mode Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3546 SYSC_getcwd fs/dcache.c:3446 [inline] SyS_getcwd+0xc9/0xa40 fs/dcache.c:3442 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f6ca19cfbe8 EFLAGS: 00000212 ORIG_RAX: 000000000000004f RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020f7e000 RBP: 00007f6ca19cfa20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b757e R13: 00007f6ca19cfb58 R14: 00000000004b758e R15: 0000000000000000 QAT: Invalid ioctl FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 11849 Comm: syz-executor5 Not tainted 4.14.0-next-20171124+ #51 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3546 anon_vma_chain_alloc mm/rmap.c:128 [inline] __anon_vma_prepare+0xbc/0x6b0 mm/rmap.c:182 anon_vma_prepare include/linux/rmap.h:153 [inline] do_huge_pmd_anonymous_page+0x1127/0x1b00 mm/huge_memory.c:678 create_huge_pmd mm/memory.c:3816 [inline] __handle_mm_fault+0x1b68/0x3dd0 mm/memory.c:4019 handle_mm_fault+0x38f/0x930 mm/memory.c:4085 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 arch/x86/lib/copy_user_64.S:180 RSP: 0018:ffff8801d95878f8 EFLAGS: 00010202 RAX: ffffed003b2b0f86 RBX: 0000000020002fa0 RCX: 0000000000000060 RDX: 0000000000000060 RSI: 0000000020002fa0 RDI: ffff8801d9587bd0 RBP: ffff8801d9587928 R08: ffffed003b2b0f86 R09: ffffed003b2b0f86 R10: 000000000000000c R11: ffffed003b2b0f85 R12: 0000000000000060 R13: ffff8801d9587bd0 R14: 00007ffffffff000 R15: 0000000020003000 copy_from_user include/linux/uaccess.h:147 [inline] move_addr_to_kernel.part.18+0x34/0x100 net/socket.c:194 move_addr_to_kernel net/socket.c:190 [inline] copy_msghdr_from_user+0x459/0x590 net/socket.c:1951 ___sys_sendmsg+0x12d/0x8a0 net/socket.c:1993 __sys_sendmmsg+0x1e6/0x5f0 net/socket.c:2138 SYSC_sendmmsg net/socket.c:2169 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2164 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f3351573be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000001 RSI: 0000000020237000 RDI: 0000000000000013 RBP: 00007f3351573a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b757e R13: 00007f3351573b58 R14: 00000000004b758e R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 11878 Comm: syz-executor5 Not tainted 4.14.0-next-20171124+ #51 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3546 anon_vma_alloc mm/rmap.c:81 [inline] __anon_vma_prepare+0x39d/0x6b0 mm/rmap.c:189 anon_vma_prepare include/linux/rmap.h:153 [inline] do_huge_pmd_anonymous_page+0x1127/0x1b00 mm/huge_memory.c:678 create_huge_pmd mm/memory.c:3816 [inline] __handle_mm_fault+0x1b68/0x3dd0 mm/memory.c:4019 handle_mm_fault+0x38f/0x930 mm/memory.c:4085 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 arch/x86/lib/copy_user_64.S:180 RSP: 0018:ffff8801c3e9f8f8 EFLAGS: 00010202 RAX: ffffed00387d3f86 RBX: 0000000020002fa0 RCX: 0000000000000060 RDX: 0000000000000060 RSI: 0000000020002fa0 RDI: ffff8801c3e9fbd0 RBP: ffff8801c3e9f928 R08: ffffed00387d3f86 R09: ffffed00387d3f86 R10: 000000000000000c R11: ffffed00387d3f85 R12: 0000000000000060 R13: ffff8801c3e9fbd0 R14: 00007ffffffff000 R15: 0000000020003000 copy_from_user include/linux/uaccess.h:147 [inline] move_addr_to_kernel.part.18+0x34/0x100 net/socket.c:194 move_addr_to_kernel net/socket.c:190 [inline] copy_msghdr_from_user+0x459/0x590 net/socket.c:1951 ___sys_sendmsg+0x12d/0x8a0 net/socket.c:1993 __sys_sendmmsg+0x1e6/0x5f0 net/socket.c:2138 SYSC_sendmmsg net/socket.c:2169 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2164 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f3351573be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000001 RSI: 0000000020237000 RDI: 0000000000000013 RBP: 00007f3351573a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b757e R13: 00007f3351573b58 R14: 00000000004b758e R15: 0000000000000000 device gre0 entered promiscuous mode FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 11891 Comm: syz-executor5 Not tainted 4.14.0-next-20171124+ #51 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3546 kmem_cache_zalloc include/linux/slab.h:693 [inline] alloc_mm_slot mm/khugepaged.c:369 [inline] __khugepaged_enter+0xbd/0x540 mm/khugepaged.c:405 khugepaged_enter include/linux/khugepaged.h:54 [inline] do_huge_pmd_anonymous_page+0x10d9/0x1b00 mm/huge_memory.c:680 create_huge_pmd mm/memory.c:3816 [inline] __handle_mm_fault+0x1b68/0x3dd0 mm/memory.c:4019 handle_mm_fault+0x38f/0x930 mm/memory.c:4085 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 arch/x86/lib/copy_user_64.S:180 RSP: 0018:ffff8801c08e78f8 EFLAGS: 00010202 RAX: ffffed003811cf86 RBX: 0000000020002fa0 RCX: 0000000000000060 RDX: 0000000000000060 RSI: 0000000020002fa0 RDI: ffff8801c08e7bd0 RBP: ffff8801c08e7928 R08: ffffed003811cf86 R09: ffffed003811cf86 R10: 000000000000000c R11: ffffed003811cf85 R12: 0000000000000060 R13: ffff8801c08e7bd0 R14: 00007ffffffff000 R15: 0000000020003000 copy_from_user include/linux/uaccess.h:147 [inline] move_addr_to_kernel.part.18+0x34/0x100 net/socket.c:194 move_addr_to_kernel net/socket.c:190 [inline] copy_msghdr_from_user+0x459/0x590 net/socket.c:1951 ___sys_sendmsg+0x12d/0x8a0 net/socket.c:1993 __sys_sendmmsg+0x1e6/0x5f0 net/socket.c:2138 SYSC_sendmmsg net/socket.c:2169 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2164 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f3351573be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000001 RSI: 0000000020237000 RDI: 0000000000000013 RBP: 00007f3351573a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b757e R13: 00007f3351573b58 R14: 00000000004b758e R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 device gre0 entered promiscuous mode CPU: 1 PID: 11917 Comm: syz-executor5 Not tainted 4.14.0-next-20171124+ #51 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 fail_dump lib/fault-inject.c:51 [inline] should_fail+0x8c0/0xa40 lib/fault-inject.c:149 should_failslab+0xec/0x120 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:425 [inline] slab_alloc mm/slab.c:3372 [inline] kmem_cache_alloc+0x47/0x760 mm/slab.c:3546 ptlock_alloc+0x24/0x70 mm/memory.c:4673 ptlock_init include/linux/mm.h:1790 [inline] pgtable_page_ctor include/linux/mm.h:1824 [inline] pte_alloc_one+0x59/0x100 arch/x86/mm/pgtable.c:32 do_huge_pmd_anonymous_page+0xc23/0x1b00 mm/huge_memory.c:689 create_huge_pmd mm/memory.c:3816 [inline] __handle_mm_fault+0x1b68/0x3dd0 mm/memory.c:4019 handle_mm_fault+0x38f/0x930 mm/memory.c:4085 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_enhanced_fast_string+0xe/0x20 arch/x86/lib/copy_user_64.S:180 RSP: 0018:ffff8801cddef8f8 EFLAGS: 00010202 RAX: ffffed0039bbdf86 RBX: 0000000020002fa0 RCX: 0000000000000060 RDX: 0000000000000060 RSI: 0000000020002fa0 RDI: ffff8801cddefbd0 RBP: ffff8801cddef928 R08: ffffed0039bbdf86 R09: ffffed0039bbdf86 R10: 000000000000000c R11: ffffed0039bbdf85 R12: 0000000000000060 R13: ffff8801cddefbd0 R14: 00007ffffffff000 R15: 0000000020003000 copy_from_user include/linux/uaccess.h:147 [inline] move_addr_to_kernel.part.18+0x34/0x100 net/socket.c:194 move_addr_to_kernel net/socket.c:190 [inline] copy_msghdr_from_user+0x459/0x590 net/socket.c:1951 ___sys_sendmsg+0x12d/0x8a0 net/socket.c:1993 __sys_sendmmsg+0x1e6/0x5f0 net/socket.c:2138 SYSC_sendmmsg net/socket.c:2169 [inline] SyS_sendmmsg+0x35/0x60 net/socket.c:2164 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f3351573be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000001 RSI: 0000000020237000 RDI: 0000000000000013 RBP: 00007f3351573a20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000004b757e R13: 00007f3351573b58 R14: 00000000004b758e R15: 0000000000000000 device gre0 entered promiscuous mode device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode device gre0 entered promiscuous mode