====================================== | [ 32.801008][ T238] 1 lock held by restore_ipv4/238: | [ 32.801183][ T238] #0: ffff888007faaa58 (sk_lock-AF_INET){+.+.}-{0:0}, at: do_tcp_getsockopt (net/ipv4/tcp.c:4631) | [ 32.801530][ T238] | [ 32.801530][ T238] stack backtrace: [ 32.802073][ T238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 32.802413][ T238] Call Trace: [ 32.802554][ T238] [ 32.802639][ T238] dump_stack_lvl (lib/dump_stack.c:123) [ 32.802812][ T238] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 32.802968][ T238] tcp_ao_copy_mkts_to_user (net/ipv4/tcp_ao.c:2232 (discriminator 7)) [ 32.803128][ T238] ? mark_held_locks (kernel/locking/lockdep.c:4321) [ 32.803295][ T238] ? __pfx_tcp_ao_copy_mkts_to_user (net/ipv4/tcp_ao.c:2106) [ 32.803500][ T238] ? stack_depot_save_flags (lib/stackdepot.c:664) [ 32.803663][ T238] ? kasan_save_stack (mm/kasan/common.c:48) [ 32.803852][ T238] ? kasan_save_track (./arch/x86/include/asm/current.h:49 mm/kasan/common.c:60 mm/kasan/common.c:69) [ 32.804000][ T238] ? kasan_save_free_info (mm/kasan/generic.c:582) [ 32.804151][ T238] ? __kasan_slab_free (mm/kasan/common.c:271) [ 32.804300][ T238] ? kfree (mm/slub.c:4579 mm/slub.c:4727) [ 32.804421][ T238] ? tcp_ao_parse_crypto (./include/net/tcp_ao.h:67 net/ipv4/tcp_ao.c:1436) [ 32.804605][ T238] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 32.804765][ T238] ? lock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5827) [ 32.804922][ T238] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 32.805087][ T238] ? __lock_release (kernel/locking/lockdep.c:5501) [ 32.805234][ T238] ? do_tcp_getsockopt (net/ipv4/tcp.c:4631) [ 32.805397][ T238] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 32.805559][ T238] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) [ 32.805688][ T238] ? do_tcp_getsockopt (net/ipv4/tcp.c:4631) [ 32.805859][ T238] do_tcp_getsockopt (net/ipv4/tcp.c:4631) [ 32.806019][ T238] ? __pfx_do_tcp_getsockopt (net/ipv4/tcp.c:4300) [ 32.806169][ T238] ? tcp_ao_add_cmd (net/ipv4/tcp_ao.c:1737) [ 32.806368][ T238] ? release_sock (net/core/sock.c:3630) [ 32.806522][ T238] ? reacquire_held_locks (kernel/locking/lockdep.c:5350) [ 32.806709][ T238] ? release_sock (net/core/sock.c:3630) [ 32.806867][ T238] ? rcu_read_lock_any_held (kernel/rcu/update.c:386 kernel/rcu/update.c:380) [ 32.807021][ T238] ? validate_chain (kernel/locking/lockdep.c:3797 kernel/locking/lockdep.c:3817 kernel/locking/lockdep.c:3872) [ 32.807203][ T238] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 32.807354][ T238] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) [ 32.807528][ T238] ? __pfx_validate_chain (kernel/locking/lockdep.c:3860) [ 32.807688][ T238] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 32.807856][ T238] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) [ 32.807987][ T238] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 32.808209][ T238] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 32.808407][ T238] ? __lock_release (kernel/locking/lockdep.c:5501) [ 32.808578][ T238] ? __might_fault (mm/memory.c:6705 mm/memory.c:6698) [ 32.808773][ T238] ? __pfx___lock_release (kernel/locking/lockdep.c:5477) [ 32.808950][ T238] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [ 32.809132][ T238] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 32.809291][ T238] ? __might_fault (mm/memory.c:6705 mm/memory.c:6698) [ 32.809455][ T238] ? __might_fault (mm/memory.c:6705 mm/memory.c:6698) [ 32.809639][ T238] tcp_getsockopt (net/ipv4/tcp.c:4673 net/ipv4/tcp.c:4664) [ 32.809799][ T238] do_sock_getsockopt (net/socket.c:2396) [ 32.809994][ T238] ? __fget_files (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 fs/file.c:1006) [ 32.810157][ T238] ? __pfx_do_sock_getsockopt (net/socket.c:2374) [ 32.810326][ T238] ? fdget (fs/file.c:1121 fs/file.c:1128) [ 32.810464][ T238] __sys_getsockopt (./include/linux/file.h:35 net/socket.c:2428) [ 32.810615][ T238] ? __pfx___sys_getsockopt (net/socket.c:2415) [ 32.810805][ T238] ? __pfx_task_work_run (kernel/task_work.c:207) [ 32.810970][ T238] ? do_user_addr_fault (./include/linux/rcupdate.h:882 ./include/linux/mm.h:729 arch/x86/mm/fault.c:1340) [ 32.811144][ T238] __x64_sys_getsockopt (net/socket.c:2432) [ 32.811309][ T238] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 32.811559][ T238] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 32.811715][ T238] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 32.811948][ T238] RIP: 0033:0x7f60a6bac46e [ 32.812117][ T238] Code: 1f 44 00 00 48 8b 15 91 99 0a 00 f7 d8 64 89 02 b8 ff ff ff ff eb b8 0f 1f 44 00 00 f3 0f 1e fa 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 59 All code ======== 0: 1f (bad) 1: 44 00 00 add %r8b,(%rax) 4: 48 8b 15 91 99 0a 00 mov 0xa9991(%rip),%rdx # 0xa999c b: f7 d8 neg %eax d: 64 89 02 mov %eax,%fs:(%rdx) 10: b8 ff ff ff ff mov $0xffffffff,%eax 15: eb b8 jmp 0xffffffffffffffcf 17: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 1c: f3 0f 1e fa endbr64 20: 49 89 ca mov %rcx,%r10 23: b8 37 00 00 00 mov $0x37,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 0a ja 0x3c 32: c3 ret 33: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 3a: 00 00 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 15 .byte 0x15 3f: 59 pop %rcx Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 0a ja 0x12 8: c3 ret 9: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 10: 00 00 12: 48 rex.W 13: 8b .byte 0x8b 14: 15 .byte 0x15 15: 59 pop %rcx [ 32.812708][ T238] RSP: 002b:00007f60a6257858 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 32.812966][ T238] RAX: ffffffffffffffda RBX: 00007f60a6257b10 RCX: 00007f60a6bac46e [ 32.813247][ T238] RDX: 0000000000000029 RSI: 0000000000000006 RDI: 0000000000000009 [ 32.813513][ T238] RBP: 00007f60a6257870 R08: 00007f60a625786c R09: 0000000000000064 [ 32.813745][ T238] R10: 00007f60a6257870 R11: 0000000000000246 R12: 0000000000000009 [ 32.814022][ T238] R13: 0000000000000064 R14: 0000000000000020 R15: 0000000000000064 | [ 32.818063][ T238] 1 lock held by restore_ipv4/238: | [ 32.818252][ T238] #0: ffff888007faaa58 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_stream_connect (net/ipv4/af_inet.c:748) | [ 32.818553][ T238] | [ 32.818553][ T238] stack backtrace: [ 32.819002][ T238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 32.819375][ T238] Call Trace: [ 32.819490][ T238] [ 32.819595][ T238] dump_stack_lvl (lib/dump_stack.c:123) [ 32.819768][ T238] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 32.819939][ T238] __tcp_ao_do_lookup.part.0 (net/ipv4/tcp_ao.c:208) [ 32.820128][ T238] tcp_v4_ao_lookup (net/ipv4/tcp_ao.c:200 net/ipv4/tcp_ao.c:222 net/ipv4/tcp_ao.c:720) [ 32.820279][ T238] tcp_connect (net/ipv4/tcp_output.c:4114) [ 32.820439][ T238] tcp_v4_connect (net/ipv4/tcp_ipv4.c:342) [ 32.820607][ T238] ? __pfx_tcp_v4_connect (net/ipv4/tcp_ipv4.c:220) [ 32.820771][ T238] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) [ 32.820900][ T238] __inet_stream_connect (net/ipv4/af_inet.c:677) [ 32.821057][ T238] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 32.821276][ T238] inet_stream_connect (net/ipv4/af_inet.c:749) [ 32.821447][ T238] __sys_connect (net/socket.c:2071 net/socket.c:2088) [ 32.821606][ T238] ? __pfx___sys_connect (net/socket.c:2078) [ 32.821755][ T238] ? do_fcntl (fs/fcntl.c:473) [ 32.821896][ T238] ? __pfx_do_fcntl (fs/fcntl.c:443) [ 32.822047][ T238] ? __fget_files (fs/file.c:1009) [ 32.822216][ T238] __x64_sys_connect (net/socket.c:2095) [ 32.822363][ T238] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 32.822515][ T238] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 32.822702][ T238] RIP: 0033:0x7f60a6bac40b [ 32.822859][ T238] Code: 83 ec 18 89 54 24 0c 48 89 34 24 89 7c 24 08 e8 eb c7 f4 ff 8b 54 24 0c 48 8b 34 24 41 89 c0 8b 7c 24 08 b8 2a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 08 e8 41 c8 f4 ff 8b 44 All code ======== 0: 83 ec 18 sub $0x18,%esp 3: 89 54 24 0c mov %edx,0xc(%rsp) 7: 48 89 34 24 mov %rsi,(%rsp) b: 89 7c 24 08 mov %edi,0x8(%rsp) f: e8 eb c7 f4 ff call 0xfffffffffff4c7ff 14: 8b 54 24 0c mov 0xc(%rsp),%edx 18: 48 8b 34 24 mov (%rsp),%rsi 1c: 41 89 c0 mov %eax,%r8d 1f: 8b 7c 24 08 mov 0x8(%rsp),%edi 23: b8 2a 00 00 00 mov $0x2a,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 35 ja 0x67 32: 44 89 c7 mov %r8d,%edi 35: 89 44 24 08 mov %eax,0x8(%rsp) 39: e8 41 c8 f4 ff call 0xfffffffffff4c87f 3e: 8b .byte 0x8b 3f: 44 rex.R Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 35 ja 0x3d 8: 44 89 c7 mov %r8d,%edi b: 89 44 24 08 mov %eax,0x8(%rsp) f: e8 41 c8 f4 ff call 0xfffffffffff4c855 14: 8b .byte 0x8b 15: 44 rex.R [ 32.823382][ T238] RSP: 002b:00007f60a6257c10 EFLAGS: 00000293 ORIG_RAX: 000000000000002a [ 32.823619][ T238] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007f60a6bac40b [ 32.823842][ T238] RDX: 0000000000000010 RSI: 00007f60a6257c60 RDI: 0000000000000009 [ 32.824063][ T238] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000415460 [ 32.824286][ T238] R10: 00007f60a6a64598 R11: 0000000000000293 R12: 0000000000410270 [ 32.824510][ T238] R13: 0000000000000005 R14: 00007f60a6257c60 R15: ffffffffffffffe0 | [ 32.831293][ T238] 1 lock held by restore_ipv4/238: | [ 32.831525][ T238] #0: ffff888007faaa58 (sk_lock-AF_INET){+.+.}-{0:0}, at: inet_stream_connect (net/ipv4/af_inet.c:748) | [ 32.831830][ T238] | [ 32.831830][ T238] stack backtrace: [ 32.832316][ T238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 32.832673][ T238] Call Trace: [ 32.832800][ T238] [ 32.832904][ T238] dump_stack_lvl (lib/dump_stack.c:123) [ 32.833079][ T238] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 32.833261][ T238] tcp_ao_finish_connect (net/ipv4/tcp_ao.c:1183 (discriminator 7)) [ 32.833429][ T238] tcp_finish_connect (net/ipv4/tcp_input.c:6340) [ 32.833597][ T238] tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6576) [ 32.833832][ T238] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 32.834018][ T238] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) [ 32.834151][ T238] ? __pfx_tcp_rcv_synsent_state_process (net/ipv4/tcp_input.c:6455) [ 32.834355][ T238] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 32.834563][ T238] ? kvm_clock_get_cycles (./arch/x86/include/asm/preempt.h:94 arch/x86/kernel/kvmclock.c:80 arch/x86/kernel/kvmclock.c:86) [ 32.834726][ T238] ? ktime_get (kernel/time/timekeeping.c:195 (discriminator 4) kernel/time/timekeeping.c:395 (discriminator 4) kernel/time/timekeeping.c:403 (discriminator 4) kernel/time/timekeeping.c:850 (discriminator 4)) [ 32.834878][ T238] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 32.835047][ T238] tcp_rcv_state_process (net/ipv4/tcp_input.c:6796) [ 32.835218][ T238] ? __lock_release (kernel/locking/lockdep.c:5501) [ 32.835382][ T238] ? __release_sock (./include/net/sock.h:1121 net/core/sock.c:3077) [ 32.835547][ T238] ? __pfx_tcp_rcv_state_process (net/ipv4/tcp_input.c:6751) [ 32.835747][ T238] ? mark_lock (kernel/locking/lockdep.c:4703 (discriminator 3)) [ 32.835883][ T238] tcp_v4_do_rcv (net/ipv4/tcp_ipv4.c:1945) [ 32.836049][ T238] __release_sock (./include/net/sock.h:1121 net/core/sock.c:3077) [ 32.836218][ T238] release_sock (net/core/sock.c:3633) [ 32.836530][ T238] inet_stream_connect (net/ipv4/af_inet.c:751) [ 32.836696][ T238] __sys_connect (net/socket.c:2071 net/socket.c:2088) [ 32.836877][ T238] ? __pfx___sys_connect (net/socket.c:2078) [ 32.837043][ T238] ? do_fcntl (fs/fcntl.c:473) [ 32.837167][ T238] ? __pfx_do_fcntl (fs/fcntl.c:443) [ 32.837331][ T238] ? __fget_files (fs/file.c:1009) [ 32.837512][ T238] __x64_sys_connect (net/socket.c:2095) [ 32.837679][ T238] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 32.837846][ T238] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 32.838047][ T238] RIP: 0033:0x7f60a6bac40b [ 32.838228][ T238] Code: 83 ec 18 89 54 24 0c 48 89 34 24 89 7c 24 08 e8 eb c7 f4 ff 8b 54 24 0c 48 8b 34 24 41 89 c0 8b 7c 24 08 b8 2a 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 08 e8 41 c8 f4 ff 8b 44 All code ======== 0: 83 ec 18 sub $0x18,%esp 3: 89 54 24 0c mov %edx,0xc(%rsp) 7: 48 89 34 24 mov %rsi,(%rsp) b: 89 7c 24 08 mov %edi,0x8(%rsp) f: e8 eb c7 f4 ff call 0xfffffffffff4c7ff 14: 8b 54 24 0c mov 0xc(%rsp),%edx 18: 48 8b 34 24 mov (%rsp),%rsi 1c: 41 89 c0 mov %eax,%r8d 1f: 8b 7c 24 08 mov 0x8(%rsp),%edi 23: b8 2a 00 00 00 mov $0x2a,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 35 ja 0x67 32: 44 89 c7 mov %r8d,%edi 35: 89 44 24 08 mov %eax,0x8(%rsp) 39: e8 41 c8 f4 ff call 0xfffffffffff4c87f 3e: 8b .byte 0x8b 3f: 44 rex.R Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 35 ja 0x3d 8: 44 89 c7 mov %r8d,%edi b: 89 44 24 08 mov %eax,0x8(%rsp) f: e8 41 c8 f4 ff call 0xfffffffffff4c855 14: 8b .byte 0x8b 15: 44 rex.R [ 32.838790][ T238] RSP: 002b:00007f60a6257c10 EFLAGS: 00000293 ORIG_RAX: 000000000000002a [ 32.839073][ T238] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007f60a6bac40b [ 32.839327][ T238] RDX: 0000000000000010 RSI: 00007f60a6257c60 RDI: 0000000000000009 [ 32.839604][ T238] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000415460 [ 32.839857][ T238] R10: 00007f60a6a64598 R11: 0000000000000293 R12: 0000000000410270 [ 32.840084][ T238] R13: 0000000000000005 R14: 00007f60a6257c60 R15: ffffffffffffffe0 | [ 32.882937][ T238] 1 lock held by restore_ipv4/238: | [ 32.883116][ T238] #0: ffff888007fad218 (sk_lock-AF_INET){+.+.}-{0:0}, at: do_tcp_setsockopt (net/ipv4/tcp.c:3809) | [ 32.883456][ T238] | [ 32.883456][ T238] stack backtrace: [ 32.883983][ T238] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 32.884382][ T238] Call Trace: [ 32.884521][ T238] [ 32.884615][ T238] dump_stack_lvl (lib/dump_stack.c:123) [ 32.884797][ T238] lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822) [ 32.884979][ T238] tcp_ao_set_repair (net/ipv4/tcp_ao.c:2399 (discriminator 7)) [ 32.885192][ T238] ? hlock_class (./arch/x86/include/asm/bitops.h:227 ./arch/x86/include/asm/bitops.h:239 ./include/asm-generic/bitops/instrumented-non-atomic.h:142 kernel/locking/lockdep.c:228) [ 32.885372][ T238] ? __pfx_tcp_ao_set_repair (net/ipv4/tcp_ao.c:2371) [ 32.885559][ T238] do_tcp_setsockopt (net/ipv4/tcp.c:3924) [ 32.885744][ T238] ? __pfx_do_tcp_setsockopt (net/ipv4/tcp.c:3705) [ 32.885919][ T238] ? __lock_acquire (kernel/locking/lockdep.c:5202) [ 32.886103][ T238] ? find_held_lock (kernel/locking/lockdep.c:5315) [ 32.886284][ T238] ? __lock_release (kernel/locking/lockdep.c:5501) [ 32.886462][ T238] ? __fget_files (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 fs/file.c:1006) [ 32.886641][ T238] ? __pfx___lock_release (kernel/locking/lockdep.c:5477) [ 32.886816][ T238] ? __pfx_lock_acquire.part.0 (kernel/locking/lockdep.c:5790) [ 32.886991][ T238] ? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 52)) [ 32.887176][ T238] do_sock_setsockopt (net/socket.c:2334) [ 32.887355][ T238] ? __pfx_do_sock_setsockopt (net/socket.c:2303) [ 32.887541][ T238] ? fdget (fs/file.c:1121 fs/file.c:1128) [ 32.887678][ T238] __sys_setsockopt (./include/linux/file.h:35 net/socket.c:2359) [ 32.887854][ T238] ? __pfx___sys_setsockopt (net/socket.c:2347) [ 32.888035][ T238] ? __fget_files (fs/file.c:1009) [ 32.888211][ T238] ? __pfx___sys_socket (net/socket.c:1712) [ 32.888392][ T238] __x64_sys_setsockopt (net/socket.c:2363) [ 32.888571][ T238] ? lockdep_hardirqs_on_prepare (kernel/locking/lockdep.c:4347 kernel/locking/lockdep.c:4406) [ 32.888788][ T238] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 32.888965][ T238] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 32.889183][ T238] RIP: 0033:0x7f60a6bac91e [ 32.889367][ T238] Code: 0f 1f 40 00 48 8b 15 e1 94 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 0f 1f 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 0a c3 66 0f 1f 84 00 00 00 00 00 48 8b 15 a9 All code ======== 0: 0f 1f 40 00 nopl 0x0(%rax) 4: 48 8b 15 e1 94 0a 00 mov 0xa94e1(%rip),%rdx # 0xa94ec b: f7 d8 neg %eax d: 64 89 02 mov %eax,%fs:(%rdx) 10: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax 17: eb b1 jmp 0xffffffffffffffca 19: 0f 1f 00 nopl (%rax) 1c: f3 0f 1e fa endbr64 20: 49 89 ca mov %rcx,%r10 23: b8 36 00 00 00 mov $0x36,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 0a ja 0x3c 32: c3 ret 33: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 3a: 00 00 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 15 .byte 0x15 3f: a9 .byte 0xa9 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 0a ja 0x12 8: c3 ret 9: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 10: 00 00 12: 48 rex.W 13: 8b .byte 0x8b 14: 15 .byte 0x15 15: a9 .byte 0xa9 [ 32.889994][ T238] RSP: 002b:00007f60a62579d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 32.890264][ T238] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f60a6bac91e [ 32.890527][ T238] RDX: 000000000000002a RSI: 0000000000000006 RDI: 0000000000000009 [ 32.890785][ T238] RBP: 0000000000000009 R08: 0000000000000010 R09: 0000000000000064 [ 32.891052][ T238] R10: 00007f60a6257cb0 R11: 0000000000000202 R12: 00007f60a6257b30 Finger prints: lockdep_rcu_suspicious:tcp_v4_ao_lookup:tcp_connect:tcp_v4_connect:__inet_stream_connect lockdep_rcu_suspicious:tcp_ao_copy_mkts_to_user:do_tcp_getsockopt:tcp_getsockopt:do_sock_getsockopt lockdep_rcu_suspicious:tcp_ao_finish_connect:tcp_finish_connect:tcp_rcv_synsent_state_process:tcp_rcv_state_process lockdep_rcu_suspicious:tcp_ao_set_repair:do_tcp_setsockopt:do_sock_setsockopt:__sys_setsockopt