Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. syzkaller login: [ 56.872599][ T8429] [ 56.874939][ T8429] ===================================================== [ 56.874945][ T8429] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 56.874954][ T8429] 5.14.0-rc3-syzkaller #0 Not tainted [ 56.874962][ T8429] ----------------------------------------------------- [ 56.874966][ T8429] syz-executor328/8429 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 56.874984][ T8429] ffff888038b917b8 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x380 [ 56.875033][ T8429] [ 56.875033][ T8429] and this task is already holding: [ 56.875037][ T8429] ffff88803116f018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 56.875072][ T8429] which would create a new lock dependency: [ 56.875076][ T8429] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 56.875109][ T8429] [ 56.875109][ T8429] but this new dependency connects a HARDIRQ-irq-safe lock: [ 56.875115][ T8429] (&dev->event_lock){-...}-{2:2} [ 56.875130][ T8429] [ 56.875130][ T8429] ... which became HARDIRQ-irq-safe at: [ 56.970910][ T8429] lock_acquire+0x1ab/0x510 [ 56.970934][ T8429] _raw_spin_lock_irqsave+0x39/0x50 [ 56.970967][ T8429] input_event+0x7b/0xb0 [ 56.970981][ T8429] psmouse_report_standard_buttons+0x2c/0x80 [ 56.971000][ T8429] psmouse_process_byte+0x1e1/0x890 [ 56.971018][ T8429] psmouse_handle_byte+0x41/0x1b0 [ 56.971036][ T8429] psmouse_interrupt+0x304/0xf00 [ 56.971053][ T8429] serio_interrupt+0x88/0x150 [ 56.971069][ T8429] i8042_interrupt+0x27a/0x520 [ 56.971084][ T8429] __handle_irq_event_percpu+0x303/0x8f0 [ 56.971101][ T8429] handle_irq_event+0x102/0x280 [ 57.027395][ T8429] handle_edge_irq+0x25f/0xd00 [ 57.027422][ T8429] __common_interrupt+0x9d/0x210 [ 57.027439][ T8429] common_interrupt+0x9f/0xd0 [ 57.027456][ T8429] asm_common_interrupt+0x1e/0x40 [ 57.027470][ T8429] _raw_spin_unlock_irqrestore+0x38/0x70 [ 57.027489][ T8429] i8042_command+0x12e/0x150 [ 57.027506][ T8429] i8042_aux_write+0xd7/0x120 [ 57.063068][ T8429] ps2_do_sendbyte+0x2cf/0x710 [ 57.063096][ T8429] ps2_sendbyte+0x58/0x150 [ 57.063111][ T8429] cypress_ps2_sendbyte+0x2e/0x160 [ 57.063128][ T8429] cypress_send_ext_cmd+0x1d0/0x8e0 [ 57.063144][ T8429] cypress_detect+0x75/0x190 [ 57.063158][ T8429] psmouse_try_protocol+0x211/0x370 [ 57.063177][ T8429] psmouse_extensions+0x557/0x930 [ 57.063195][ T8429] psmouse_switch_protocol+0x52a/0x740 [ 57.063213][ T8429] psmouse_connect+0x5e9/0xfd0 [ 57.063226][ T8429] serio_driver_probe+0x72/0xa0 [ 57.063241][ T8429] really_probe+0x23c/0xcd0 [ 57.063259][ T8429] __driver_probe_device+0x338/0x4d0 [ 57.124182][ T8429] driver_probe_device+0x4c/0x1a0 [ 57.124208][ T8429] __driver_attach+0x22d/0x4e0 [ 57.124224][ T8429] bus_for_each_dev+0x147/0x1d0 [ 57.124240][ T8429] serio_handle_event+0x5f6/0xa30 [ 57.124257][ T8429] process_one_work+0x98d/0x1630 [ 57.124276][ T8429] worker_thread+0x658/0x11f0 [ 57.124292][ T8429] kthread+0x3e5/0x4d0 [ 57.158170][ T8429] ret_from_fork+0x1f/0x30 [ 57.158195][ T8429] [ 57.158195][ T8429] to a HARDIRQ-irq-unsafe lock: [ 57.158201][ T8429] (&f->f_owner.lock){.+.+}-{2:2} [ 57.158217][ T8429] [ 57.158217][ T8429] ... which became HARDIRQ-irq-unsafe at: [ 57.158223][ T8429] ... [ 57.158225][ T8429] lock_acquire+0x1ab/0x510 [ 57.158240][ T8429] _raw_read_lock+0x5b/0x70 [ 57.158260][ T8429] f_getown+0x23/0x2a0 [ 57.158275][ T8429] sock_ioctl+0x4ba/0x6a0 [ 57.158293][ T8429] __x64_sys_ioctl+0x193/0x200 [ 57.158309][ T8429] do_syscall_64+0x35/0xb0 [ 57.158325][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.158339][ T8429] [ 57.158339][ T8429] other info that might help us debug this: [ 57.158339][ T8429] [ 57.158344][ T8429] Chain exists of: [ 57.158344][ T8429] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 57.158344][ T8429] [ 57.228657][ T8429] Possible interrupt unsafe locking scenario: [ 57.228657][ T8429] [ 57.228663][ T8429] CPU0 CPU1 [ 57.228667][ T8429] ---- ---- [ 57.228671][ T8429] lock(&f->f_owner.lock); [ 57.228681][ T8429] local_irq_disable(); [ 57.228685][ T8429] lock(&dev->event_lock); [ 57.228695][ T8429] lock(&new->fa_lock); [ 57.228705][ T8429] <Interrupt> [ 57.228708][ T8429] lock(&dev->event_lock); [ 57.228718][ T8429] [ 57.228718][ T8429] *** DEADLOCK *** [ 57.228718][ T8429] [ 57.228723][ T8429] 8 locks held by syz-executor328/8429: [ 57.228734][ T8429] #0: ffff8880216bb110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 57.317741][ T8429] #1: ffff8881472ca230 (&dev->event_lock){-...}-{2:2}, at: input_inject_event+0xa6/0x320 [ 57.327726][ T8429] #2: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x320 [ 57.337346][ T8429] #3: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x710 [ 57.347403][ T8429] #4: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3e0 [ 57.356682][ T8429] #5: ffff88801f203028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 57.367889][ T8429] #6: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 57.376904][ T8429] #7: ffff88803116f018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 57.386008][ T8429] [ 57.386008][ T8429] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 57.396386][ T8429] -> (&dev->event_lock){-...}-{2:2} { [ 57.401913][ T8429] IN-HARDIRQ-W at: [ 57.406035][ T8429] lock_acquire+0x1ab/0x510 [ 57.412508][ T8429] _raw_spin_lock_irqsave+0x39/0x50 [ 57.419679][ T8429] input_event+0x7b/0xb0 [ 57.425894][ T8429] psmouse_report_standard_buttons+0x2c/0x80 [ 57.433939][ T8429] psmouse_process_byte+0x1e1/0x890 [ 57.441302][ T8429] psmouse_handle_byte+0x41/0x1b0 [ 57.448302][ T8429] psmouse_interrupt+0x304/0xf00 [ 57.455220][ T8429] serio_interrupt+0x88/0x150 [ 57.461868][ T8429] i8042_interrupt+0x27a/0x520 [ 57.468603][ T8429] __handle_irq_event_percpu+0x303/0x8f0 [ 57.476379][ T8429] handle_irq_event+0x102/0x280 [ 57.483286][ T8429] handle_edge_irq+0x25f/0xd00 [ 57.490293][ T8429] __common_interrupt+0x9d/0x210 [ 57.497408][ T8429] common_interrupt+0x9f/0xd0 [ 57.504059][ T8429] asm_common_interrupt+0x1e/0x40 [ 57.511052][ T8429] _raw_spin_unlock_irqrestore+0x38/0x70 [ 57.518656][ T8429] i8042_command+0x12e/0x150 [ 57.525510][ T8429] i8042_aux_write+0xd7/0x120 [ 57.532165][ T8429] ps2_do_sendbyte+0x2cf/0x710 [ 57.538900][ T8429] ps2_sendbyte+0x58/0x150 [ 57.545292][ T8429] cypress_ps2_sendbyte+0x2e/0x160 [ 57.552375][ T8429] cypress_send_ext_cmd+0x1d0/0x8e0 [ 57.559541][ T8429] cypress_detect+0x75/0x190 [ 57.566473][ T8429] psmouse_try_protocol+0x211/0x370 [ 57.574002][ T8429] psmouse_extensions+0x557/0x930 [ 57.581184][ T8429] psmouse_switch_protocol+0x52a/0x740 [ 57.588621][ T8429] psmouse_connect+0x5e9/0xfd0 [ 57.595368][ T8429] serio_driver_probe+0x72/0xa0 [ 57.602197][ T8429] really_probe+0x23c/0xcd0 [ 57.608676][ T8429] __driver_probe_device+0x338/0x4d0 [ 57.615937][ T8429] driver_probe_device+0x4c/0x1a0 [ 57.622933][ T8429] __driver_attach+0x22d/0x4e0 [ 57.629669][ T8429] bus_for_each_dev+0x147/0x1d0 [ 57.636774][ T8429] serio_handle_event+0x5f6/0xa30 [ 57.643773][ T8429] process_one_work+0x98d/0x1630 [ 57.650685][ T8429] worker_thread+0x658/0x11f0 [ 57.657330][ T8429] kthread+0x3e5/0x4d0 [ 57.663368][ T8429] ret_from_fork+0x1f/0x30 [ 57.669759][ T8429] INITIAL USE at: [ 57.673795][ T8429] lock_acquire+0x1ab/0x510 [ 57.680187][ T8429] _raw_spin_lock_irqsave+0x39/0x50 [ 57.687359][ T8429] input_inject_event+0xa6/0x320 [ 57.694268][ T8429] led_set_brightness_nosleep+0xe6/0x1a0 [ 57.701870][ T8429] led_set_brightness+0x134/0x170 [ 57.708775][ T8429] led_trigger_event+0x75/0xd0 [ 57.715504][ T8429] kbd_led_trigger_activate+0xc9/0x100 [ 57.722846][ T8429] led_trigger_set+0x61e/0xbd0 [ 57.729490][ T8429] led_trigger_set_default+0x1a6/0x230 [ 57.737016][ T8429] led_classdev_register_ext+0x5b1/0x7c0 [ 57.744532][ T8429] input_leds_connect+0x4bd/0x860 [ 57.751525][ T8429] input_attach_handler+0x180/0x1f0 [ 57.758606][ T8429] input_register_device.cold+0xf0/0x304 [ 57.766121][ T8429] atkbd_connect+0x739/0xa00 [ 57.772594][ T8429] serio_driver_probe+0x72/0xa0 [ 57.779326][ T8429] really_probe+0x23c/0xcd0 [ 57.785713][ T8429] __driver_probe_device+0x338/0x4d0 [ 57.792880][ T8429] driver_probe_device+0x4c/0x1a0 [ 57.799785][ T8429] __driver_attach+0x22d/0x4e0 [ 57.806434][ T8429] bus_for_each_dev+0x147/0x1d0 [ 57.813167][ T8429] serio_handle_event+0x5f6/0xa30 [ 57.820194][ T8429] process_one_work+0x98d/0x1630 [ 57.827021][ T8429] worker_thread+0x658/0x11f0 [ 57.833582][ T8429] kthread+0x3e5/0x4d0 [ 57.839534][ T8429] ret_from_fork+0x1f/0x30 [ 57.845835][ T8429] } [ 57.848476][ T8429] ... key at: [<ffffffff90535e60>] __key.8+0x0/0x40 [ 57.855735][ T8429] -> (&client->buffer_lock){....}-{2:2} { [ 57.861524][ T8429] INITIAL USE at: [ 57.865471][ T8429] lock_acquire+0x1ab/0x510 [ 57.871683][ T8429] _raw_spin_lock+0x2a/0x40 [ 57.878163][ T8429] evdev_pass_values.part.0+0xf6/0x970 [ 57.885333][ T8429] evdev_events+0x359/0x3e0 [ 57.891543][ T8429] input_to_handler+0x2a0/0x4c0 [ 57.898101][ T8429] input_pass_values.part.0+0x230/0x710 [ 57.905355][ T8429] input_handle_event+0x373/0x1440 [ 57.912174][ T8429] input_inject_event+0x1bd/0x320 [ 57.918904][ T8429] evdev_write+0x430/0x760 [ 57.925031][ T8429] vfs_write+0x28e/0xa40 [ 57.930985][ T8429] ksys_write+0x1ee/0x250 [ 57.937024][ T8429] do_syscall_64+0x35/0xb0 [ 57.943148][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.950746][ T8429] } [ 57.953299][ T8429] ... key at: [<ffffffff905362e0>] __key.4+0x0/0x40 [ 57.960644][ T8429] ... acquired at: [ 57.964505][ T8429] _raw_spin_lock+0x2a/0x40 [ 57.969155][ T8429] evdev_pass_values.part.0+0xf6/0x970 [ 57.974889][ T8429] evdev_events+0x359/0x3e0 [ 57.979538][ T8429] input_to_handler+0x2a0/0x4c0 [ 57.984533][ T8429] input_pass_values.part.0+0x230/0x710 [ 57.990221][ T8429] input_handle_event+0x373/0x1440 [ 57.995476][ T8429] input_inject_event+0x1bd/0x320 [ 58.000644][ T8429] evdev_write+0x430/0x760 [ 58.005208][ T8429] vfs_write+0x28e/0xa40 [ 58.009595][ T8429] ksys_write+0x1ee/0x250 [ 58.014069][ T8429] do_syscall_64+0x35/0xb0 [ 58.018632][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.024667][ T8429] [ 58.026961][ T8429] -> (&new->fa_lock){....}-{2:2} { [ 58.032050][ T8429] INITIAL READ USE at: [ 58.036346][ T8429] lock_acquire+0x1ab/0x510 [ 58.042820][ T8429] _raw_read_lock+0x5b/0x70 [ 58.049293][ T8429] kill_fasync+0x132/0x460 [ 58.055679][ T8429] evdev_pass_values.part.0+0x64e/0x970 [ 58.063193][ T8429] evdev_events+0x359/0x3e0 [ 58.069662][ T8429] input_to_handler+0x2a0/0x4c0 [ 58.076483][ T8429] input_pass_values.part.0+0x230/0x710 [ 58.084195][ T8429] input_handle_event+0x373/0x1440 [ 58.091275][ T8429] input_inject_event+0x1bd/0x320 [ 58.098279][ T8429] evdev_write+0x430/0x760 [ 58.104669][ T8429] vfs_write+0x28e/0xa40 [ 58.110885][ T8429] ksys_write+0x1ee/0x250 [ 58.117183][ T8429] do_syscall_64+0x35/0xb0 [ 58.123569][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.131431][ T8429] } [ 58.133900][ T8429] ... key at: [<ffffffff90290080>] __key.0+0x0/0x40 [ 58.140986][ T8429] ... acquired at: [ 58.144755][ T8429] _raw_read_lock+0x5b/0x70 [ 58.149405][ T8429] kill_fasync+0x132/0x460 [ 58.153969][ T8429] evdev_pass_values.part.0+0x64e/0x970 [ 58.159659][ T8429] evdev_events+0x359/0x3e0 [ 58.164307][ T8429] input_to_handler+0x2a0/0x4c0 [ 58.169303][ T8429] input_pass_values.part.0+0x230/0x710 [ 58.174991][ T8429] input_handle_event+0x373/0x1440 [ 58.180246][ T8429] input_inject_event+0x1bd/0x320 [ 58.185633][ T8429] evdev_write+0x430/0x760 [ 58.190195][ T8429] vfs_write+0x28e/0xa40 [ 58.194584][ T8429] ksys_write+0x1ee/0x250 [ 58.199059][ T8429] do_syscall_64+0x35/0xb0 [ 58.203622][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.209658][ T8429] [ 58.211951][ T8429] [ 58.211951][ T8429] the dependencies between the lock to be acquired [ 58.211956][ T8429] and HARDIRQ-irq-unsafe lock: [ 58.225416][ T8429] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 58.230768][ T8429] HARDIRQ-ON-R at: [ 58.234717][ T8429] lock_acquire+0x1ab/0x510 [ 58.240856][ T8429] _raw_read_lock+0x5b/0x70 [ 58.246998][ T8429] f_getown+0x23/0x2a0 [ 58.252699][ T8429] sock_ioctl+0x4ba/0x6a0 [ 58.258657][ T8429] __x64_sys_ioctl+0x193/0x200 [ 58.265050][ T8429] do_syscall_64+0x35/0xb0 [ 58.271293][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.278811][ T8429] SOFTIRQ-ON-R at: [ 58.282930][ T8429] lock_acquire+0x1ab/0x510 [ 58.289056][ T8429] _raw_read_lock+0x5b/0x70 [ 58.295374][ T8429] f_getown+0x23/0x2a0 [ 58.301069][ T8429] sock_ioctl+0x4ba/0x6a0 [ 58.307025][ T8429] __x64_sys_ioctl+0x193/0x200 [ 58.313413][ T8429] do_syscall_64+0x35/0xb0 [ 58.319544][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.327061][ T8429] INITIAL READ USE at: [ 58.331362][ T8429] lock_acquire+0x1ab/0x510 [ 58.337841][ T8429] _raw_read_lock+0x5b/0x70 [ 58.344321][ T8429] f_getown+0x23/0x2a0 [ 58.350886][ T8429] sock_ioctl+0x4ba/0x6a0 [ 58.357190][ T8429] __x64_sys_ioctl+0x193/0x200 [ 58.364072][ T8429] do_syscall_64+0x35/0xb0 [ 58.370459][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.378320][ T8429] } [ 58.380788][ T8429] ... key at: [<ffffffff9028f2a0>] __key.5+0x0/0x40 [ 58.387876][ T8429] ... acquired at: [ 58.391645][ T8429] lock_acquire+0x1ab/0x510 [ 58.396451][ T8429] _raw_read_lock_irqsave+0x70/0x90 [ 58.401985][ T8429] send_sigio+0x24/0x380 [ 58.406375][ T8429] kill_fasync+0x1ec/0x460 [ 58.410937][ T8429] evdev_pass_values.part.0+0x64e/0x970 [ 58.416816][ T8429] evdev_events+0x359/0x3e0 [ 58.421553][ T8429] input_to_handler+0x2a0/0x4c0 [ 58.426551][ T8429] input_pass_values.part.0+0x230/0x710 [ 58.432421][ T8429] input_handle_event+0x373/0x1440 [ 58.437675][ T8429] input_inject_event+0x1bd/0x320 [ 58.442843][ T8429] evdev_write+0x430/0x760 [ 58.447405][ T8429] vfs_write+0x28e/0xa40 [ 58.451793][ T8429] ksys_write+0x1ee/0x250 [ 58.456278][ T8429] do_syscall_64+0x35/0xb0 [ 58.460845][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.466882][ T8429] [ 58.469460][ T8429] [ 58.469460][ T8429] stack backtrace: [ 58.475315][ T8429] CPU: 0 PID: 8429 Comm: syz-executor328 Not tainted 5.14.0-rc3-syzkaller #0 [ 58.484640][ T8429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 58.494669][ T8429] Call Trace: [ 58.497928][ T8429] dump_stack_lvl+0xcd/0x134 [ 58.502502][ T8429] check_irq_usage.cold+0x4c1/0x6b0 [ 58.507777][ T8429] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 58.514867][ T8429] ? kernel_text_address+0xbd/0xf0 [ 58.519955][ T8429] ? check_path.constprop.0+0x24/0x50 [ 58.525303][ T8429] ? register_lock_class+0xb7/0x10c0 [ 58.530565][ T8429] ? stack_trace_save+0x8c/0xc0 [ 58.535389][ T8429] ? lockdep_lock+0xc6/0x200 [ 58.539954][ T8429] ? call_rcu_zapped+0xb0/0xb0 [ 58.544693][ T8429] __lock_acquire+0x2a1f/0x54a0 [ 58.549518][ T8429] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 58.555469][ T8429] lock_acquire+0x1ab/0x510 [ 58.559945][ T8429] ? send_sigio+0x24/0x380 [ 58.564335][ T8429] ? lock_release+0x720/0x720 [ 58.568981][ T8429] ? lock_release+0x720/0x720 [ 58.573628][ T8429] ? lock_release+0x720/0x720 [ 58.578274][ T8429] _raw_read_lock_irqsave+0x70/0x90 [ 58.583447][ T8429] ? send_sigio+0x24/0x380 [ 58.587836][ T8429] send_sigio+0x24/0x380 [ 58.592053][ T8429] kill_fasync+0x1ec/0x460 [ 58.596441][ T8429] evdev_pass_values.part.0+0x64e/0x970 [ 58.601963][ T8429] ? evdev_release+0x410/0x410 [ 58.606698][ T8429] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 58.612391][ T8429] evdev_events+0x359/0x3e0 [ 58.616868][ T8429] ? evdev_pass_values.part.0+0x970/0x970 [ 58.622560][ T8429] input_to_handler+0x2a0/0x4c0 [ 58.627386][ T8429] input_pass_values.part.0+0x230/0x710 [ 58.632904][ T8429] input_handle_event+0x373/0x1440 [ 58.637989][ T8429] input_inject_event+0x1bd/0x320 [ 58.642984][ T8429] evdev_write+0x430/0x760 [ 58.647371][ T8429] ? evdev_read+0xe40/0xe40 [ 58.651846][ T8429] ? security_file_permission+0x248/0x560 [ 58.657541][ T8429] ? evdev_read+0xe40/0xe40 [ 58.662018][ T8429] vfs_write+0x28e/0xa40 [ 58.666238][ T8429] ksys_write+0x1ee/0x250 [ 58.670539][ T8429] ? __ia32_sys_read+0xb0/0xb0 [ 58.675274][ T8429] ? syscall_enter_from_user_mode+0x21/0x70 [ 58.681142][ T8429] do_syscall_64+0x35/0xb0 [ 58.685529][ T8429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 58.691392][ T8429] RIP: 0033:0x443509 [ 58.695255][ T8429] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 58.715173][ T8429] RSP: 002b:00007ffc7ad908b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 58.723559][ T8429] RAX: ffffffffffffffda RBX: 00000000004004a0 RCX: 000000000044