[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.87' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 56.137725][ T8422] [ 56.140067][ T8422] ===================================================== [ 56.140077][ T8422] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 56.140086][ T8422] 5.14.0-rc4-syzkaller #0 Not tainted [ 56.140094][ T8422] ----------------------------------------------------- [ 56.140098][ T8422] syz-executor683/8422 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 56.140115][ T8422] ffff888024a3d7b8 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x380 [ 56.140161][ T8422] [ 56.140161][ T8422] and this task is already holding: [ 56.140164][ T8422] ffff888034d66018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 56.140198][ T8422] which would create a new lock dependency: [ 56.140202][ T8422] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 56.140234][ T8422] [ 56.140234][ T8422] but this new dependency connects a HARDIRQ-irq-safe lock: [ 56.140240][ T8422] (&dev->event_lock){-.-.}-{2:2} [ 56.140254][ T8422] [ 56.140254][ T8422] ... which became HARDIRQ-irq-safe at: [ 56.238676][ T8422] lock_acquire+0x1ab/0x510 [ 56.238699][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 56.238726][ T8422] input_event+0x7b/0xb0 [ 56.238740][ T8422] psmouse_report_standard_buttons+0x2c/0x80 [ 56.238755][ T8422] psmouse_process_byte+0x1e1/0x890 [ 56.238768][ T8422] psmouse_handle_byte+0x41/0x1b0 [ 56.238785][ T8422] psmouse_interrupt+0x304/0xf00 [ 56.238798][ T8422] serio_interrupt+0x88/0x150 [ 56.238813][ T8422] i8042_interrupt+0x27a/0x520 [ 56.238829][ T8422] __handle_irq_event_percpu+0x303/0x8f0 [ 56.238845][ T8422] handle_irq_event+0x102/0x280 [ 56.238860][ T8422] handle_edge_irq+0x25f/0xd00 [ 56.299518][ T8422] __common_interrupt+0x9d/0x210 [ 56.299545][ T8422] common_interrupt+0x9f/0xd0 [ 56.299562][ T8422] asm_common_interrupt+0x1e/0x40 [ 56.299576][ T8422] _raw_spin_unlock_irqrestore+0x38/0x70 [ 56.299589][ T8422] debug_check_no_obj_freed+0x20c/0x420 [ 56.299605][ T8422] slab_free_freelist_hook+0x171/0x240 [ 56.299620][ T8422] kmem_cache_free+0x8a/0x5b0 [ 56.299635][ T8422] __put_task_struct+0x26f/0x400 [ 56.299652][ T8422] delayed_put_task_struct+0x1f6/0x340 [ 56.299667][ T8422] rcu_core+0x7ab/0x1380 [ 56.351207][ T8422] __do_softirq+0x29b/0x9c2 [ 56.351230][ T8422] run_ksoftirqd+0x2d/0x60 [ 56.351246][ T8422] smpboot_thread_fn+0x645/0x9c0 [ 56.351260][ T8422] kthread+0x3e5/0x4d0 [ 56.351275][ T8422] ret_from_fork+0x1f/0x30 [ 56.351291][ T8422] [ 56.351291][ T8422] to a HARDIRQ-irq-unsafe lock: [ 56.351297][ T8422] (&f->f_owner.lock){.+.+}-{2:2} [ 56.351313][ T8422] [ 56.351313][ T8422] ... which became HARDIRQ-irq-unsafe at: [ 56.351319][ T8422] ... [ 56.351321][ T8422] lock_acquire+0x1ab/0x510 [ 56.351335][ T8422] _raw_read_lock+0x5b/0x70 [ 56.351348][ T8422] do_fcntl+0x8af/0x1210 [ 56.351363][ T8422] __x64_sys_fcntl+0x165/0x1e0 [ 56.351378][ T8422] do_syscall_64+0x35/0xb0 [ 56.351393][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 56.351408][ T8422] [ 56.351408][ T8422] other info that might help us debug this: [ 56.351408][ T8422] [ 56.351413][ T8422] Chain exists of: [ 56.351413][ T8422] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 56.351413][ T8422] [ 56.435652][ T8422] Possible interrupt unsafe locking scenario: [ 56.435652][ T8422] [ 56.435657][ T8422] CPU0 CPU1 [ 56.435661][ T8422] ---- ---- [ 56.435664][ T8422] lock(&f->f_owner.lock); [ 56.435672][ T8422] local_irq_disable(); [ 56.435676][ T8422] lock(&dev->event_lock); [ 56.435686][ T8422] lock(&new->fa_lock); [ 56.435696][ T8422] [ 56.435698][ T8422] lock(&dev->event_lock); [ 56.435707][ T8422] [ 56.435707][ T8422] *** DEADLOCK *** [ 56.435707][ T8422] [ 56.435710][ T8422] 8 locks held by syz-executor683/8422: [ 56.435720][ T8422] #0: ffff888021e58110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 56.523629][ T8422] #1: ffff888021906230 (&dev->event_lock){-.-.}-{2:2}, at: input_inject_event+0xa6/0x320 [ 56.523680][ T8422] #2: ffffffff8b97c180 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x320 [ 56.523716][ T8422] #3: ffffffff8b97c180 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x710 [ 56.523753][ T8422] #4: ffffffff8b97c180 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3e0 [ 56.523790][ T8422] #5: ffff88802bcbe028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 56.523829][ T8422] #6: ffffffff8b97c180 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 56.523867][ T8422] #7: ffff888034d66018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 56.591452][ T8422] [ 56.591452][ T8422] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 56.591464][ T8422] -> (&dev->event_lock){-.-.}-{2:2} { [ 56.591487][ T8422] IN-HARDIRQ-W at: [ 56.591495][ T8422] lock_acquire+0x1ab/0x510 [ 56.591516][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 56.591531][ T8422] input_event+0x7b/0xb0 [ 56.591546][ T8422] psmouse_report_standard_buttons+0x2c/0x80 [ 56.591561][ T8422] psmouse_process_byte+0x1e1/0x890 [ 56.591575][ T8422] psmouse_handle_byte+0x41/0x1b0 [ 56.653553][ T8422] psmouse_interrupt+0x304/0xf00 [ 56.653576][ T8422] serio_interrupt+0x88/0x150 [ 56.653592][ T8422] i8042_interrupt+0x27a/0x520 [ 56.653608][ T8422] __handle_irq_event_percpu+0x303/0x8f0 [ 56.653627][ T8422] handle_irq_event+0x102/0x280 [ 56.653642][ T8422] handle_edge_irq+0x25f/0xd00 [ 56.653658][ T8422] __common_interrupt+0x9d/0x210 [ 56.653676][ T8422] common_interrupt+0x9f/0xd0 [ 56.653694][ T8422] asm_common_interrupt+0x1e/0x40 [ 56.653708][ T8422] _raw_spin_unlock_irqrestore+0x38/0x70 [ 56.653722][ T8422] debug_check_no_obj_freed+0x20c/0x420 [ 56.653739][ T8422] slab_free_freelist_hook+0x171/0x240 [ 56.653755][ T8422] kmem_cache_free+0x8a/0x5b0 [ 56.653770][ T8422] __put_task_struct+0x26f/0x400 [ 56.653787][ T8422] delayed_put_task_struct+0x1f6/0x340 [ 56.653803][ T8422] rcu_core+0x7ab/0x1380 [ 56.765900][ T8422] __do_softirq+0x29b/0x9c2 [ 56.765926][ T8422] run_ksoftirqd+0x2d/0x60 [ 56.765943][ T8422] smpboot_thread_fn+0x645/0x9c0 [ 56.765959][ T8422] kthread+0x3e5/0x4d0 [ 56.765974][ T8422] ret_from_fork+0x1f/0x30 [ 56.765991][ T8422] IN-SOFTIRQ-W at: [ 56.766001][ T8422] lock_acquire+0x1ab/0x510 [ 56.766016][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 56.816084][ T8422] input_event+0x7b/0xb0 [ 56.822514][ T8422] psmouse_report_standard_buttons+0x2c/0x80 [ 56.830668][ T8422] psmouse_process_byte+0x1e1/0x890 [ 56.838092][ T8422] psmouse_handle_byte+0x41/0x1b0 [ 56.845101][ T8422] psmouse_interrupt+0x304/0xf00 [ 56.852596][ T8422] serio_interrupt+0x88/0x150 [ 56.859348][ T8422] i8042_interrupt+0x27a/0x520 [ 56.866216][ T8422] __handle_irq_event_percpu+0x303/0x8f0 [ 56.873832][ T8422] handle_irq_event+0x102/0x280 [ 56.880746][ T8422] handle_edge_irq+0x25f/0xd00 [ 56.887491][ T8422] __common_interrupt+0x9d/0x210 [ 56.894412][ T8422] common_interrupt+0x9f/0xd0 [ 56.901315][ T8422] asm_common_interrupt+0x1e/0x40 [ 56.908326][ T8422] _raw_spin_unlock_irqrestore+0x38/0x70 [ 56.915940][ T8422] debug_check_no_obj_freed+0x20c/0x420 [ 56.923551][ T8422] slab_free_freelist_hook+0x171/0x240 [ 56.931145][ T8422] kmem_cache_free+0x8a/0x5b0 [ 56.937811][ T8422] __put_task_struct+0x26f/0x400 [ 56.944913][ T8422] delayed_put_task_struct+0x1f6/0x340 [ 56.952449][ T8422] rcu_core+0x7ab/0x1380 [ 56.958672][ T8422] __do_softirq+0x29b/0x9c2 [ 56.965158][ T8422] run_ksoftirqd+0x2d/0x60 [ 56.971552][ T8422] smpboot_thread_fn+0x645/0x9c0 [ 56.978473][ T8422] kthread+0x3e5/0x4d0 [ 56.984527][ T8422] ret_from_fork+0x1f/0x30 [ 56.990927][ T8422] INITIAL USE at: [ 56.994970][ T8422] lock_acquire+0x1ab/0x510 [ 57.001449][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 57.008687][ T8422] input_inject_event+0xa6/0x320 [ 57.015611][ T8422] led_set_brightness_nosleep+0xe6/0x1a0 [ 57.023138][ T8422] led_set_brightness+0x134/0x170 [ 57.030064][ T8422] led_trigger_event+0x75/0xd0 [ 57.036731][ T8422] kbd_led_trigger_activate+0xc9/0x100 [ 57.044178][ T8422] led_trigger_set+0x61e/0xbd0 [ 57.050834][ T8422] led_trigger_set_default+0x1a6/0x230 [ 57.058183][ T8422] led_classdev_register_ext+0x5b1/0x7c0 [ 57.065716][ T8422] input_leds_connect+0x4bd/0x860 [ 57.072632][ T8422] input_attach_handler+0x180/0x1f0 [ 57.079724][ T8422] input_register_device.cold+0xf0/0x304 [ 57.087259][ T8422] atkbd_connect+0x739/0xa00 [ 57.093751][ T8422] serio_driver_probe+0x72/0xa0 [ 57.100493][ T8422] really_probe+0x23c/0xcd0 [ 57.106890][ T8422] __driver_probe_device+0x338/0x4d0 [ 57.114158][ T8422] driver_probe_device+0x4c/0x1a0 [ 57.121078][ T8422] __driver_attach+0x22d/0x4e0 [ 57.127735][ T8422] bus_for_each_dev+0x147/0x1d0 [ 57.134622][ T8422] serio_handle_event+0x5f6/0xa30 [ 57.141625][ T8422] process_one_work+0x98d/0x1630 [ 57.148458][ T8422] worker_thread+0x658/0x11f0 [ 57.155033][ T8422] kthread+0x3e5/0x4d0 [ 57.160995][ T8422] ret_from_fork+0x1f/0x30 [ 57.167304][ T8422] } [ 57.169955][ T8422] ... key at: [] __key.8+0x0/0x40 [ 57.177396][ T8422] -> (&client->buffer_lock){....}-{2:2} { [ 57.183191][ T8422] INITIAL USE at: [ 57.187151][ T8422] lock_acquire+0x1ab/0x510 [ 57.193376][ T8422] _raw_spin_lock+0x2a/0x40 [ 57.199604][ T8422] evdev_pass_values.part.0+0xf6/0x970 [ 57.206791][ T8422] evdev_events+0x359/0x3e0 [ 57.213014][ T8422] input_to_handler+0x2a0/0x4c0 [ 57.219585][ T8422] input_pass_values.part.0+0x230/0x710 [ 57.226860][ T8422] input_handle_event+0x373/0x1440 [ 57.233690][ T8422] input_inject_event+0x1bd/0x320 [ 57.240514][ T8422] evdev_write+0x430/0x760 [ 57.246648][ T8422] vfs_write+0x28e/0xa40 [ 57.252611][ T8422] ksys_write+0x1ee/0x250 [ 57.258658][ T8422] do_syscall_64+0x35/0xb0 [ 57.264798][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.272494][ T8422] } [ 57.275055][ T8422] ... key at: [] __key.4+0x0/0x40 [ 57.282234][ T8422] ... acquired at: [ 57.286100][ T8422] _raw_spin_lock+0x2a/0x40 [ 57.290759][ T8422] evdev_pass_values.part.0+0xf6/0x970 [ 57.296460][ T8422] evdev_events+0x359/0x3e0 [ 57.301118][ T8422] input_to_handler+0x2a0/0x4c0 [ 57.306127][ T8422] input_pass_values.part.0+0x230/0x710 [ 57.311827][ T8422] input_handle_event+0x373/0x1440 [ 57.317178][ T8422] input_inject_event+0x1bd/0x320 [ 57.322361][ T8422] evdev_write+0x430/0x760 [ 57.326934][ T8422] vfs_write+0x28e/0xa40 [ 57.331336][ T8422] ksys_write+0x1ee/0x250 [ 57.335818][ T8422] do_syscall_64+0x35/0xb0 [ 57.340391][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.346440][ T8422] [ 57.348742][ T8422] -> (&new->fa_lock){....}-{2:2} { [ 57.353837][ T8422] INITIAL READ USE at: [ 57.358141][ T8422] lock_acquire+0x1ab/0x510 [ 57.364627][ T8422] _raw_read_lock+0x5b/0x70 [ 57.371107][ T8422] kill_fasync+0x132/0x460 [ 57.377502][ T8422] evdev_pass_values.part.0+0x64e/0x970 [ 57.385032][ T8422] evdev_events+0x359/0x3e0 [ 57.391519][ T8422] input_to_handler+0x2a0/0x4c0 [ 57.398360][ T8422] input_pass_values.part.0+0x230/0x710 [ 57.405893][ T8422] input_handle_event+0x373/0x1440 [ 57.412984][ T8422] input_inject_event+0x1bd/0x320 [ 57.419989][ T8422] evdev_write+0x430/0x760 [ 57.426396][ T8422] vfs_write+0x28e/0xa40 [ 57.432620][ T8422] ksys_write+0x1ee/0x250 [ 57.438931][ T8422] do_syscall_64+0x35/0xb0 [ 57.445420][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.453290][ T8422] } [ 57.455764][ T8422] ... key at: [] __key.0+0x0/0x40 [ 57.463029][ T8422] ... acquired at: [ 57.466806][ T8422] _raw_read_lock+0x5b/0x70 [ 57.471635][ T8422] kill_fasync+0x132/0x460 [ 57.476205][ T8422] evdev_pass_values.part.0+0x64e/0x970 [ 57.481922][ T8422] evdev_events+0x359/0x3e0 [ 57.486577][ T8422] input_to_handler+0x2a0/0x4c0 [ 57.491583][ T8422] input_pass_values.part.0+0x230/0x710 [ 57.497285][ T8422] input_handle_event+0x373/0x1440 [ 57.502552][ T8422] input_inject_event+0x1bd/0x320 [ 57.507733][ T8422] evdev_write+0x430/0x760 [ 57.512310][ T8422] vfs_write+0x28e/0xa40 [ 57.516713][ T8422] ksys_write+0x1ee/0x250 [ 57.521197][ T8422] do_syscall_64+0x35/0xb0 [ 57.525766][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.531813][ T8422] [ 57.534112][ T8422] [ 57.534112][ T8422] the dependencies between the lock to be acquired [ 57.534117][ T8422] and HARDIRQ-irq-unsafe lock: [ 57.547585][ T8422] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 57.553123][ T8422] HARDIRQ-ON-R at: [ 57.557081][ T8422] lock_acquire+0x1ab/0x510 [ 57.563218][ T8422] _raw_read_lock+0x5b/0x70 [ 57.569500][ T8422] do_fcntl+0x8af/0x1210 [ 57.575380][ T8422] __x64_sys_fcntl+0x165/0x1e0 [ 57.581773][ T8422] do_syscall_64+0x35/0xb0 [ 57.587825][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.595527][ T8422] SOFTIRQ-ON-R at: [ 57.599489][ T8422] lock_acquire+0x1ab/0x510 [ 57.605624][ T8422] _raw_read_lock+0x5b/0x70 [ 57.611759][ T8422] do_fcntl+0x8af/0x1210 [ 57.617636][ T8422] __x64_sys_fcntl+0x165/0x1e0 [ 57.624036][ T8422] do_syscall_64+0x35/0xb0 [ 57.630082][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.637781][ T8422] INITIAL READ USE at: [ 57.642082][ T8422] lock_acquire+0x1ab/0x510 [ 57.648571][ T8422] _raw_read_lock+0x5b/0x70 [ 57.655056][ T8422] do_fcntl+0x8af/0x1210 [ 57.661276][ T8422] __x64_sys_fcntl+0x165/0x1e0 [ 57.668020][ T8422] do_syscall_64+0x35/0xb0 [ 57.674420][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.682816][ T8422] } [ 57.685296][ T8422] ... key at: [] __key.5+0x0/0x40 [ 57.692393][ T8422] ... acquired at: [ 57.696174][ T8422] lock_acquire+0x1ab/0x510 [ 57.700924][ T8422] _raw_read_lock_irqsave+0x70/0x90 [ 57.706523][ T8422] send_sigio+0x24/0x380 [ 57.710921][ T8422] kill_fasync+0x1ec/0x460 [ 57.715572][ T8422] evdev_pass_values.part.0+0x64e/0x970 [ 57.721271][ T8422] evdev_events+0x359/0x3e0 [ 57.725927][ T8422] input_to_handler+0x2a0/0x4c0 [ 57.730933][ T8422] input_pass_values.part.0+0x230/0x710 [ 57.736717][ T8422] input_handle_event+0x373/0x1440 [ 57.741980][ T8422] input_inject_event+0x1bd/0x320 [ 57.747157][ T8422] evdev_write+0x430/0x760 [ 57.751728][ T8422] vfs_write+0x28e/0xa40 [ 57.756124][ T8422] ksys_write+0x1ee/0x250 [ 57.760604][ T8422] do_syscall_64+0x35/0xb0 [ 57.765379][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.771842][ T8422] [ 57.774145][ T8422] [ 57.774145][ T8422] stack backtrace: [ 57.780005][ T8422] CPU: 1 PID: 8422 Comm: syz-executor683 Not tainted 5.14.0-rc4-syzkaller #0 [ 57.788925][ T8422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 57.798967][ T8422] Call Trace: [ 57.802233][ T8422] dump_stack_lvl+0xcd/0x134 [ 57.806811][ T8422] check_irq_usage.cold+0x4c1/0x6b0 [ 57.812006][ T8422] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 57.819106][ T8422] ? kernel_text_address+0xbd/0xf0 [ 57.824208][ T8422] ? check_path.constprop.0+0x24/0x50 [ 57.829562][ T8422] ? register_lock_class+0xb7/0x10c0 [ 57.834830][ T8422] ? stack_trace_save+0x8c/0xc0 [ 57.839726][ T8422] ? lockdep_lock+0xc6/0x200 [ 57.844299][ T8422] ? call_rcu_zapped+0xb0/0xb0 [ 57.849049][ T8422] __lock_acquire+0x2a1f/0x54a0 [ 57.853884][ T8422] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 57.859842][ T8422] lock_acquire+0x1ab/0x510 [ 57.864411][ T8422] ? send_sigio+0x24/0x380 [ 57.868810][ T8422] ? lock_release+0x720/0x720 [ 57.873549][ T8422] ? lock_release+0x720/0x720 [ 57.878200][ T8422] ? lock_release+0x720/0x720 [ 57.882852][ T8422] _raw_read_lock_irqsave+0x70/0x90 [ 57.888033][ T8422] ? send_sigio+0x24/0x380 [ 57.892441][ T8422] send_sigio+0x24/0x380 [ 57.896754][ T8422] kill_fasync+0x1ec/0x460 [ 57.901153][ T8422] evdev_pass_values.part.0+0x64e/0x970 [ 57.906683][ T8422] ? evdev_release+0x410/0x410 [ 57.911432][ T8422] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 57.917136][ T8422] evdev_events+0x359/0x3e0 [ 57.921624][ T8422] ? evdev_pass_values.part.0+0x970/0x970 [ 57.927328][ T8422] input_to_handler+0x2a0/0x4c0 [ 57.932170][ T8422] input_pass_values.part.0+0x230/0x710 [ 57.937700][ T8422] input_handle_event+0x373/0x1440 [ 57.942889][ T8422] input_inject_event+0x1bd/0x320 [ 57.947903][ T8422] evdev_write+0x430/0x760 [ 57.952308][ T8422] ? evdev_read+0xe40/0xe40 [ 57.956794][ T8422] ? security_file_permission+0x248/0x560 [ 57.962497][ T8422] ? evdev_read+0xe40/0xe40 [ 57.966983][ T8422] vfs_write+0x28e/0xa40 [ 57.971212][ T8422] ksys_write+0x1ee/0x250 [ 57.975521][ T8422] ? __ia32_sys_read+0xb0/0xb0 [ 57.980266][ T8422] ? syscall_enter_from_user_mode+0x21/0x70 [ 57.986142][ T8422] do_syscall_64+0x35/0xb0 [ 57.990539][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 57.996501][ T8422] RIP: 0033:0x443519 [ 58.000374][ T8422] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 58.020312][ T8422] RSP: 002b:00007fffba359338 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 58.028713][ T8422] RAX: ffffffffffffffda RBX: 00000000004004a0 RCX: 0000000000443519 [ 58.036674][ T8422] RDX: 0000000000000373 RSI: 0000000020000040 RDI: 0000000000000004 [ 58.044712][