[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.202' (ECDSA) to the list of known hosts. syzkaller login: [ 33.987941] IPVS: ftp: loaded support on port[0] = 21 [ 34.056113] chnl_net:caif_netlink_parms(): no params data found [ 34.128136] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.134815] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.143104] device bridge_slave_0 entered promiscuous mode [ 34.151035] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.157423] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.164829] device bridge_slave_1 entered promiscuous mode [ 34.181735] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 34.190895] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 34.209651] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 34.217547] team0: Port device team_slave_0 added [ 34.223639] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 34.231351] team0: Port device team_slave_1 added [ 34.247069] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 34.253335] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.279451] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 34.291522] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 34.297759] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 34.323899] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 34.334800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 34.342473] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 34.361887] device hsr_slave_0 entered promiscuous mode [ 34.367575] device hsr_slave_1 entered promiscuous mode [ 34.374161] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 34.381647] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 34.445611] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.452035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.458787] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.465227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.495456] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 34.502604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.511661] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 34.520310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 34.528190] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.535640] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.542834] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 34.554236] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 34.560484] 8021q: adding VLAN 0 to HW filter on device team0 [ 34.569223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 34.578695] bridge0: port 1(bridge_slave_0) entered blocking state [ 34.585095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 34.594575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 34.602533] bridge0: port 2(bridge_slave_1) entered blocking state [ 34.608939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 34.624133] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 34.631792] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 34.646708] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 34.657086] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 34.668261] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 34.676409] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 34.684537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 34.692379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 34.700074] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 34.711579] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 34.720084] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 34.726721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 34.736893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 34.750268] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 34.760428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 34.789045] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 34.796378] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 34.803680] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 34.812712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 34.821855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 34.828665] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 34.837400] device veth0_vlan entered promiscuous mode [ 34.845828] device veth1_vlan entered promiscuous mode [ 34.852388] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 34.858738] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 34.868603] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 34.880819] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 34.889955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 34.897159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 34.906656] device veth0_macvtap entered promiscuous mode [ 34.913009] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 34.921285] device veth1_macvtap entered promiscuous mode [ 34.929325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 34.938333] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 34.948583] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 34.956159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 34.964449] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 34.973618] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 34.981298] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 35.064430] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 35.092760] [ 35.094384] ===================================================== [ 35.100589] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 35.107317] 4.19.163-syzkaller #0 Not tainted [ 35.111802] ----------------------------------------------------- [ 35.118011] syz-executor054/8110 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: [ 35.125344] 000000003cefc050 (hugetlb_lock){+.+.}, at: free_huge_page+0x482/0xd20 [ 35.132951] [ 35.132951] and this task is already holding: [ 35.138897] 0000000077f5c83e (slock-AF_INET){+.-.}, at: tcp_close+0x5bd/0xfd0 [ 35.146153] which would create a new lock dependency: [ 35.151328] (slock-AF_INET){+.-.} -> (hugetlb_lock){+.+.} [ 35.156931] [ 35.156931] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 35.164959] (slock-AF_INET){+.-.} [ 35.164965] [ 35.164965] ... which became SOFTIRQ-irq-safe at: [ 35.174776] _raw_spin_lock+0x2a/0x40 [ 35.178644] sk_clone_lock+0x40b/0x1430 [ 35.182683] inet_csk_clone_lock+0x1f/0x3e0 [ 35.187087] tcp_create_openreq_child+0x2c/0x19f0 [ 35.191991] tcp_v4_syn_recv_sock+0xb6/0x1030 [ 35.196546] tcp_check_req+0x601/0x16b0 [ 35.200583] tcp_v4_rcv+0x1e3c/0x3b80 [ 35.204450] ip_local_deliver_finish+0x495/0xc00 [ 35.209273] ip_local_deliver+0x188/0x500 [ 35.213485] ip_rcv_finish+0x1ca/0x2e0 [ 35.217434] ip_rcv+0xca/0x3c0 [ 35.220693] __netif_receive_skb_one_core+0x114/0x180 [ 35.225943] __netif_receive_skb+0x27/0x1c0 [ 35.230351] netif_receive_skb_internal+0xf0/0x3f0 [ 35.235343] napi_gro_receive+0x2e6/0x450 [ 35.239556] receive_buf+0xf1d/0x6120 [ 35.243416] virtnet_poll+0x568/0xd70 [ 35.247307] net_rx_action+0x4ac/0xfb0 [ 35.251255] __do_softirq+0x26c/0x9a0 [ 35.255119] run_ksoftirqd+0x57/0x110 [ 35.258991] smpboot_thread_fn+0x655/0x9e0 [ 35.263298] kthread+0x33f/0x460 [ 35.266726] ret_from_fork+0x24/0x30 [ 35.270500] [ 35.270500] to a SOFTIRQ-irq-unsafe lock: [ 35.276112] (hugetlb_lock){+.+.} [ 35.276118] [ 35.276118] ... which became SOFTIRQ-irq-unsafe at: [ 35.286017] ... [ 35.286028] _raw_spin_lock+0x2a/0x40 [ 35.291751] hugetlb_overcommit_handler+0x2d4/0x460 [ 35.296853] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 35.302102] __vfs_write+0xf7/0x770 [ 35.305788] vfs_write+0x1f3/0x540 [ 35.309406] ksys_write+0x12b/0x2a0 [ 35.313097] do_syscall_64+0xf9/0x620 [ 35.316959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.322216] [ 35.322216] other info that might help us debug this: [ 35.322216] [ 35.330333] Possible interrupt unsafe locking scenario: [ 35.330333] [ 35.337232] CPU0 CPU1 [ 35.341871] ---- ---- [ 35.346509] lock(hugetlb_lock); [ 35.349934] local_irq_disable(); [ 35.355964] lock(slock-AF_INET); [ 35.361996] lock(hugetlb_lock); [ 35.367947] [ 35.370727] lock(slock-AF_INET); [ 35.374430] [ 35.374430] *** DEADLOCK *** [ 35.374430] [ 35.380646] 3 locks held by syz-executor054/8110: [ 35.385478] #0: 000000009eeb8928 (&sb->s_type->i_mutex_key#13){+.+.}, at: __sock_release+0x86/0x2a0 [ 35.394761] #1: 00000000c5ed8102 (sk_lock-AF_INET){+.+.}, at: tcp_close+0x25/0xfd0 [ 35.402543] #2: 0000000077f5c83e (slock-AF_INET){+.-.}, at: tcp_close+0x5bd/0xfd0 [ 35.410237] [ 35.410237] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 35.419246] -> (slock-AF_INET){+.-.} ops: 6939 { [ 35.423987] HARDIRQ-ON-W at: [ 35.427251] _raw_spin_lock_bh+0x2f/0x40 [ 35.432986] lock_sock_nested+0x3b/0x110 [ 35.438696] inet_autobind+0x1a/0x190 [ 35.444149] inet_dgram_connect+0x245/0x2d0 [ 35.450137] __sys_connect+0x265/0x2c0 [ 35.455649] __x64_sys_connect+0x6f/0xb0 [ 35.461339] do_syscall_64+0xf9/0x620 [ 35.466782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.473592] IN-SOFTIRQ-W at: [ 35.476851] _raw_spin_lock+0x2a/0x40 [ 35.482279] sk_clone_lock+0x40b/0x1430 [ 35.487891] inet_csk_clone_lock+0x1f/0x3e0 [ 35.493837] tcp_create_openreq_child+0x2c/0x19f0 [ 35.500400] tcp_v4_syn_recv_sock+0xb6/0x1030 [ 35.506521] tcp_check_req+0x601/0x16b0 [ 35.512133] tcp_v4_rcv+0x1e3c/0x3b80 [ 35.517589] ip_local_deliver_finish+0x495/0xc00 [ 35.523971] ip_local_deliver+0x188/0x500 [ 35.529766] ip_rcv_finish+0x1ca/0x2e0 [ 35.535278] ip_rcv+0xca/0x3c0 [ 35.540113] __netif_receive_skb_one_core+0x114/0x180 [ 35.546928] __netif_receive_skb+0x27/0x1c0 [ 35.552878] netif_receive_skb_internal+0xf0/0x3f0 [ 35.559433] napi_gro_receive+0x2e6/0x450 [ 35.565206] receive_buf+0xf1d/0x6120 [ 35.570647] virtnet_poll+0x568/0xd70 [ 35.576075] net_rx_action+0x4ac/0xfb0 [ 35.581597] __do_softirq+0x26c/0x9a0 [ 35.587025] run_ksoftirqd+0x57/0x110 [ 35.592451] smpboot_thread_fn+0x655/0x9e0 [ 35.598311] kthread+0x33f/0x460 [ 35.603303] ret_from_fork+0x24/0x30 [ 35.608662] INITIAL USE at: [ 35.611834] _raw_spin_lock_bh+0x2f/0x40 [ 35.617444] lock_sock_nested+0x3b/0x110 [ 35.623046] inet_autobind+0x1a/0x190 [ 35.628402] inet_dgram_connect+0x245/0x2d0 [ 35.634278] __sys_connect+0x265/0x2c0 [ 35.639707] __x64_sys_connect+0x6f/0xb0 [ 35.645306] do_syscall_64+0xf9/0x620 [ 35.650649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.657375] } [ 35.659158] ... key at: [] af_family_slock_keys+0x10/0x1a0 [ 35.666835] ... acquired at: [ 35.669935] _raw_spin_lock+0x2a/0x40 [ 35.673886] free_huge_page+0x482/0xd20 [ 35.678011] __put_page+0xe2/0x3a0 [ 35.681703] skb_release_data+0x2f3/0x920 [ 35.686000] __kfree_skb+0x46/0x60 [ 35.689709] tcp_write_queue_purge+0x446/0x800 [ 35.694439] tcp_v4_destroy_sock+0x101/0x770 [ 35.699009] inet_csk_destroy_sock+0x189/0x400 [ 35.703740] tcp_close+0x95f/0xfd0 [ 35.707449] inet_release+0xd7/0x1e0 [ 35.711313] __sock_release+0xcd/0x2a0 [ 35.715347] sock_close+0x15/0x20 [ 35.718952] __fput+0x2ce/0x890 [ 35.722381] task_work_run+0x148/0x1c0 [ 35.726434] exit_to_usermode_loop+0x251/0x2a0 [ 35.731164] do_syscall_64+0x538/0x620 [ 35.735204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.740539] [ 35.742140] [ 35.742140] the dependencies between the lock to be acquired [ 35.742142] and SOFTIRQ-irq-unsafe lock: [ 35.753542] -> (hugetlb_lock){+.+.} ops: 8 { [ 35.757929] HARDIRQ-ON-W at: [ 35.761189] _raw_spin_lock+0x2a/0x40 [ 35.766630] hugetlb_overcommit_handler+0x2d4/0x460 [ 35.773280] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 35.780097] __vfs_write+0xf7/0x770 [ 35.785348] vfs_write+0x1f3/0x540 [ 35.790514] ksys_write+0x12b/0x2a0 [ 35.795769] do_syscall_64+0xf9/0x620 [ 35.801195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.808007] SOFTIRQ-ON-W at: [ 35.811266] _raw_spin_lock+0x2a/0x40 [ 35.816706] hugetlb_overcommit_handler+0x2d4/0x460 [ 35.823352] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 35.830168] __vfs_write+0xf7/0x770 [ 35.835433] vfs_write+0x1f3/0x540 [ 35.840600] ksys_write+0x12b/0x2a0 [ 35.845855] do_syscall_64+0xf9/0x620 [ 35.851282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.858098] INITIAL USE at: [ 35.861282] _raw_spin_lock+0x2a/0x40 [ 35.866627] hugetlb_overcommit_handler+0x2d4/0x460 [ 35.873186] proc_sys_call_handler.isra.0+0x1f3/0x3b0 [ 35.879931] __vfs_write+0xf7/0x770 [ 35.885102] vfs_write+0x1f3/0x540 [ 35.890182] ksys_write+0x12b/0x2a0 [ 35.895349] do_syscall_64+0xf9/0x620 [ 35.900693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.907417] } [ 35.909202] ... key at: [] hugetlb_lock+0x18/0x17a0 [ 35.916272] ... acquired at: [ 35.919360] _raw_spin_lock+0x2a/0x40 [ 35.923311] free_huge_page+0x482/0xd20 [ 35.927435] __put_page+0xe2/0x3a0 [ 35.931127] skb_release_data+0x2f3/0x920 [ 35.935443] __kfree_skb+0x46/0x60 [ 35.939133] tcp_write_queue_purge+0x446/0x800 [ 35.943880] tcp_v4_destroy_sock+0x101/0x770 [ 35.948436] inet_csk_destroy_sock+0x189/0x400 [ 35.953166] tcp_close+0x95f/0xfd0 [ 35.956859] inet_release+0xd7/0x1e0 [ 35.960744] __sock_release+0xcd/0x2a0 [ 35.964785] sock_close+0x15/0x20 [ 35.968406] __fput+0x2ce/0x890 [ 35.971841] task_work_run+0x148/0x1c0 [ 35.975962] exit_to_usermode_loop+0x251/0x2a0 [ 35.980705] do_syscall_64+0x538/0x620 [ 35.984754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 35.990101] [ 35.991709] [ 35.991709] stack backtrace: [ 35.996187] CPU: 1 PID: 8110 Comm: syz-executor054 Not tainted 4.19.163-syzkaller #0 [ 36.004038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.013363] Call Trace: [ 36.015933] dump_stack+0x1fc/0x2fe [ 36.019540] check_usage.cold+0x7ea/0xbad [ 36.023669] ? check_usage_backwards+0x300/0x300 [ 36.028400] ? __save_stack_trace+0x72/0x190 [ 36.032785] ? deref_stack_reg+0x134/0x1d0 [ 36.036993] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 36.042860] ? lock_downgrade+0x720/0x720 [ 36.046994] ? lock_acquire+0x170/0x3c0 [ 36.050947] __lock_acquire+0x1da1/0x3ff0 [ 36.055075] ? trace_hardirqs_off+0x64/0x200 [ 36.059462] ? mark_held_locks+0xf0/0xf0 [ 36.063501] ? __kasan_slab_free+0x186/0x1f0 [ 36.067887] ? tcp_write_queue_purge+0x24d/0x800 [ 36.072618] ? tcp_v4_destroy_sock+0x101/0x770 [ 36.077175] ? inet_csk_destroy_sock+0x189/0x400 [ 36.081908] ? tcp_close+0x95f/0xfd0 [ 36.085602] ? inet_release+0xd7/0x1e0 [ 36.089468] ? __sock_release+0xcd/0x2a0 [ 36.093508] ? sock_close+0x15/0x20 [ 36.097114] ? task_work_run+0x148/0x1c0 [ 36.101155] ? exit_to_usermode_loop+0x251/0x2a0 [ 36.105904] ? do_syscall_64+0x538/0x620 [ 36.109940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.115280] ? lock_downgrade+0x720/0x720 [ 36.119405] lock_acquire+0x170/0x3c0 [ 36.123186] ? free_huge_page+0x482/0xd20 [ 36.127310] ? PageHuge+0xc7/0x160 [ 36.130850] _raw_spin_lock+0x2a/0x40 [ 36.134629] ? free_huge_page+0x482/0xd20 [ 36.138764] free_huge_page+0x482/0xd20 [ 36.142742] ? PageHuge+0xc7/0x160 [ 36.146258] __put_page+0xe2/0x3a0 [ 36.149778] skb_release_data+0x2f3/0x920 [ 36.153901] __kfree_skb+0x46/0x60 [ 36.157430] tcp_write_queue_purge+0x446/0x800 [ 36.161990] tcp_v4_destroy_sock+0x101/0x770 [ 36.166399] inet_csk_destroy_sock+0x189/0x400 [ 36.170961] tcp_close+0x95f/0xfd0 [ 36.174500] inet_release+0xd7/0x1e0 [ 36.178198] __sock_release+0xcd/0x2a0 [ 36.182070] ? __sock_release+0x2a0/0x2a0 [ 36.186195] sock_close+0x15/0x20 [ 36.189636] __fput+0x2ce/0x890 [ 36.192900] task_work_run+0x148/0x1c0 [ 36.196767] exit_to_usermode_loop+0x251/0x2a0 [ 36.201344] do_syscall_64+0x538/0x620 [ 36.205212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 36.210419] RIP: 0033:0x408051 [ 36.213595] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 24 1a 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 36.232578] RSP: 002b:00007ffe5fbefce0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 36.240302] RAX: 0000000000000000 RBX: 00007ffe5fbefd10 RCX: 0000000000408051 [ 36.247561] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 0000000000000004 [ 36.254908] RBP: 0000000000000005 R08: 0000000000000140 R09: 0000000000000140 [ 36.262288] R10: 00007ffe5fbefd10 R11: 0000000000000293 R12: 00000000006dec30 [ 3