Warning: Permanently added '10.128.0.251' (ECDSA) to the list of known hosts. executing program [ 68.921192][ T8422] [ 68.923634][ T8422] ===================================================== [ 68.930586][ T8422] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 68.938190][ T8422] 5.14.0-rc3-syzkaller #0 Not tainted [ 68.943534][ T8422] ----------------------------------------------------- [ 68.950449][ T8422] syz-executor130/8422 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 68.958502][ T8422] ffff888015edd0c0 (&new->fa_lock){.+.+}-{2:2}, at: kill_fasync+0x132/0x460 [ 68.967201][ T8422] [ 68.967201][ T8422] and this task is already holding: [ 68.974560][ T8422] ffff88801fcf9028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 68.984983][ T8422] which would create a new lock dependency: [ 68.990851][ T8422] (&client->buffer_lock){....}-{2:2} -> (&new->fa_lock){.+.+}-{2:2} [ 68.998926][ T8422] [ 68.998926][ T8422] but this new dependency connects a HARDIRQ-irq-safe lock: [ 69.008367][ T8422] (&dev->event_lock){-...}-{2:2} [ 69.008395][ T8422] [ 69.008395][ T8422] ... which became HARDIRQ-irq-safe at: [ 69.021183][ T8422] lock_acquire+0x1ab/0x510 [ 69.025768][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 69.031055][ T8422] input_event+0x7b/0xb0 [ 69.035371][ T8422] psmouse_report_standard_buttons+0x2c/0x80 [ 69.041427][ T8422] psmouse_process_byte+0x1e1/0x890 [ 69.046700][ T8422] psmouse_handle_byte+0x41/0x1b0 [ 69.051886][ T8422] psmouse_interrupt+0x304/0xf00 [ 69.056897][ T8422] serio_interrupt+0x88/0x150 [ 69.061645][ T8422] i8042_interrupt+0x27a/0x520 [ 69.066482][ T8422] __handle_irq_event_percpu+0x303/0x8f0 [ 69.072196][ T8422] handle_irq_event+0x102/0x280 [ 69.077124][ T8422] handle_edge_irq+0x25f/0xd00 [ 69.081962][ T8422] __common_interrupt+0x9d/0x210 [ 69.086978][ T8422] common_interrupt+0x9f/0xd0 [ 69.091729][ T8422] asm_common_interrupt+0x1e/0x40 [ 69.096824][ T8422] _raw_spin_unlock_irqrestore+0x38/0x70 [ 69.102555][ T8422] i8042_command+0x12e/0x150 [ 69.107222][ T8422] i8042_aux_write+0xd7/0x120 [ 69.111974][ T8422] ps2_do_sendbyte+0x2cf/0x710 [ 69.116810][ T8422] ps2_sendbyte+0x58/0x150 [ 69.121298][ T8422] cypress_ps2_sendbyte+0x2e/0x160 [ 69.126482][ T8422] cypress_send_ext_cmd+0x1d0/0x8e0 [ 69.131748][ T8422] cypress_detect+0x75/0x190 [ 69.136409][ T8422] psmouse_try_protocol+0x211/0x370 [ 69.141684][ T8422] psmouse_extensions+0x557/0x930 [ 69.146956][ T8422] psmouse_switch_protocol+0x52a/0x740 [ 69.152490][ T8422] psmouse_connect+0x5e9/0xfd0 [ 69.157344][ T8422] serio_driver_probe+0x72/0xa0 [ 69.162424][ T8422] really_probe+0x23c/0xcd0 [ 69.167004][ T8422] __driver_probe_device+0x338/0x4d0 [ 69.172361][ T8422] driver_probe_device+0x4c/0x1a0 [ 69.177471][ T8422] __driver_attach+0x22d/0x4e0 [ 69.182306][ T8422] bus_for_each_dev+0x147/0x1d0 [ 69.187227][ T8422] serio_handle_event+0x5f6/0xa30 [ 69.192373][ T8422] process_one_work+0x98d/0x1630 [ 69.197389][ T8422] worker_thread+0x658/0x11f0 [ 69.202139][ T8422] kthread+0x3e5/0x4d0 [ 69.206288][ T8422] ret_from_fork+0x1f/0x30 [ 69.210776][ T8422] [ 69.210776][ T8422] to a HARDIRQ-irq-unsafe lock: [ 69.217875][ T8422] (&new->fa_lock){.+.+}-{2:2} [ 69.217896][ T8422] [ 69.217896][ T8422] ... which became HARDIRQ-irq-unsafe at: [ 69.230859][ T8422] ... [ 69.230864][ T8422] lock_acquire+0x1ab/0x510 [ 69.237996][ T8422] _raw_read_lock+0x5b/0x70 [ 69.242574][ T8422] kill_fasync+0x132/0x460 [ 69.247065][ T8422] fsnotify_add_event+0x3ba/0x500 [ 69.252160][ T8422] inotify_handle_inode_event+0x31b/0x5c0 [ 69.257954][ T8422] inotify_ignored_and_remove_idr+0x24/0x70 [ 69.264354][ T8422] fsnotify_free_mark+0xe5/0x140 [ 69.269366][ T8422] fsnotify_destroy_marks+0x14e/0x240 [ 69.275069][ T8422] dentry_unlink_inode+0x335/0x3d0 [ 69.280343][ T8422] d_delete+0x16b/0x1c0 [ 69.284676][ T8422] vfs_rmdir.part.0+0x37b/0x430 [ 69.289610][ T8422] do_rmdir+0x3d6/0x480 [ 69.293838][ T8422] do_syscall_64+0x35/0xb0 [ 69.298326][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 69.304330][ T8422] [ 69.304330][ T8422] other info that might help us debug this: [ 69.304330][ T8422] [ 69.314625][ T8422] Chain exists of: [ 69.314625][ T8422] &dev->event_lock --> &client->buffer_lock --> &new->fa_lock [ 69.314625][ T8422] [ 69.328435][ T8422] Possible interrupt unsafe locking scenario: [ 69.328435][ T8422] [ 69.336832][ T8422] CPU0 CPU1 [ 69.342177][ T8422] ---- ---- [ 69.347706][ T8422] lock(&new->fa_lock); [ 69.351932][ T8422] local_irq_disable(); [ 69.358665][ T8422] lock(&dev->event_lock); [ 69.365668][ T8422] lock(&client->buffer_lock); [ 69.373030][ T8422] [ 69.376487][ T8422] lock(&dev->event_lock); [ 69.381423][ T8422] [ 69.381423][ T8422] *** DEADLOCK *** [ 69.381423][ T8422] [ 69.389640][ T8422] 7 locks held by syz-executor130/8422: [ 69.395163][ T8422] #0: ffff888022144110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 69.404303][ T8422] #1: ffff8881442e4230 (&dev->event_lock){-...}-{2:2}, at: input_inject_event+0xa6/0x320 [ 69.414201][ T8422] #2: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x320 [ 69.423838][ T8422] #3: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x710 [ 69.433942][ T8422] #4: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3e0 [ 69.443061][ T8422] #5: ffff88801fcf9028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 69.453845][ T8422] #6: ffffffff8b97b9c0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 69.462887][ T8422] [ 69.462887][ T8422] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 69.473268][ T8422] -> (&dev->event_lock){-...}-{2:2} { [ 69.478719][ T8422] IN-HARDIRQ-W at: [ 69.482769][ T8422] lock_acquire+0x1ab/0x510 [ 69.489256][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 69.496268][ T8422] input_event+0x7b/0xb0 [ 69.502319][ T8422] psmouse_report_standard_buttons+0x2c/0x80 [ 69.510110][ T8422] psmouse_process_byte+0x1e1/0x890 [ 69.517121][ T8422] psmouse_handle_byte+0x41/0x1b0 [ 69.523958][ T8422] psmouse_interrupt+0x304/0xf00 [ 69.530707][ T8422] serio_interrupt+0x88/0x150 [ 69.537247][ T8422] i8042_interrupt+0x27a/0x520 [ 69.543823][ T8422] __handle_irq_event_percpu+0x303/0x8f0 [ 69.551270][ T8422] handle_irq_event+0x102/0x280 [ 69.558016][ T8422] handle_edge_irq+0x25f/0xd00 [ 69.564591][ T8422] __common_interrupt+0x9d/0x210 [ 69.571343][ T8422] common_interrupt+0x9f/0xd0 [ 69.577835][ T8422] asm_common_interrupt+0x1e/0x40 [ 69.584665][ T8422] _raw_spin_unlock_irqrestore+0x38/0x70 [ 69.592110][ T8422] i8042_command+0x12e/0x150 [ 69.598517][ T8422] i8042_aux_write+0xd7/0x120 [ 69.605005][ T8422] ps2_do_sendbyte+0x2cf/0x710 [ 69.611583][ T8422] ps2_sendbyte+0x58/0x150 [ 69.617811][ T8422] cypress_ps2_sendbyte+0x2e/0x160 [ 69.624740][ T8422] cypress_send_ext_cmd+0x1d0/0x8e0 [ 69.631748][ T8422] cypress_detect+0x75/0x190 [ 69.638147][ T8422] psmouse_try_protocol+0x211/0x370 [ 69.645177][ T8422] psmouse_extensions+0x557/0x930 [ 69.652014][ T8422] psmouse_switch_protocol+0x52a/0x740 [ 69.659287][ T8422] psmouse_connect+0x5e9/0xfd0 [ 69.665866][ T8422] serio_driver_probe+0x72/0xa0 [ 69.672527][ T8422] really_probe+0x23c/0xcd0 [ 69.679448][ T8422] __driver_probe_device+0x338/0x4d0 [ 69.686717][ T8422] driver_probe_device+0x4c/0x1a0 [ 69.693550][ T8422] __driver_attach+0x22d/0x4e0 [ 69.700132][ T8422] bus_for_each_dev+0x147/0x1d0 [ 69.707070][ T8422] serio_handle_event+0x5f6/0xa30 [ 69.713916][ T8422] process_one_work+0x98d/0x1630 [ 69.720768][ T8422] worker_thread+0x658/0x11f0 [ 69.727360][ T8422] kthread+0x3e5/0x4d0 [ 69.733237][ T8422] ret_from_fork+0x1f/0x30 [ 69.739465][ T8422] INITIAL USE at: [ 69.743424][ T8422] lock_acquire+0x1ab/0x510 [ 69.749647][ T8422] _raw_spin_lock_irqsave+0x39/0x50 [ 69.756657][ T8422] input_inject_event+0xa6/0x320 [ 69.763401][ T8422] led_set_brightness_nosleep+0xe6/0x1a0 [ 69.770757][ T8422] led_set_brightness+0x134/0x170 [ 69.777500][ T8422] led_trigger_event+0x75/0xd0 [ 69.784000][ T8422] kbd_led_trigger_activate+0xc9/0x100 [ 69.791202][ T8422] led_trigger_set+0x61e/0xbd0 [ 69.797945][ T8422] led_trigger_set_default+0x1a6/0x230 [ 69.805122][ T8422] led_classdev_register_ext+0x5b1/0x7c0 [ 69.812477][ T8422] input_leds_connect+0x4bd/0x860 [ 69.819481][ T8422] input_attach_handler+0x180/0x1f0 [ 69.826509][ T8422] input_register_device.cold+0xf0/0x304 [ 69.833864][ T8422] atkbd_connect+0x739/0xa00 [ 69.840180][ T8422] serio_driver_probe+0x72/0xa0 [ 69.846838][ T8422] really_probe+0x23c/0xcd0 [ 69.853065][ T8422] __driver_probe_device+0x338/0x4d0 [ 69.860073][ T8422] driver_probe_device+0x4c/0x1a0 [ 69.866821][ T8422] __driver_attach+0x22d/0x4e0 [ 69.873311][ T8422] bus_for_each_dev+0x147/0x1d0 [ 69.879884][ T8422] serio_handle_event+0x5f6/0xa30 [ 69.886631][ T8422] process_one_work+0x98d/0x1630 [ 69.893293][ T8422] worker_thread+0x658/0x11f0 [ 69.899728][ T8422] kthread+0x3e5/0x4d0 [ 69.905816][ T8422] ret_from_fork+0x1f/0x30 [ 69.911971][ T8422] } [ 69.914547][ T8422] ... key at: [] __key.8+0x0/0x40 [ 69.921935][ T8422] -> (&client->buffer_lock){....}-{2:2} { [ 69.927655][ T8422] INITIAL USE at: [ 69.931529][ T8422] lock_acquire+0x1ab/0x510 [ 69.937670][ T8422] _raw_spin_lock+0x2a/0x40 [ 69.943995][ T8422] evdev_pass_values.part.0+0xf6/0x970 [ 69.951112][ T8422] evdev_events+0x359/0x3e0 [ 69.957603][ T8422] input_to_handler+0x2a0/0x4c0 [ 69.964095][ T8422] input_pass_values.part.0+0x230/0x710 [ 69.971204][ T8422] input_handle_event+0x373/0x1440 [ 69.977867][ T8422] input_inject_event+0x1bd/0x320 [ 69.984440][ T8422] evdev_write+0x430/0x760 [ 69.990427][ T8422] vfs_write+0x28e/0xa40 [ 69.996309][ T8422] ksys_write+0x1ee/0x250 [ 70.002198][ T8422] do_syscall_64+0x35/0xb0 [ 70.008164][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.015613][ T8422] } [ 70.018091][ T8422] ... key at: [] __key.4+0x0/0x40 [ 70.025193][ T8422] ... acquired at: [ 70.028986][ T8422] _raw_spin_lock+0x2a/0x40 [ 70.033650][ T8422] evdev_pass_values.part.0+0xf6/0x970 [ 70.039268][ T8422] evdev_events+0x359/0x3e0 [ 70.043928][ T8422] input_to_handler+0x2a0/0x4c0 [ 70.048940][ T8422] input_pass_values.part.0+0x230/0x710 [ 70.054644][ T8422] input_handle_event+0x373/0x1440 [ 70.059910][ T8422] input_inject_event+0x1bd/0x320 [ 70.065098][ T8422] evdev_write+0x430/0x760 [ 70.069673][ T8422] vfs_write+0x28e/0xa40 [ 70.074076][ T8422] ksys_write+0x1ee/0x250 [ 70.078568][ T8422] do_syscall_64+0x35/0xb0 [ 70.083248][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.089311][ T8422] [ 70.091614][ T8422] [ 70.091614][ T8422] the dependencies between the lock to be acquired [ 70.091621][ T8422] and HARDIRQ-irq-unsafe lock: [ 70.106756][ T8422] -> (&new->fa_lock){.+.+}-{2:2} { [ 70.111884][ T8422] HARDIRQ-ON-R at: [ 70.115936][ T8422] lock_acquire+0x1ab/0x510 [ 70.122164][ T8422] _raw_read_lock+0x5b/0x70 [ 70.128305][ T8422] kill_fasync+0x132/0x460 [ 70.134357][ T8422] fsnotify_add_event+0x3ba/0x500 [ 70.141189][ T8422] inotify_handle_inode_event+0x31b/0x5c0 [ 70.148751][ T8422] inotify_ignored_and_remove_idr+0x24/0x70 [ 70.156376][ T8422] fsnotify_free_mark+0xe5/0x140 [ 70.162948][ T8422] fsnotify_destroy_marks+0x14e/0x240 [ 70.169960][ T8422] dentry_unlink_inode+0x335/0x3d0 [ 70.176709][ T8422] d_delete+0x16b/0x1c0 [ 70.182510][ T8422] vfs_rmdir.part.0+0x37b/0x430 [ 70.189085][ T8422] do_rmdir+0x3d6/0x480 [ 70.194873][ T8422] do_syscall_64+0x35/0xb0 [ 70.200926][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.208465][ T8422] SOFTIRQ-ON-R at: [ 70.212512][ T8422] lock_acquire+0x1ab/0x510 [ 70.218658][ T8422] _raw_read_lock+0x5b/0x70 [ 70.224800][ T8422] kill_fasync+0x132/0x460 [ 70.230854][ T8422] fsnotify_add_event+0x3ba/0x500 [ 70.237520][ T8422] inotify_handle_inode_event+0x31b/0x5c0 [ 70.244963][ T8422] inotify_ignored_and_remove_idr+0x24/0x70 [ 70.252494][ T8422] fsnotify_free_mark+0xe5/0x140 [ 70.259155][ T8422] fsnotify_destroy_marks+0x14e/0x240 [ 70.266161][ T8422] dentry_unlink_inode+0x335/0x3d0 [ 70.272910][ T8422] d_delete+0x16b/0x1c0 [ 70.278699][ T8422] vfs_rmdir.part.0+0x37b/0x430 [ 70.285184][ T8422] do_rmdir+0x3d6/0x480 [ 70.291076][ T8422] do_syscall_64+0x35/0xb0 [ 70.297128][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.304663][ T8422] INITIAL READ USE at: [ 70.308971][ T8422] lock_acquire+0x1ab/0x510 [ 70.315453][ T8422] _raw_read_lock+0x5b/0x70 [ 70.321940][ T8422] kill_fasync+0x132/0x460 [ 70.328339][ T8422] fsnotify_add_event+0x3ba/0x500 [ 70.335359][ T8422] inotify_handle_inode_event+0x31b/0x5c0 [ 70.343080][ T8422] inotify_ignored_and_remove_idr+0x24/0x70 [ 70.351052][ T8422] fsnotify_free_mark+0xe5/0x140 [ 70.357976][ T8422] fsnotify_destroy_marks+0x14e/0x240 [ 70.365344][ T8422] dentry_unlink_inode+0x335/0x3d0 [ 70.372441][ T8422] d_delete+0x16b/0x1c0 [ 70.378576][ T8422] vfs_rmdir.part.0+0x37b/0x430 [ 70.385406][ T8422] do_rmdir+0x3d6/0x480 [ 70.391543][ T8422] do_syscall_64+0x35/0xb0 [ 70.397951][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.406100][ T8422] } [ 70.408578][ T8422] ... key at: [] __key.0+0x0/0x40 [ 70.415772][ T8422] ... acquired at: [ 70.419553][ T8422] lock_acquire+0x1ab/0x510 [ 70.424211][ T8422] _raw_read_lock+0x5b/0x70 [ 70.428878][ T8422] kill_fasync+0x132/0x460 [ 70.433452][ T8422] evdev_pass_values.part.0+0x64e/0x970 [ 70.439160][ T8422] evdev_events+0x359/0x3e0 [ 70.443827][ T8422] input_to_handler+0x2a0/0x4c0 [ 70.448839][ T8422] input_pass_values.part.0+0x230/0x710 [ 70.454641][ T8422] input_handle_event+0x373/0x1440 [ 70.459920][ T8422] input_inject_event+0x1bd/0x320 [ 70.465103][ T8422] evdev_write+0x430/0x760 [ 70.469679][ T8422] vfs_write+0x28e/0xa40 [ 70.474084][ T8422] ksys_write+0x1ee/0x250 [ 70.478576][ T8422] do_syscall_64+0x35/0xb0 [ 70.483322][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.489383][ T8422] [ 70.491687][ T8422] [ 70.491687][ T8422] stack backtrace: [ 70.497553][ T8422] CPU: 1 PID: 8422 Comm: syz-executor130 Not tainted 5.14.0-rc3-syzkaller #0 [ 70.507361][ T8422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.517409][ T8422] Call Trace: [ 70.520676][ T8422] dump_stack_lvl+0xcd/0x134 [ 70.525283][ T8422] check_irq_usage.cold+0x4c1/0x6b0 [ 70.530469][ T8422] ? is_bpf_text_address+0x99/0x170 [ 70.535885][ T8422] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 70.542989][ T8422] ? __kernel_text_address+0x9/0x30 [ 70.548188][ T8422] ? unwind_get_return_address+0x51/0x90 [ 70.553836][ T8422] ? check_path.constprop.0+0x24/0x50 [ 70.559198][ T8422] ? register_lock_class+0xb7/0x10c0 [ 70.564644][ T8422] ? stack_trace_save+0x8c/0xc0 [ 70.569489][ T8422] ? stack_trace_consume_entry+0x160/0x160 [ 70.575295][ T8422] ? lockdep_lock+0xc6/0x200 [ 70.579876][ T8422] ? call_rcu_zapped+0xb0/0xb0 [ 70.584632][ T8422] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 70.590860][ T8422] __lock_acquire+0x2a1f/0x54a0 [ 70.595710][ T8422] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 70.601768][ T8422] lock_acquire+0x1ab/0x510 [ 70.606257][ T8422] ? kill_fasync+0x132/0x460 [ 70.610833][ T8422] ? lock_release+0x720/0x720 [ 70.615496][ T8422] ? lock_release+0x720/0x720 [ 70.620155][ T8422] ? lock_release+0x720/0x720 [ 70.624816][ T8422] _raw_read_lock+0x5b/0x70 [ 70.629354][ T8422] ? kill_fasync+0x132/0x460 [ 70.633940][ T8422] kill_fasync+0x132/0x460 [ 70.638344][ T8422] evdev_pass_values.part.0+0x64e/0x970 [ 70.643968][ T8422] ? evdev_release+0x410/0x410 [ 70.648727][ T8422] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 70.654439][ T8422] evdev_events+0x359/0x3e0 [ 70.658942][ T8422] ? evdev_pass_values.part.0+0x970/0x970 [ 70.664648][ T8422] input_to_handler+0x2a0/0x4c0 [ 70.669624][ T8422] input_pass_values.part.0+0x230/0x710 [ 70.675173][ T8422] input_handle_event+0x373/0x1440 [ 70.680298][ T8422] input_inject_event+0x1bd/0x320 [ 70.685313][ T8422] evdev_write+0x430/0x760 [ 70.689719][ T8422] ? evdev_read+0xe40/0xe40 [ 70.694212][ T8422] ? security_file_permission+0x248/0x560 [ 70.699920][ T8422] ? evdev_read+0xe40/0xe40 [ 70.704408][ T8422] vfs_write+0x28e/0xa40 [ 70.708726][ T8422] ksys_write+0x1ee/0x250 [ 70.713148][ T8422] ? __ia32_sys_read+0xb0/0xb0 [ 70.717921][ T8422] ? syscall_enter_from_user_mode+0x21/0x70 [ 70.723805][ T8422] do_syscall_64+0x35/0xb0 [ 70.728209][ T8422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 70.734367][ T8422] RIP: 0033:0x443629 [ 70.738346][ T8422] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 70.758050][ T8422] RSP: 002b:00007ffc85ca1708 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 70.766453][ T8422] RAX: ffffffffffffffda RBX: 6f72746e6f632f2e RCX: 0000000000443629 [ 70.774594][ T8422] RDX: 0000000000035000 RSI: 000000002000