===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected 5.15.119-syzkaller #0 Not tainted ----------------------------------------------------- syz-executor.0/10821 [HC0[0]:SC0[2]:HE1:SE0] is trying to acquire: ffffffff8c9dcce0 (fs_reclaim){+.+.}-{0:0}, at: might_alloc include/linux/sched/mm.h:206 [inline] ffffffff8c9dcce0 (fs_reclaim){+.+.}-{0:0}, at: slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 and this task is already holding: ffff88807971a908 (&sch->q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 net/sched/sch_netem.c:972 which would create a new lock dependency: (&sch->q.lock){+.-.}-{2:2} -> (fs_reclaim){+.+.}-{0:0} but this new dependency connects a SOFTIRQ-irq-safe lock: (&sch->q.lock){+.-.}-{2:2} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:363 [inline] net_tx_action+0x6c5/0x8e0 net/core/dev.c:5049 __do_softirq+0x3b3/0x93a kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x155/0x240 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1096 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:638 __preempt_count_add kernel/rcu/tree.c:1118 [inline] rcu_is_watching+0x2/0xa0 kernel/rcu/tree.c:1121 rcu_read_lock include/linux/rcupdate.h:697 [inline] percpu_ref_put_many include/linux/percpu-refcount.h:317 [inline] percpu_ref_put+0x24/0x150 include/linux/percpu-refcount.h:338 css_put include/linux/cgroup.h:405 [inline] __mem_cgroup_charge+0x55/0x80 mm/memcontrol.c:6778 mem_cgroup_charge include/linux/memcontrol.h:695 [inline] __add_to_page_cache_locked+0xbdb/0x11a0 mm/filemap.c:892 add_to_page_cache_lru+0x1b3/0x560 mm/filemap.c:984 pagecache_get_page+0xbe0/0x1010 mm/filemap.c:1951 grab_cache_page_write_begin+0x57/0x90 mm/filemap.c:3730 ext4_da_write_begin+0x599/0xb60 fs/ext4/inode.c:2990 generic_perform_write+0x2bf/0x5b0 mm/filemap.c:3776 ext4_buffered_write_iter+0x227/0x360 fs/ext4/file.c:268 ext4_file_write_iter+0x87c/0x1990 __kernel_write+0x5b1/0xa60 fs/read_write.c:539 __dump_emit+0x264/0x3a0 fs/coredump.c:875 dump_user_range+0x91/0x320 fs/coredump.c:949 elf_core_dump+0x3c7d/0x4570 fs/binfmt_elf.c:2285 do_coredump+0x1852/0x31e0 fs/coredump.c:826 get_signal+0xc06/0x14e0 kernel/signal.c:2875 arch_do_signal_or_restart+0xc3/0x1890 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop+0x97/0x130 kernel/entry/common.c:172 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:208 irqentry_exit_to_user_mode+0x5/0x30 kernel/entry/common.c:314 exc_general_protection+0x358/0x4f0 arch/x86/kernel/traps.c:562 asm_exc_general_protection+0x22/0x30 arch/x86/include/asm/idtentry.h:562 to a SOFTIRQ-irq-unsafe lock: (fs_reclaim){+.+.}-{0:0} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __fs_reclaim_acquire mm/page_alloc.c:4547 [inline] fs_reclaim_acquire+0x83/0x120 mm/page_alloc.c:4561 might_alloc include/linux/sched/mm.h:206 [inline] slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x49/0x290 mm/slub.c:3245 kmalloc include/linux/slab.h:591 [inline] kzalloc include/linux/slab.h:721 [inline] alloc_workqueue_attrs kernel/workqueue.c:3403 [inline] wq_numa_init+0x122/0x49f kernel/workqueue.c:5994 workqueue_init+0x18/0x5e1 kernel/workqueue.c:6121 kernel_init_freeable+0x40a/0x5c5 init/main.c:1603 kernel_init+0x19/0x290 init/main.c:1510 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 other info that might help us debug this: Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(fs_reclaim); local_irq_disable(); lock(&sch->q.lock); lock(fs_reclaim); lock(&sch->q.lock); *** DEADLOCK *** 2 locks held by syz-executor.0/10821: #0: ffffffff8d9de208 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock net/core/rtnetlink.c:72 [inline] #0: ffffffff8d9de208 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 net/core/rtnetlink.c:5590 #1: ffff88807971a908 (&sch->q.lock){+.-.}-{2:2}, at: netem_change+0x257/0x20c0 net/sched/sch_netem.c:972 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&sch->q.lock){+.-.}-{2:2} { HARDIRQ-ON-W at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:368 [inline] dev_reset_queue+0xc1/0x140 net/sched/sch_generic.c:1245 netdev_for_each_tx_queue include/linux/netdevice.h:2379 [inline] dev_deactivate_many+0x6ad/0xbf0 net/sched/sch_generic.c:1313 dev_deactivate+0x177/0x270 net/sched/sch_generic.c:1336 linkwatch_do_dev+0x104/0x160 net/core/link_watch.c:165 __linkwatch_run_queue+0x4ca/0x7f0 net/core/link_watch.c:213 linkwatch_event+0x48/0x50 net/core/link_watch.c:252 process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2307 worker_thread+0xaca/0x1280 kernel/workqueue.c:2454 kthread+0x3f6/0x4f0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 IN-SOFTIRQ-W at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:363 [inline] net_tx_action+0x6c5/0x8e0 net/core/dev.c:5049 __do_softirq+0x3b3/0x93a kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x155/0x240 kernel/softirq.c:636 irq_exit_rcu+0x5/0x20 kernel/softirq.c:648 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1096 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:638 __preempt_count_add kernel/rcu/tree.c:1118 [inline] rcu_is_watching+0x2/0xa0 kernel/rcu/tree.c:1121 rcu_read_lock include/linux/rcupdate.h:697 [inline] percpu_ref_put_many include/linux/percpu-refcount.h:317 [inline] percpu_ref_put+0x24/0x150 include/linux/percpu-refcount.h:338 css_put include/linux/cgroup.h:405 [inline] __mem_cgroup_charge+0x55/0x80 mm/memcontrol.c:6778 mem_cgroup_charge include/linux/memcontrol.h:695 [inline] __add_to_page_cache_locked+0xbdb/0x11a0 mm/filemap.c:892 add_to_page_cache_lru+0x1b3/0x560 mm/filemap.c:984 pagecache_get_page+0xbe0/0x1010 mm/filemap.c:1951 grab_cache_page_write_begin+0x57/0x90 mm/filemap.c:3730 ext4_da_write_begin+0x599/0xb60 fs/ext4/inode.c:2990 generic_perform_write+0x2bf/0x5b0 mm/filemap.c:3776 ext4_buffered_write_iter+0x227/0x360 fs/ext4/file.c:268 ext4_file_write_iter+0x87c/0x1990 __kernel_write+0x5b1/0xa60 fs/read_write.c:539 __dump_emit+0x264/0x3a0 fs/coredump.c:875 dump_user_range+0x91/0x320 fs/coredump.c:949 elf_core_dump+0x3c7d/0x4570 fs/binfmt_elf.c:2285 do_coredump+0x1852/0x31e0 fs/coredump.c:826 get_signal+0xc06/0x14e0 kernel/signal.c:2875 arch_do_signal_or_restart+0xc3/0x1890 arch/x86/kernel/signal.c:865 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop+0x97/0x130 kernel/entry/common.c:172 exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:208 irqentry_exit_to_user_mode+0x5/0x30 kernel/entry/common.c:314 exc_general_protection+0x358/0x4f0 arch/x86/kernel/traps.c:562 asm_exc_general_protection+0x22/0x30 arch/x86/include/asm/idtentry.h:562 INITIAL USE at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:368 [inline] dev_reset_queue+0xc1/0x140 net/sched/sch_generic.c:1245 netdev_for_each_tx_queue include/linux/netdevice.h:2379 [inline] dev_deactivate_many+0x6ad/0xbf0 net/sched/sch_generic.c:1313 dev_deactivate+0x177/0x270 net/sched/sch_generic.c:1336 linkwatch_do_dev+0x104/0x160 net/core/link_watch.c:165 __linkwatch_run_queue+0x4ca/0x7f0 net/core/link_watch.c:213 linkwatch_event+0x48/0x50 net/core/link_watch.c:252 process_one_work+0x8a1/0x10c0 kernel/workqueue.c:2307 worker_thread+0xaca/0x1280 kernel/workqueue.c:2454 kthread+0x3f6/0x4f0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 } ... key at: [] qdisc_alloc.__key+0x0/0x20 the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (fs_reclaim){+.+.}-{0:0} { HARDIRQ-ON-W at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __fs_reclaim_acquire mm/page_alloc.c:4547 [inline] fs_reclaim_acquire+0x83/0x120 mm/page_alloc.c:4561 might_alloc include/linux/sched/mm.h:206 [inline] slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x49/0x290 mm/slub.c:3245 kmalloc include/linux/slab.h:591 [inline] kzalloc include/linux/slab.h:721 [inline] alloc_workqueue_attrs kernel/workqueue.c:3403 [inline] wq_numa_init+0x122/0x49f kernel/workqueue.c:5994 workqueue_init+0x18/0x5e1 kernel/workqueue.c:6121 kernel_init_freeable+0x40a/0x5c5 init/main.c:1603 kernel_init+0x19/0x290 init/main.c:1510 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 SOFTIRQ-ON-W at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __fs_reclaim_acquire mm/page_alloc.c:4547 [inline] fs_reclaim_acquire+0x83/0x120 mm/page_alloc.c:4561 might_alloc include/linux/sched/mm.h:206 [inline] slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x49/0x290 mm/slub.c:3245 kmalloc include/linux/slab.h:591 [inline] kzalloc include/linux/slab.h:721 [inline] alloc_workqueue_attrs kernel/workqueue.c:3403 [inline] wq_numa_init+0x122/0x49f kernel/workqueue.c:5994 workqueue_init+0x18/0x5e1 kernel/workqueue.c:6121 kernel_init_freeable+0x40a/0x5c5 init/main.c:1603 kernel_init+0x19/0x290 init/main.c:1510 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 INITIAL USE at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __fs_reclaim_acquire mm/page_alloc.c:4547 [inline] fs_reclaim_acquire+0x83/0x120 mm/page_alloc.c:4561 might_alloc include/linux/sched/mm.h:206 [inline] slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x49/0x290 mm/slub.c:3245 kmalloc include/linux/slab.h:591 [inline] kzalloc include/linux/slab.h:721 [inline] alloc_workqueue_attrs kernel/workqueue.c:3403 [inline] wq_numa_init+0x122/0x49f kernel/workqueue.c:5994 workqueue_init+0x18/0x5e1 kernel/workqueue.c:6121 kernel_init_freeable+0x40a/0x5c5 init/main.c:1603 kernel_init+0x19/0x290 init/main.c:1510 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 } ... key at: [] __fs_reclaim_map+0x0/0x160 ... acquired at: lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __fs_reclaim_acquire mm/page_alloc.c:4547 [inline] fs_reclaim_acquire+0x83/0x120 mm/page_alloc.c:4561 might_alloc include/linux/sched/mm.h:206 [inline] slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] __kmalloc_node+0x71/0x390 mm/slub.c:4451 kmalloc_node include/linux/slab.h:614 [inline] kvmalloc_node+0x80/0x140 mm/util.c:619 kvmalloc include/linux/mm.h:805 [inline] get_dist_table+0x83/0x2c0 net/sched/sch_netem.c:788 netem_change+0xa05/0x20c0 net/sched/sch_netem.c:988 netem_init+0x58/0xb0 net/sched/sch_netem.c:1075 qdisc_create+0x8ae/0x1390 net/sched/sch_api.c:1264 tc_modify_qdisc+0xac5/0x1710 rtnetlink_rcv_msg+0x993/0xee0 net/core/rtnetlink.c:5593 netlink_rcv_skb+0x1cf/0x410 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline] netlink_unicast+0x7b6/0x980 net/netlink/af_netlink.c:1356 netlink_sendmsg+0xa30/0xd60 net/netlink/af_netlink.c:1923 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg net/socket.c:724 [inline] ____sys_sendmsg+0x59e/0x8f0 net/socket.c:2412 ___sys_sendmsg+0x252/0x2e0 net/socket.c:2466 __sys_sendmsg net/socket.c:2495 [inline] __do_sys_sendmsg net/socket.c:2504 [inline] __se_sys_sendmsg+0x19a/0x260 net/socket.c:2502 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb stack backtrace: CPU: 0 PID: 10821 Comm: syz-executor.0 Not tainted 5.15.119-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 print_bad_irq_dependency kernel/locking/lockdep.c:2567 [inline] check_irq_usage kernel/locking/lockdep.c:2806 [inline] check_prev_add kernel/locking/lockdep.c:3057 [inline] check_prevs_add kernel/locking/lockdep.c:3172 [inline] validate_chain+0x4cfe/0x58b0 kernel/locking/lockdep.c:3787 __lock_acquire+0x1295/0x1ff0 kernel/locking/lockdep.c:5011 lock_acquire+0x1db/0x4f0 kernel/locking/lockdep.c:5622 __fs_reclaim_acquire mm/page_alloc.c:4547 [inline] fs_reclaim_acquire+0x83/0x120 mm/page_alloc.c:4561 might_alloc include/linux/sched/mm.h:206 [inline] slab_pre_alloc_hook+0x22/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] __kmalloc_node+0x71/0x390 mm/slub.c:4451 kmalloc_node include/linux/slab.h:614 [inline] kvmalloc_node+0x80/0x140 mm/util.c:619 kvmalloc include/linux/mm.h:805 [inline] get_dist_table+0x83/0x2c0 net/sched/sch_netem.c:788 netem_change+0xa05/0x20c0 net/sched/sch_netem.c:988 netem_init+0x58/0xb0 net/sched/sch_netem.c:1075 qdisc_create+0x8ae/0x1390 net/sched/sch_api.c:1264 tc_modify_qdisc+0xac5/0x1710 rtnetlink_rcv_msg+0x993/0xee0 net/core/rtnetlink.c:5593 netlink_rcv_skb+0x1cf/0x410 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline] netlink_unicast+0x7b6/0x980 net/netlink/af_netlink.c:1356 netlink_sendmsg+0xa30/0xd60 net/netlink/af_netlink.c:1923 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg net/socket.c:724 [inline] ____sys_sendmsg+0x59e/0x8f0 net/socket.c:2412 ___sys_sendmsg+0x252/0x2e0 net/socket.c:2466 __sys_sendmsg net/socket.c:2495 [inline] __do_sys_sendmsg net/socket.c:2504 [inline] __se_sys_sendmsg+0x19a/0x260 net/socket.c:2502 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fa0e6107389 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa0e4679168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fa0e6226f80 RCX: 00007fa0e6107389 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 RBP: 00007fa0e6152493 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe45c10b1f R14: 00007fa0e4679300 R15: 0000000000022000 BUG: sleeping function called from invalid context at include/linux/sched/mm.h:209 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 10821, name: syz-executor.0 INFO: lockdep is turned off. Preemption disabled at: [<0000000000000000>] 0x0 CPU: 0 PID: 10821 Comm: syz-executor.0 Not tainted 5.15.119-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/27/2023 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 ___might_sleep+0x547/0x6a0 kernel/sched/core.c:9625 might_alloc include/linux/sched/mm.h:209 [inline] slab_pre_alloc_hook+0x44/0xc0 mm/slab.h:492 slab_alloc_node mm/slub.c:3134 [inline] __kmalloc_node+0x71/0x390 mm/slub.c:4451 kmalloc_node include/linux/slab.h:614 [inline] kvmalloc_node+0x80/0x140 mm/util.c:619 kvmalloc include/linux/mm.h:805 [inline] get_dist_table+0x83/0x2c0 net/sched/sch_netem.c:788 netem_change+0xa05/0x20c0 net/sched/sch_netem.c:988 netem_init+0x58/0xb0 net/sched/sch_netem.c:1075 qdisc_create+0x8ae/0x1390 net/sched/sch_api.c:1264 tc_modify_qdisc+0xac5/0x1710 rtnetlink_rcv_msg+0x993/0xee0 net/core/rtnetlink.c:5593 netlink_rcv_skb+0x1cf/0x410 net/netlink/af_netlink.c:2504 netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline] netlink_unicast+0x7b6/0x980 net/netlink/af_netlink.c:1356 netlink_sendmsg+0xa30/0xd60 net/netlink/af_netlink.c:1923 sock_sendmsg_nosec net/socket.c:704 [inline] sock_sendmsg net/socket.c:724 [inline] ____sys_sendmsg+0x59e/0x8f0 net/socket.c:2412 ___sys_sendmsg+0x252/0x2e0 net/socket.c:2466 __sys_sendmsg net/socket.c:2495 [inline] __do_sys_sendmsg net/socket.c:2504 [inline] __se_sys_sendmsg+0x19a/0x260 net/socket.c:2502 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fa0e6107389 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fa0e4679168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fa0e6226f80 RCX: 00007fa0e6107389 RDX: 0000000000000000 RSI: 00000000200007c0 RDI: 0000000000000003 RBP: 00007fa0e6152493 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe45c10b1f R14: 00007fa0e4679300 R15: 0000000000022000