bisecting fixing commit since dce0f88600e49746b4bda873965b671a23ff4313 building syzkaller on ada108d08bee29122bf15427630464265c555cbc testing commit dce0f88600e49746b4bda873965b671a23ff4313 with gcc (GCC) 8.1.0 kernel signature: 2ba911dddd1f663ed21380d9da7e38909087eb8894d7616b4459e55a53d539d7 run #0: crashed: KASAN: use-after-free Write in tls_push_record run #1: crashed: KASAN: use-after-free Write in tls_push_record run #2: crashed: KASAN: slab-out-of-bounds Write in tls_push_record run #3: crashed: KASAN: use-after-free Write in tls_push_record run #4: crashed: KASAN: use-after-free Write in tls_push_record run #5: crashed: KASAN: use-after-free Write in tls_push_record run #6: crashed: KASAN: use-after-free Write in tls_push_record run #7: crashed: KASAN: use-after-free Write in tls_push_record run #8: crashed: KASAN: use-after-free in tls_push_record run #9: crashed: KASAN: use-after-free Write in tls_push_record testing current HEAD 13d2ce42de8cb98ff952f8de6307f896203854c2 testing commit 13d2ce42de8cb98ff952f8de6307f896203854c2 with gcc (GCC) 8.1.0 kernel signature: 76ea35dd6e942ac802e2fca7f6b50647ae974d0be18db1afcf1a54763b446efa run #0: crashed: KASAN: use-after-free Write in tls_push_record run #1: crashed: KASAN: use-after-free Write in tls_push_record run #2: crashed: KASAN: use-after-free Write in tls_push_record run #3: crashed: KASAN: out-of-bounds Write in tls_push_record run #4: crashed: WARNING in sk_stream_kill_queues run #5: crashed: KASAN: use-after-free Write in tls_push_record run #6: crashed: KASAN: use-after-free Write in tls_push_record run #7: crashed: KASAN: use-after-free Write in tls_push_record run #8: crashed: KASAN: out-of-bounds Write in tls_push_record run #9: crashed: KASAN: use-after-free Write in tls_push_record revisions tested: 2, total time: 25m0.445818984s (build: 18m34.063717265s, test: 5m39.37228012s) the crash still happens on HEAD commit msg: Linux 4.19.163 crash: KASAN: use-after-free Write in tls_push_record CPU: 1 PID: 7332 Comm: syz-executor.4 Not tainted 4.19.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ================================================================== Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x17c/0x22a lib/dump_stack.c:118 BUG: KASAN: use-after-free in tls_fill_prepend include/net/tls.h:379 [inline] BUG: KASAN: use-after-free in tls_push_record+0x116e/0x15f0 net/tls/tls_sw.c:220 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.2+0x5/0xb lib/fault-inject.c:149 Write of size 1 at addr ffff8881f3da8000 by task syz-executor.2/7327 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x14 mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x6f/0x3d0 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] gcmaes_encrypt.constprop.5+0x630/0xda0 arch/x86/crypto/aesni-intel_glue.c:952 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:335 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:335 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x15f0 net/tls/tls_sw.c:228 tls_sw_sendmsg+0xb42/0x1010 net/tls/tls_sw.c:467 inet_sendmsg+0x108/0x440 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xac/0xf0 net/socket.c:632 __sys_sendto+0x1f2/0x2e0 net/socket.c:1787 __do_sys_sendto net/socket.c:1799 [inline] __se_sys_sendto net/socket.c:1795 [inline] __x64_sys_sendto+0xdc/0x1a0 net/socket.c:1795 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cba9 Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f5b2a4e2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000504760 RCX: 000000000045cba9 RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 RBP: 000000000078bf00 R08: 0000000000000000 R09: 00000000000000d8 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 0000000000000a99 R14: 00000000004cd6c7 R15: 00007f5b2a4e36d4 CPU: 0 PID: 7327 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x17c/0x22a lib/dump_stack.c:118 print_address_description.cold.6+0x9/0x211 mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x307 mm/kasan/report.c:412 __asan_report_store1_noabort+0x17/0x20 mm/kasan/report.c:435 tls_fill_prepend include/net/tls.h:379 [inline] tls_push_record+0x116e/0x15f0 net/tls/tls_sw.c:220 tls_sw_push_pending_record+0xe/0x10 net/tls/tls_sw.c:257 tls_push_pending_closed_record+0xbc/0x100 net/tls/tls_main.c:203 tls_complete_pending_work include/net/tls.h:309 [inline] tls_sk_proto_close+0x479/0x980 net/tls/tls_main.c:270 inet_release+0xb4/0x1b0 net/ipv4/af_inet.c:427 inet6_release+0x46/0x60 net/ipv6/af_inet6.c:472 __sock_release+0xc2/0x290 net/socket.c:579 sock_close+0x10/0x20 net/socket.c:1140 __fput+0x249/0x7f0 fs/file_table.c:278 ____fput+0x9/0x10 fs/file_table.c:309 task_work_run+0x108/0x180 kernel/task_work.c:113 get_signal+0x1359/0x1970 kernel/signal.c:2400 do_signal+0x87/0x1860 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x159/0x1e0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x413/0x4e0 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cba9 Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f01aabe9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000004000 RBX: 0000000000504760 RCX: 000000000045cba9 RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 RBP: 000000000078bf00 R08: 0000000000000000 R09: 00000000000000d8 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 0000000000000a99 R14: 00000000004cd6c7 R15: 00007f01aabea6d4 CPU: 1 PID: 7333 Comm: syz-executor.0 Not tainted 4.19.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 The buggy address belongs to the page: Call Trace: page:ffffea0007cf6a00 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x17c/0x22a lib/dump_stack.c:118 flags: 0x17ffe0000000000() fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.2+0x5/0xb lib/fault-inject.c:149 raw: 017ffe0000000000 ffffea00075a2c08 ffff88823fff9fb8 0000000000000000 raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected __should_failslab+0xba/0xf0 mm/failslab.c:32 Memory state around the buggy address: ffff8881f3da7f00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc should_failslab+0x9/0x14 mm/slab_common.c:1588 ffff8881f3da7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x6f/0x3d0 mm/slab.c:3736 >ffff8881f3da8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff8881f3da8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff kmalloc include/linux/slab.h:520 [inline] gcmaes_encrypt.constprop.5+0x630/0xda0 arch/x86/crypto/aesni-intel_glue.c:952 ffff8881f3da8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ================================================================== page:ffffea0007cd1c00 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 flags: 0x17ffe0000000000() generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:335 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:335 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x15f0 net/tls/tls_sw.c:228 tls_sw_sendmsg+0xb42/0x1010 net/tls/tls_sw.c:467 inet_sendmsg+0x108/0x440 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xac/0xf0 net/socket.c:632 __sys_sendto+0x1f2/0x2e0 net/socket.c:1787 raw: 017ffe0000000000 ffffea0007695608 ffff88823fff9fb8 0000000000000000 raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) ------------[ cut here ]------------ __do_sys_sendto net/socket.c:1799 [inline] __se_sys_sendto net/socket.c:1795 [inline] __x64_sys_sendto+0xdc/0x1a0 net/socket.c:1795 kernel BUG at include/linux/mm.h:519! do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 invalid opcode: 0000 [#1] PREEMPT SMP KASAN entry_SYSCALL_64_after_hwframe+0x49/0xbe CPU: 0 PID: 7334 Comm: syz-executor.1 Tainted: G B 4.19.163-syzkaller #0 RIP: 0033:0x45cba9 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:put_page_testzero include/linux/mm.h:519 [inline] RIP: 0010:put_page include/linux/mm.h:962 [inline] RIP: 0010:tls_sk_proto_close+0x63e/0x980 net/tls/tls_main.c:277 Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 Code: 4b 7b ff 48 8b b5 50 ff ff ff 4c 89 ff 48 8b 85 58 ff ff ff ff d0 e9 0c ff ff ff 48 c7 c6 40 51 c9 87 4c 89 f7 e8 52 bf a0 fb <0f> 0b be 00 00 10 00 4c 89 ff e8 33 ba 7a ff e9 8e fd ff ff 49 8d RSP: 002b:00007fa865fdac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RSP: 0018:ffff8881d3da7a20 EFLAGS: 00010246 RAX: ffffffffffffffda RBX: 0000000000504760 RCX: 000000000045cba9 RAX: dffffc0000000000 RBX: ffff8881f430f280 RCX: 0000000000000000 RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 RDX: 1ffffd4000f9a387 RSI: 0000000000000000 RDI: ffffea0007cd1c38 RBP: ffff8881d3da7ae0 R08: ffffed103ed03eef R09: ffffed103ed03eee RBP: 000000000078bf00 R08: 0000000000000000 R09: 00000000000000d8 R10: ffffed103ed03eee R11: ffff8881f681f777 R12: ffff8881d3816360 R13: dffffc0000000000 R14: ffffea0007cd1c00 R15: ffff8881f4bfc400 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 FS: 00007fd401948700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 R13: 0000000000000a99 R14: 00000000004cd6c7 R15: 00007fa865fdb6d4 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CPU: 1 PID: 7330 Comm: syz-executor.5 Tainted: G B 4.19.163-syzkaller #0 CR2: 00007f6b99f42000 CR3: 00000001d9df0001 CR4: 00000000001606f0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Call Trace: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x17c/0x22a lib/dump_stack.c:118 Call Trace: fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.2+0x5/0xb lib/fault-inject.c:149 inet_release+0xb4/0x1b0 net/ipv4/af_inet.c:427 inet6_release+0x46/0x60 net/ipv6/af_inet6.c:472 __should_failslab+0xba/0xf0 mm/failslab.c:32 __sock_release+0xc2/0x290 net/socket.c:579 should_failslab+0x9/0x14 mm/slab_common.c:1588 sock_close+0x10/0x20 net/socket.c:1140 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x6f/0x3d0 mm/slab.c:3736 __fput+0x249/0x7f0 fs/file_table.c:278 kmalloc include/linux/slab.h:520 [inline] gcmaes_encrypt.constprop.5+0x630/0xda0 arch/x86/crypto/aesni-intel_glue.c:952 ____fput+0x9/0x10 fs/file_table.c:309 task_work_run+0x108/0x180 kernel/task_work.c:113 get_signal+0x1359/0x1970 kernel/signal.c:2400 do_signal+0x87/0x1860 arch/x86/kernel/signal.c:821 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:335 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:335 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x15f0 net/tls/tls_sw.c:228 tls_sw_sendmsg+0xb42/0x1010 net/tls/tls_sw.c:467 exit_to_usermode_loop+0x159/0x1e0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x413/0x4e0 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cba9 Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 inet_sendmsg+0x108/0x440 net/ipv4/af_inet.c:798 RSP: 002b:00007fd401947c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000004000 RBX: 0000000000504760 RCX: 000000000045cba9 RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 sock_sendmsg_nosec net/socket.c:622 [inline] sock_sendmsg+0xac/0xf0 net/socket.c:632 RBP: 000000000078bf00 R08: 0000000000000000 R09: 00000000000000d8 __sys_sendto+0x1f2/0x2e0 net/socket.c:1787 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 0000000000000a99 R14: 00000000004cd6c7 R15: 00007fd4019486d4 Modules linked in: page:ffffea00075abe00 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 flags: 0x17ffe0000000000() raw: 017ffe0000000000 ffffea0007522408 ffff88823fff9fb8 0000000000000000 raw: 0000000000000000 0000000000000003 00000000ffffff7f 0000000000000000 page dumped because: VM_BUG_ON_PAGE(page_ref_count(page) == 0) ------------[ cut here ]------------ kernel BUG at include/linux/mm.h:519! invalid opcode: 0000 [#2] PREEMPT SMP KASAN CPU: 0 PID: 7331 Comm: syz-executor.3 Tainted: G B D 4.19.163-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 __do_sys_sendto net/socket.c:1799 [inline] __se_sys_sendto net/socket.c:1795 [inline] __x64_sys_sendto+0xdc/0x1a0 net/socket.c:1795 RIP: 0010:put_page_testzero include/linux/mm.h:519 [inline] RIP: 0010:put_page include/linux/mm.h:962 [inline] RIP: 0010:tls_sk_proto_close+0x63e/0x980 net/tls/tls_main.c:277 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 Code: 4b 7b ff 48 8b b5 50 ff ff ff 4c 89 ff 48 8b 85 58 ff ff ff ff d0 e9 0c ff ff ff 48 c7 c6 40 51 c9 87 4c 89 f7 e8 52 bf a0 fb <0f> 0b be 00 00 10 00 4c 89 ff e8 33 ba 7a ff e9 8e fd ff ff 49 8d entry_SYSCALL_64_after_hwframe+0x49/0xbe RSP: 0018:ffff8881d47bfa20 EFLAGS: 00010246 RIP: 0033:0x45cba9 RAX: dffffc0000000000 RBX: ffff8881d6ee4840 RCX: 0000000000000000 Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RDX: 1ffffd4000eb57c7 RSI: 0000000000000000 RDI: ffffea00075abe38 RSP: 002b:00007f7e24ca4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RBP: ffff8881d47bfae0 R08: ffffed103ed05081 R09: ffffed103ed05080 RAX: ffffffffffffffda RBX: 0000000000504760 RCX: 000000000045cba9 R10: ffffed103ed05080 R11: ffff8881f6828407 R12: ffff8881d3fe94a0 RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 R13: dffffc0000000000 R14: ffffea00075abe00 R15: ffff8881d7a06e00 RBP: 000000000078bf00 R08: 0000000000000000 R09: 00000000000000d8 FS: 00007fd171301700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 0000000000000a99 R14: 00000000004cd6c7 R15: 00007f7e24ca56d4 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 page:ffffea00076c2400 count:0 mapcount:-128 mapping:0000000000000000 index:0x0 CR2: 00007f6b8c037028 CR3: 00000001d4b88006 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: inet_release+0xb4/0x1b0 net/ipv4/af_inet.c:427 inet6_release+0x46/0x60 net/ipv6/af_inet6.c:472 __sock_release+0xc2/0x290 net/socket.c:579 sock_close+0x10/0x20 net/socket.c:1140 __fput+0x249/0x7f0 fs/file_table.c:278 ____fput+0x9/0x10 fs/file_table.c:309 flags: 0x17ffe0000000000() task_work_run+0x108/0x180 kernel/task_work.c:113 get_signal+0x1359/0x1970 kernel/signal.c:2400 do_signal+0x87/0x1860 arch/x86/kernel/signal.c:821 raw: 017ffe0000000000 ffffea0007741808 ffff88823fff9fb8 0000000000000000 raw: 0000000000000000 ffff8881db090880 0000000100000001 0000000000000000 exit_to_usermode_loop+0x159/0x1e0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x413/0x4e0 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45cba9 Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fd171300c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000004000 RBX: 0000000000504760 RCX: 000000000045cba9 RDX: 00000000e0ffffff RSI: 00000000200005c0 RDI: 0000000000000003 RBP: 000000000078bf00 R08: 0000000000000000 R09: 00000000000000d8 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 0000000000000a99 R14: 00000000004cd6c7 R15: 00007fd1713016d4 Modules linked in: