./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor1879592342 <...> forked to background, child pid 3209 [ 34.170202][ T3210] 8021q: adding VLAN 0 to HW filter on device bond0 [ 34.195145][ T3210] eql: remember to turn off Van-Jacobson compression on your slave devices Starting sshd: [ 34.612962][ T3302] sshd (3302) used greatest stack depth: 22392 bytes left OK syzkaller Warning: Permanently added '10.128.10.53' (ECDSA) to the list of known hosts. execve("./syz-executor1879592342", ["./syz-executor1879592342"], 0x7ffd8a7d1fd0 /* 10 vars */) = 0 brk(NULL) = 0x555555ac9000 brk(0x555555ac9c40) = 0x555555ac9c40 arch_prctl(ARCH_SET_FS, 0x555555ac9300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 readlink("/proc/self/exe", "/root/syz-executor1879592342", 4096) = 28 brk(0x555555aeac40) = 0x555555aeac40 brk(0x555555aeb000) = 0x555555aeb000 mprotect(0x7f871cff1000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 socket(AF_PPPOX, SOCK_STREAM, 1) = 3 socket(AF_INET6, SOCK_DGRAM, IPPROTO_IP) = 4 syzkaller login: [ 57.018192][ T3642] [ 57.020550][ T3642] ======================================================== [ 57.027724][ T3642] WARNING: possible irq lock inversion dependency detected [ 57.034896][ T3642] 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 Not tainted [ 57.041897][ T3642] -------------------------------------------------------- [ 57.049066][ T3642] syz-executor187/3642 just changed the state of lock: [ 57.055892][ T3642] ffff88814c00c3b8 (clock-AF_INET6){+++.}-{2:2}, at: l2tp_tunnel_register+0x126/0x1210 [ 57.065566][ T3642] but this lock was taken by another, SOFTIRQ-safe lock in the past: [ 57.073606][ T3642] (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} [ 57.073625][ T3642] [ 57.073625][ T3642] [ 57.073625][ T3642] and interrupts could create inverse lock ordering between them. [ 57.073625][ T3642] [ 57.093861][ T3642] [ 57.093861][ T3642] other info that might help us debug this: [ 57.101900][ T3642] Possible interrupt unsafe locking scenario: [ 57.101900][ T3642] [ 57.110205][ T3642] CPU0 CPU1 [ 57.115561][ T3642] ---- ---- [ 57.120929][ T3642] lock(clock-AF_INET6); [ 57.125270][ T3642] local_irq_disable(); [ 57.132028][ T3642] lock(&tcp_hashinfo.bhash[i].lock); [ 57.140009][ T3642] lock(clock-AF_INET6); [ 57.146884][ T3642] [ 57.150329][ T3642] lock(&tcp_hashinfo.bhash[i].lock); [ 57.155965][ T3642] [ 57.155965][ T3642] *** DEADLOCK *** [ 57.155965][ T3642] [ 57.164100][ T3642] 1 lock held by syz-executor187/3642: [ 57.169556][ T3642] #0: ffff8881479e1130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xadc/0x1a10 [ 57.179512][ T3642] [ 57.179512][ T3642] the shortest dependencies between 2nd lock and 1st lock: [ 57.188880][ T3642] -> (&tcp_hashinfo.bhash[i].lock){+.-.}-{2:2} { [ 57.195323][ T3642] HARDIRQ-ON-W at: [ 57.199394][ T3642] lock_acquire+0x1e3/0x630 [ 57.205743][ T3642] _raw_spin_lock_bh+0x33/0x40 [ 57.212338][ T3642] inet_csk_get_port+0x66a/0x2640 [ 57.219211][ T3642] __inet6_bind+0x625/0x1b20 [ 57.225639][ T3642] inet6_bind+0x177/0x220 [ 57.231803][ T3642] rds_tcp_listen_init+0x2a9/0x4e0 [ 57.238750][ T3642] rds_tcp_init_net+0x21d/0x4f0 [ 57.245435][ T3642] ops_init+0xb9/0x680 [ 57.251362][ T3642] register_pernet_operations+0x35a/0x850 [ 57.258924][ T3642] register_pernet_device+0x2a/0x80 [ 57.266079][ T3642] rds_tcp_init+0x65/0xd3 [ 57.272256][ T3642] do_one_initcall+0x141/0x780 [ 57.278908][ T3642] kernel_init_freeable+0x6ff/0x788 [ 57.285972][ T3642] kernel_init+0x1e/0x1d0 [ 57.292139][ T3642] ret_from_fork+0x1f/0x30 [ 57.298396][ T3642] IN-SOFTIRQ-W at: [ 57.302465][ T3642] lock_acquire+0x1e3/0x630 [ 57.308807][ T3642] _raw_spin_lock+0x2e/0x40 [ 57.315139][ T3642] __inet_inherit_port+0x297/0x14e0 [ 57.322177][ T3642] tcp_v4_syn_recv_sock+0xb5b/0x14c0 [ 57.329292][ T3642] tcp_check_req+0x632/0x1aa0 [ 57.336054][ T3642] tcp_v4_rcv+0x24b4/0x3980 [ 57.342384][ T3642] ip_protocol_deliver_rcu+0x9f/0x7c0 [ 57.349594][ T3642] ip_local_deliver_finish+0x2ec/0x4c0 [ 57.356883][ T3642] ip_local_deliver+0x1ae/0x200 [ 57.363566][ T3642] ip_sublist_rcv_finish+0x9a/0x2c0 [ 57.370597][ T3642] ip_sublist_rcv+0x533/0x980 [ 57.377104][ T3642] ip_list_rcv+0x31e/0x470 [ 57.383362][ T3642] __netif_receive_skb_list_core+0x548/0x8f0 [ 57.391201][ T3642] netif_receive_skb_list_internal+0x75f/0xd90 [ 57.399225][ T3642] napi_complete_done+0x1f5/0x890 [ 57.406373][ T3642] virtnet_poll+0xd08/0x1300 [ 57.413076][ T3642] __napi_poll+0xb8/0x770 [ 57.419253][ T3642] net_rx_action+0xa00/0xde0 [ 57.425788][ T3642] __do_softirq+0x1fb/0xadc [ 57.432131][ T3642] __irq_exit_rcu+0x123/0x180 [ 57.438657][ T3642] irq_exit_rcu+0x9/0x20 [ 57.444725][ T3642] common_interrupt+0xad/0xd0 [ 57.451249][ T3642] asm_common_interrupt+0x26/0x40 [ 57.458126][ T3642] acpi_idle_do_entry+0x1fd/0x2a0 [ 57.464983][ T3642] acpi_idle_enter+0x368/0x510 [ 57.471584][ T3642] cpuidle_enter_state+0x1af/0xd40 [ 57.478550][ T3642] cpuidle_enter+0x4e/0xa0 [ 57.484817][ T3642] do_idle+0x3f7/0x590 [ 57.490808][ T3642] cpu_startup_entry+0x18/0x20 [ 57.497411][ T3642] rest_init+0x16d/0x270 [ 57.503485][ T3642] arch_call_rest_init+0x13/0x1c [ 57.510264][ T3642] start_kernel+0x477/0x498 [ 57.516607][ T3642] secondary_startup_64_no_verify+0xce/0xdb [ 57.524336][ T3642] INITIAL USE at: [ 57.528321][ T3642] lock_acquire+0x1e3/0x630 [ 57.534588][ T3642] _raw_spin_lock_bh+0x33/0x40 [ 57.541098][ T3642] inet_csk_get_port+0x66a/0x2640 [ 57.547884][ T3642] __inet6_bind+0x625/0x1b20 [ 57.554232][ T3642] inet6_bind+0x177/0x220 [ 57.560317][ T3642] rds_tcp_listen_init+0x2a9/0x4e0 [ 57.567178][ T3642] rds_tcp_init_net+0x21d/0x4f0 [ 57.573786][ T3642] ops_init+0xb9/0x680 [ 57.579605][ T3642] register_pernet_operations+0x35a/0x850 [ 57.587084][ T3642] register_pernet_device+0x2a/0x80 [ 57.594037][ T3642] rds_tcp_init+0x65/0xd3 [ 57.600113][ T3642] do_one_initcall+0x141/0x780 [ 57.606624][ T3642] kernel_init_freeable+0x6ff/0x788 [ 57.613579][ T3642] kernel_init+0x1e/0x1d0 [ 57.619668][ T3642] ret_from_fork+0x1f/0x30 [ 57.625920][ T3642] } [ 57.628509][ T3642] ... key at: [] __key.1+0x0/0x40 [ 57.635738][ T3642] ... acquired at: [ 57.639630][ T3642] _raw_read_lock_bh+0x3f/0x70 [ 57.644575][ T3642] sock_i_uid+0x1f/0xb0 [ 57.648913][ T3642] inet_csk_get_port+0x869/0x2640 [ 57.654126][ T3642] __inet6_bind+0x625/0x1b20 [ 57.658908][ T3642] inet6_bind+0x177/0x220 [ 57.663434][ T3642] __sys_bind+0x1ed/0x260 [ 57.667935][ T3642] __x64_sys_bind+0x73/0xb0 [ 57.672611][ T3642] do_syscall_64+0x39/0xb0 [ 57.677214][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.683294][ T3642] [ 57.685611][ T3642] -> (clock-AF_INET6){+++.}-{2:2} { [ 57.690832][ T3642] HARDIRQ-ON-W at: [ 57.694810][ T3642] lock_acquire+0x1e3/0x630 [ 57.700981][ T3642] _raw_write_lock_bh+0x33/0x40 [ 57.707490][ T3642] sk_common_release+0xc6/0x390 [ 57.714001][ T3642] inet_release+0x132/0x270 [ 57.720164][ T3642] inet6_release+0x50/0x70 [ 57.726240][ T3642] __sock_release+0xcd/0x280 [ 57.732495][ T3642] sock_close+0x1c/0x20 [ 57.738315][ T3642] __fput+0x27c/0xa90 [ 57.743958][ T3642] task_work_run+0x16f/0x270 [ 57.750214][ T3642] exit_to_user_mode_prepare+0x23c/0x250 [ 57.757500][ T3642] syscall_exit_to_user_mode+0x1d/0x50 [ 57.764616][ T3642] do_syscall_64+0x46/0xb0 [ 57.770697][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.778253][ T3642] HARDIRQ-ON-R at: [ 57.782229][ T3642] lock_acquire+0x1e3/0x630 [ 57.788401][ T3642] _raw_read_lock_bh+0x3f/0x70 [ 57.794823][ T3642] sock_i_uid+0x1f/0xb0 [ 57.800638][ T3642] udp_lib_lport_inuse+0x32/0x490 [ 57.807325][ T3642] udp_lib_get_port+0x835/0x18c0 [ 57.813931][ T3642] __inet6_bind+0x625/0x1b20 [ 57.820184][ T3642] inet6_bind+0x177/0x220 [ 57.826175][ T3642] __sys_bind+0x1ed/0x260 [ 57.832156][ T3642] __x64_sys_bind+0x73/0xb0 [ 57.838313][ T3642] do_syscall_64+0x39/0xb0 [ 57.844396][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.851951][ T3642] SOFTIRQ-ON-W at: [ 57.855930][ T3642] lock_acquire+0x1e3/0x630 [ 57.862102][ T3642] _raw_write_lock+0x2e/0x40 [ 57.868348][ T3642] l2tp_tunnel_register+0x126/0x1210 [ 57.875299][ T3642] pppol2tp_connect+0xcdc/0x1a10 [ 57.881903][ T3642] __sys_connect_file+0x153/0x1a0 [ 57.888580][ T3642] __sys_connect+0x165/0x1a0 [ 57.894820][ T3642] __x64_sys_connect+0x73/0xb0 [ 57.901240][ T3642] do_syscall_64+0x39/0xb0 [ 57.907321][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 57.914880][ T3642] INITIAL USE at: [ 57.918771][ T3642] lock_acquire+0x1e3/0x630 [ 57.924855][ T3642] _raw_write_lock_bh+0x33/0x40 [ 57.931283][ T3642] sk_common_release+0xc6/0x390 [ 57.937714][ T3642] inet_release+0x132/0x270 [ 57.943787][ T3642] inet6_release+0x50/0x70 [ 57.949779][ T3642] __sock_release+0xcd/0x280 [ 57.955946][ T3642] sock_close+0x1c/0x20 [ 57.961697][ T3642] __fput+0x27c/0xa90 [ 57.967255][ T3642] task_work_run+0x16f/0x270 [ 57.973419][ T3642] exit_to_user_mode_prepare+0x23c/0x250 [ 57.980617][ T3642] syscall_exit_to_user_mode+0x1d/0x50 [ 57.987647][ T3642] do_syscall_64+0x46/0xb0 [ 57.993640][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.001110][ T3642] INITIAL READ USE at: [ 58.005435][ T3642] lock_acquire+0x1e3/0x630 [ 58.011951][ T3642] _raw_read_lock_bh+0x3f/0x70 [ 58.018724][ T3642] sock_i_uid+0x1f/0xb0 [ 58.024881][ T3642] udp_lib_lport_inuse+0x32/0x490 [ 58.031915][ T3642] udp_lib_get_port+0x835/0x18c0 [ 58.038864][ T3642] __inet6_bind+0x625/0x1b20 [ 58.045475][ T3642] inet6_bind+0x177/0x220 [ 58.051817][ T3642] __sys_bind+0x1ed/0x260 [ 58.058148][ T3642] __x64_sys_bind+0x73/0xb0 [ 58.064651][ T3642] do_syscall_64+0x39/0xb0 [ 58.071080][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.078986][ T3642] } [ 58.081478][ T3642] ... key at: [] af_callback_keys+0xa0/0x300 [ 58.089552][ T3642] ... acquired at: [ 58.093352][ T3642] __lock_acquire+0x893/0x56d0 [ 58.098326][ T3642] lock_acquire+0x1e3/0x630 [ 58.103030][ T3642] _raw_write_lock+0x2e/0x40 [ 58.107803][ T3642] l2tp_tunnel_register+0x126/0x1210 [ 58.113281][ T3642] pppol2tp_connect+0xcdc/0x1a10 [ 58.118405][ T3642] __sys_connect_file+0x153/0x1a0 [ 58.123606][ T3642] __sys_connect+0x165/0x1a0 [ 58.128372][ T3642] __x64_sys_connect+0x73/0xb0 [ 58.133327][ T3642] do_syscall_64+0x39/0xb0 [ 58.137938][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.144017][ T3642] [ 58.146335][ T3642] [ 58.146335][ T3642] stack backtrace: [ 58.152215][ T3642] CPU: 1 PID: 3642 Comm: syz-executor187 Not tainted 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 [ 58.162644][ T3642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 58.172709][ T3642] Call Trace: [ 58.175987][ T3642] [ 58.178921][ T3642] dump_stack_lvl+0xd1/0x138 [ 58.183526][ T3642] mark_lock.part.0.cold+0x61/0xd8 [ 58.188656][ T3642] ? lock_chain_count+0x20/0x20 [ 58.193539][ T3642] ? register_lock_class+0xbe/0x1120 [ 58.198869][ T3642] ? filter_irq_stacks+0x90/0x90 [ 58.203829][ T3642] ? __lock_acquire+0xbc3/0x56d0 [ 58.208793][ T3642] __lock_acquire+0x893/0x56d0 [ 58.213587][ T3642] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 58.219593][ T3642] ? find_held_lock+0x2d/0x110 [ 58.224390][ T3642] lock_acquire+0x1e3/0x630 [ 58.228946][ T3642] ? l2tp_tunnel_register+0x126/0x1210 [ 58.234442][ T3642] ? lock_release+0x810/0x810 [ 58.239144][ T3642] ? __fget_files+0x26a/0x440 [ 58.243838][ T3642] _raw_write_lock+0x2e/0x40 [ 58.248443][ T3642] ? l2tp_tunnel_register+0x126/0x1210 [ 58.253917][ T3642] l2tp_tunnel_register+0x126/0x1210 [ 58.259237][ T3642] ? sprintf+0xc4/0x100 [ 58.263397][ T3642] ? l2tp_tunnel_del_work+0x780/0x780 [ 58.268786][ T3642] ? debug_object_free+0x360/0x360 [ 58.273928][ T3642] ? lockdep_init_map_type+0x21e/0x800 [ 58.279409][ T3642] ? lockdep_init_map_type+0x21e/0x800 [ 58.284894][ T3642] ? l2tp_tunnel_create+0x2bf/0x4b0 [ 58.290106][ T3642] ? l2tp_tunnel_create+0x3c6/0x4b0 [ 58.295318][ T3642] pppol2tp_connect+0xcdc/0x1a10 [ 58.300285][ T3642] ? pppol2tp_put_sk+0xd0/0xd0 [ 58.305071][ T3642] ? aa_sk_perm+0x313/0xab0 [ 58.309593][ T3642] ? aa_af_perm+0x240/0x240 [ 58.314116][ T3642] ? bpf_lsm_socket_connect+0x9/0x10 [ 58.319413][ T3642] ? pppol2tp_put_sk+0xd0/0xd0 [ 58.324190][ T3642] __sys_connect_file+0x153/0x1a0 [ 58.329223][ T3642] __sys_connect+0x165/0x1a0 [ 58.333821][ T3642] ? __sys_connect_file+0x1a0/0x1a0 [ 58.339030][ T3642] ? _raw_spin_unlock_irq+0x23/0x50 [ 58.344243][ T3642] ? lockdep_hardirqs_on+0x7d/0x100 [ 58.349449][ T3642] ? _raw_spin_unlock_irq+0x2e/0x50 [ 58.354662][ T3642] __x64_sys_connect+0x73/0xb0 [ 58.359429][ T3642] do_syscall_64+0x39/0xb0 [ 58.363863][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.369775][ T3642] RIP: 0033:0x7f871cf84b99 [ 58.374196][ T3642] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 58.393812][ T3642] RSP: 002b:00007fff53ae7948 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 58.402233][ T3642] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871cf84b99 [ 58.410205][ T3642] RDX: 000000000000002e RSI: 0000000020000000 RDI: 0000000000000003 [ 58.418193][ T3642] RBP: 00007f871cf48d40 R08: 0000000000000000 R09: 0000000000000000 [ 58.426174][ T3642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f871cf48dd0 [ 58.434148][ T3642] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 58.442133][ T3642] [ 58.445437][ T3642] BUG: sleeping function called from invalid context at include/linux/percpu-rwsem.h:49 [ 58.455197][ T3642] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 3642, name: syz-executor187 [ 58.464698][ T3642] preempt_count: 1, expected: 0 [ 58.469554][ T3642] RCU nest depth: 0, expected: 0 [ 58.474506][ T3642] INFO: lockdep is turned off. [ 58.479245][ T3642] Preemption disabled at: [ 58.479250][ T3642] [<0000000000000000>] 0x0 [ 58.487982][ T3642] CPU: 1 PID: 3642 Comm: syz-executor187 Not tainted 6.1.0-rc4-syzkaller-00212-g064bc7312bd0 #0 [ 58.498387][ T3642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 58.508440][ T3642] Call Trace: [ 58.511704][ T3642] [ 58.514637][ T3642] dump_stack_lvl+0xd1/0x138 [ 58.519226][ T3642] __might_resched.cold+0x222/0x26b [ 58.524416][ T3642] cpus_read_lock+0x1b/0x140 [ 58.528995][ T3642] static_key_slow_inc+0x12/0x20 [ 58.533922][ T3642] setup_udp_tunnel_sock+0x43d/0x550 [ 58.539197][ T3642] l2tp_tunnel_register+0xc51/0x1210 [ 58.544479][ T3642] ? l2tp_tunnel_del_work+0x780/0x780 [ 58.549841][ T3642] ? debug_object_free+0x360/0x360 [ 58.554945][ T3642] ? l2tp_recv_common+0x3100/0x3100 [ 58.560134][ T3642] ? l2tp_tunnel_delete+0x50/0x50 [ 58.565160][ T3642] ? l2tp_tunnel_create+0x2bf/0x4b0 [ 58.570348][ T3642] ? l2tp_tunnel_create+0x3c6/0x4b0 [ 58.575535][ T3642] pppol2tp_connect+0xcdc/0x1a10 [ 58.580468][ T3642] ? pppol2tp_put_sk+0xd0/0xd0 [ 58.585222][ T3642] ? aa_sk_perm+0x313/0xab0 [ 58.589715][ T3642] ? aa_af_perm+0x240/0x240 [ 58.594217][ T3642] ? bpf_lsm_socket_connect+0x9/0x10 [ 58.599515][ T3642] ? pppol2tp_put_sk+0xd0/0xd0 [ 58.604295][ T3642] __sys_connect_file+0x153/0x1a0 [ 58.609329][ T3642] __sys_connect+0x165/0x1a0 [ 58.613922][ T3642] ? __sys_connect_file+0x1a0/0x1a0 [ 58.619131][ T3642] ? _raw_spin_unlock_irq+0x23/0x50 [ 58.624340][ T3642] ? lockdep_hardirqs_on+0x7d/0x100 [ 58.629543][ T3642] ? _raw_spin_unlock_irq+0x2e/0x50 [ 58.634754][ T3642] __x64_sys_connect+0x73/0xb0 [ 58.639525][ T3642] do_syscall_64+0x39/0xb0 [ 58.643961][ T3642] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 58.649868][ T3642] RIP: 0033:0x7f871cf84b99 [ 58.654283][ T3642] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 connect(3, {sa_family=AF_PPPOX, sa_data="\x01\x00\x00\x00\x03\x00\x00\x00\x04\x00\x00\x00\x02\x00\x00\x00\xac\x14\x14\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"}, 46) = 0 exit_group(0) = ? +++ exited with 0 +++ [ 58.673897][ T3642]