Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6788326rwb; Tue, 15 Nov 2022 03:50:40 -0800 (PST) X-Google-Smtp-Source: AA0mqf4XYjJ6sAkuifCWA3v8z98H/VRk+D1hqcH2leCqBYcMdkwD0nfGPhOV84ndIhFKKdjpRUE/ X-Received: by 2002:a62:17d8:0:b0:572:149c:e278 with SMTP id 207-20020a6217d8000000b00572149ce278mr9102851pfx.8.1668513040052; Tue, 15 Nov 2022 03:50:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668513040; cv=none; d=google.com; s=arc-20160816; b=UyJeua0fwCrWmB1RjrTNEjIrVca2O/JYRJ/U/LcXeJKNRqNoaHsla3mnTtSOB8anKm E6N9IK3MgsLxKK1jGqqrwgjs+iPAC7vapi2RW/IutsVrlkqKT1YH2lNZPbZ8FUd8fpbC FNLlk6hzVOGb4heYy7l/sKG7TYbM9ZSw1h+4rv+UZrdRAg4fX7HrZMogut9hxGFsLg8i rU1ciL+4pYqADXvgRY+/Xu0Ezbt807FoTpFdckvbr0GK9yILmpD1O3GTo/OMeICpQum8 FKBv32xPRvkzMnlXgI30lbWpOjIgXMOxbrT+l15QRc9wt0fAKDtN2Qd3Gp6npyXitTHI LDMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:ui-outboundreport:content-transfer-encoding :in-reply-to:subject:from:references:cc:to:content-language :user-agent:mime-version:date:message-id; bh=H1EyV4ixuBLFWFvFiM2X0D1ZSVB3st3Bu3nhngMQvM0=; b=yil/GNnkmD3pIs1SW2NGrEq5xkCHUDtk1Y9Cn3v1zxpGF+9AiOU5IMlGaRv7NrmKlO Kos/Kh3KON+vgkxYr50PndOOfIUCi65zw/IrJnNMqn0DbNY5ALPhI2NQ4ps1pk56bpEm lZZgYHo7le7NxcMSEhM6zfqiYs4oJ/tMNUeTnzbBf7KHx5yaz9b9cMNUKjPOI5Nj0Nk5 BASGX+UG3yI+tFzQGZuOzdc8feqyLh9+a6MkrMRFfYbzfOOGp3eqP+XLza39NbBMMvf3 Y9YKxgiaX1XFqCkmfLdgGOf85MZFYnv4aRquM11x3VWOA85nHTvNQacxq2yzqV2SjBo9 qf4g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gmx.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 33-20020a631561000000b004404162e5e0si11831220pgv.593.2022.11.15.03.50.28; Tue, 15 Nov 2022 03:50:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gmx.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229634AbiKOLPg (ORCPT + 89 others); Tue, 15 Nov 2022 06:15:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51890 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230052AbiKOLPC (ORCPT ); Tue, 15 Nov 2022 06:15:02 -0500 Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A0D3F233AB; Tue, 15 Nov 2022 03:14:58 -0800 (PST) Received: from [0.0.0.0] ([149.28.201.231]) by mail.gmx.net (mrgmx104 [212.227.17.174]) with ESMTPSA (Nemesis) id 1MiJVG-1pQMm605pe-00fR8u; Tue, 15 Nov 2022 12:14:48 +0100 Message-ID: <12d5eb57-af18-c099-9a60-6a1d564182af@gmx.com> Date: Tue, 15 Nov 2022 19:14:42 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Content-Language: en-US To: Wei Chen Cc: clm@fb.com, josef@toxicpanda.com, dsterba@suse.com, linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org, osandov@fb.com, sweettea-kernel@dorminy.me, syzkaller-bugs@googlegroups.com References: <08a18fd6-3ce8-a063-90cf-e659004d0894@gmx.com> From: Qu Wenruo Subject: Re: WARNING in _btrfs_ioctl_set_received_subvol In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K1:ibwkcpj1J7g3zglAj4IbUeajTqgWcUAeODm4RaJ8ReU95Za65qL U/tCFNo0HKtYfBS7FYdpwPDR3rtLHumtlMFfg3X9qMe0omO8pYXUIUa09lKm2bkjKFwkqYl xWndTgFeVMOa//3yaciqP6pLTfgXIZrg75LY5ia89odQQjTVRmPQKKhqdUoWrH6TD3+Czzc ZW086im6R7jIBCU3RVtoA== UI-OutboundReport: notjunk:1;M01:P0:WqEgpc6N5yo=;TuEu6/Psrj6q3gKl4OwKDN3hBZ2 MYvEcEhlZFectI3E9FBr9e0SdrPfVADVNtDQDZe1PiV70s1EByNTVDyS83TLqrgVEWL3YtHd3 b6m/ukpz8juxGtNenPFCEKs8LDRTgr+Fb89PavQxPb1s0VakrPSTh4wwx0UZxr2F3OG43g6RS FopViVdYVzpCQVzklc9n9G4rsKo2K2G7LMtmV2VeCXVGWbV2ierZhIYLazwtUtGsZECxa8hlR 3ZkZ5HKPxG7klnUAkKDAIHVPvaTYzYSJhnbG2SmESNqRbhfFQKGNZXhIh3G6GI9/DnGqdw/9I KFOnp8Vz4IfnIRZeNOnjbICuePyxXtOGO6UjeSq4Drg5ASjwOEXySidtwOkhRurSdYpYERIFd VQpxvFZTuURmSN7AQWygQas1kYQFvRf92gq5kfnzKBaVOEpo139C0AGOAP6cOC557+iggmV59 v+NkILinnjVWkh+qq/pItxf9tT0K+52wOVrrKiaBQ5xRPVGfBEOJAw5aToPcTpORKYp67sYXJ 7FRicBRp0N+ED3/VjeOTBGQX6whwsllRc++KJ17ahReHLSa6uR2wDCj0KAHwyDNuJrsGHoNIZ /X9KvzKAnqNL7BauExttWW5OWF7egN9E4ppLSpJLkhXwxnEA4CskJXX6Ppoo2KntlWTAkqKk6 ivcJ/RjbsKwTJeV4aTu1qB0QQdcNhTlrHTKAnH951Vx/fG22ZPkyFTQL7NYbeCuA0/cOluc9w BUmojzSCM0VZZapPjoEZOcXEwJR96RATOEMB0YXCr5eCGUxe91L3N+bZ/SaJe8bEzvg3E+xfv j8HyXja8hQNE4u7p0RRjjFPD58z38V3Rg7bF7hKd6O0ydYPepmbC8mNKmysmo8N9NjiQqNZJ/ mxD8EJTvxqvyiJzHkzeY54tjfxuPI2UnjTiYxAMtWGByDdWAo1moQIkliDGhVD0jI9QiQAQ/2 +dHaOeTMWimTPbOqVyYbPSb/hqkIdPQOvmD6bB6vPehB+7JdXgoCmp7m6y237D7o5AhxOA== X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,FREEMAIL_FROM, NICE_REPLY_A,RCVD_IN_DNSWL_LOW,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/11/15 18:48, Wei Chen wrote: > Dear Linux developers, > > Thank you for the advice. Please find the crash report in the upstream > release v6.0.0 below. You know what? Even using your v6.0.0 report, it's just doing more harm than good. Your reports never include the most important part - The 6.0 report is the worst. panic_on_warn hides the original line number. - The v5.15.76 report only make sense if one digs the full console output. I just spend several minutes on the v5.15.76 report, and you know what? The line number points to btrfs_abort_transaction(). And what caused the abort transaction? Nope, your email just cut it and only shows the WARN() line. Then more time spent on your console output, you know what? Fault injection: FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 29222 Comm: syz-executor.0 Not tainted 5.15.76 #5 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x8d/0xcf should_fail+0x13c/0x160 should_failslab+0x5/0x10 kmem_cache_alloc+0x6a/0x360 ? __mutex_unlock_slowpath+0x3c/0x280 btrfs_uuid_tree_remove+0x6e/0x270 ? btrfs_record_root_in_trans+0x6f/0x90 ? start_transaction+0x115/0x970 _btrfs_ioctl_set_received_subvol+0x1d7/0x430 ? btrfs_ioctl+0x2154/0x3d50 btrfs_ioctl+0x2154/0x3d50 ? __fget_files+0x141/0x260 ? do_vfs_ioctl+0x150/0xaa0 ? btrfs_ioctl_get_supported_features+0x40/0x40 ? __x64_sys_ioctl+0xb6/0x100 __x64_sys_ioctl+0xb6/0x100 do_syscall_64+0x34/0xb0 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x4697f9 Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 RSP: 002b:00007f41ffc26c48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000077bf80 RCX: 00000000004697f9 RDX: 0000000020072c40 RSI: 00000000c0c09425 RDI: 0000000000000005 RBP: 00007f41ffc26c80 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 R13: 0000000000000000 R14: 000000000077bf80 R15: 00007ffd3c817900 So, the whole situation is, we abort transaction because we hit an ENOMEM. Thankfully the following patch should end the meaningless reports completely: https://lore.kernel.org/linux-btrfs/20221103151051.28669-1-dsterba@suse.com/T/ Thanks, Qu > > [ 93.080051][ T8445] Kernel panic - not syncing: panic_on_warn set ... > [ 93.080584][ T8445] CPU: 0 PID: 8445 Comm: a.out Not tainted 6.0.0+ #39 > [ 93.081120][ T8445] Hardware name: QEMU Standard PC (i440FX + PIIX, > 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014 > [ 93.081919][ T8445] Call Trace: > [ 93.082209][ T8445] > [ 93.082478][ T8445] dump_stack_lvl+0x1b1/0x28e > [ 93.082897][ T8445] ? io_alloc_page_table+0xfe/0xfe > [ 93.083340][ T8445] ? panic+0x81b/0x81b > [ 93.083709][ T8445] ? _btrfs_ioctl_set_received_subvol+0xbe0/0x1660 > [ 93.084260][ T8445] panic+0x2c2/0x81b > [ 93.084597][ T8445] ? __warn+0x131/0x220 > [ 93.084955][ T8445] ? asan.module_ctor+0x4/0x4 > [ 93.085379][ T8445] ? _btrfs_ioctl_set_received_subvol+0xc93/0x1660 > [ 93.085933][ T8445] __warn+0x1fc/0x220 > [ 93.086282][ T8445] ? _btrfs_ioctl_set_received_subvol+0xc93/0x1660 > [ 93.086744][ T8445] report_bug+0x1b3/0x2d0 > [ 93.087034][ T8445] handle_bug+0x3d/0x70 > [ 93.087345][ T8445] exc_invalid_op+0x16/0x40 > [ 93.087708][ T8445] asm_exc_invalid_op+0x16/0x20 > [ 93.088121][ T8445] RIP: 0010:_btrfs_ioctl_set_received_subvol+0xc93/0x1660 > [ 93.088707][ T8445] Code: 76 e6 8a 44 89 fa 31 c0 e8 9f 55 a6 06 4c > 8b 6c 24 10 eb 18 e8 7e 3a 04 fe 48 c7 c7 20 75 e6 8a 44 89 fe 31 c0 > e8 fd b4 cd fd <0f> 0b 4c 89 ef 48 c7 c6 c0 87 e6 8a ba f6 12 00 00 e9 > a7 06 00 00 > [ 93.090000][ T8445] RSP: 0018:ffffc9000280f7a8 EFLAGS: 00010246 > [ 93.090524][ T8445] RAX: cceb294c9a36ee00 RBX: ffff88802b27c001 > RCX: ffff88801e0cc880 > [ 93.091197][ T8445] RDX: 0000000000000000 RSI: 0000000080000000 > RDI: 0000000000000000 > [ 93.091833][ T8445] RBP: 00000000fffffff4 R08: ffffffff816b75fc > R09: ffffed100c784f14 > [ 93.092488][ T8445] R10: ffffed100c784f14 R11: 0000000000000000 > R12: ffff88802c664440 > [ 93.093079][ T8445] R13: ffff88802c6643f0 R14: 1ffff110058cc888 > R15: 00000000fffffff4 > [ 93.093585][ T8445] ? __wake_up_klogd+0xcc/0x100 > [ 93.094019][ T8445] ? _btrfs_ioctl_set_received_subvol+0xc93/0x1660 > [ 93.094542][ T8445] btrfs_ioctl+0x1cf0/0x9db0 > [ 93.094858][ T8445] ? btrfs_ioctl_get_supported_features+0x40/0x40 > [ 93.095352][ T8445] ? lockdep_hardirqs_on_prepare+0x428/0x790 > [ 93.095870][ T8445] ? rcu_read_lock_sched_held+0x87/0x110 > [ 93.096361][ T8445] ? __bpf_trace_rcu_stall_warning+0x10/0x10 > [ 93.096887][ T8445] ? lockdep_hardirqs_on_prepare+0x428/0x790 > [ 93.097401][ T8445] ? do_vfs_ioctl+0xc35/0x29e0 > [ 93.097853][ T8445] ? __ia32_compat_sys_ioctl+0xb90/0xb90 > [ 93.098321][ T8445] ? __lock_acquire+0x6080/0x6080 > [ 93.098754][ T8445] ? slab_free_freelist_hook+0x12e/0x1a0 > [ 93.099216][ T8445] ? tomoyo_path_number_perm+0x5be/0x790 > [ 93.099668][ T8445] ? kfree+0xda/0x350 > [ 93.100028][ T8445] ? tomoyo_path_number_perm+0x627/0x790 > [ 93.100500][ T8445] ? tomoyo_check_path_acl+0x1c0/0x1c0 > [ 93.100967][ T8445] ? rcu_read_lock_sched_held+0x87/0x110 > [ 93.101502][ T8445] ? lockdep_hardirqs_on_prepare+0x428/0x790 > [ 93.101995][ T8445] ? print_irqtrace_events+0x220/0x220 > [ 93.102327][ T8445] ? vtime_user_exit+0x2b2/0x3e0 > [ 93.102647][ T8445] ? __ct_user_exit+0xd9/0x160 > [ 93.102946][ T8445] ? bpf_lsm_file_ioctl+0x5/0x10 > [ 93.103249][ T8445] ? security_file_ioctl+0x9d/0xb0 > [ 93.103566][ T8445] ? btrfs_ioctl_get_supported_features+0x40/0x40 > [ 93.103953][ T8445] __se_sys_ioctl+0xfb/0x170 > [ 93.104232][ T8445] do_syscall_64+0x3d/0x90 > [ 93.104501][ T8445] entry_SYSCALL_64_after_hwframe+0x63/0xcd > [ 93.104855][ T8445] RIP: 0033:0x7fbfad8e4469 > [ 93.105126][ T8445] Code: 00 f3 c3 66 2e 0f 1f 84 00 00 00 00 00 0f > 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b > 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d ff 49 2b 00 f7 d8 > 64 89 01 48 > [ 93.106297][ T8445] RSP: 002b:00007fffb93a1248 EFLAGS: 00000202 > ORIG_RAX: 0000000000000010 > [ 93.106853][ T8445] RAX: ffffffffffffffda RBX: 0000000000000000 > RCX: 00007fbfad8e4469 > [ 93.107377][ T8445] RDX: 0000000020072c40 RSI: 00000000c0c09425 > RDI: 0000000000000006 > [ 93.107901][ T8445] RBP: 00007fffb93a1260 R08: 0000000000000001 > R09: 00007fffb93a1260 > [ 93.108441][ T8445] R10: 0000000000000001 R11: 0000000000000202 > R12: 00005650a6c01170 > [ 93.108933][ T8445] R13: 00007fffb93a13a0 R14: 0000000000000000 > R15: 0000000000000000 > [ 93.109418][ T8445] > [ 93.109843][ T8445] Kernel Offset: disabled > [ 93.110188][ T8445] Rebooting in 86400 seconds.. > > Best, > Wei > > On Tue, 15 Nov 2022 at 18:42, Qu Wenruo wrote: >> >> >> >> On 2022/11/15 18:30, Wei Chen wrote: >>> Dear Linux developers, >>> >>> I hope the following bug report is helpful. >>> >>> Best, >>> Wei >>> >>> On Sun, 13 Nov 2022 at 19:38, Wei Chen wrote: >>>> >>>> Dear Linux Developer, >>>> >>>> Recently when using our tool to fuzz kernel, the following crash was >>>> triggered. The bug persists in Linux 6.0. >>>> >>>> HEAD commit: 4f5365f77018 Linux 5.15.76 >> >> Not related to the bug itself, but more on the report. >> >> I'd say, if the bug persists in the latest release, then please use the >> latest kernel in the report. >> Not use the latest LTS as the commit. >> >> You know most (if not all) linux communities are working on upstream >> code, not some LTS branch. >> >> Thanks, >> Qu >> >>>> git tree: stable >>>> compiler: gcc 7.5.0 >>>> console output: >>>> https://drive.google.com/file/d/1wkzu8jz6edriSP6TpsCGYD5AzkLajIEv/view?usp=share_link >>>> kernel config: https://drive.google.com/file/d/1flhc33savDkmYN6PRU5C2vXDX0LAKMvM/view?usp=share_link >>>> C reproducer: https://drive.google.com/file/d/1zKWsWAOcaHfPKewTG6P3pnnVfwH_WXa9/view?usp=share_link >>>> Syz reproducer: >>>> https://drive.google.com/file/d/1jUR8_6Re4xpJhyLdXqPiiV72WT-Tk8A-/view?usp=share_link >>>> >>>> IMPORTANT: if you fix the bug, please add the following tag to the commit: >>>> Reported-by: Wei Chen >>>> >>>> R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 >>>> R13: 0000000000000000 R14: 000000000077bf80 R15: 00007ffd3c817900 >>>> >>>> ------------[ cut here ]------------ >>>> WARNING: CPU: 1 PID: 29222 at fs/btrfs/ioctl.c:4521 >>>> _btrfs_ioctl_set_received_subvol+0x221/0x430 fs/btrfs/ioctl.c:4521 >>>> Modules linked in: >>>> CPU: 1 PID: 29222 Comm: syz-executor.0 Not tainted 5.15.76 #5 >>>> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS >>>> rel-1.13.0-48-gd9c812dda519-prebuilt.qemu.org 04/01/2014 >>>> RIP: 0010:_btrfs_ioctl_set_received_subvol+0x221/0x430 fs/btrfs/ioctl.c:4521 >>>> Code: e8 74 34 44 ff 83 fb fb 0f 84 de 01 00 00 83 fb e2 0f 84 d5 01 >>>> 00 00 e8 5d 34 44 ff 89 de 48 c7 c7 c0 f8 39 85 e8 9f dc 2e ff <0f> 0b >>>> e8 48 34 44 ff 89 d9 ba a9 11 00 00 e9 45 01 00 00 49 8b 4f >>>> RSP: 0018:ffffc9000aecfd40 EFLAGS: 00010286 >>>> RAX: 0000000000000000 RBX: fffffffffffffff4 RCX: ffffc900013ed000 >>>> RDX: 0000000000040000 RSI: ffffffff812d935c RDI: 00000000ffffffff >>>> RBP: ffffc9000aecfda0 R08: 0000000000000000 R09: 0000000000000001 >>>> R10: ffffc9000aecfbe0 R11: 0000000000000003 R12: ffff888014210400 >>>> R13: ffff8880208d2000 R14: ffff88810c4f21c0 R15: ffff88810f37b600 >>>> FS: 00007f41ffc27700(0000) GS:ffff88813dc00000(0000) knlGS:0000000000000000 >>>> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >>>> CR2: 00007fab915f7008 CR3: 000000002096e000 CR4: 00000000003526e0 >>>> Call Trace: >>>> >>>> btrfs_ioctl_set_received_subvol_32 fs/btrfs/ioctl.c:4584 [inline] >>>> btrfs_ioctl+0x2154/0x3d50 fs/btrfs/ioctl.c:5007 >>>> vfs_ioctl fs/ioctl.c:51 [inline] >>>> __do_sys_ioctl fs/ioctl.c:874 [inline] >>>> __se_sys_ioctl fs/ioctl.c:860 [inline] >>>> __x64_sys_ioctl+0xb6/0x100 fs/ioctl.c:860 >>>> do_syscall_x64 arch/x86/entry/common.c:50 [inline] >>>> do_syscall_64+0x34/0xb0 arch/x86/entry/common.c:80 >>>> entry_SYSCALL_64_after_hwframe+0x61/0xcb >>>> RIP: 0033:0x4697f9 >>>> Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48 >>>> 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d >>>> 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 >>>> RSP: 002b:00007f41ffc26c48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 >>>> RAX: ffffffffffffffda RBX: 000000000077bf80 RCX: 00000000004697f9 >>>> RDX: 0000000020072c40 RSI: 00000000c0c09425 RDI: 0000000000000005 >>>> RBP: 00007f41ffc26c80 R08: 0000000000000000 R09: 0000000000000000 >>>> R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 >>>> R13: 0000000000000000 R14: 000000000077bf80 R15: 00007ffd3c817900 >>>> >>>> >>>> Best, >>>> Wei