./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor83682607

<...>
Warning: Permanently added '10.128.10.37' (ED25519) to the list of known hosts.
execve("./syz-executor83682607", ["./syz-executor83682607"], 0x7ffdb2c49110 /* 10 vars */) = 0
brk(NULL)                               = 0x555557ba9000
brk(0x555557ba9e00)                     = 0x555557ba9e00
arch_prctl(ARCH_SET_FS, 0x555557ba9480) = 0
set_tid_address(0x555557ba9750)         = 5831
set_robust_list(0x555557ba9760, 24)     = 0
rseq(0x555557ba9da0, 0x20, 0, 0x53053053) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor83682607", 4096) = 26
getrandom("\x61\x1c\xcf\xda\x1c\xa2\x52\x78", 8, GRND_NONBLOCK) = 8
brk(NULL)                               = 0x555557ba9e00
brk(0x555557bcae00)                     = 0x555557bcae00
brk(0x555557bcb000)                     = 0x555557bcb000
mprotect(0x7f3b58c4f000, 16384, PROT_READ) = 0
mmap(0x3ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x3ffffffff000
mmap(0x400000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400000000000
mmap(0x400001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x400001000000
rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0
rt_sigaction(SIGSEGV, {sa_handler=0x7f3b58ba8d80, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f3b58bb22e0}, NULL, 8) = 0
rt_sigaction(SIGBUS, {sa_handler=0x7f3b58ba8d80, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f3b58bb22e0}, NULL, 8) = 0
unshare(CLONE_NEWPID)                   = 0
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD./strace-static-x86_64: Process 5832 attached
 <unfinished ...>
[pid  5832] set_robust_list(0x555557ba9760, 24 <unfinished ...>
[pid  5831] <... clone resumed>, child_tidptr=0x555557ba9750) = 5832
[pid  5832] <... set_robust_list resumed>) = 0
[pid  5832] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid  5832] getppid()                   = 0
[pid  5832] prlimit64(0, RLIMIT_AS, {rlim_cur=204800*1024, rlim_max=204800*1024}, NULL) = 0
[pid  5832] prlimit64(0, RLIMIT_MEMLOCK, {rlim_cur=32768*1024, rlim_max=32768*1024}, NULL) = 0
[pid  5832] prlimit64(0, RLIMIT_FSIZE, {rlim_cur=139264*1024, rlim_max=139264*1024}, NULL) = 0
[pid  5832] prlimit64(0, RLIMIT_STACK, {rlim_cur=1024*1024, rlim_max=1024*1024}, NULL) = 0
[pid  5832] prlimit64(0, RLIMIT_CORE, {rlim_cur=131072*1024, rlim_max=131072*1024}, NULL) = 0
[pid  5832] prlimit64(0, RLIMIT_NOFILE, {rlim_cur=256, rlim_max=256}, NULL) = 0
[pid  5832] unshare(CLONE_NEWNS)        = 0
[pid  5832] mount(NULL, "/", NULL, MS_REC|MS_PRIVATE, NULL) = 0
[pid  5832] unshare(CLONE_NEWIPC)       = 0
[pid  5832] unshare(CLONE_NEWCGROUP)    = 0
[pid  5832] unshare(CLONE_NEWUTS)       = 0
[pid  5832] unshare(CLONE_SYSVSEM)      = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/shmmax", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "16777216", 8)     = 8
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/shmall", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "536870912", 9)    = 9
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/shmmni", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "1024", 4)         = 4
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/msgmax", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "8192", 4)         = 4
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/msgmni", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "1024", 4)         = 4
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/msgmnb", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "1024", 4)         = 4
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/kernel/sem", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "1024 1048576 500 1024", 21) = 21
[pid  5832] close(3)                    = 0
[pid  5832] getpid()                    = 1
[pid  5832] capget({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PTRACE|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_NICE|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid  5832] capset({version=_LINUX_CAPABILITY_VERSION_3, pid=1}, {effective=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, permitted=1<<CAP_CHOWN|1<<CAP_DAC_OVERRIDE|1<<CAP_DAC_READ_SEARCH|1<<CAP_FOWNER|1<<CAP_FSETID|1<<CAP_KILL|1<<CAP_SETGID|1<<CAP_SETUID|1<<CAP_SETPCAP|1<<CAP_LINUX_IMMUTABLE|1<<CAP_NET_BIND_SERVICE|1<<CAP_NET_BROADCAST|1<<CAP_NET_ADMIN|1<<CAP_NET_RAW|1<<CAP_IPC_LOCK|1<<CAP_IPC_OWNER|1<<CAP_SYS_MODULE|1<<CAP_SYS_RAWIO|1<<CAP_SYS_CHROOT|1<<CAP_SYS_PACCT|1<<CAP_SYS_ADMIN|1<<CAP_SYS_BOOT|1<<CAP_SYS_RESOURCE|1<<CAP_SYS_TIME|1<<CAP_SYS_TTY_CONFIG|1<<CAP_MKNOD|1<<CAP_LEASE|1<<CAP_AUDIT_WRITE|1<<CAP_AUDIT_CONTROL|1<<CAP_SETFCAP|1<<CAP_MAC_OVERRIDE|1<<CAP_MAC_ADMIN|1<<CAP_SYSLOG|1<<CAP_WAKE_ALARM|1<<CAP_BLOCK_SUSPEND|1<<CAP_AUDIT_READ|1<<CAP_PERFMON|1<<CAP_BPF|1<<CAP_CHECKPOINT_RESTORE, inheritable=0}) = 0
[pid  5832] unshare(CLONE_NEWNET)       = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/net/ipv4/ping_group_range", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "0 65535", 7)      = 7
[pid  5832] close(3)                    = 0
[pid  5832] openat(AT_FDCWD, "/proc/sys/fs/mount-max", O_WRONLY|O_CLOEXEC) = 3
[pid  5832] write(3, "100000", 6)       = 6
[pid  5832] close(3)                    = 0
[pid  5832] mkdir("./syz-tmp", 0777)    = 0
[pid  5832] mount("", "./syz-tmp", "tmpfs", 0, NULL) = 0
[pid  5832] mkdir("./syz-tmp/newroot", 0777) = 0
[pid  5832] mkdir("./syz-tmp/newroot/dev", 0700) = 0
[pid  5832] mount("/dev", "./syz-tmp/newroot/dev", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid  5832] mkdir("./syz-tmp/newroot/proc", 0700) = 0
[pid  5832] mount("syz-proc", "./syz-tmp/newroot/proc", "proc", 0, NULL) = 0
[pid  5832] mkdir("./syz-tmp/newroot/selinux", 0700) = 0
[pid  5832] mount("/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid  5832] mount("/sys/fs/selinux", "./syz-tmp/newroot/selinux", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid  5832] mkdir("./syz-tmp/newroot/sys", 0700) = 0
[pid  5832] mount("/sys", "./syz-tmp/newroot/sys", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid  5832] mount("/sys/kernel/debug", "./syz-tmp/newroot/sys/kernel/debug", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid  5832] mount("/sys/fs/smackfs", "./syz-tmp/newroot/sys/fs/smackfs", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid  5832] mount("/proc/sys/fs/binfmt_misc", "./syz-tmp/newroot/proc/sys/fs/binfmt_misc", NULL, MS_BIND|MS_REC|MS_PRIVATE, NULL) = 0
[pid  5832] mkdir("./syz-tmp/newroot/syz-inputs", 0700) = 0
[pid  5832] mount("/syz-inputs", "./syz-tmp/newroot/syz-inputs", NULL, MS_RDONLY|MS_BIND|MS_REC|MS_PRIVATE, NULL) = -1 ENOENT (No such file or directory)
[pid  5832] mkdir("./syz-tmp/pivot", 0777) = 0
[pid  5832] pivot_root("./syz-tmp", "./syz-tmp/pivot") = 0
[pid  5832] chdir("/")                  = 0
[pid  5832] umount2("./pivot", MNT_DETACH) = 0
[pid  5832] chroot("./newroot")         = 0
[pid  5832] chdir("/")                  = 0
[pid  5832] mkdir("/dev/gadgetfs", 0777) = 0
[pid  5832] mount("gadgetfs", "/dev/gadgetfs", "gadgetfs", 0, NULL) = 0
[pid  5832] mkdir("/dev/binderfs", 0777) = 0
[pid  5832] mount("binder", "/dev/binderfs", "binder", 0, NULL) = -1 ENODEV (No such device)
[pid  5832] symlink("/dev/binderfs", "./binderfs") = 0
[pid  5832] mount(NULL, "/sys/fs/fuse/connections", "fusectl", 0, NULL) = -1 EBUSY (Device or resource busy)
[pid  5832] write(1, "executing program\n", 18executing program
) = 18
[pid  5832] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x400000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=BPF_F_ANY_ALIGNMENT|BPF_F_TEST_RND_HI32|BPF_F_TEST_STATE_FREQ|0x40, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_UDP6_RECVMSG, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address)
[pid  5832] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x400000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address)
[pid  5832] bpf(BPF_MAP_CREATE, {map_type=BPF_MAP_TYPE_RINGBUF, key_size=0, value_size=0, max_entries=32768, map_flags=0, inner_map_fd=-1, map_name="", map_ifindex=0, btf_fd=-1, btf_key_type_id=0, btf_value_type_id=0, btf_vmlinux_value_type_id=0, map_extra=0}, 72) = 3
[pid  5832] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=12, insns=0x400000000440, license=NULL, log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=0, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 148) = -1 EFAULT (Bad address)
[pid  5832] bpf(BPF_PROG_LOAD, {prog_type=BPF_PROG_TYPE_SYSCALL, insn_cnt=12, insns=0x400000000440, license="GPL", log_level=0, log_size=0, log_buf=NULL, kern_version=KERNEL_VERSION(0, 0, 0), prog_flags=BPF_F_ANY_ALIGNMENT|BPF_F_SLEEPABLE, prog_name="", prog_ifindex=0, expected_attach_type=BPF_CGROUP_INET_INGRESS, prog_btf_fd=-1, func_info_rec_size=0, func_info=NULL, func_info_cnt=0, line_info_rec_size=0, line_info=NULL, line_info_cnt=0, attach_btf_id=0, attach_prog_fd=0, fd_array=NULL}, 144) = 4
[   62.692064][ T5832] 
[   62.694738][ T5832] =============================
[   62.699579][ T5832] WARNING: suspicious RCU usage
[   62.705173][ T5832] 6.14.0-rc3-syzkaller-g319fc77f8f45 #0 Not tainted
[   62.711785][ T5832] -----------------------------
[   62.716922][ T5832] kernel/events/callchain.c:162 suspicious rcu_dereference_check() usage!
[   62.725742][ T5832] 
[   62.725742][ T5832] other info that might help us debug this:
[   62.725742][ T5832] 
[   62.736201][ T5832] 
[pid  5832] bpf(BPF_PROG_TEST_RUN, {test={prog_fd=4, retval=0, data_size_in=0, data_size_out=0, data_in=NULL, data_out=NULL, repeat=0, duration=0}}, 16) = 0
[pid  5832] exit_group(1)               = ?
[   62.736201][ T5832] rcu_scheduler_active = 2, debug_locks = 1
[   62.744594][ T5832] 1 lock held by syz-executor836/5832:
[   62.750364][ T5832]  #0: ffffffff8eb39420 (rcu_read_lock_trace){....}-{0:0}, at: rcu_read_lock_trace+0x38/0x80
[   62.760965][ T5832] 
[   62.760965][ T5832] stack backtrace:
[   62.767156][ T5832] CPU: 0 UID: 0 PID: 5832 Comm: syz-executor836 Not tainted 6.14.0-rc3-syzkaller-g319fc77f8f45 #0
[   62.767176][ T5832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   62.767188][ T5832] Call Trace:
[   62.767197][ T5832]  <TASK>
[   62.767202][ T5832]  dump_stack_lvl+0x241/0x360
[   62.767227][ T5832]  ? __pfx_dump_stack_lvl+0x10/0x10
[   62.767241][ T5832]  ? __pfx__printk+0x10/0x10
[   62.767263][ T5832]  lockdep_rcu_suspicious+0x226/0x340
[   62.767280][ T5832]  get_callchain_entry+0x2b2/0x3c0
[   62.767300][ T5832]  get_perf_callchain+0xec/0x970
[   62.767324][ T5832]  ? __pfx_get_perf_callchain+0x10/0x10
[   62.767345][ T5832]  ? __lock_acquire+0x1397/0x2100
[   62.767375][ T5832]  __bpf_get_stack+0x412/0xaa0
[   62.767404][ T5832]  ? __pfx___bpf_get_stack+0x10/0x10
[   62.767427][ T5832]  ? __pfx_lock_acquire+0x10/0x10
[   62.767451][ T5832]  bpf_get_stack+0x33/0x50
[   62.767470][ T5832]  bpf_get_stack_raw_tp+0x1a3/0x240
[   62.767496][ T5832]  bpf_prog_d43750871481577d+0x46/0x4a
[   62.767517][ T5832]  bpf_prog_run_pin_on_cpu+0x67/0x150
[   62.767538][ T5832]  bpf_prog_test_run_syscall+0x316/0x4e0
[   62.767557][ T5832]  ? __pfx_bpf_prog_test_run_syscall+0x10/0x10
[   62.767575][ T5832]  ? __pfx_bpf_prog_test_run_syscall+0x10/0x10
[   62.767590][ T5832]  bpf_prog_test_run+0x2e4/0x360
[   62.767611][ T5832]  __sys_bpf+0x487/0x820
[   62.767633][ T5832]  ? __pfx___sys_bpf+0x10/0x10
[   62.767671][ T5832]  ? __pfx_lockdep_hardirqs_on_prepare+0x10/0x10
[   62.767695][ T5832]  ? do_syscall_64+0x100/0x230
[   62.767728][ T5832]  __x64_sys_bpf+0x7c/0x90
[   62.767749][ T5832]  do_syscall_64+0xf3/0x230
[   62.767768][ T5832]  ? clear_bhb_loop+0x35/0x90
[   62.767788][ T5832]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   62.767805][ T5832] RIP: 0033:0x7f3b58bdc179
[   62.767818][ T5832] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   62.767830][ T5832] RSP: 002b:00007fffc0fdf5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
[   62.767846][ T5832] RAX: ffffffffffffffda RBX: 00007f3b58c2515d RCX: 00007f3b58bdc179
[   62.767856][ T5832] RDX: 0000000000000010 RSI: 0000400000000740 RDI: 000000000000000a
[pid  5832] +++ exited with 1 +++
--- SIGCHLD {si_signo=SIGCHLD, si_code=CLD_EXITED, si_pid=5832, si_uid=0, si_status=1, si_utime=0, si_stime=14 /* 0.14 s */} ---
exit_group(0)                           = ?
+++ exited with 0 +++
[   62.767865][ T5832] RBP: 00007f3b58c2512d R08: 00007f3