kvm [10187]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x3ad6e37883b8e6ec
kvm [10209]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x3ad6e37883b8e6ec
======================================================
WARNING: possible circular locking dependency detected
4.14.283-syzkaller #0 Not tainted
------------------------------------------------------
kworker/u4:2/34 is trying to acquire lock:
 (sk_lock-AF_INET){+.+.}, at: [<ffffffff86826dde>] do_strp_work net/strparser/strparser.c:415 [inline]
 (sk_lock-AF_INET){+.+.}, at: [<ffffffff86826dde>] strp_work+0x3e/0x100 net/strparser/strparser.c:434

but task is already holding lock:
 ((&strp->work)){+.+.}, at: [<ffffffff81364f26>] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #1 ((&strp->work)){+.+.}:
       flush_work+0xad/0x770 kernel/workqueue.c:2890
       __cancel_work_timer+0x321/0x460 kernel/workqueue.c:2965
       strp_done+0x53/0xd0 net/strparser/strparser.c:519
       kcm_attach net/kcm/kcmsock.c:1429 [inline]
       kcm_attach_ioctl net/kcm/kcmsock.c:1490 [inline]
       kcm_ioctl+0x828/0xfb0 net/kcm/kcmsock.c:1701
       sock_do_ioctl net/socket.c:974 [inline]
       sock_ioctl+0x2cc/0x4c0 net/socket.c:1071
       vfs_ioctl fs/ioctl.c:46 [inline]
       file_ioctl fs/ioctl.c:500 [inline]
       do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684
       SYSC_ioctl fs/ioctl.c:701 [inline]
       SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692
       do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
       entry_SYSCALL_64_after_hwframe+0x46/0xbb

-> #0 (sk_lock-AF_INET){+.+.}:
       lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998
       lock_sock_nested+0xb7/0x100 net/core/sock.c:2813
       do_strp_work net/strparser/strparser.c:415 [inline]
       strp_work+0x3e/0x100 net/strparser/strparser.c:434
       process_one_work+0x793/0x14a0 kernel/workqueue.c:2117
       worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251
       kthread+0x30d/0x420 kernel/kthread.c:232
       ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404

other info that might help us debug this:

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock((&strp->work));
                               lock(sk_lock-AF_INET);
                               lock((&strp->work));
  lock(sk_lock-AF_INET);

 *** DEADLOCK ***

2 locks held by kworker/u4:2/34:
 #0:  ("%s""kstrp"){+.+.}, at: [<ffffffff81364ef0>] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088
 #1:  ((&strp->work)){+.+.}, at: [<ffffffff81364f26>] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092

stack backtrace:
CPU: 0 PID: 34 Comm: kworker/u4:2 Not tainted 4.14.283-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: kstrp strp_work
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x281 lib/dump_stack.c:58
 print_circular_bug.constprop.0.cold+0x2d7/0x41e kernel/locking/lockdep.c:1258
 check_prev_add kernel/locking/lockdep.c:1905 [inline]
 check_prevs_add kernel/locking/lockdep.c:2022 [inline]
 validate_chain kernel/locking/lockdep.c:2464 [inline]
 __lock_acquire+0x2e0e/0x3f20 kernel/locking/lockdep.c:3491
 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998
 lock_sock_nested+0xb7/0x100 net/core/sock.c:2813
 do_strp_work net/strparser/strparser.c:415 [inline]
 strp_work+0x3e/0x100 net/strparser/strparser.c:434
 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117
 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251
 kthread+0x30d/0x420 kernel/kthread.c:232
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
EXT4-fs (loop4): Unrecognized mount option "�" or missing value
cannot load conntrack support for proto=10
IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
EXT4-fs (loop4): Unrecognized mount option "�" or missing value
IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
EXT4-fs (loop4): Unrecognized mount option "�" or missing value
IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
cannot load conntrack support for proto=10
EXT4-fs (loop2): Unrecognized mount option "�" or missing value
cannot load conntrack support for proto=10
cannot load conntrack support for proto=10
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'.
print_req_error: I/O error, dev loop0, sector 0
process 'syz-executor.4' launched '/dev/fd/4' with NULL argv: empty string added
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'.
netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'.
netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'.
A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check.
sd 0:0:1:0: [sg0] tag#6782 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6782 CDB: Search Equal
team0: Port device bridge1 added
sd 0:0:1:0: [sg0] tag#6782 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
sd 0:0:1:0: [sg0] tag#6782 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6782 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6782 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6782 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6782 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6782 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6782 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6782 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6782 CDB[90]: 7f 54 d1 86 e2 c6 1e
sd 0:0:1:0: [sg0] tag#6778 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6778 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6778 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
sd 0:0:1:0: [sg0] tag#6778 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6778 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6778 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6778 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6778 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6778 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6778 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6778 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6778 CDB[90]: 7f 54 d1 86 e2 c6 1e
sd 0:0:1:0: [sg0] tag#6785 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6785 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
kauditd_printk_skb: 19 callbacks suppressed
audit: type=1800 audit(1655357826.761:111): pid=10826 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=13996 res=0
sd 0:0:1:0: [sg0] tag#6785 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6785 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6785 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6785 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6785 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6785 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6785 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6785 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6785 CDB[90]: 7f 54 d1 86 e2 c6 1e
sd 0:0:1:0: [sg0] tag#6785 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6785 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6785 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
sd 0:0:1:0: [sg0] tag#6785 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6785 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6785 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6785 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6785 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6785 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6785 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6785 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6785 CDB[90]: 7f 54 d1 86 e2 c6 1e
sd 0:0:1:0: [sg0] tag#6790 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6790 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6790 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
sd 0:0:1:0: [sg0] tag#6790 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6790 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6790 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6790 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6790 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6790 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6790 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6790 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6790 CDB[90]: 7f 54 d1 86 e2 c6 1e
team0: Port device bridge2 added
team0: Port device bridge3 added
team0: Port device bridge4 added
team0: Port device bridge1 added
team0: Port device bridge5 added
team0: Port device bridge6 added
nla_parse: 4 callbacks suppressed
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'.
sd 0:0:1:0: [sg0] tag#6791 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6791 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6791 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
sd 0:0:1:0: [sg0] tag#6791 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6791 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6791 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6791 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6791 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6791 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6791 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6791 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6791 CDB[90]: 7f 54 d1 86 e2 c6 1e
audit: type=1800 audit(1655357829.902:112): pid=11029 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14004 res=0
audit: type=1804 audit(1655357829.922:113): pid=11029 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir741650502/syzkaller.SY1D6A/27/file0" dev="sda1" ino=14004 res=1
team0: Port device bridge7 added
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
audit: type=1800 audit(1655357829.992:114): pid=11035 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=14007 res=0
syz-executor.1 (11029) used greatest stack depth: 24920 bytes left
audit: type=1804 audit(1655357829.992:115): pid=11035 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2837122742/syzkaller.Gvfu8q/20/file0" dev="sda1" ino=14007 res=1
audit: type=1800 audit(1655357830.232:116): pid=11048 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="file0" dev="sda1" ino=14007 res=0
audit: type=1804 audit(1655357830.232:117): pid=11048 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir2837122742/syzkaller.Gvfu8q/21/file0" dev="sda1" ino=14007 res=1
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
audit: type=1800 audit(1655357830.252:118): pid=11054 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="file0" dev="sda1" ino=14004 res=0
ISO 9660 Extensions: Microsoft Joliet Level 3
sd 0:0:1:0: [sg0] tag#6816 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6816 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6816 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
audit: type=1804 audit(1655357830.252:119): pid=11054 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir741650502/syzkaller.SY1D6A/28/file0" dev="sda1" ino=14004 res=1
sd 0:0:1:0: [sg0] tag#6816 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6816 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6816 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6816 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6816 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6816 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6816 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6816 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6816 CDB[90]: 7f 54 d1 86 e2 c6 1e
ISO 9660 Extensions: Microsoft Joliet Level 3
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'.
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
sd 0:0:1:0: [sg0] tag#6791 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK
sd 0:0:1:0: [sg0] tag#6791 CDB: Search Equal
sd 0:0:1:0: [sg0] tag#6791 CDB[00]: 31 60 0a a2 26 a9 27 68 25 0b 18 08 06 f9 44 4b
netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'.
sd 0:0:1:0: [sg0] tag#6791 CDB[10]: 76 dc 60 3f 47 2a dd ff 74 f7 5f 9d 7e d1 af 22
sd 0:0:1:0: [sg0] tag#6791 CDB[20]: 9e 8e 32 9a 4d 4c ac 28 1b f7 27 79 a0 86 91 41
sd 0:0:1:0: [sg0] tag#6791 CDB[30]: 05 82 f9 1d 3e e5 07 a7 0c 8d 6a 10 21 99 56 21
sd 0:0:1:0: [sg0] tag#6791 CDB[40]: df 77 9b 00 00 01 00 21 30 0b a0 a0 9d 25 49 ea
sd 0:0:1:0: [sg0] tag#6791 CDB[50]: cb 90 af 53 d1 32 21 0b 56 ac b5 2e 4c 3a 94 df
sd 0:0:1:0: [sg0] tag#6791 CDB[60]: fc 65 58 ae 56 87 2f 4a f2 40 7e 6e a2 8d fa 56
sd 0:0:1:0: [sg0] tag#6791 CDB[70]: 50 0d ea c7 8d 7d 4d f8 b0 52 6f 3d 83 21 74 7c
sd 0:0:1:0: [sg0] tag#6791 CDB[80]: 77 3b 54 8e 1e 5b b5 da 96 d1 5f 3a bd 65 27 db
sd 0:0:1:0: [sg0] tag#6791 CDB[90]: 7f 54 d1 86 e2 c6 1e