BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 2975, name: udevd preempt_count: 101, expected: 0 RCU nest depth: 0, expected: 0 2 locks held by udevd/2975: #0: ffffffff8c7c6aa8 (tomoyo_ss){....}-{0:0}, at: tomoyo_path_perm+0x1c1/0x400 security/tomoyo/file.c:847 #1: ffffc90000007d60 ((&dlci->t1)){+.-.}-{0:0}, at: lockdep_copy_map include/linux/lockdep.h:31 [inline] #1: ffffc90000007d60 ((&dlci->t1)){+.-.}-{0:0}, at: call_timer_fn+0xd4/0x7c0 kernel/time/timer.c:1464 Preemption disabled at: [] unwind_next_frame+0xaa/0x1cc0 arch/x86/kernel/unwind_orc.c:433 CPU: 0 PID: 2975 Comm: udevd Not tainted 6.1.0-rc4-syzkaller-00020-gf67dd6ce0723 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 __might_resched.cold+0x222/0x26b kernel/sched/core.c:9890 __mutex_lock_common kernel/locking/mutex.c:580 [inline] __mutex_lock+0x9f/0x1350 kernel/locking/mutex.c:747 gsm_send.isra.0+0x41e/0x7e0 drivers/tty/n_gsm.c:724 gsm_command drivers/tty/n_gsm.c:788 [inline] gsm_dlci_begin_close+0x12e/0x210 drivers/tty/n_gsm.c:1930 gsm_dlci_t1+0x186/0x450 drivers/tty/n_gsm.c:1854 call_timer_fn+0x1da/0x7c0 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [inline] __run_timers.part.0+0x6a2/0xaf0 kernel/time/timer.c:1790 __run_timers kernel/time/timer.c:1768 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1803 __do_softirq+0x1f7/0xad8 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1107 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:168 [inline] RIP: 0010:unwind_next_frame+0x1cb/0x1cc0 arch/x86/kernel/unwind_orc.c:448 Code: ff 41 39 c7 0f 83 a6 13 00 00 48 b8 00 00 00 00 00 fc ff df 44 89 fa 48 8d 3c 95 e8 9f 03 8f 48 89 f9 48 c1 e9 03 0f b6 0c 01 <48> 89 f8 83 e0 07 83 c0 03 38 c8 7c 1d 84 c9 74 19 48 89 54 24 28 RSP: 0018:ffffc9000317f5e8 EFLAGS: 00000a03 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 000000000000d883 RSI: ffffffff81d8839e RDI: ffffffff8f0701f4 RBP: ffffc9000317f6a0 R08: ffffffff8be00b20 R09: ffffc9000317f68c R10: fffff5200062fed6 R11: 000000000008c07e R12: ffffc9000317f68d R13: ffffc9000317f658 R14: ffffffff81d8839d R15: 000000000000d883 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:45 kasan_set_track+0x21/0x30 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:371 [inline] ____kasan_kmalloc mm/kasan/common.c:330 [inline] __kasan_kmalloc+0xa1/0xb0 mm/kasan/common.c:380 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slab_common.c:955 [inline] __kmalloc+0x56/0xc0 mm/slab_common.c:968 kmalloc include/linux/slab.h:558 [inline] tomoyo_realpath_from_path+0xbf/0x600 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x21b/0x400 security/tomoyo/file.c:822 security_inode_getattr+0xcf/0x140 security/security.c:1347 vfs_getattr fs/stat.c:158 [inline] vfs_statx+0x16e/0x430 fs/stat.c:233 vfs_fstatat+0x8c/0xb0 fs/stat.c:267 __do_sys_newfstatat+0x94/0x120 fs/stat.c:437 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fe36ad251da Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 0b 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 69 fc 0c 00 f7 RSP: 002b:00007ffcc25817e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 00007fe36adf2380 RCX: 00007fe36ad251da RDX: 00007ffcc25817f0 RSI: 00007fe36adbb75a RDI: 000000000000000c RBP: 0000559f1e629160 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000001000 R11: 0000000000000206 R12: 0000559f1e629160 R13: 0000000000000000 R14: 00007ffcc2581dc8 R15: 0000000000003fff ============================= [ BUG: Invalid wait context ] 6.1.0-rc4-syzkaller-00020-gf67dd6ce0723 #0 Tainted: G W ----------------------------- udevd/2975 is trying to lock: ffff888077ee4430 (&gsm->tx_mutex){+.+.}-{3:3}, at: gsm_send.isra.0+0x41e/0x7e0 drivers/tty/n_gsm.c:724 other info that might help us debug this: context-{2:2} 2 locks held by udevd/2975: #0: ffffffff8c7c6aa8 (tomoyo_ss){....}-{0:0}, at: tomoyo_path_perm+0x1c1/0x400 security/tomoyo/file.c:847 #1: ffffc90000007d60 ((&dlci->t1)){+.-.}-{0:0}, at: lockdep_copy_map include/linux/lockdep.h:31 [inline] #1: ffffc90000007d60 ((&dlci->t1)){+.-.}-{0:0}, at: call_timer_fn+0xd4/0x7c0 kernel/time/timer.c:1464 stack backtrace: CPU: 0 PID: 2975 Comm: udevd Tainted: G W 6.1.0-rc4-syzkaller-00020-gf67dd6ce0723 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_lock_invalid_wait_context kernel/locking/lockdep.c:4707 [inline] check_wait_context kernel/locking/lockdep.c:4768 [inline] __lock_acquire.cold+0x322/0x3a7 kernel/locking/lockdep.c:5005 lock_acquire kernel/locking/lockdep.c:5668 [inline] lock_acquire+0x1df/0x630 kernel/locking/lockdep.c:5633 __mutex_lock_common kernel/locking/mutex.c:603 [inline] __mutex_lock+0x12f/0x1350 kernel/locking/mutex.c:747 gsm_send.isra.0+0x41e/0x7e0 drivers/tty/n_gsm.c:724 gsm_command drivers/tty/n_gsm.c:788 [inline] gsm_dlci_begin_close+0x12e/0x210 drivers/tty/n_gsm.c:1930 gsm_dlci_t1+0x186/0x450 drivers/tty/n_gsm.c:1854 call_timer_fn+0x1da/0x7c0 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [inline] __run_timers.part.0+0x6a2/0xaf0 kernel/time/timer.c:1790 __run_timers kernel/time/timer.c:1768 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1803 __do_softirq+0x1f7/0xad8 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1107 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:orc_find arch/x86/kernel/unwind_orc.c:168 [inline] RIP: 0010:unwind_next_frame+0x1cb/0x1cc0 arch/x86/kernel/unwind_orc.c:448 Code: ff 41 39 c7 0f 83 a6 13 00 00 48 b8 00 00 00 00 00 fc ff df 44 89 fa 48 8d 3c 95 e8 9f 03 8f 48 89 f9 48 c1 e9 03 0f b6 0c 01 <48> 89 f8 83 e0 07 83 c0 03 38 c8 7c 1d 84 c9 74 19 48 89 54 24 28 RSP: 0018:ffffc9000317f5e8 EFLAGS: 00000a03 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000000 RDX: 000000000000d883 RSI: ffffffff81d8839e RDI: ffffffff8f0701f4 RBP: ffffc9000317f6a0 R08: ffffffff8be00b20 R09: ffffc9000317f68c R10: fffff5200062fed6 R11: 000000000008c07e R12: ffffc9000317f68d R13: ffffc9000317f658 R14: ffffffff81d8839d R15: 000000000000d883 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:45 kasan_set_track+0x21/0x30 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:371 [inline] ____kasan_kmalloc mm/kasan/common.c:330 [inline] __kasan_kmalloc+0xa1/0xb0 mm/kasan/common.c:380 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slab_common.c:955 [inline] __kmalloc+0x56/0xc0 mm/slab_common.c:968 kmalloc include/linux/slab.h:558 [inline] tomoyo_realpath_from_path+0xbf/0x600 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x21b/0x400 security/tomoyo/file.c:822 security_inode_getattr+0xcf/0x140 security/security.c:1347 vfs_getattr fs/stat.c:158 [inline] vfs_statx+0x16e/0x430 fs/stat.c:233 vfs_fstatat+0x8c/0xb0 fs/stat.c:267 __do_sys_newfstatat+0x94/0x120 fs/stat.c:437 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fe36ad251da Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 0b 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 69 fc 0c 00 f7 RSP: 002b:00007ffcc25817e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 00007fe36adf2380 RCX: 00007fe36ad251da RDX: 00007ffcc25817f0 RSI: 00007fe36adbb75a RDI: 000000000000000c RBP: 0000559f1e629160 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000001000 R11: 0000000000000206 R12: 0000559f1e629160 R13: 0000000000000000 R14: 00007ffcc2581dc8 R15: 0000000000003fff BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 13309, name: udevd preempt_count: 101, expected: 0 RCU nest depth: 0, expected: 0 INFO: lockdep is turned off. Preemption disabled at: [] unwind_next_frame+0xaa/0x1cc0 arch/x86/kernel/unwind_orc.c:433 CPU: 0 PID: 13309 Comm: udevd Tainted: G W 6.1.0-rc4-syzkaller-00020-gf67dd6ce0723 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 __might_resched.cold+0x222/0x26b kernel/sched/core.c:9890 __mutex_lock_common kernel/locking/mutex.c:580 [inline] __mutex_lock+0x9f/0x1350 kernel/locking/mutex.c:747 gsm_send.isra.0+0x41e/0x7e0 drivers/tty/n_gsm.c:724 gsm_command drivers/tty/n_gsm.c:788 [inline] gsm_dlci_begin_close+0x12e/0x210 drivers/tty/n_gsm.c:1930 gsm_dlci_t1+0x186/0x450 drivers/tty/n_gsm.c:1854 call_timer_fn+0x1da/0x7c0 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [inline] __run_timers.part.0+0x6a2/0xaf0 kernel/time/timer.c:1790 __run_timers kernel/time/timer.c:1768 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1803 __do_softirq+0x1f7/0xad8 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1107 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:stack_access_ok+0xc/0x1d0 arch/x86/kernel/unwind_orc.c:343 Code: c3 e8 28 28 93 00 eb a8 48 89 ef e8 2e 28 93 00 eb c4 48 89 ef e8 24 28 93 00 eb de 66 90 48 b8 00 00 00 00 00 fc ff df 41 56 <41> 55 41 54 49 89 d4 48 89 fa 55 48 c1 ea 03 48 89 f5 53 48 89 fb RSP: 0018:ffffc90003a3f580 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff8e6d7081 RDX: 0000000000000008 RSI: ffffc90003a3f938 RDI: ffffc90003a3f600 RBP: ffffc90003a3f648 R08: ffffffff8e6d707c R09: ffffc90003a3f634 R10: fffff52000747ecb R11: ffffc90003a3f938 R12: ffffc90003a3f635 R13: ffffc90003a3f600 R14: ffffc90003a3f940 R15: ffffffff8e6d7080 deref_stack_reg arch/x86/kernel/unwind_orc.c:357 [inline] unwind_next_frame+0xc3f/0x1cc0 arch/x86/kernel/unwind_orc.c:539 arch_stack_walk+0x7d/0xe0 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x1e/0x40 mm/kasan/common.c:45 kasan_set_track+0x21/0x30 mm/kasan/common.c:52 __kasan_slab_alloc+0x7e/0x80 mm/kasan/common.c:325 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook mm/slab.h:737 [inline] slab_alloc_node mm/slub.c:3398 [inline] slab_alloc mm/slub.c:3406 [inline] __kmem_cache_alloc_lru mm/slub.c:3413 [inline] kmem_cache_alloc+0x2ac/0x3c0 mm/slub.c:3422 kmem_cache_zalloc include/linux/slab.h:679 [inline] seq_open+0x57/0x180 fs/seq_file.c:63 kernfs_fop_open+0x694/0xec0 fs/kernfs/file.c:722 do_dentry_open+0x6cc/0x13f0 fs/open.c:882 do_open fs/namei.c:3557 [inline] path_openat+0x1bf6/0x2860 fs/namei.c:3713 do_filp_open+0x1b6/0x400 fs/namei.c:3740 do_sys_openat2+0x16d/0x4c0 fs/open.c:1310 do_sys_open fs/open.c:1326 [inline] __do_sys_openat fs/open.c:1342 [inline] __se_sys_openat fs/open.c:1337 [inline] __x64_sys_openat+0x13f/0x1f0 fs/open.c:1337 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fe36ad25697 Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f RSP: 002b:00007ffcc257d2a0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000559f1e629160 RCX: 00007fe36ad25697 RDX: 0000000000080000 RSI: 00007ffcc257d3d8 RDI: 00000000ffffff9c RBP: 00007ffcc257d3d8 R08: 0000000000000008 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000080000 R13: 0000559f1e629160 R14: 0000000000000001 R15: 0000559f1dada160 BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 14972, name: udevd preempt_count: 100, expected: 0 RCU nest depth: 0, expected: 0 INFO: lockdep is turned off. Preemption disabled at: [] softirq_handle_begin kernel/softirq.c:409 [inline] [] __do_softirq+0xe3/0xad8 kernel/softirq.c:547 CPU: 0 PID: 14972 Comm: udevd Tainted: G W 6.1.0-rc4-syzkaller-00020-gf67dd6ce0723 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 __might_resched.cold+0x222/0x26b kernel/sched/core.c:9890 __mutex_lock_common kernel/locking/mutex.c:580 [inline] __mutex_lock+0x9f/0x1350 kernel/locking/mutex.c:747 gsm_send.isra.0+0x41e/0x7e0 drivers/tty/n_gsm.c:724 gsm_command drivers/tty/n_gsm.c:788 [inline] gsm_dlci_begin_close+0x12e/0x210 drivers/tty/n_gsm.c:1930 gsm_dlci_t1+0x186/0x450 drivers/tty/n_gsm.c:1854 call_timer_fn+0x1da/0x7c0 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [inline] __run_timers.part.0+0x6a2/0xaf0 kernel/time/timer.c:1790 __run_timers kernel/time/timer.c:1768 [inline] run_timer_softirq+0xb3/0x1d0 kernel/time/timer.c:1803 __do_softirq+0x1f7/0xad8 kernel/softirq.c:571 invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x93/0xc0 arch/x86/kernel/apic/apic.c:1107 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0010:write_comp_data+0x7/0x90 kernel/kcov.c:230 Code: ff 00 75 10 65 48 8b 04 25 80 6f 02 00 48 8b 80 80 15 00 00 c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 65 8b 05 39 c7 85 7e <49> 89 f1 89 c6 49 89 d2 81 e6 00 01 00 00 49 89 f8 65 48 8b 14 25 RSP: 0018:ffffc90008d4f988 EFLAGS: 00000246 RAX: 0000000080000000 RBX: 0000000000000000 RCX: ffffffff81da2fa8 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 RBP: ffff888035439440 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000000 R14: ffffffff81fe0b10 R15: ffff888035439442 devcgroup_inode_permission include/linux/device_cgroup.h:21 [inline] inode_permission.part.0+0x108/0x670 fs/namei.c:529 inode_permission fs/namei.c:506 [inline] may_lookup fs/namei.c:1715 [inline] link_path_walk.part.0+0x83c/0xe20 fs/namei.c:2262 link_path_walk fs/namei.c:2244 [inline] path_lookupat+0xb7/0x840 fs/namei.c:2473 filename_lookup+0x1ce/0x590 fs/namei.c:2503 vfs_statx+0x14c/0x430 fs/stat.c:229 vfs_fstatat+0x8c/0xb0 fs/stat.c:267 __do_sys_newfstatat+0x94/0x120 fs/stat.c:437 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7fe36ad251da Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 0b 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 69 fc 0c 00 f7 RSP: 002b:00007ffcc257fa38 EFLAGS: 00000206 ORIG_RAX: 0000000000000106 RAX: ffffffffffffffda RBX: 0000559f1e61c1a0 RCX: 00007fe36ad251da RDX: 00007ffcc257fa48 RSI: 00007ffcc257fad8 RDI: 00000000ffffff9c RBP: 0000559f1e6231bf R08: 0000559f1e6231bf R09: 0000000000000000 R10: 0000000000000100 R11: 0000000000000206 R12: 0000000000000000 R13: 0000559f1e61c290 R14: 00007ffcc257fad8 R15: 0000559f1dada160 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 41 39 c7 cmp %eax,%r15d 3: 0f 83 a6 13 00 00 jae 0x13af 9: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 10: fc ff df 13: 44 89 fa mov %r15d,%edx 16: 48 8d 3c 95 e8 9f 03 lea -0x70fc6018(,%rdx,4),%rdi 1d: 8f 1e: 48 89 f9 mov %rdi,%rcx 21: 48 c1 e9 03 shr $0x3,%rcx 25: 0f b6 0c 01 movzbl (%rcx,%rax,1),%ecx * 29: 48 89 f8 mov %rdi,%rax <-- trapping instruction 2c: 83 e0 07 and $0x7,%eax 2f: 83 c0 03 add $0x3,%eax 32: 38 c8 cmp %cl,%al 34: 7c 1d jl 0x53 36: 84 c9 test %cl,%cl 38: 74 19 je 0x53 3a: 48 89 54 24 28 mov %rdx,0x28(%rsp)