FAULT_INJECTION: forcing a failure. name fail_usercopy, interval 1, probability 0, space 0, times 0 ====================================================== WARNING: possible circular locking dependency detected 5.16.0-rc8-syzkaller #0 Not tainted ------------------------------------------------------ syz-executor.3/22248 is trying to acquire lock: ffffffff8bb73338 ((console_sem).lock){-.-.}-{2:2}, at: down_trylock+0xe/0x60 kernel/locking/semaphore.c:138 but task is already holding lock: ffff8880b9c39a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&rq->__lock){-.-.}-{2:2}: _raw_spin_lock_nested+0x30/0x40 kernel/locking/spinlock.c:368 raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 raw_spin_rq_lock kernel/sched/sched.h:1316 [inline] rq_lock kernel/sched/sched.h:1614 [inline] task_fork_fair+0x68/0x520 kernel/sched/fair.c:11193 sched_post_fork+0x340/0x480 kernel/sched/core.c:4448 copy_process+0x460e/0x75a0 kernel/fork.c:2406 kernel_clone+0xe7/0xab0 kernel/fork.c:2582 kernel_thread+0xb5/0xf0 kernel/fork.c:2634 rest_init+0x23/0x3e0 init/main.c:690 start_kernel+0x47a/0x49b init/main.c:1135 secondary_startup_64_no_verify+0xb0/0xbb -> #1 (&p->pi_lock){-.-.}-{2:2}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 try_to_wake_up+0xab/0x15a0 kernel/sched/core.c:4003 up+0x75/0xb0 kernel/locking/semaphore.c:190 __up_console_sem+0xa4/0xc0 kernel/printk/printk.c:254 console_unlock+0x567/0xb70 kernel/printk/printk.c:2727 do_fb_ioctl+0x63b/0x690 drivers/video/fbdev/core/fbmem.c:1116 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1189 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae -> #0 ((console_sem).lock){-.-.}-{2:2}: check_prev_add kernel/locking/lockdep.c:3063 [inline] check_prevs_add kernel/locking/lockdep.c:3186 [inline] validate_chain kernel/locking/lockdep.c:3801 [inline] __lock_acquire+0x2a2c/0x5470 kernel/locking/lockdep.c:5027 lock_acquire kernel/locking/lockdep.c:5637 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 down_trylock+0xe/0x60 kernel/locking/semaphore.c:138 __down_trylock_console_sem+0x40/0x120 kernel/printk/printk.c:237 console_trylock kernel/printk/printk.c:2542 [inline] console_trylock_spinning kernel/printk/printk.c:1843 [inline] vprintk_emit+0x146/0x4f0 kernel/printk/printk.c:2244 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2266 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x472/0x5a0 lib/fault-inject.c:146 __copy_to_user_inatomic include/linux/uaccess.h:133 [inline] copy_to_user_nofault+0x117/0x1f0 mm/maccess.c:255 kvm_steal_time_set_preempted arch/x86/kvm/x86.c:4445 [inline] kvm_arch_vcpu_put+0x370/0x860 arch/x86/kvm/x86.c:4466 kvm_sched_out+0xc2/0x100 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5389 __fire_sched_out_preempt_notifiers kernel/sched/core.c:4580 [inline] fire_sched_out_preempt_notifiers kernel/sched/core.c:4588 [inline] prepare_task_switch kernel/sched/core.c:4784 [inline] context_switch kernel/sched/core.c:4924 [inline] __schedule+0x1c69/0x4900 kernel/sched/core.c:6253 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6668 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 clear_page_erms+0x7/0x10 arch/x86/lib/clear_page_64.S:48 clear_page arch/x86/include/asm/page_64.h:49 [inline] clear_highpage include/linux/highmem.h:217 [inline] kernel_init_free_pages mm/page_alloc.c:1276 [inline] kernel_init_free_pages mm/page_alloc.c:1261 [inline] post_alloc_hook+0x1ba/0x230 mm/page_alloc.c:2408 prep_new_page mm/page_alloc.c:2418 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369 __alloc_pages_node include/linux/gfp.h:570 [inline] alloc_pages_vma+0x688/0x760 mm/mempolicy.c:2133 do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4422 [inline] __handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657 handle_mm_fault+0x1c8/0x790 mm/memory.c:4784 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1485 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 record_steal_time+0x3ca/0xe20 arch/x86/kvm/x86.c:3330 vcpu_enter_guest+0x2b7a/0x4370 arch/x86/kvm/x86.c:9716 vcpu_run arch/x86/kvm/x86.c:10048 [inline] kvm_arch_vcpu_ioctl_run+0x4fa/0x20e0 arch/x86/kvm/x86.c:10243 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3727 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae other info that might help us debug this: Chain exists of: (console_sem).lock --> &p->pi_lock --> &rq->__lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rq->__lock); lock(&p->pi_lock); lock(&rq->__lock); lock((console_sem).lock); *** DEADLOCK *** 5 locks held by syz-executor.3/22248: #0: ffff8880224f40c8 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x1d1/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3704 #1: ffffc900053b44a8 (&kvm->srcu){....}-{0:0}, at: vcpu_run arch/x86/kvm/x86.c:10041 [inline] #1: ffffc900053b44a8 (&kvm->srcu){....}-{0:0}, at: kvm_arch_vcpu_ioctl_run+0x3c9/0x20e0 arch/x86/kvm/x86.c:10243 #2: ffff88801739c028 (&mm->mmap_lock#2){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline] #2: ffff88801739c028 (&mm->mmap_lock#2){++++}-{3:3}, at: do_user_addr_fault+0x285/0x11c0 arch/x86/mm/fault.c:1338 #3: ffff8880b9c39a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:478 #4: ffffc900053b44a8 (&kvm->srcu){....}-{0:0}, at: kvm_arch_vcpu_put+0xbd/0x860 arch/x86/kvm/x86.c:4462 stack backtrace: CPU: 0 PID: 22248 Comm: syz-executor.3 Not tainted 5.16.0-rc8-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 check_noncircular+0x25f/0x2e0 kernel/locking/lockdep.c:2143 check_prev_add kernel/locking/lockdep.c:3063 [inline] check_prevs_add kernel/locking/lockdep.c:3186 [inline] validate_chain kernel/locking/lockdep.c:3801 [inline] __lock_acquire+0x2a2c/0x5470 kernel/locking/lockdep.c:5027 lock_acquire kernel/locking/lockdep.c:5637 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5602 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 down_trylock+0xe/0x60 kernel/locking/semaphore.c:138 __down_trylock_console_sem+0x40/0x120 kernel/printk/printk.c:237 console_trylock kernel/printk/printk.c:2542 [inline] console_trylock_spinning kernel/printk/printk.c:1843 [inline] vprintk_emit+0x146/0x4f0 kernel/printk/printk.c:2244 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2266 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x472/0x5a0 lib/fault-inject.c:146 __copy_to_user_inatomic include/linux/uaccess.h:133 [inline] copy_to_user_nofault+0x117/0x1f0 mm/maccess.c:255 kvm_steal_time_set_preempted arch/x86/kvm/x86.c:4445 [inline] kvm_arch_vcpu_put+0x370/0x860 arch/x86/kvm/x86.c:4466 kvm_sched_out+0xc2/0x100 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5389 __fire_sched_out_preempt_notifiers kernel/sched/core.c:4580 [inline] fire_sched_out_preempt_notifiers kernel/sched/core.c:4588 [inline] prepare_task_switch kernel/sched/core.c:4784 [inline] context_switch kernel/sched/core.c:4924 [inline] __schedule+0x1c69/0x4900 kernel/sched/core.c:6253 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6668 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:clear_page_erms+0x7/0x10 arch/x86/lib/clear_page_64.S:49 Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 cc cc cc cc cc cc 41 57 41 56 41 55 41 54 55 53 48 89 fb RSP: 0018:ffffc9001298f470 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000001c0 RDX: ffffea0000dade40 RSI: ffff888000000000 RDI: ffff888036b79e40 RBP: ffffea0000da8000 R08: 0000160000000000 R09: ffffea0000db0000 R10: fffff940001b5006 R11: 0000000000000001 R12: 0000000000000009 R13: 00000000013d20ca R14: 0000000000000200 R15: 0000000000000009 clear_page arch/x86/include/asm/page_64.h:49 [inline] clear_highpage include/linux/highmem.h:217 [inline] kernel_init_free_pages mm/page_alloc.c:1276 [inline] kernel_init_free_pages mm/page_alloc.c:1261 [inline] post_alloc_hook+0x1ba/0x230 mm/page_alloc.c:2408 prep_new_page mm/page_alloc.c:2418 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369 __alloc_pages_node include/linux/gfp.h:570 [inline] alloc_pages_vma+0x688/0x760 mm/mempolicy.c:2133 do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4422 [inline] __handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657 handle_mm_fault+0x1c8/0x790 mm/memory.c:4784 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1485 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0010:record_steal_time+0x3ca/0xe20 arch/x86/kvm/x86.c:3330 Code: f8 67 00 48 b8 c0 ef ff ff ff 7f 00 00 48 39 c3 0f 87 a9 00 00 00 e8 05 f6 67 00 0f 01 cb 0f ae e8 45 31 ed 41 bc f2 ff ff ff <44> 86 6b 10 45 31 e4 31 ff 44 89 e6 e8 05 f8 67 00 45 85 e4 0f 84 RSP: 0018:ffffc9001298fb38 EFLAGS: 00050246 RAX: 00000000000008ff RBX: 0000000020fe8000 RCX: ffffc9000ef70000 RDX: 0000000000040000 RSI: ffffffff810f9c2b RDI: 0000000000000003 RBP: ffff8880224f4000 R08: 00007fffffffefc0 R09: 0000000000000000 R10: ffffffff810f9c13 R11: 0000000000000000 R12: 00000000fffffff2 R13: 0000000000000000 R14: ffff8880224f4e70 R15: ffff8880224f4e90 vcpu_enter_guest+0x2b7a/0x4370 arch/x86/kvm/x86.c:9716 vcpu_run arch/x86/kvm/x86.c:10048 [inline] kvm_arch_vcpu_ioctl_run+0x4fa/0x20e0 arch/x86/kvm/x86.c:10243 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3727 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff9838a6e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff9821fb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff9839ba030 RCX: 00007ff9838a6e99 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 RBP: 00007ff9821fb1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ff983eedb1f R14: 00007ff9821fb300 R15: 0000000000022000 CPU: 0 PID: 22248 Comm: syz-executor.3 Not tainted 5.16.0-rc8-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 fail_dump lib/fault-inject.c:52 [inline] should_fail.cold+0x5/0xa lib/fault-inject.c:146 __copy_to_user_inatomic include/linux/uaccess.h:133 [inline] copy_to_user_nofault+0x117/0x1f0 mm/maccess.c:255 kvm_steal_time_set_preempted arch/x86/kvm/x86.c:4445 [inline] kvm_arch_vcpu_put+0x370/0x860 arch/x86/kvm/x86.c:4466 kvm_sched_out+0xc2/0x100 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5389 __fire_sched_out_preempt_notifiers kernel/sched/core.c:4580 [inline] fire_sched_out_preempt_notifiers kernel/sched/core.c:4588 [inline] prepare_task_switch kernel/sched/core.c:4784 [inline] context_switch kernel/sched/core.c:4924 [inline] __schedule+0x1c69/0x4900 kernel/sched/core.c:6253 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6668 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:clear_page_erms+0x7/0x10 arch/x86/lib/clear_page_64.S:49 Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 cc cc cc cc cc cc 41 57 41 56 41 55 41 54 55 53 48 89 fb RSP: 0018:ffffc9001298f470 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000001c0 RDX: ffffea0000dade40 RSI: ffff888000000000 RDI: ffff888036b79e40 RBP: ffffea0000da8000 R08: 0000160000000000 R09: ffffea0000db0000 R10: fffff940001b5006 R11: 0000000000000001 R12: 0000000000000009 R13: 00000000013d20ca R14: 0000000000000200 R15: 0000000000000009 clear_page arch/x86/include/asm/page_64.h:49 [inline] clear_highpage include/linux/highmem.h:217 [inline] kernel_init_free_pages mm/page_alloc.c:1276 [inline] kernel_init_free_pages mm/page_alloc.c:1261 [inline] post_alloc_hook+0x1ba/0x230 mm/page_alloc.c:2408 prep_new_page mm/page_alloc.c:2418 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4149 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5369 __alloc_pages_node include/linux/gfp.h:570 [inline] alloc_pages_vma+0x688/0x760 mm/mempolicy.c:2133 do_huge_pmd_anonymous_page+0x439/0x2840 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4422 [inline] __handle_mm_fault+0x2a2a/0x5120 mm/memory.c:4657 handle_mm_fault+0x1c8/0x790 mm/memory.c:4784 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1485 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1541 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0010:record_steal_time+0x3ca/0xe20 arch/x86/kvm/x86.c:3330 Code: f8 67 00 48 b8 c0 ef ff ff ff 7f 00 00 48 39 c3 0f 87 a9 00 00 00 e8 05 f6 67 00 0f 01 cb 0f ae e8 45 31 ed 41 bc f2 ff ff ff <44> 86 6b 10 45 31 e4 31 ff 44 89 e6 e8 05 f8 67 00 45 85 e4 0f 84 RSP: 0018:ffffc9001298fb38 EFLAGS: 00050246 RAX: 00000000000008ff RBX: 0000000020fe8000 RCX: ffffc9000ef70000 RDX: 0000000000040000 RSI: ffffffff810f9c2b RDI: 0000000000000003 RBP: ffff8880224f4000 R08: 00007fffffffefc0 R09: 0000000000000000 R10: ffffffff810f9c13 R11: 0000000000000000 R12: 00000000fffffff2 R13: 0000000000000000 R14: ffff8880224f4e70 R15: ffff8880224f4e90 vcpu_enter_guest+0x2b7a/0x4370 arch/x86/kvm/x86.c:9716 vcpu_run arch/x86/kvm/x86.c:10048 [inline] kvm_arch_vcpu_ioctl_run+0x4fa/0x20e0 arch/x86/kvm/x86.c:10243 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3727 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff9838a6e99 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff9821fb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007ff9839ba030 RCX: 00007ff9838a6e99 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 RBP: 00007ff9821fb1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ff983eedb1f R14: 00007ff9821fb300 R15: 0000000000022000 ---------------- Code disassembly (best guess): 0: 48 89 47 18 mov %rax,0x18(%rdi) 4: 48 89 47 20 mov %rax,0x20(%rdi) 8: 48 89 47 28 mov %rax,0x28(%rdi) c: 48 89 47 30 mov %rax,0x30(%rdi) 10: 48 89 47 38 mov %rax,0x38(%rdi) 14: 48 8d 7f 40 lea 0x40(%rdi),%rdi 18: 75 d9 jne 0xfffffff3 1a: 90 nop 1b: c3 retq 1c: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 23: b9 00 10 00 00 mov $0x1000,%ecx 28: 31 c0 xor %eax,%eax * 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction 2c: c3 retq 2d: cc int3 2e: cc int3 2f: cc int3 30: cc int3 31: cc int3 32: cc int3 33: 41 57 push %r15 35: 41 56 push %r14 37: 41 55 push %r13 39: 41 54 push %r12 3b: 55 push %rbp 3c: 53 push %rbx 3d: 48 89 fb mov %rdi,%rbx