==================================================================
BUG: KASAN: use-after-free in cpu_map_generic_redirect+0x1a8/0x6d0 kernel/bpf/cpumap.c:786
Read of size 8 at addr ffff88810ddfe018 by task kworker/0:5/1026
CPU: 0 PID: 1026 Comm: kworker/0:5 Not tainted 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x151/0x1c0 lib/dump_stack.c:106
print_address_description+0x87/0x3b0 mm/kasan/report.c:248
__kasan_report mm/kasan/report.c:427 [inline]
kasan_report+0x179/0x1c0 mm/kasan/report.c:444
__asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309
cpu_map_generic_redirect+0x1a8/0x6d0 kernel/bpf/cpumap.c:786
xdp_do_generic_redirect_map net/core/filter.c:4189 [inline]
xdp_do_generic_redirect+0x3df/0xb40 net/core/filter.c:4236
do_xdp_generic+0x50b/0x7c0 net/core/dev.c:4919
__netif_receive_skb_core+0x1706/0x3640 net/core/dev.c:5324
__netif_receive_skb_one_core net/core/dev.c:5499 [inline]
__netif_receive_skb+0x11c/0x530 net/core/dev.c:5615
process_backlog+0x31c/0x650 net/core/dev.c:6492
__napi_poll+0xc4/0x5a0 net/core/dev.c:7051
napi_poll net/core/dev.c:7118 [inline]
net_rx_action+0x47d/0xc50 net/core/dev.c:7208
handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565
__do_softirq+0xb/0xd kernel/softirq.c:603
do_softirq+0xf6/0x150 kernel/softirq.c:452
__local_bh_enable_ip+0x75/0x80 kernel/softirq.c:379
__raw_read_unlock_bh include/linux/rwlock_api_smp.h:251 [inline]
_raw_read_unlock_bh+0x29/0x30 kernel/locking/spinlock.c:284
wg_socket_send_skb_to_peer+0x178/0x1d0 drivers/net/wireguard/socket.c:184
wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline]
wg_packet_tx_worker+0x1e6/0x530 drivers/net/wireguard/send.c:276
process_one_work+0x6bb/0xc10 kernel/workqueue.c:2325
worker_thread+0xad5/0x12a0 kernel/workqueue.c:2472
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
Allocated by task 2655:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track mm/kasan/common.c:45 [inline]
set_alloc_info mm/kasan/common.c:433 [inline]
____kasan_kmalloc+0xdb/0x110 mm/kasan/common.c:512
__kasan_kmalloc+0x9/0x10 mm/kasan/common.c:521
kasan_kmalloc include/linux/kasan.h:227 [inline]
__kmalloc+0x13f/0x2c0 mm/slub.c:4431
__kmalloc_node include/linux/slab.h:469 [inline]
kmalloc_node include/linux/slab.h:626 [inline]
bpf_map_kmalloc_node+0xdb/0x160 kernel/bpf/syscall.c:432
__cpu_map_entry_alloc kernel/bpf/cpumap.c:442 [inline]
cpu_map_update_elem+0x26c/0xea0 kernel/bpf/cpumap.c:600
bpf_map_update_value+0x1a3/0x3c0 kernel/bpf/syscall.c:186
map_update_elem+0x644/0x770 kernel/bpf/syscall.c:1165
__sys_bpf+0x405/0x760 kernel/bpf/syscall.c:4626
__do_sys_bpf kernel/bpf/syscall.c:4742 [inline]
__se_sys_bpf kernel/bpf/syscall.c:4740 [inline]
__x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:4740
x64_sys_call+0x87f/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:322
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
Freed by task 2656:
kasan_save_stack mm/kasan/common.c:38 [inline]
kasan_set_track+0x4b/0x70 mm/kasan/common.c:45
kasan_set_free_info+0x23/0x40 mm/kasan/generic.c:370
____kasan_slab_free+0x126/0x160 mm/kasan/common.c:365
__kasan_slab_free+0x11/0x20 mm/kasan/common.c:373
kasan_slab_free include/linux/kasan.h:193 [inline]
slab_free_hook mm/slub.c:1723 [inline]
slab_free_freelist_hook+0xbd/0x190 mm/slub.c:1749
slab_free mm/slub.c:3521 [inline]
kfree+0xcc/0x270 mm/slub.c:4583
put_cpu_map_entry+0x6dd/0x750 kernel/bpf/cpumap.c:160
cpu_map_kthread_run+0x22d0/0x2390 kernel/bpf/cpumap.c:407
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
Last potentially related work creation:
kasan_save_stack+0x3b/0x60 mm/kasan/common.c:38
__kasan_record_aux_stack+0xd3/0xf0 mm/kasan/generic.c:348
kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:358
insert_work+0x56/0x320 kernel/workqueue.c:1373
__queue_work+0x92a/0xcd0 kernel/workqueue.c:1539
queue_work_on+0x105/0x170 kernel/workqueue.c:1566
queue_work include/linux/workqueue.h:510 [inline]
schedule_work include/linux/workqueue.h:571 [inline]
__cpu_map_entry_replace kernel/bpf/cpumap.c:555 [inline]
cpu_map_free+0x1e7/0x2c0 kernel/bpf/cpumap.c:638
bpf_map_free_deferred+0x10d/0x1e0 kernel/bpf/syscall.c:481
process_one_work+0x6bb/0xc10 kernel/workqueue.c:2325
worker_thread+0xad5/0x12a0 kernel/workqueue.c:2472
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
Second to last potentially related work creation:
kasan_save_stack+0x3b/0x60 mm/kasan/common.c:38
__kasan_record_aux_stack+0xd3/0xf0 mm/kasan/generic.c:348
kasan_record_aux_stack_noalloc+0xb/0x10 mm/kasan/generic.c:358
__call_rcu_common kernel/rcu/tree.c:3007 [inline]
call_rcu+0x123/0x10b0 kernel/rcu/tree.c:3125
__cpu_map_entry_replace kernel/bpf/cpumap.c:553 [inline]
cpu_map_free+0x109/0x2c0 kernel/bpf/cpumap.c:638
bpf_map_free_deferred+0x10d/0x1e0 kernel/bpf/syscall.c:481
process_one_work+0x6bb/0xc10 kernel/workqueue.c:2325
worker_thread+0xad5/0x12a0 kernel/workqueue.c:2472
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
The buggy address belongs to the object at ffff88810ddfe000
which belongs to the cache kmalloc-192 of size 192
The buggy address is located 24 bytes inside of
192-byte region [ffff88810ddfe000, ffff88810ddfe0c0)
The buggy address belongs to the page:
page:ffffea0004377f80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10ddfe
flags: 0x4000000000000200(slab|zone=1)
raw: 4000000000000200 ffffea000442de40 0000000f00000002 ffff888100042c00
raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 102, ts 4831525203, free_ts 4831504164
set_page_owner include/linux/page_owner.h:33 [inline]
post_alloc_hook+0x1a3/0x1b0 mm/page_alloc.c:2605
prep_new_page+0x1b/0x110 mm/page_alloc.c:2611
get_page_from_freelist+0x3550/0x35d0 mm/page_alloc.c:4485
__alloc_pages+0x27e/0x8f0 mm/page_alloc.c:5780
allocate_slab mm/slub.c:1932 [inline]
new_slab+0x9a/0x4e0 mm/slub.c:1995
___slab_alloc+0x39e/0x830 mm/slub.c:3028
__slab_alloc+0x4a/0x90 mm/slub.c:3115
slab_alloc_node mm/slub.c:3206 [inline]
slab_alloc mm/slub.c:3250 [inline]
kmem_cache_alloc_trace+0x147/0x270 mm/slub.c:3267
kmalloc include/linux/slab.h:603 [inline]
kzalloc include/linux/slab.h:733 [inline]
kernfs_fop_open+0x324/0xab0 fs/kernfs/file.c:628
do_dentry_open+0x81c/0xfd0 fs/open.c:828
vfs_open+0x73/0x80 fs/open.c:958
do_open fs/namei.c:3608 [inline]
path_openat+0x26f0/0x2f40 fs/namei.c:3742
do_filp_open+0x21c/0x460 fs/namei.c:3769
do_sys_openat2+0x13f/0x820 fs/open.c:1234
do_sys_open fs/open.c:1250 [inline]
__do_sys_openat fs/open.c:1266 [inline]
__se_sys_openat fs/open.c:1261 [inline]
__x64_sys_openat+0x243/0x290 fs/open.c:1261
x64_sys_call+0x6bf/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:258
page last free stack trace:
reset_page_owner include/linux/page_owner.h:26 [inline]
free_pages_prepare mm/page_alloc.c:1472 [inline]
free_pcp_prepare mm/page_alloc.c:1544 [inline]
free_unref_page_prepare+0x7c8/0x7d0 mm/page_alloc.c:3534
free_unref_page+0xe8/0x750 mm/page_alloc.c:3616
free_the_page mm/page_alloc.c:805 [inline]
__free_pages+0x61/0xf0 mm/page_alloc.c:5856
free_pages+0x7c/0x90 mm/page_alloc.c:5867
selinux_genfs_get_sid+0x24d/0x2a0 security/selinux/hooks.c:1375
inode_doinit_with_dentry+0x8d2/0x1070 security/selinux/hooks.c:1570
selinux_d_instantiate+0x27/0x40 security/selinux/hooks.c:6489
security_d_instantiate+0x9f/0x100 security/security.c:2074
d_splice_alias+0x6d/0x390 fs/dcache.c:3071
kernfs_iop_lookup+0x29e/0x2f0 fs/kernfs/dir.c:1175
lookup_open fs/namei.c:3440 [inline]
open_last_lookups fs/namei.c:3532 [inline]
path_openat+0x1194/0x2f40 fs/namei.c:3739
do_filp_open+0x21c/0x460 fs/namei.c:3769
do_sys_openat2+0x13f/0x820 fs/open.c:1234
do_sys_open fs/open.c:1250 [inline]
__do_sys_openat fs/open.c:1266 [inline]
__se_sys_openat fs/open.c:1261 [inline]
__x64_sys_openat+0x243/0x290 fs/open.c:1261
x64_sys_call+0x6bf/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:258
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:80
Memory state around the buggy address:
ffff88810ddfdf00: fc fc fc fc 00 00 00 00 00 00 00 fc fc fc fc 00
ffff88810ddfdf80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
>ffff88810ddfe000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
^
ffff88810ddfe080: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
ffff88810ddfe100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
================================================================================
UBSAN: array-index-out-of-bounds in kernel/locking/qspinlock.c:130:9
index 16382 is out of range for type 'unsigned long[8]'
CPU: 0 PID: 1026 Comm: kworker/0:5 Tainted: G B 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x151/0x1c0 lib/dump_stack.c:106
dump_stack+0x15/0x20 lib/dump_stack.c:113
ubsan_epilogue lib/ubsan.c:151 [inline]
__ubsan_handle_out_of_bounds+0x118/0x140 lib/ubsan.c:282
decode_tail kernel/locking/qspinlock.c:130 [inline]
__pv_queued_spin_lock_slowpath+0xb9d/0xc40 kernel/locking/qspinlock.c:468
pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline]
queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline]
queued_spin_lock include/asm-generic/qspinlock.h:85 [inline]
do_raw_spin_lock include/linux/spinlock.h:187 [inline]
__raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_lock+0x139/0x1b0 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:363 [inline]
ptr_ring_produce include/linux/ptr_ring.h:128 [inline]
cpu_map_generic_redirect+0x1d5/0x6d0 kernel/bpf/cpumap.c:786
xdp_do_generic_redirect_map net/core/filter.c:4189 [inline]
xdp_do_generic_redirect+0x3df/0xb40 net/core/filter.c:4236
do_xdp_generic+0x50b/0x7c0 net/core/dev.c:4919
__netif_receive_skb_core+0x1706/0x3640 net/core/dev.c:5324
__netif_receive_skb_one_core net/core/dev.c:5499 [inline]
__netif_receive_skb+0x11c/0x530 net/core/dev.c:5615
process_backlog+0x31c/0x650 net/core/dev.c:6492
__napi_poll+0xc4/0x5a0 net/core/dev.c:7051
napi_poll net/core/dev.c:7118 [inline]
net_rx_action+0x47d/0xc50 net/core/dev.c:7208
handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565
__do_softirq+0xb/0xd kernel/softirq.c:603
do_softirq+0xf6/0x150 kernel/softirq.c:452
__local_bh_enable_ip+0x75/0x80 kernel/softirq.c:379
__raw_read_unlock_bh include/linux/rwlock_api_smp.h:251 [inline]
_raw_read_unlock_bh+0x29/0x30 kernel/locking/spinlock.c:284
wg_socket_send_skb_to_peer+0x178/0x1d0 drivers/net/wireguard/socket.c:184
wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline]
wg_packet_tx_worker+0x1e6/0x530 drivers/net/wireguard/send.c:276
process_one_work+0x6bb/0xc10 kernel/workqueue.c:2325
worker_thread+0xad5/0x12a0 kernel/workqueue.c:2472
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
================================================================================
general protection fault, probably for non-canonical address 0x488810ddfe000: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1026 Comm: kworker/0:5 Tainted: G B 5.15.178-syzkaller-00013-g7d1f9b5c2ff5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
RIP: 0010:per_cpu_remove_cache+0xb9/0x1b0 mm/kasan/quarantine.c:325
Code: 40 10 00 00 00 00 48 8d 5d c8 4c 8d 55 c0 48 89 fa 4c 89 e1 48 b8 ff ff ff 7f ff ff ff ff 48 39 c7 76 07 48 8b 0d 47 89 ee 04 <48> 8b 3a 48 01 d1 48 81 e9 00 00 00 80 48 c1 e9 0c 48 c1 e1 06 49
RSP: 0018:ffffc90000006f00 EFLAGS: 00010013
RAX: ffffffff7fffffff RBX: ffffc90000006f08 RCX: 0000777f80000000
RDX: 000488810ddfe000 RSI: ffff8881f7035048 RDI: 000488810ddfe000
RBP: ffffc90000006f40 R08: ffff8881f7035040 R09: ffff8881f7035050
R10: ffffc90000006f00 R11: ffff8881f7035048 R12: 0000777f80000000
R13: ffff8881f7035050 R14: ffff88811af00f00 R15: ffffea0000000000
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f322a46e000 CR3: 0000000113032000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
flush_smp_call_function_queue+0x222/0x6a0 kernel/smp.c:628
generic_smp_call_function_single_interrupt+0x13/0x20 kernel/smp.c:544
__sysvec_call_function_single+0x63/0x1b0 arch/x86/kernel/smp.c:248
instr_sysvec_call_function_single arch/x86/kernel/smp.c:243 [inline]
sysvec_call_function_single+0x50/0xc0 arch/x86/kernel/smp.c:243
asm_sysvec_call_function_single+0x1b/0x20 arch/x86/include/asm/idtentry.h:684
RIP: 0010:console_lock_spinning_disable_and_check kernel/printk/printk.c:1840 [inline]
RIP: 0010:console_unlock+0xc5b/0x10e0 kernel/printk/printk.c:2773
Code: 48 89 de 48 81 e6 00 02 00 00 31 ff e8 7e fb 18 00 48 81 e3 00 02 00 00 75 07 e8 30 f7 18 00 eb 06 e8 29 f7 18 00 fb 45 31 ff <45> 84 f6 0f 94 c1 0f 95 c0 84 4c 24 0f 74 0f e8 11 f7 18 00 2e 2e
RSP: 0018:ffffc900000070a0 EFLAGS: 00000246
RAX: ffffffff81577587 RBX: 0000000000000200 RCX: ffff888116ad4f00
RDX: 0000000000000100 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffffc90000007330 R08: ffffffff81577572 R09: 0000000000000003
R10: fffff52000000e04 R11: dffffc0000000001 R12: ffffffff86ad29e8
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
vprintk_emit+0x132/0x340 kernel/printk/printk.c:2294
vprintk_default+0x26/0x30 kernel/printk/printk.c:2309
vprintk+0x74/0x80 kernel/printk/printk_safe.c:45
_printk+0xd1/0x120 kernel/printk/printk.c:2319
ubsan_epilogue lib/ubsan.c:152 [inline]
__ubsan_handle_out_of_bounds+0x124/0x140 lib/ubsan.c:282
decode_tail kernel/locking/qspinlock.c:130 [inline]
__pv_queued_spin_lock_slowpath+0xb9d/0xc40 kernel/locking/qspinlock.c:468
pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:585 [inline]
queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline]
queued_spin_lock include/asm-generic/qspinlock.h:85 [inline]
do_raw_spin_lock include/linux/spinlock.h:187 [inline]
__raw_spin_lock include/linux/spinlock_api_smp.h:143 [inline]
_raw_spin_lock+0x139/0x1b0 kernel/locking/spinlock.c:154
spin_lock include/linux/spinlock.h:363 [inline]
ptr_ring_produce include/linux/ptr_ring.h:128 [inline]
cpu_map_generic_redirect+0x1d5/0x6d0 kernel/bpf/cpumap.c:786
xdp_do_generic_redirect_map net/core/filter.c:4189 [inline]
xdp_do_generic_redirect+0x3df/0xb40 net/core/filter.c:4236
do_xdp_generic+0x50b/0x7c0 net/core/dev.c:4919
__netif_receive_skb_core+0x1706/0x3640 net/core/dev.c:5324
__netif_receive_skb_one_core net/core/dev.c:5499 [inline]
__netif_receive_skb+0x11c/0x530 net/core/dev.c:5615
process_backlog+0x31c/0x650 net/core/dev.c:6492
__napi_poll+0xc4/0x5a0 net/core/dev.c:7051
napi_poll net/core/dev.c:7118 [inline]
net_rx_action+0x47d/0xc50 net/core/dev.c:7208
handle_softirqs+0x25e/0x5c0 kernel/softirq.c:565
__do_softirq+0xb/0xd kernel/softirq.c:603
do_softirq+0xf6/0x150 kernel/softirq.c:452
__local_bh_enable_ip+0x75/0x80 kernel/softirq.c:379
__raw_read_unlock_bh include/linux/rwlock_api_smp.h:251 [inline]
_raw_read_unlock_bh+0x29/0x30 kernel/locking/spinlock.c:284
wg_socket_send_skb_to_peer+0x178/0x1d0 drivers/net/wireguard/socket.c:184
wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline]
wg_packet_tx_worker+0x1e6/0x530 drivers/net/wireguard/send.c:276
process_one_work+0x6bb/0xc10 kernel/workqueue.c:2325
worker_thread+0xad5/0x12a0 kernel/workqueue.c:2472
kthread+0x421/0x510 kernel/kthread.c:337
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
Modules linked in:
---[ end trace ca62119de123bf9d ]---
RIP: 0010:per_cpu_remove_cache+0xb9/0x1b0 mm/kasan/quarantine.c:325
Code: 40 10 00 00 00 00 48 8d 5d c8 4c 8d 55 c0 48 89 fa 4c 89 e1 48 b8 ff ff ff 7f ff ff ff ff 48 39 c7 76 07 48 8b 0d 47 89 ee 04 <48> 8b 3a 48 01 d1 48 81 e9 00 00 00 80 48 c1 e9 0c 48 c1 e1 06 49
RSP: 0018:ffffc90000006f00 EFLAGS: 00010013
RAX: ffffffff7fffffff RBX: ffffc90000006f08 RCX: 0000777f80000000
RDX: 000488810ddfe000 RSI: ffff8881f7035048 RDI: 000488810ddfe000
RBP: ffffc90000006f40 R08: ffff8881f7035040 R09: ffff8881f7035050
R10: ffffc90000006f00 R11: ffff8881f7035048 R12: 0000777f80000000
R13: ffff8881f7035050 R14: ffff88811af00f00 R15: ffffea0000000000
FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f322a46e000 CR3: 0000000113032000 CR4: 00000000003506b0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
----------------
Code disassembly (best guess):
0: 40 10 00 rex adc %al,(%rax)
3: 00 00 add %al,(%rax)
5: 00 48 8d add %cl,-0x73(%rax)
8: 5d pop %rbp
9: c8 4c 8d 55 enter $0x8d4c,$0x55
d: c0 48 89 fa rorb $0xfa,-0x77(%rax)
11: 4c 89 e1 mov %r12,%rcx
14: 48 b8 ff ff ff 7f ff movabs $0xffffffff7fffffff,%rax
1b: ff ff ff
1e: 48 39 c7 cmp %rax,%rdi
21: 76 07 jbe 0x2a
23: 48 8b 0d 47 89 ee 04 mov 0x4ee8947(%rip),%rcx # 0x4ee8971
* 2a: 48 8b 3a mov (%rdx),%rdi <-- trapping instruction
2d: 48 01 d1 add %rdx,%rcx
30: 48 81 e9 00 00 00 80 sub $0xffffffff80000000,%rcx
37: 48 c1 e9 0c shr $0xc,%rcx
3b: 48 c1 e1 06 shl $0x6,%rcx
3f: 49 rex.WB