FAULT_INJECTION: forcing a failure. name fail_usercopy, interval 1, probability 0, space 0, times 0 ====================================================== WARNING: possible circular locking dependency detected 5.17.0-rc2-syzkaller-00054-g27bb0b18c208 #0 Not tainted ------------------------------------------------------ syz-executor.0/14105 is trying to acquire lock: ffffffff8bb72798 ((console_sem).lock){-...}-{2:2}, at: down_trylock+0xe/0x60 kernel/locking/semaphore.c:138 but task is already holding lock: ffff8880b9d39c58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:489 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&rq->__lock){-.-.}-{2:2}: _raw_spin_lock_nested+0x30/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:489 raw_spin_rq_lock kernel/sched/sched.h:1318 [inline] rq_lock kernel/sched/sched.h:1616 [inline] task_fork_fair+0x68/0x520 kernel/sched/fair.c:11182 sched_post_fork+0x340/0x480 kernel/sched/core.c:4462 copy_process+0x56d7/0x7300 kernel/fork.c:2379 kernel_clone+0xe7/0xab0 kernel/fork.c:2555 kernel_thread+0xb5/0xf0 kernel/fork.c:2607 rest_init+0x23/0x3e0 init/main.c:690 start_kernel+0x47a/0x49b init/main.c:1138 secondary_startup_64_no_verify+0xc3/0xcb -> #1 (&p->pi_lock){-.-.}-{2:2}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 try_to_wake_up+0xab/0x1510 kernel/sched/core.c:4017 up+0x75/0xb0 kernel/locking/semaphore.c:190 __up_console_sem+0xa4/0xc0 kernel/printk/printk.c:255 console_unlock+0x567/0xb70 kernel/printk/printk.c:2727 vprintk_emit+0x198/0x4f0 kernel/printk/printk.c:2245 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2266 kauditd_printk_skb kernel/audit.c:538 [inline] kauditd_hold_skb.cold+0x3f/0x4e kernel/audit.c:573 kauditd_send_queue+0x220/0x280 kernel/audit.c:758 kauditd_thread+0x762/0xba0 kernel/audit.c:882 kthread+0x2e9/0x3a0 kernel/kthread.c:377 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 -> #0 ((console_sem).lock){-...}-{2:2}: check_prev_add kernel/locking/lockdep.c:3063 [inline] check_prevs_add kernel/locking/lockdep.c:3186 [inline] validate_chain kernel/locking/lockdep.c:3801 [inline] __lock_acquire+0x2a2c/0x5470 kernel/locking/lockdep.c:5027 lock_acquire kernel/locking/lockdep.c:5639 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5604 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 down_trylock+0xe/0x60 kernel/locking/semaphore.c:138 __down_trylock_console_sem+0x40/0x120 kernel/printk/printk.c:238 console_trylock kernel/printk/printk.c:2542 [inline] console_trylock_spinning kernel/printk/printk.c:1843 [inline] vprintk_emit+0x146/0x4f0 kernel/printk/printk.c:2244 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2266 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x472/0x5a0 lib/fault-inject.c:146 __copy_to_user_inatomic include/linux/uaccess.h:133 [inline] copy_to_user_nofault+0x117/0x1f0 mm/maccess.c:255 kvm_steal_time_set_preempted arch/x86/kvm/x86.c:4582 [inline] kvm_arch_vcpu_put+0x370/0x860 arch/x86/kvm/x86.c:4603 kvm_sched_out+0xc2/0x100 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5570 __fire_sched_out_preempt_notifiers kernel/sched/core.c:4594 [inline] fire_sched_out_preempt_notifiers kernel/sched/core.c:4602 [inline] prepare_task_switch kernel/sched/core.c:4798 [inline] context_switch kernel/sched/core.c:4938 [inline] __schedule+0x172a/0x4db0 kernel/sched/core.c:6295 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6710 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 clear_page_erms+0x7/0x10 arch/x86/lib/clear_page_64.S:48 clear_page arch/x86/include/asm/page_64.h:50 [inline] clear_highpage include/linux/highmem.h:217 [inline] kernel_init_free_pages mm/page_alloc.c:1289 [inline] kernel_init_free_pages mm/page_alloc.c:1274 [inline] post_alloc_hook+0x1ba/0x230 mm/page_alloc.c:2423 prep_new_page mm/page_alloc.c:2434 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4165 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5389 __alloc_pages_node include/linux/gfp.h:572 [inline] alloc_pages_vma+0x69b/0x770 mm/mempolicy.c:2214 do_huge_pmd_anonymous_page+0x431/0x2830 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4441 [inline] __handle_mm_fault+0x2a1a/0x5110 mm/memory.c:4676 handle_mm_fault+0x1c8/0x790 mm/memory.c:4803 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1484 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1540 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 record_steal_time+0x3ca/0xe30 arch/x86/kvm/x86.c:3358 vcpu_enter_guest+0x2b9a/0x4370 arch/x86/kvm/x86.c:9877 vcpu_run arch/x86/kvm/x86.c:10239 [inline] kvm_arch_vcpu_ioctl_run+0x521/0x21a0 arch/x86/kvm/x86.c:10445 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3908 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae other info that might help us debug this: Chain exists of: (console_sem).lock --> &p->pi_lock --> &rq->__lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rq->__lock); lock(&p->pi_lock); lock(&rq->__lock); lock((console_sem).lock); *** DEADLOCK *** 5 locks held by syz-executor.0/14105: #0: ffff8880713b80b0 (&vcpu->mutex){+.+.}-{3:3}, at: kvm_vcpu_ioctl+0x1d1/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3885 #1: ffffc9000eac1698 (&kvm->srcu){....}-{0:0}, at: vcpu_run arch/x86/kvm/x86.c:10232 [inline] #1: ffffc9000eac1698 (&kvm->srcu){....}-{0:0}, at: kvm_arch_vcpu_ioctl_run+0x3f1/0x21a0 arch/x86/kvm/x86.c:10445 #2: ffff888023509628 (&mm->mmap_lock#2){++++}-{3:3}, at: mmap_read_trylock include/linux/mmap_lock.h:136 [inline] #2: ffff888023509628 (&mm->mmap_lock#2){++++}-{3:3}, at: do_user_addr_fault+0x285/0x11c0 arch/x86/mm/fault.c:1338 #3: ffff8880b9d39c58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:489 #4: ffffc9000eac1698 (&kvm->srcu){....}-{0:0}, at: kvm_arch_vcpu_put+0xbd/0x860 arch/x86/kvm/x86.c:4599 stack backtrace: CPU: 1 PID: 14105 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00054-g27bb0b18c208 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 check_noncircular+0x25f/0x2e0 kernel/locking/lockdep.c:2143 check_prev_add kernel/locking/lockdep.c:3063 [inline] check_prevs_add kernel/locking/lockdep.c:3186 [inline] validate_chain kernel/locking/lockdep.c:3801 [inline] __lock_acquire+0x2a2c/0x5470 kernel/locking/lockdep.c:5027 lock_acquire kernel/locking/lockdep.c:5639 [inline] lock_acquire+0x1ab/0x510 kernel/locking/lockdep.c:5604 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x39/0x50 kernel/locking/spinlock.c:162 down_trylock+0xe/0x60 kernel/locking/semaphore.c:138 __down_trylock_console_sem+0x40/0x120 kernel/printk/printk.c:238 console_trylock kernel/printk/printk.c:2542 [inline] console_trylock_spinning kernel/printk/printk.c:1843 [inline] vprintk_emit+0x146/0x4f0 kernel/printk/printk.c:2244 vprintk+0x80/0x90 kernel/printk/printk_safe.c:50 _printk+0xba/0xed kernel/printk/printk.c:2266 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x472/0x5a0 lib/fault-inject.c:146 __copy_to_user_inatomic include/linux/uaccess.h:133 [inline] copy_to_user_nofault+0x117/0x1f0 mm/maccess.c:255 kvm_steal_time_set_preempted arch/x86/kvm/x86.c:4582 [inline] kvm_arch_vcpu_put+0x370/0x860 arch/x86/kvm/x86.c:4603 kvm_sched_out+0xc2/0x100 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5570 __fire_sched_out_preempt_notifiers kernel/sched/core.c:4594 [inline] fire_sched_out_preempt_notifiers kernel/sched/core.c:4602 [inline] prepare_task_switch kernel/sched/core.c:4798 [inline] context_switch kernel/sched/core.c:4938 [inline] __schedule+0x172a/0x4db0 kernel/sched/core.c:6295 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6710 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:clear_page_erms+0x7/0x10 arch/x86/lib/clear_page_64.S:49 Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 cc cc cc cc cc cc 41 57 41 56 41 55 41 54 55 53 48 89 fb RSP: 0018:ffffc9000bf9f470 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000f40 RDX: ffffea0000cb4c40 RSI: ffff888000000000 RDI: ffff888032d310c0 RBP: ffffea0000cb0000 R08: 0000160000000000 R09: ffffea0000cb8000 R10: fffff94000196006 R11: 0000000000000001 R12: 0000000000000009 R13: 00000000013d20ca R14: 0000000000000200 R15: 0000000000000009 clear_page arch/x86/include/asm/page_64.h:50 [inline] clear_highpage include/linux/highmem.h:217 [inline] kernel_init_free_pages mm/page_alloc.c:1289 [inline] kernel_init_free_pages mm/page_alloc.c:1274 [inline] post_alloc_hook+0x1ba/0x230 mm/page_alloc.c:2423 prep_new_page mm/page_alloc.c:2434 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4165 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5389 __alloc_pages_node include/linux/gfp.h:572 [inline] alloc_pages_vma+0x69b/0x770 mm/mempolicy.c:2214 do_huge_pmd_anonymous_page+0x431/0x2830 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4441 [inline] __handle_mm_fault+0x2a1a/0x5110 mm/memory.c:4676 handle_mm_fault+0x1c8/0x790 mm/memory.c:4803 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1484 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1540 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0010:record_steal_time+0x3ca/0xe30 arch/x86/kvm/x86.c:3358 Code: a6 68 00 48 b8 c0 ef ff ff ff 7f 00 00 48 39 c3 0f 87 a9 00 00 00 e8 65 a3 68 00 0f 01 cb 0f ae e8 45 31 ed 41 bc f2 ff ff ff <44> 86 6b 10 45 31 e4 31 ff 44 89 e6 e8 65 a5 68 00 45 85 e4 0f 84 RSP: 0018:ffffc9000bf9fb38 EFLAGS: 00050246 RAX: 00000000000009a6 RBX: 0000000020fe2000 RCX: ffffc90006572000 RDX: 0000000000040000 RSI: ffffffff810fcb1b RDI: 0000000000000003 RBP: ffff8880713b8000 R08: 00007fffffffefc0 R09: 0000000000000000 R10: ffffffff810fcb03 R11: 0000000000000000 R12: 00000000fffffff2 R13: 0000000000000000 R14: ffff8880713b8e60 R15: ffff8880713b8e80 vcpu_enter_guest+0x2b9a/0x4370 arch/x86/kvm/x86.c:9877 vcpu_run arch/x86/kvm/x86.c:10239 [inline] kvm_arch_vcpu_ioctl_run+0x521/0x21a0 arch/x86/kvm/x86.c:10445 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3908 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f92348a7059 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f923321c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f92349b9f60 RCX: 00007f92348a7059 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 RBP: 00007f923321c1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007f9234eedb1f R14: 00007f923321c300 R15: 0000000000022000 CPU: 1 PID: 14105 Comm: syz-executor.0 Not tainted 5.17.0-rc2-syzkaller-00054-g27bb0b18c208 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 fail_dump lib/fault-inject.c:52 [inline] should_fail.cold+0x5/0xa lib/fault-inject.c:146 __copy_to_user_inatomic include/linux/uaccess.h:133 [inline] copy_to_user_nofault+0x117/0x1f0 mm/maccess.c:255 kvm_steal_time_set_preempted arch/x86/kvm/x86.c:4582 [inline] kvm_arch_vcpu_put+0x370/0x860 arch/x86/kvm/x86.c:4603 kvm_sched_out+0xc2/0x100 arch/x86/kvm/../../../virt/kvm/kvm_main.c:5570 __fire_sched_out_preempt_notifiers kernel/sched/core.c:4594 [inline] fire_sched_out_preempt_notifiers kernel/sched/core.c:4602 [inline] prepare_task_switch kernel/sched/core.c:4798 [inline] context_switch kernel/sched/core.c:4938 [inline] __schedule+0x172a/0x4db0 kernel/sched/core.c:6295 preempt_schedule_irq+0x4e/0x90 kernel/sched/core.c:6710 irqentry_exit+0x31/0x80 kernel/entry/common.c:425 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 RIP: 0010:clear_page_erms+0x7/0x10 arch/x86/lib/clear_page_64.S:49 Code: 48 89 47 18 48 89 47 20 48 89 47 28 48 89 47 30 48 89 47 38 48 8d 7f 40 75 d9 90 c3 0f 1f 80 00 00 00 00 b9 00 10 00 00 31 c0 aa c3 cc cc cc cc cc cc 41 57 41 56 41 55 41 54 55 53 48 89 fb RSP: 0018:ffffc9000bf9f470 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000f40 RDX: ffffea0000cb4c40 RSI: ffff888000000000 RDI: ffff888032d310c0 RBP: ffffea0000cb0000 R08: 0000160000000000 R09: ffffea0000cb8000 R10: fffff94000196006 R11: 0000000000000001 R12: 0000000000000009 R13: 00000000013d20ca R14: 0000000000000200 R15: 0000000000000009 clear_page arch/x86/include/asm/page_64.h:50 [inline] clear_highpage include/linux/highmem.h:217 [inline] kernel_init_free_pages mm/page_alloc.c:1289 [inline] kernel_init_free_pages mm/page_alloc.c:1274 [inline] post_alloc_hook+0x1ba/0x230 mm/page_alloc.c:2423 prep_new_page mm/page_alloc.c:2434 [inline] get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4165 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5389 __alloc_pages_node include/linux/gfp.h:572 [inline] alloc_pages_vma+0x69b/0x770 mm/mempolicy.c:2214 do_huge_pmd_anonymous_page+0x431/0x2830 mm/huge_memory.c:777 create_huge_pmd mm/memory.c:4441 [inline] __handle_mm_fault+0x2a1a/0x5110 mm/memory.c:4676 handle_mm_fault+0x1c8/0x790 mm/memory.c:4803 do_user_addr_fault+0x489/0x11c0 arch/x86/mm/fault.c:1397 handle_page_fault arch/x86/mm/fault.c:1484 [inline] exc_page_fault+0x9e/0x180 arch/x86/mm/fault.c:1540 asm_exc_page_fault+0x1e/0x30 arch/x86/include/asm/idtentry.h:568 RIP: 0010:record_steal_time+0x3ca/0xe30 arch/x86/kvm/x86.c:3358 Code: a6 68 00 48 b8 c0 ef ff ff ff 7f 00 00 48 39 c3 0f 87 a9 00 00 00 e8 65 a3 68 00 0f 01 cb 0f ae e8 45 31 ed 41 bc f2 ff ff ff <44> 86 6b 10 45 31 e4 31 ff 44 89 e6 e8 65 a5 68 00 45 85 e4 0f 84 RSP: 0018:ffffc9000bf9fb38 EFLAGS: 00050246 RAX: 00000000000009a6 RBX: 0000000020fe2000 RCX: ffffc90006572000 RDX: 0000000000040000 RSI: ffffffff810fcb1b RDI: 0000000000000003 RBP: ffff8880713b8000 R08: 00007fffffffefc0 R09: 0000000000000000 R10: ffffffff810fcb03 R11: 0000000000000000 R12: 00000000fffffff2 R13: 0000000000000000 R14: ffff8880713b8e60 R15: ffff8880713b8e80 vcpu_enter_guest+0x2b9a/0x4370 arch/x86/kvm/x86.c:9877 vcpu_run arch/x86/kvm/x86.c:10239 [inline] kvm_arch_vcpu_ioctl_run+0x521/0x21a0 arch/x86/kvm/x86.c:10445 kvm_vcpu_ioctl+0x570/0xf30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3908 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f92348a7059 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f923321c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f92349b9f60 RCX: 00007f92348a7059 RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 RBP: 00007f923321c1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007f9234eedb1f R14: 00007f923321c300 R15: 0000000000022000 ---------------- Code disassembly (best guess): 0: 48 89 47 18 mov %rax,0x18(%rdi) 4: 48 89 47 20 mov %rax,0x20(%rdi) 8: 48 89 47 28 mov %rax,0x28(%rdi) c: 48 89 47 30 mov %rax,0x30(%rdi) 10: 48 89 47 38 mov %rax,0x38(%rdi) 14: 48 8d 7f 40 lea 0x40(%rdi),%rdi 18: 75 d9 jne 0xfffffff3 1a: 90 nop 1b: c3 retq 1c: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 23: b9 00 10 00 00 mov $0x1000,%ecx 28: 31 c0 xor %eax,%eax * 2a: f3 aa rep stos %al,%es:(%rdi) <-- trapping instruction 2c: c3 retq 2d: cc int3 2e: cc int3 2f: cc int3 30: cc int3 31: cc int3 32: cc int3 33: 41 57 push %r15 35: 41 56 push %r14 37: 41 55 push %r13 39: 41 54 push %r12 3b: 55 push %rbp 3c: 53 push %rbx 3d: 48 89 fb mov %rdi,%rbx