ci2 starts bisection 2026-01-03 06:04:40.239716991 +0000 UTC m=+3256492.416840118 bisecting fixing commit since 48647f2c6800c3eaa375f44ec58f3da7867eb85b building syzkaller on d291dd2d58a1885c00a60561048b6ceb1bf1206a ensuring issue is reproducible on original commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: ebf6c2701079a03e950c7dd5abb07359fbc2966397daba2a7bdbdb85bd42973f all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] check whether we can drop unnecessary instrumentation disabling configs for [bug_or_warning locking atomic_sleep hang memleak ubsan], they are not needed testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: bd5c90027555aeb334ebb05de044b112c19294180096bf3b23fc60e8d4cef56a all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] the bug reproduces without the instrumentation disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed kconfig minimization: base=4788 full=6025 leaves diff=247 split chunks (needed=false): <247> split chunk #0 of len 247 into 5 parts testing without sub-chunk 1/5 disabling configs for [bug_or_warning locking atomic_sleep hang memleak ubsan], they are not needed testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: f399b6c8eff4ef84857d4111cdc4229ec1d565db3b5649f194606097ac763533 all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] the chunk can be dropped testing without sub-chunk 2/5 disabling configs for [hang memleak ubsan bug_or_warning locking atomic_sleep], they are not needed testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: fee2998bdd3fee36577ecb84aa8abd03929847007095943296d7944b352d536e all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] the chunk can be dropped testing without sub-chunk 3/5 disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 491ce2a73ef464d20f42a699a88be6b56748251237124066ee9607c1c30226a0 all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] the chunk can be dropped testing without sub-chunk 4/5 disabling configs for [hang memleak ubsan bug_or_warning locking atomic_sleep], they are not needed testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 76cf98e4b28242999490be2ff3f0e023becbb91fdbd690740256cc2e4379359e all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] the chunk can be dropped testing without sub-chunk 5/5 disabling configs for [bug_or_warning locking atomic_sleep hang memleak ubsan], they are not needed testing commit 48647f2c6800c3eaa375f44ec58f3da7867eb85b gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 failed building 48647f2c6800c3eaa375f44ec58f3da7867eb85b: net/socket.c:1128: undefined reference to `wext_handle_ioctl' net/socket.c:3397: undefined reference to `compat_wext_handle_ioctl' net/core/net-procfs.c:346: undefined reference to `wext_proc_exit' net/core/net-procfs.c:330: undefined reference to `wext_proc_init' minimized to 47 configs; suspects: [HID_ZEROPLUS USB_NET_DM9601 USB_NET_GL620A USB_NET_MCS7830 USB_NET_NET1080 USB_NET_PLUSB USB_NET_RNDIS_HOST USB_NET_SMSC75XX USB_NET_SMSC95XX USB_NET_SR9700 USB_NET_SR9800 USB_NET_ZAURUS USB_OHCI_HCD USB_OHCI_HCD_PCI USB_OHCI_HCD_PLATFORM USB_OTG USB_OTG_FSM USB_PRINTER USB_SERIAL USB_SERIAL_FTDI_SIO USB_SERIAL_GENERIC USB_SERIAL_PL2303 USB_STORAGE_ALAUDA USB_STORAGE_CYPRESS_ATACB USB_STORAGE_DATAFAB USB_STORAGE_FREECOM USB_STORAGE_ISD200 USB_STORAGE_JUMPSHOT USB_STORAGE_KARMA USB_STORAGE_ONETOUCH USB_STORAGE_SDDR09 USB_STORAGE_SDDR55 USB_STORAGE_USBAT USB_TRANCEVIBRATOR USB_U_AUDIO USB_U_ETHER USB_U_SERIAL USB_WDM USB_XHCI_PCI_RENESAS WLAN WLAN_VENDOR_ATH WLAN_VENDOR_ATMEL WLAN_VENDOR_BROADCOM WLAN_VENDOR_INTERSIL WLAN_VENDOR_MARVELL WLAN_VENDOR_MEDIATEK WLAN_VENDOR_MICROCHIP WLAN_VENDOR_RALINK WLAN_VENDOR_REALTEK WLAN_VENDOR_RSI WLAN_VENDOR_ZYDAS ZEROPLUS_FF] disabling configs for [locking atomic_sleep hang memleak ubsan bug_or_warning], they are not needed testing current HEAD e253c52bbdfce1f214777784549a350a8f9ba3b8 testing commit e253c52bbdfce1f214777784549a350a8f9ba3b8 gcc compiler: gcc (GCC) 10.2.1 20210217, GNU ld (GNU Binutils for Debian) 2.40 kernel signature: 3bfe22de39138ffae18e2a1c5832ce65d853d0eecf460030c01bf797d2e02979 all runs: crashed: KASAN: slab-out-of-bounds Write in reset_curseg representative crash: KASAN: slab-out-of-bounds Write in reset_curseg, types: [KASAN-WRITE] crash still not fixed/happens on the oldest tested release revisions tested: 7, total time: 1h17m31.508058022s (build: 35m36.088358615s, test: 40m17.050873833s) crash still not fixed or there were kernel test errors commit msg: Merge 5.10.247 into android13-5.10-lts crash: KASAN: slab-out-of-bounds Write in reset_curseg ================================================================== BUG: KASAN: slab-out-of-bounds in __set_sit_entry_type fs/f2fs/segment.c:2257 [inline] BUG: KASAN: slab-out-of-bounds in reset_curseg+0x466/0x540 fs/f2fs/segment.c:2663 Write of size 4 at addr ffff88810c7783c0 by task syz.0.48/689 CPU: 0 PID: 689 Comm: syz.0.48 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x81/0xac lib/dump_stack.c:118 print_address_description.constprop.0+0x24/0x160 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:435 [inline] kasan_report.cold+0x82/0xdb mm/kasan/report.c:452 __asan_report_store4_noabort+0x17/0x20 mm/kasan/report_generic.c:313 __set_sit_entry_type fs/f2fs/segment.c:2257 [inline] reset_curseg+0x466/0x540 fs/f2fs/segment.c:2663 new_curseg+0x9d9/0x1750 fs/f2fs/segment.c:2723 __allocate_new_segment+0xf1/0x5e0 fs/f2fs/segment.c:3039 __allocate_new_section fs/f2fs/segment.c:3047 [inline] f2fs_allocate_new_section+0x125/0x280 fs/f2fs/segment.c:3054 expand_inode_data fs/f2fs/file.c:1760 [inline] f2fs_fallocate+0x795/0x3170 fs/f2fs/file.c:1865 vfs_fallocate+0x2b1/0xb10 fs/open.c:310 ioctl_preallocate+0x149/0x1c0 fs/ioctl.c:494 file_ioctl fs/ioctl.c:534 [inline] do_vfs_ioctl+0xad4/0xd10 fs/ioctl.c:732 __do_sys_ioctl fs/ioctl.c:751 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0xce/0x1a0 fs/ioctl.c:739 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fb329df6be9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb329c25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fb32a02e180 RCX: 00007fb329df6be9 RDX: 00002000000000c0 RSI: 0000000040305828 RDI: 0000000000000004 RBP: 00007fb329e79e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fb32a02e218 R14: 00007fb32a02e180 R15: 00007ffd11b1fa08 Allocated by task 666: kasan_save_stack+0x26/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:45 [inline] set_alloc_info mm/kasan/common.c:430 [inline] ____kasan_kmalloc mm/kasan/common.c:509 [inline] ____kasan_kmalloc mm/kasan/common.c:468 [inline] __kasan_kmalloc+0xae/0xe0 mm/kasan/common.c:518 kasan_kmalloc include/linux/kasan.h:254 [inline] __kmalloc+0x1cd/0x360 mm/slub.c:4038 __kmalloc_node include/linux/slab.h:421 [inline] kmalloc_node include/linux/slab.h:578 [inline] kvmalloc_node+0x25/0x90 mm/util.c:612 kvmalloc include/linux/mm.h:833 [inline] f2fs_kvmalloc fs/f2fs/f2fs.h:3375 [inline] f2fs_kvzalloc fs/f2fs/f2fs.h:3381 [inline] build_sit_info fs/f2fs/segment.c:4395 [inline] f2fs_build_segment_manager+0xaca/0x8ce0 fs/f2fs/segment.c:5258 f2fs_fill_super+0x3c37/0x63b0 fs/f2fs/super.c:4315 mount_bdev+0x2b7/0x390 fs/super.c:1442 f2fs_mount+0x10/0x20 fs/f2fs/super.c:4595 legacy_get_tree+0xf5/0x1d0 fs/fs_context.c:593 vfs_get_tree+0x81/0x1b0 fs/super.c:1572 do_new_mount fs/namespace.c:3006 [inline] path_mount+0x47b/0x1c60 fs/namespace.c:3336 do_mount fs/namespace.c:3349 [inline] __do_sys_mount fs/namespace.c:3557 [inline] __se_sys_mount fs/namespace.c:3534 [inline] __x64_sys_mount+0x20e/0x280 fs/namespace.c:3534 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb The buggy address belongs to the object at ffff88810c778000 which belongs to the cache kmalloc-1k of size 1024 The buggy address is located 960 bytes inside of 1024-byte region [ffff88810c778000, ffff88810c778400) The buggy address belongs to the page: page:ffffea000431de00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88810c77f000 pfn:0x10c778 head:ffffea000431de00 order:3 compound_mapcount:0 compound_pincount:0 flags: 0x4000000000010200(slab|head) raw: 4000000000010200 ffffea0004087200 0000000300000003 ffff888100042f00 raw: ffff88810c77f000 000000008010000a 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 7, ts 37227182496, free_ts 37221279401 set_page_owner include/linux/page_owner.h:35 [inline] post_alloc_hook mm/page_alloc.c:2456 [inline] prep_new_page mm/page_alloc.c:2462 [inline] get_page_from_freelist+0x1fee/0x2ad0 mm/page_alloc.c:4254 __alloc_pages_nodemask+0x2ae/0x2530 mm/page_alloc.c:5370 __alloc_pages include/linux/gfp.h:544 [inline] __alloc_pages_node include/linux/gfp.h:557 [inline] alloc_pages_node include/linux/gfp.h:571 [inline] alloc_pages include/linux/gfp.h:590 [inline] alloc_slab_page mm/slub.c:1670 [inline] allocate_slab+0x30f/0x460 mm/slub.c:1813 new_slab mm/slub.c:1874 [inline] new_slab_objects mm/slub.c:2632 [inline] ___slab_alloc.constprop.0+0x32b/0x730 mm/slub.c:2796 __slab_alloc mm/slub.c:2836 [inline] slab_alloc_node mm/slub.c:2918 [inline] slab_alloc mm/slub.c:2960 [inline] __kmalloc_track_caller+0x325/0x360 mm/slub.c:4541 __kmalloc_reserve net/core/skbuff.c:144 [inline] __alloc_skb+0x74/0x4d0 net/core/skbuff.c:212 alloc_skb include/linux/skbuff.h:1126 [inline] nlmsg_new include/net/netlink.h:953 [inline] rtmsg_fib+0x198/0xab0 net/ipv4/fib_semantics.c:522 fib_table_delete+0x55d/0xa00 net/ipv4/fib_trie.c:1695 fib_magic.isra.0+0x1ba/0x350 net/ipv4/fib_frontend.c:1109 fib_del_ifaddr+0x918/0x1250 net/ipv4/fib_frontend.c:1322 fib_inetaddr_event+0x9e/0x250 net/ipv4/fib_frontend.c:1453 notifier_call_chain kernel/notifier.c:83 [inline] blocking_notifier_call_chain kernel/notifier.c:337 [inline] blocking_notifier_call_chain+0xce/0x120 kernel/notifier.c:325 __inet_del_ifa+0x2e7/0xdd0 net/ipv4/devinet.c:442 inet_del_ifa net/ipv4/devinet.c:479 [inline] inetdev_destroy net/ipv4/devinet.c:320 [inline] inetdev_event+0x468/0x1220 net/ipv4/devinet.c:1612 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0x8e/0xd0 kernel/notifier.c:410 call_netdevice_notifiers_info net/core/dev.c:2054 [inline] call_netdevice_notifiers_info net/core/dev.c:2039 [inline] call_netdevice_notifiers_extack net/core/dev.c:2066 [inline] call_netdevice_notifiers net/core/dev.c:2080 [inline] unregister_netdevice_many+0x799/0x14c0 net/core/dev.c:10767 page last free stack trace: reset_page_owner include/linux/page_owner.h:28 [inline] free_pages_prepare mm/page_alloc.c:1349 [inline] __free_pages_ok+0x44b/0x840 mm/page_alloc.c:1629 free_the_page mm/page_alloc.c:5431 [inline] __free_pages+0xda/0xf0 mm/page_alloc.c:5440 __free_slab+0xde/0x1d0 mm/slub.c:1899 free_slab mm/slub.c:1914 [inline] discard_slab+0x2b/0x40 mm/slub.c:1920 unfreeze_partials+0x1e1/0x240 mm/slub.c:2415 put_cpu_partial+0xce/0x120 mm/slub.c:2451 __slab_free+0x23f/0x560 mm/slub.c:3100 do_slab_free mm/slub.c:3196 [inline] ___cache_free+0x255/0x2b0 mm/slub.c:3215 qlink_free mm/kasan/quarantine.c:157 [inline] qlist_free_all+0x71/0x150 mm/kasan/quarantine.c:176 kasan_quarantine_reduce+0x15f/0x1c0 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0xaa/0xc0 mm/kasan/common.c:440 kasan_slab_alloc include/linux/kasan.h:244 [inline] slab_post_alloc_hook mm/slab.h:580 [inline] slab_alloc_node mm/slub.c:2952 [inline] slab_alloc mm/slub.c:2960 [inline] kmem_cache_alloc+0x15d/0x4f0 mm/slub.c:2965 kmem_cache_alloc_node include/linux/slab.h:426 [inline] __alloc_skb+0x41/0x4d0 net/core/skbuff.c:200 alloc_skb include/linux/skbuff.h:1126 [inline] nlmsg_new include/net/netlink.h:953 [inline] inet_netconf_notify_devconf+0x82/0x130 net/ipv4/devinet.c:2120 __devinet_sysctl_unregister net/ipv4/devinet.c:2625 [inline] devinet_sysctl_unregister net/ipv4/devinet.c:2649 [inline] inetdev_destroy net/ipv4/devinet.c:326 [inline] inetdev_event+0x5cc/0x1220 net/ipv4/devinet.c:1612 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0x8e/0xd0 kernel/notifier.c:410 Memory state around the buggy address: ffff88810c778280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88810c778300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff88810c778380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc ^ ffff88810c778400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88810c778480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ================================================================== general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 689 Comm: syz.0.48 Tainted: G B syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:f2fs_test_and_set_bit fs/f2fs/f2fs.h:2915 [inline] RIP: 0010:update_sit_entry+0x31d/0x1110 fs/f2fs/segment.c:2320 Code: 08 41 89 c8 f7 d1 b8 01 00 00 00 41 c1 e8 03 83 e1 07 d3 e0 89 c1 48 b8 00 00 00 00 00 fc ff df 4d 01 c7 4c 89 fa 48 c1 ea 03 <0f> b6 04 02 4c 89 fa 83 e2 07 41 83 fd 01 0f 85 15 05 00 00 38 d0 RSP: 0018:ffffc90001377550 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff888125d18000 RCX: 0000000000000080 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88810c7783c8 RBP: ffffc900013775b0 R08: 0000000000000000 R09: 0000000000004000 R10: ffff888125d18078 R11: 0000000000000007 R12: ffff88810c7783c0 R13: 0000000000000001 R14: 0000000000000018 R15: 0000000000000000 FS: 00007fb329c256c0(0000) GS:ffff8881f7500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffa6bd25000 CR3: 00000001268f1000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: f2fs_allocate_data_block+0x1760/0x38b0 fs/f2fs/segment.c:3481 __allocate_data_block+0x3d1/0xd00 fs/f2fs/data.c:1407 f2fs_map_blocks+0x141d/0x3730 fs/f2fs/data.c:1575 expand_inode_data fs/f2fs/file.c:1764 [inline] f2fs_fallocate+0x7c2/0x3170 fs/f2fs/file.c:1865 vfs_fallocate+0x2b1/0xb10 fs/open.c:310 ioctl_preallocate+0x149/0x1c0 fs/ioctl.c:494 file_ioctl fs/ioctl.c:534 [inline] do_vfs_ioctl+0xad4/0xd10 fs/ioctl.c:732 __do_sys_ioctl fs/ioctl.c:751 [inline] __se_sys_ioctl fs/ioctl.c:739 [inline] __x64_sys_ioctl+0xce/0x1a0 fs/ioctl.c:739 do_syscall_64+0x32/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fb329df6be9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb329c25038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fb32a02e180 RCX: 00007fb329df6be9 RDX: 00002000000000c0 RSI: 0000000040305828 RDI: 0000000000000004 RBP: 00007fb329e79e19 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fb32a02e218 R14: 00007fb32a02e180 R15: 00007ffd11b1fa08 Modules linked in: ---[ end trace 319c64598c7588dc ]--- RIP: 0010:f2fs_test_and_set_bit fs/f2fs/f2fs.h:2915 [inline] RIP: 0010:update_sit_entry+0x31d/0x1110 fs/f2fs/segment.c:2320 Code: 08 41 89 c8 f7 d1 b8 01 00 00 00 41 c1 e8 03 83 e1 07 d3 e0 89 c1 48 b8 00 00 00 00 00 fc ff df 4d 01 c7 4c 89 fa 48 c1 ea 03 <0f> b6 04 02 4c 89 fa 83 e2 07 41 83 fd 01 0f 85 15 05 00 00 38 d0 RSP: 0018:ffffc90001377550 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff888125d18000 RCX: 0000000000000080 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff88810c7783c8 RBP: ffffc900013775b0 R08: 0000000000000000 R09: 0000000000004000 R10: ffff888125d18078 R11: 0000000000000007 R12: ffff88810c7783c0 R13: 0000000000000001 R14: 0000000000000018 R15: 0000000000000000 FS: 00007fb329c256c0(0000) GS:ffff8881f7400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc29f636000 CR3: 00000001268f1000 CR4: 00000000003506b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 08 41 89 or %al,-0x77(%rcx) 3: c8 f7 d1 b8 enter $0xd1f7,$0xb8 7: 01 00 add %eax,(%rax) 9: 00 00 add %al,(%rax) b: 41 c1 e8 03 shr $0x3,%r8d f: 83 e1 07 and $0x7,%ecx 12: d3 e0 shl %cl,%eax 14: 89 c1 mov %eax,%ecx 16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1d: fc ff df 20: 4d 01 c7 add %r8,%r15 23: 4c 89 fa mov %r15,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 4c 89 fa mov %r15,%rdx 31: 83 e2 07 and $0x7,%edx 34: 41 83 fd 01 cmp $0x1,%r13d 38: 0f 85 15 05 00 00 jne 0x553 3e: 38 d0 cmp %dl,%al