lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 06 Jul 2015 11:00:49 -0400
From:	Sasha Levin <sasha.levin@...cle.com>
To:	Ingo Molnar <mingo@...nel.org>,
	Denys Vlasenko <dvlasenk@...hat.com>
CC:	linux-kernel@...r.kernel.org,
	Andy Lutomirski <luto@...capital.net>,
	Brian Gerst <brgerst@...il.com>,
	Peter Zijlstra <peterz@...radead.org>,
	Borislav Petkov <bp@...en8.de>,
	"H. Peter Anvin" <hpa@...or.com>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Oleg Nesterov <oleg@...hat.com>,
	Thomas Gleixner <tglx@...utronix.de>
Subject: Re: [PATCH] x86/asm/entry/64: Clean up entry_64.S

On 06/08/2015 02:51 PM, Ingo Molnar wrote:
> From 4d7321381e5c7102a3d3faf0a0a0035a09619612 Mon Sep 17 00:00:00 2001
> From: Ingo Molnar <mingo@...nel.org>
> Date: Mon, 8 Jun 2015 20:43:07 +0200
> Subject: [PATCH] x86/asm/entry/64: Clean up entry_64.S
> 
> Make the 64-bit syscall entry code a bit more readable:
> 
>  - use consistent assembly coding style similar to the other entry_*.S files
> 
>  - remove old comments that are not true anymore
> 
>  - eliminate whitespace noise
> 
>  - use consistent vertical spacing
> 
>  - fix various comments
> 
>  - reorganize entry point generation tables to be more readable
> 
> No code changed:
> 
>   # arch/x86/entry/entry_64.o:
> 
>    text    data     bss     dec     hex filename
>   12282       0       0   12282    2ffa entry_64.o.before
>   12282       0       0   12282    2ffa entry_64.o.after
> 
> md5:
>    cbab1f2d727a2a8a87618eeb79f391b7  entry_64.o.before.asm
>    cbab1f2d727a2a8a87618eeb79f391b7  entry_64.o.after.asm

Hey Ingo,

I've started seeing the fuzzer hitting the BUG() at arch/x86/kernel/nmi.c:533. git
blame pointed to this patch. I know that you didn't see any changes in the compiled
file in your testcase, but I do see changes in mine.

Below is what the fuzzer was hitting, and lower are the differences in the compiled
output of entry_64.o.

[3157054.661763] ------------[ cut here ]------------
[3157054.662552] kernel BUG at arch/x86/kernel/nmi.c:533!
[3157054.663277] invalid opcode: 0000 [#1] PREEMPT SMP KASAN
[3157054.664164] Dumping ftrace buffer:
[3157054.664740]    (ftrace buffer empty)
[3157054.665274] Modules linked in:
[3157054.665768] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157054.667203] task: ffff880408813000 ti: ffff8803d29c8000 task.ti: ffff8803d29c8000
[3157054.668256] RIP: do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.669378] RSP: 0018:ffff88077800bed8  EFLAGS: 00010006
[3157054.670141] ==================================================================
[3157054.671268] BUG: KASan: out of bounds on stack in __show_regs+0x7f6/0x940 at addr ffff88077800be50
[3157054.674604] Read of size 8 by task trinity-main/11446
[3157054.676521] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157054.679451] flags: 0x42fffff80000400(reserved)
[3157054.681237] page dumped because: kasan: bad access detected
[3157054.683326] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157054.687097]  ffff88077800be50 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157054.690303]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157054.693365]  ffff88077800bab8 ffffffffa0abe0b3 0000000000000082 ffffffffa2fe39e4
[3157054.696209] Call Trace:
[3157054.697180] <NMI> dump_stack (lib/dump_stack.c:52)
[3157054.699390] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157054.701663] ? printk (kernel/printk/printk.c:1896)
[3157054.703531] ? bitmap_weight (include/linux/bitmap.h:303)
[3157054.705553] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157054.708014] ? __show_regs (arch/x86/kernel/process_64.c:68)
[3157054.710046] __show_regs (arch/x86/kernel/process_64.c:68)
[3157054.712066] ? printk (kernel/printk/printk.c:1896)
[3157054.713878] ? bitmap_weight (include/linux/bitmap.h:303)
[3157054.715875] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157054.718336] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157054.720619] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157054.722530] __die (arch/x86/kernel/dumpstack.c:294)
[3157054.724290] die (arch/x86/kernel/dumpstack.c:316)
[3157054.725962] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157054.727805] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157054.729843] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157054.732211] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.734101] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157054.736165] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157054.738126] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157054.740133] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157054.742997] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157054.744991] invalid_op (arch/x86/entry/entry_64.S:925)
[3157054.746873] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.748769] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157054.750658] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157054.752712] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.754514] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.756313] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.758106] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157054.760665]  <<EOE>>  <UNK>
[3157054.761826] Memory state around the buggy address:
[3157054.763672]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.766266]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157054.768848] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157054.771469]                                                  ^
[3157054.774302]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.776910]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.779636] ==================================================================
[3157054.784428] RAX: 0000000080120001 RBX: 0000000000000001 RCX: 00000000c0000101
[3157054.801838] RDX: 1ffffffff4691cd0 RSI: ffffffffa0c10620 RDI: ffffffffa344dc00
[3157054.804414] ==================================================================
[3157054.807050] BUG: KASan: out of bounds on stack in __show_regs+0x897/0x940 at addr ffff88077800be48
[3157054.810374] Read of size 8 by task trinity-main/11446
[3157054.813129] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157054.816012] flags: 0x42fffff80000400(reserved)
[3157054.817718] page dumped because: kasan: bad access detected
[3157054.819766] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157054.823531]  ffff88077800be48 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157054.826320]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157054.829107]  ffff88077800bab8 ffffffffa0abe0b3 0000000000000082 ffffffffa2fe39e4
[3157054.831922] Call Trace:
[3157054.832864] <NMI> dump_stack (lib/dump_stack.c:52)
[3157054.835025] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157054.837224] ? printk (kernel/printk/printk.c:1896)
[3157054.839040] ? bitmap_weight (include/linux/bitmap.h:303)
[3157054.841011] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157054.843454] ? __show_regs (arch/x86/kernel/process_64.c:72)
[3157054.845477] __show_regs (arch/x86/kernel/process_64.c:72)
[3157054.847442] ? printk (kernel/printk/printk.c:1896)
[3157054.849276] ? bitmap_weight (include/linux/bitmap.h:303)
[3157054.851272] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157054.853949] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157054.856236] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157054.858114] __die (arch/x86/kernel/dumpstack.c:294)
[3157054.859871] die (arch/x86/kernel/dumpstack.c:316)
[3157054.861624] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157054.863479] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157054.865508] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157054.867842] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.869736] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157054.871910] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157054.872787] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157054.873674] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157054.874725] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157054.875605] invalid_op (arch/x86/entry/entry_64.S:925)
[3157054.876439] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.877275] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157054.878112] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157054.879012] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.879810] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.880605] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.881678] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157054.882830]  <<EOE>>  <UNK>
[3157054.883319] Memory state around the buggy address:
[3157054.884153]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.885300]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157054.886443] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157054.887580]                                               ^
[3157054.888469]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.889605]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.890743] ==================================================================
[3157054.891910] RBP: ffff88077800bee8 R08: 0000000000000001 R09: 000000000000002e
[3157054.893039] ==================================================================
[3157054.894188] BUG: KASan: out of bounds on stack in __show_regs+0x87f/0x940 at addr ffff88077800be40
[3157054.895585] Read of size 8 by task trinity-main/11446
[3157054.896401] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157054.897657] flags: 0x42fffff80000400(reserved)
[3157054.898431] page dumped because: kasan: bad access detected
[3157054.899325] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157054.900940]  ffff88077800be40 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157054.902128]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157054.903273]  ffff88077800bab8 ffffffffa0abe0b3 0000000000000082 ffffffffa2fe39e4
[3157054.904415] Call Trace:
[3157054.904793] <NMI> dump_stack (lib/dump_stack.c:52)
[3157054.905668] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157054.906527] ? printk (kernel/printk/printk.c:1896)
[3157054.907254] ? bitmap_weight (include/linux/bitmap.h:303)
[3157054.908034] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157054.908973] ? __show_regs (arch/x86/kernel/process_64.c:74)
[3157054.909774] __show_regs (arch/x86/kernel/process_64.c:74)
[3157054.910558] ? printk (kernel/printk/printk.c:1896)
[3157054.911555] ? bitmap_weight (include/linux/bitmap.h:303)
[3157054.913530] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157054.916152] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157054.918430] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157054.920318] __die (arch/x86/kernel/dumpstack.c:294)
[3157054.922112] die (arch/x86/kernel/dumpstack.c:316)
[3157054.923801] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157054.925643] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157054.927671] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157054.930005] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.931948] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157054.934024] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157054.935990] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157054.937983] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157054.940346] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157054.942337] invalid_op (arch/x86/entry/entry_64.S:925)
[3157054.944211] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157054.946085] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157054.947953] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157054.949950] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.951993] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.953778] ? debug (arch/x86/entry/entry_64.S:1067)
[3157054.955568] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157054.958110]  <<EOE>>  <UNK>
[3157054.959168] Memory state around the buggy address:
[3157054.960999]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.963654]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157054.966249] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157054.968833]                                            ^
[3157054.970757]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.973408]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157054.975995] ==================================================================
[3157054.978574] ==================================================================
[3157054.981228] BUG: KASan: out of bounds on stack in __show_regs+0x7ae/0x940 at addr ffff88077800be58
[3157054.984458] Read of size 8 by task trinity-main/11446
[3157054.986295] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157054.989141] flags: 0x42fffff80000400(reserved)
[3157054.990824] page dumped because: kasan: bad access detected
[3157054.992895] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157054.996590]  ffff88077800be58 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157054.999365]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157055.002164]  0000000000000010 ffffffff00000000 0000000000000082 ffffed00ef0017c8
[3157055.004929] Call Trace:
[3157055.005866] <NMI> dump_stack (lib/dump_stack.c:52)
[3157055.007983] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157055.010155] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157055.012580] ? __show_regs (arch/x86/kernel/process_64.c:74)
[3157055.014603] __show_regs (arch/x86/kernel/process_64.c:74)
[3157055.016574] ? printk (kernel/printk/printk.c:1896)
[3157055.018396] ? bitmap_weight (include/linux/bitmap.h:303)
[3157055.020358] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157055.023068] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157055.025348] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157055.027228] __die (arch/x86/kernel/dumpstack.c:294)
[3157055.028983] die (arch/x86/kernel/dumpstack.c:316)
[3157055.030664] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157055.032552] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157055.034572] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157055.036891] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.038782] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157055.040840] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157055.042835] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157055.044842] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157055.047189] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157055.049155] invalid_op (arch/x86/entry/entry_64.S:925)
[3157055.051022] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.052945] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157055.054819] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157055.056824] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.058595] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.060379] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.062197] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157055.064731]  <<EOE>>  <UNK>
[3157055.065800] Memory state around the buggy address:
[3157055.067623]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.070203]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157055.072827] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157055.075416]                                                     ^
[3157055.077617]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.080205]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.083104] ==================================================================
[3157055.085692] ==================================================================
[3157055.088288] BUG: KASan: out of bounds on stack in __show_regs+0x8e2/0x940 at addr ffff88077800be60
[3157055.091538] Read of size 8 by task trinity-main/11446
[3157055.093378] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157055.096225] flags: 0x42fffff80000400(reserved)
[3157055.097905] page dumped because: kasan: bad access detected
[3157055.099925] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157055.103650]  ffff88077800be60 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157055.106430]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157055.109192]  0000000000000010 ffffffff00000000 0000000000000082 ffffed00ef0017cb
[3157055.111989] Call Trace:
[3157055.112927] <NMI> dump_stack (lib/dump_stack.c:52)
[3157055.115044] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157055.117220] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157055.119608] ? __show_regs (arch/x86/kernel/process_64.c:74)
[3157055.121667] __show_regs (arch/x86/kernel/process_64.c:74)
[3157055.123627] ? printk (kernel/printk/printk.c:1896)
[3157055.125449] ? bitmap_weight (include/linux/bitmap.h:303)
[3157055.127429] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157055.130055] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157055.132355] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157055.134243] __die (arch/x86/kernel/dumpstack.c:294)
[3157055.135988] die (arch/x86/kernel/dumpstack.c:316)
[3157055.137648] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157055.139500] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157055.141530] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157055.143859] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.145741] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157055.147811] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157055.149771] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157055.151856] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157055.154231] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157055.156219] invalid_op (arch/x86/entry/entry_64.S:925)
[3157055.158111] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.159993] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157055.161923] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157055.163912] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.165701] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.167472] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.169247] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157055.171839]  <<EOE>>  <UNK>
[3157055.172903] Memory state around the buggy address:
[3157055.174732]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.177327]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157055.179921] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157055.182583]                                                        ^
[3157055.184885]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.187483]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.190072] ==================================================================
[3157055.191450] pps pps0: PPS event at 4682.682479766
[3157055.191456] pps pps0: capture assert seq #4932
[3157055.196385] R10: ffffed014e1e4883 R11: ffffed014e1e4881 R12: ffff88077800bef8
[3157055.198934] ==================================================================
[3157055.201581] BUG: KASan: out of bounds on stack in __show_regs+0x901/0x940 at addr ffff88077800be30
[3157055.204771] Read of size 8 by task trinity-main/11446
[3157055.206617] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157055.209469] flags: 0x42fffff80000400(reserved)
[3157055.211321] page dumped because: kasan: bad access detected
[3157055.213356] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157055.217047]  ffff88077800be30 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157055.219821]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157055.222620]  ffff88077800bab8 ffffffffa0abe0b3 0000000000000082 ffffffffa2fe39e4
[3157055.225392] Call Trace:
[3157055.226326] <NMI> dump_stack (lib/dump_stack.c:52)
[3157055.228460] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157055.230633] ? printk (kernel/printk/printk.c:1896)
[3157055.232508] ? bitmap_weight (include/linux/bitmap.h:303)
[3157055.234471] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157055.236860] ? __show_regs (arch/x86/kernel/process_64.c:76)
[3157055.238885] __show_regs (arch/x86/kernel/process_64.c:76)
[3157055.240849] ? printk (kernel/printk/printk.c:1896)
[3157055.242726] ? bitmap_weight (include/linux/bitmap.h:303)
[3157055.244694] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157055.247332] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157055.249599] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157055.251525] __die (arch/x86/kernel/dumpstack.c:294)
[3157055.253277] die (arch/x86/kernel/dumpstack.c:316)
[3157055.254948] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157055.256791] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157055.258825] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157055.261184] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.263075] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157055.265127] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157055.267091] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157055.269083] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157055.271489] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157055.273463] invalid_op (arch/x86/entry/entry_64.S:925)
[3157055.275344] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.277229] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157055.279103] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157055.281096] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.283115] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.284903] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.286702] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157055.289236]  <<EOE>>  <UNK>
[3157055.290296] Memory state around the buggy address:
[3157055.292224]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.294827]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157055.297424] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157055.300003]                                      ^
[3157055.301810]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.304413]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.307011] ==================================================================
[3157055.309596] ==================================================================
[3157055.312309] BUG: KASan: out of bounds on stack in __show_regs+0x73e/0x940 at addr ffff88077800be38
[3157055.315505] Read of size 8 by task trinity-main/11446
[3157055.317354] page:ffffea001de002c0 count:1 mapcount:0 mapping:          (null) index:0x0
[3157055.320204] flags: 0x42fffff80000400(reserved)
[3157055.321928] page dumped because: kasan: bad access detected
[3157055.323953] CPU: 16 PID: 11446 Comm: trinity-main Not tainted 4.1.0-next-20150703-sasha-00040-gd868f14-dirty #2292
[3157055.327653]  ffff88077800be38 000000009c65e33f ffff88077800b9f8 ffffffffa0ac8938
[3157055.330417]  1ffffd4003bc0058 ffff88077800ba88 ffff88077800ba78 ffffffff9759796e
[3157055.333251]  0000000000000010 ffffffff00000000 0000000000000082 ffffed00ef0017c6
[3157055.336017] Call Trace:
[3157055.336958] <NMI> dump_stack (lib/dump_stack.c:52)
[3157055.339087] kasan_report_error (mm/kasan/report.c:132 mm/kasan/report.c:193)
[3157055.341276] __asan_report_load8_noabort (mm/kasan/report.c:230 mm/kasan/report.c:251)
[3157055.343674] ? __show_regs (arch/x86/kernel/process_64.c:76)
[3157055.345699] __show_regs (arch/x86/kernel/process_64.c:76)
[3157055.347659] ? printk (kernel/printk/printk.c:1896)
[3157055.349473] ? bitmap_weight (include/linux/bitmap.h:303)
[3157055.351520] ? start_thread_common.constprop.0 (arch/x86/kernel/process_64.c:58)
[3157055.354146] ? dump_stack_print_info (kernel/printk/printk.c:3121)
[3157055.356412] show_regs (arch/x86/kernel/dumpstack_64.c:313)
[3157055.358289] __die (arch/x86/kernel/dumpstack.c:294)
[3157055.360045] die (arch/x86/kernel/dumpstack.c:316)
[3157055.361735] do_trap (arch/x86/kernel/traps.c:214 arch/x86/kernel/traps.c:260)
[3157055.363595] do_error_trap (arch/x86/kernel/traps.c:298 include/linux/jump_label.h:125 include/linux/context_tracking_state.h:29 include/linux/context_tracking.h:46 arch/x86/kernel/traps.c:302)
[3157055.365653] ? do_device_not_available (arch/x86/kernel/traps.c:291)
[3157055.367973] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.369858] ? kvm_clock_read (./arch/x86/include/asm/preempt.h:87 arch/x86/kernel/kvmclock.c:86)
[3157055.371934] ? sched_clock (arch/x86/kernel/tsc.c:305)
[3157055.373889] ? nmi_handle (arch/x86/kernel/nmi.c:134)
[3157055.375882] ? trace_hardirqs_off_thunk (arch/x86/entry/thunk_64.S:40)
[3157055.378249] do_invalid_op (arch/x86/kernel/traps.c:313)
[3157055.380216] invalid_op (arch/x86/entry/entry_64.S:925)
[3157055.382139] ? do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.384024] ? do_nmi (arch/x86/kernel/nmi.c:515 arch/x86/kernel/nmi.c:531)
[3157055.385907] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157055.387896] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.389669] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.391502] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.393282] <<EOE>> <#DB> ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157055.395816]  <<EOE>>  <UNK>
[3157055.396865] Memory state around the buggy address:
[3157055.398693]  ffff88077800bd00: f1 f1 f1 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.401307]  ffff88077800bd80: 00 00 00 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00
[3157055.403897] >ffff88077800be00: 00 f1 f1 f1 f1 00 f4 f4 f4 f3 f3 f3 f3 00 00 00
[3157055.406472]                                         ^
[3157055.408309]  ffff88077800be80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.410885]  ffff88077800bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[3157055.413508] ==================================================================
[3157055.416083] R13: 000b375311a5d4ab R14: ffffffffa3485190 R15: ffffffffa3485180
[3157055.418637] FS:  00007f6d93c6f700(0000) GS:ffff880778000000(0000) knlGS:0000000000000000
[3157055.421726] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[3157055.423798] CR2: 0000000004378000 CR3: 00000003d2987000 CR4: 00000000000007e0
[3157055.426363] DR0: ffffffff81000000 DR1: 0000000000000000 DR2: 0000000000000000
[3157055.428933] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600
[3157055.431526] Stack:
[3157055.432310]  0000000000000001 0000000004378000 ffff88077800be98 ffffffffa0b2ff6f
[3157055.435066]  ffffffffa3485180 ffffffffa3485190 000b375311a5d4ab 0000000000000000
[3157055.437846]  ffff88077800be98 dffffc0000000000 ffffed014e1e4881 ffffed014e1e4883
[3157055.440612] Call Trace:
[3157055.441576]  <NMI>
[3157055.442347] end_repeat_nmi (arch/x86/entry/entry_64.S:1435)
[3157055.444426] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.446211] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.447992] ? debug (arch/x86/entry/entry_64.S:1067)
[3157055.449762]  <<EOE>>
[3157055.450579] <#DB> [3157055.451465] ? nmi_handle (arch/x86/kernel/nmi.c:134 include/linux/jump_label.h:125 include/trace/events/nmi.h:10 arch/x86/kernel/nmi.c:135)
[3157055.453456]  <<EOE>>
[3157055.454274] <UNK> Code: c9 ff 68 85 c0 75 28 5b 41 5c 5d c3 4c 89 e7 e8 4a fc ff ff eb 8c e8 73 8a 02 00 65 c7 05 78 c9 ff 68 01 00 00 00 e9 04 ff ff ff <0f> 0b 0f 0b e8 8a 8b 02 00 65 c7 05 5f c9 ff 68 00 00 00 00 eb
All code
========
   0:	c9                   	leaveq
   1:	ff 68 85             	ljmpq  *-0x7b(%rax)
   4:	c0                   	(bad)
   5:	75 28                	jne    0x2f
   7:	5b                   	pop    %rbx
   8:	41 5c                	pop    %r12
   a:	5d                   	pop    %rbp
   b:	c3                   	retq
   c:	4c 89 e7             	mov    %r12,%rdi
   f:	e8 4a fc ff ff       	callq  0xfffffffffffffc5e
  14:	eb 8c                	jmp    0xffffffffffffffa2
  16:	e8 73 8a 02 00       	callq  0x28a8e
  1b:	65 c7 05 78 c9 ff 68 	movl   $0x1,%gs:0x68ffc978(%rip)        # 0x68ffc99e
  22:	01 00 00 00
  26:	e9 04 ff ff ff       	jmpq   0xffffffffffffff2f
  2b:*	0f 0b                	ud2    		<-- trapping instruction
  2d:	0f 0b                	ud2
  2f:	e8 8a 8b 02 00       	callq  0x28bbe
  34:	65 c7 05 5f c9 ff 68 	movl   $0x0,%gs:0x68ffc95f(%rip)        # 0x68ffc99e
  3b:	00 00 00 00
  3f:	eb 00                	jmp    0x41

Code starting with the faulting instruction
===========================================
   0:	0f 0b                	ud2
   2:	0f 0b                	ud2
   4:	e8 8a 8b 02 00       	callq  0x28b93
   9:	65 c7 05 5f c9 ff 68 	movl   $0x0,%gs:0x68ffc95f(%rip)        # 0x68ffc973
  10:	00 00 00 00
  14:	eb 00                	jmp    0x16
[3157055.463226] RIP do_nmi (arch/x86/kernel/nmi.c:533 (discriminator 1))
[3157055.465196]  RSP <ffff88077800bed8>
[3157055.466582] ---[ end trace 778a5a25355bda0f ]---
[3157055.468290] Kernel panic - not syncing: Fatal exception in interrupt
[3157055.470836] Dumping ftrace buffer:
[3157055.471807]    (ftrace buffer empty)
[3157055.472408] Kernel Offset: 0x16000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[3157055.474066] Rebooting in 1 seconds..




--- entry.before.o.cmd	2015-07-06 10:48:32.110189938 -0400
+++ entry.after.o.cmd	2015-07-06 10:48:23.509645442 -0400
@@ -1,5 +1,5 @@

-entry.before.o:     file format elf64-x86-64
+entry.after.o:     file format elf64-x86-64


 Disassembly of section .entry.text:
@@ -3961,8 +3961,8 @@
   3b:	09 02                	or     %eax,(%rdx)
 	...
 			3d: R_X86_64_64	.entry.text
-  45:	03 3a                	add    (%rdx),%edi
-  47:	01 3d 03 d6 00 c8    	add    %edi,-0x37ff29fd(%rip)        # ffffffffc800d650 <ignore_sysret+0xffffffffc800b1f0>
+  45:	03 33                	add    (%rbx),%esi
+  47:	01 3d 03 d5 00 c8    	add    %edi,-0x37ff2afd(%rip)        # ffffffffc800d550 <ignore_sysret+0xffffffffc800b0f0>
   4d:	44 91                	rex.R xchg %eax,%ecx
   4f:	93                   	xchg   %eax,%ebx
   50:	2f                   	(bad)
@@ -3998,7 +3998,7 @@
   94:	09 58 84             	or     %ebx,-0x7c(%rax)
   97:	59                   	pop    %rcx
   98:	5c                   	pop    %rsp
-  99:	f3 3d 2f 2f 4b 5e    	repz cmp $0x5e4b2f2f,%eax
+  99:	f3 3d 2f 2f 4b 60    	repz cmp $0x604b2f2f,%eax
   9f:	4b 2f                	rex.WXB (bad)
   a1:	59                   	pop    %rcx
   a2:	83 21 59             	andl   $0x59,(%rcx)
@@ -4010,7 +4010,7 @@
   bc:	bb 83 59 5c 67       	mov    $0x675c5983,%ebx
   c1:	f8                   	clc
   c2:	59                   	pop    %rcx
-  c3:	83 3d 03 0e 2e 4b 4c 	cmpl   $0x4c,0x4b2e0e03(%rip)        # 4b2e0ecd <ignore_sysret+0x4b2dea6d>
+  c3:	83 3d 03 0f 2e 4b 4d 	cmpl   $0x4d,0x4b2e0f03(%rip)        # 4b2e0fcd <ignore_sysret+0x4b2deb6d>
   ca:	3d 30 91 30 59       	cmp    $0x59309130,%eax
   cf:	83 03 10             	addl   $0x10,(%rbx)
   d2:	2e 75 32             	jne,pn 107 <.debug_line+0x107>
@@ -4038,14 +4038,14 @@
  104:	03 0b                	add    (%rbx),%ecx
  106:	c8 76 2f 22          	enterq $0x2f76,$0x22
  10a:	5a                   	pop    %rdx
- 10b:	08 bc 03 09 82 6a 3d 	or     %bh,0x3d6a8209(%rbx,%rax,1)
+ 10b:	08 bc 03 09 82 6c 3d 	or     %bh,0x3d6c8209(%rbx,%rax,1)
  112:	2f                   	(bad)
  113:	83 08 bb             	orl    $0xffffffbb,(%rax)
  116:	03 0f                	add    (%rdi),%ecx
  118:	ba 03 38 02 93       	mov    $0x93023803,%edx
  11d:	0d 01 59 02 68       	or     $0x68025901,%eax
  122:	15 83 59 85 22       	adc    $0x22855983,%eax
- 127:	4c 83 31 f7          	rex.WR xorq $0xfffffffffffffff7,(%rcx)
+ 127:	4c 83 31 f6          	rex.WR xorq $0xfffffffffffffff6,(%rcx)
  12b:	5b                   	pop    %rbx
  12c:	3d 2f 6c 67 f4       	cmp    $0xf4676c2f,%eax
  131:	67 35 91 2f 91 2f    	addr32 xor $0x2f912f91,%eax
@@ -4073,21 +4073,20 @@
  16d:	3d 59 08 bb 83       	cmp    $0x83bb0859,%eax
  172:	59                   	pop    %rcx
  173:	f3 03 23             	repz add (%rbx),%esp
- 176:	ba 02 80 01 14       	mov    $0x14018002,%edx
- 17b:	02 80 01 17 02 80    	add    -0x7ffde8ff(%rax),%al
- 181:	01 15 02 80 02 14    	add    %edx,0x14028002(%rip)        # 14028189 <ignore_sysret+0x14025d29>
- 187:	02 80 02 16 02 80    	add    -0x7ffde9fe(%rax),%al
- 18d:	01 14 02             	add    %edx,(%rdx,%rax,1)
- 190:	80 01 17             	addb   $0x17,(%rcx)
- 193:	02 80 02 17 02 80    	add    -0x7ffde8fe(%rax),%al
- 199:	02 17                	add    (%rdi),%dl
- 19b:	02 80 02 17 02 80    	add    -0x7ffde8fe(%rax),%al
- 1a1:	02 14 02             	add    (%rdx,%rax,1),%dl
- 1a4:	80 02 14             	addb   $0x14,(%rdx)
- 1a7:	02 80 02 16 02 80    	add    -0x7ffde9fe(%rax),%al
- 1ad:	02 14 02             	add    (%rdx,%rax,1),%dl
- 1b0:	80 02 16             	addb   $0x16,(%rdx)
- 1b3:	03 ef                	add    %edi,%ebp
+ 176:	ba 02 80 01 13       	mov    $0x13018002,%edx
+ 17b:	02 80 01 16 02 80    	add    -0x7ffde9ff(%rax),%al
+ 181:	01 15 02 80 02 13    	add    %edx,0x13028002(%rip)        # 13028189 <ignore_sysret+0x13025d29>
+ 187:	02 80 02 15 02 80    	add    -0x7ffdeafe(%rax),%al
+ 18d:	01 13                	add    %edx,(%rbx)
+ 18f:	02 80 01 16 02 80    	add    -0x7ffde9ff(%rax),%al
+ 195:	02 16                	add    (%rsi),%dl
+ 197:	02 80 02 16 02 80    	add    -0x7ffde9fe(%rax),%al
+ 19d:	02 16                	add    (%rsi),%dl
+ 19f:	02 80 02 13 02 80    	add    -0x7ffdecfe(%rax),%al
+ 1a5:	02 13                	add    (%rbx),%dl
+ 1a7:	02 80 02 15 02 80    	add    -0x7ffdeafe(%rax),%al
+ 1ad:	02 13                	add    (%rbx),%dl
+ 1af:	02 80 02 15 03 ee    	add    -0x11fceafe(%rax),%al
  1b5:	00 02                	add    %al,(%rdx)
  1b7:	80 02 01             	addb   $0x1,(%rdx)
  1ba:	02 30                	add    (%rax),%dh
@@ -4108,28 +4107,30 @@
  1d9:	30 13                	xor    %dl,(%rbx)
  1db:	02 30                	add    (%rax),%dh
  1dd:	13 02                	adc    (%rdx),%eax
- 1df:	2d 18 21 67 68       	sub    $0x68672118,%eax
+ 1df:	2d 1a 21 67 68       	sub    $0x6867211a,%eax
  1e4:	2f                   	(bad)
  1e5:	3d 67 21 03 0f       	cmp    $0xf032167,%eax
  1ea:	74 21                	je     20d <.debug_line+0x20d>
  1ec:	3d 83 9f 21 59       	cmp    $0x59219f83,%eax
- 1f1:	21 83 03 d9 00 d6    	and    %eax,-0x29ff26fd(%rbx)
+ 1f1:	21 83 03 da 00 d6    	and    %eax,-0x29ff25fd(%rbx)
  1f7:	02 80 01 16 02 80    	add    -0x7ffde9ff(%rax),%al
  1fd:	01 13                	add    %edx,(%rbx)
  1ff:	02 80 01 13 02 30    	add    0x30021301(%rax),%al
- 205:	18 02                	sbb    %al,(%rdx)
+ 205:	1a 02                	sbb    (%rdx),%al
  207:	30 13                	xor    %dl,(%rbx)
- 209:	02 60 14             	add    0x14(%rax),%ah
+ 209:	02 60 15             	add    0x15(%rax),%ah
  20c:	02 30                	add    (%rax),%dh
- 20e:	15 03 09 02 5d       	adc    $0x5d020903,%eax
- 213:	01 21                	add    %esp,(%rcx)
- 215:	02 2d 13 08 c9 59    	add    0x59c90813(%rip),%ch        # 59c90a2e <ignore_sysret+0x59c8e5ce>
+ 20e:	16                   	(bad)
+ 20f:	03 09                	add    (%rcx),%ecx
+ 211:	02 5d 01             	add    0x1(%rbp),%bl
+ 214:	21 02                	and    %eax,(%rdx)
+ 216:	2d 13 08 c9 59       	sub    $0x59c90813,%eax
  21b:	59                   	pop    %rcx
  21c:	2f                   	(bad)
  21d:	2f                   	(bad)
  21e:	2f                   	(bad)
  21f:	67 2f                	addr32 (bad)
- 221:	03 0f                	add    (%rdi),%ecx
+ 221:	03 10                	add    (%rax),%edx
  223:	ba 83 e5 2f 2f       	mov    $0x2f2fe583,%edx
  228:	f3 3d 30 08 92 08    	repz cmp $0x8920830,%eax
  22e:	bb 02 2d 13 4b       	mov    $0x4b132d02,%ebx
@@ -4155,8 +4156,7 @@
  264:	2e                   	cs
  265:	5a                   	pop    %rdx
  266:	5a                   	pop    %rdx
- 267:	2f                   	(bad)
- 268:	75 5a                	jne    2c4 <syscall_return+0x38>
+ 267:	30 75 5a             	xor    %dh,0x5a(%rbp)
  26a:	03 09                	add    (%rcx),%ecx
  26c:	2e 75 59             	jne,pn 2c8 <syscall_return+0x3c>
  26f:	2f                   	(bad)
@@ -4169,7 +4169,7 @@
  27a:	5b                   	pop    %rbx
  27b:	4d 23 03             	and    (%r11),%r8
  27e:	27                   	(bad)
- 27f:	66 4d 33 4f 03       	data32 xor 0x3(%r15),%r9
+ 27f:	66 4d 31 4f 03       	data32 xor %r9,0x3(%r15)
  284:	13 08                	adc    (%rax),%ecx
  286:	3c 93                	cmp    $0x93,%al
  288:	4d 08 3d 52 2f 03 09 	rex.WRB or %r15b,0x9032f52(%rip)        # 90331e1 <ignore_sysret+0x9030d81>
@@ -4188,10 +4188,7 @@
  2ae:	09 02                	or     %eax,(%rdx)
 	...
 			2b0: R_X86_64_64	.fixup
- 2b8:	03 cc                	add    %esp,%ecx
- 2ba:	07                   	(bad)
- 2bb:	01 67 2f             	add    %esp,0x2f(%rdi)
- 2be:	2f                   	(bad)
+ 2b8:	03 bc 07 01 67 2f 2f 	add    0x2f2f6701(%rdi,%rax,1),%edi
  2bf:	02                   	.byte 0x2
  2c0:	05                   	.byte 0x5
  2c1:	00 01                	add    %al,(%rcx)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ