llvm.lists.linux.dev archive mirror
 help / color / mirror / Atom feed
* arch/x86/mm/fault.o: warning: objtool: do_user_addr_fault+0x860: __stack_chk_fail() is missing a __noreturn annotation
@ 2023-07-03 13:45 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2023-07-03 13:45 UTC (permalink / raw)
  Cc: oe-kbuild-all, llvm

CC: linux-kernel@vger.kernel.org
TO: Josh Poimboeuf <jpoimboe@kernel.org>
CC: Miroslav Benes <mbenes@suse.cz>

Hi Josh,

FYI, the error/warning still remains.

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   a901a3568fd26ca9c4a82d8bc5ed5b3ed844d451
commit: fedb724c3db5490234ddde0103811c28c2fedae0 objtool: Detect missing __noreturn annotations
date:   7 weeks ago
config: x86_64-randconfig-r026-20230703 (https://download.01.org/0day-ci/archive/20230703/202307032151.QlCffvjL-lkp@intel.com/config)
compiler: clang version 15.0.7 (https://github.com/llvm/llvm-project.git 8dfdcc7b7bf66834a761bd8de445840ef68e4d1a)
reproduce: (https://download.01.org/0day-ci/archive/20230703/202307032151.QlCffvjL-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202307032151.QlCffvjL-lkp@intel.com/

All warnings (new ones prefixed by >>):

>> arch/x86/mm/fault.o: warning: objtool: do_user_addr_fault+0x860: __stack_chk_fail() is missing a __noreturn annotation


objdump-func vmlinux.o do_user_addr_fault:
0000 0000000000124a80 <do_user_addr_fault>:
0000   124a80:	55                   	push   %rbp
0001   124a81:	48 89 e5             	mov    %rsp,%rbp
0004   124a84:	41 57                	push   %r15
0006   124a86:	41 56                	push   %r14
0008   124a88:	41 55                	push   %r13
000a   124a8a:	41 54                	push   %r12
000c   124a8c:	53                   	push   %rbx
000d   124a8d:	48 83 ec 58          	sub    $0x58,%rsp
0011   124a91:	49 89 d5             	mov    %rdx,%r13
0014   124a94:	49 89 f7             	mov    %rsi,%r15
0017   124a97:	49 89 fe             	mov    %rdi,%r14
001a   124a9a:	65 48 8b 04 25 28 00 00 00 	mov    %gs:0x28,%rax
0023   124aa3:	48 89 45 d0          	mov    %rax,-0x30(%rbp)
0027   124aa7:	49 bc 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r12
0031   124ab1:	e8 00 00 00 00       	call   124ab6 <do_user_addr_fault+0x36>	124ab2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0036   124ab6:	48 8b 05 00 00 00 00 	mov    0x0(%rip),%rax        # 124abd <do_user_addr_fault+0x3d>	124ab9: R_X86_64_PC32	pcpu_hot-0x4
003d   124abd:	48 89 45 a0          	mov    %rax,-0x60(%rbp)
0041   124ac1:	48 8d 98 18 04 00 00 	lea    0x418(%rax),%rbx
0048   124ac8:	48 89 d8             	mov    %rbx,%rax
004b   124acb:	48 c1 e8 03          	shr    $0x3,%rax
004f   124acf:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
0054   124ad4:	74 08                	je     124ade <do_user_addr_fault+0x5e>
0056   124ad6:	48 89 df             	mov    %rbx,%rdi
0059   124ad9:	e8 00 00 00 00       	call   124ade <do_user_addr_fault+0x5e>	124ada: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
005e   124ade:	48 8b 03             	mov    (%rbx),%rax
0061   124ae1:	48 89 45 a8          	mov    %rax,-0x58(%rbp)
0065   124ae5:	44 89 fb             	mov    %r15d,%ebx
0068   124ae8:	83 e3 14             	and    $0x14,%ebx
006b   124aeb:	31 f6                	xor    %esi,%esi
006d   124aed:	48 83 fb 10          	cmp    $0x10,%rbx
0071   124af1:	40 0f 94 c6          	sete   %sil
0075   124af5:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124af8: R_X86_64_32S	_ftrace_annotated_branch+0x19140
007c   124afc:	31 d2                	xor    %edx,%edx
007e   124afe:	31 c9                	xor    %ecx,%ecx
0080   124b00:	e8 00 00 00 00       	call   124b05 <do_user_addr_fault+0x85>	124b01: R_X86_64_PLT32	ftrace_likely_update-0x4
0085   124b05:	48 83 fb 10          	cmp    $0x10,%rbx
0089   124b09:	75 77                	jne    124b82 <do_user_addr_fault+0x102>
008b   124b0b:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	124b0e: R_X86_64_32S	boot_cpu_data+0x1
0092   124b12:	48 c1 e8 03          	shr    $0x3,%rax
0096   124b16:	42 8a 04 20          	mov    (%rax,%r12,1),%al
009a   124b1a:	84 c0                	test   %al,%al
009c   124b1c:	0f 85 f0 06 00 00    	jne    125212 <do_user_addr_fault+0x792>
00a2   124b22:	80 3d 00 00 00 00 02 	cmpb   $0x2,0x0(%rip)        # 124b29 <do_user_addr_fault+0xa9>	124b24: R_X86_64_PC32	boot_cpu_data-0x4
00a9   124b29:	0f 85 c4 00 00 00    	jne    124bf3 <do_user_addr_fault+0x173>
00af   124b2f:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	124b32: R_X86_64_32S	boot_cpu_data
00b6   124b36:	48 c1 e8 03          	shr    $0x3,%rax
00ba   124b3a:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
00bf   124b3f:	0f 85 f0 06 00 00    	jne    125235 <do_user_addr_fault+0x7b5>
00c5   124b45:	80 3d 00 00 00 00 0f 	cmpb   $0xf,0x0(%rip)        # 124b4c <do_user_addr_fault+0xcc>	124b47: R_X86_64_PC32	boot_cpu_data-0x5
00cc   124b4c:	0f 85 fe 00 00 00    	jne    124c50 <do_user_addr_fault+0x1d0>
00d2   124b52:	49 8d 9e 88 00 00 00 	lea    0x88(%r14),%rbx
00d9   124b59:	48 89 d8             	mov    %rbx,%rax
00dc   124b5c:	48 c1 e8 03          	shr    $0x3,%rax
00e0   124b60:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
00e5   124b65:	74 08                	je     124b6f <do_user_addr_fault+0xef>
00e7   124b67:	48 89 df             	mov    %rbx,%rdi
00ea   124b6a:	e8 00 00 00 00       	call   124b6f <do_user_addr_fault+0xef>	124b6b: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
00ef   124b6f:	f6 03 03             	testb  $0x3,(%rbx)
00f2   124b72:	0f 84 b1 02 00 00    	je     124e29 <do_user_addr_fault+0x3a9>
00f8   124b78:	e8 00 00 00 00       	call   124b7d <do_user_addr_fault+0xfd>	124b79: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
00fd   124b7d:	e9 70 03 00 00       	jmp    124ef2 <do_user_addr_fault+0x472>
0102   124b82:	49 8d 86 88 00 00 00 	lea    0x88(%r14),%rax
0109   124b89:	48 89 c1             	mov    %rax,%rcx
010c   124b8c:	48 c1 e9 03          	shr    $0x3,%rcx
0110   124b90:	48 89 4d 88          	mov    %rcx,-0x78(%rbp)
0114   124b94:	42 80 3c 21 00       	cmpb   $0x0,(%rcx,%r12,1)
0119   124b99:	48 89 45 b0          	mov    %rax,-0x50(%rbp)
011d   124b9d:	74 0d                	je     124bac <do_user_addr_fault+0x12c>
011f   124b9f:	48 8b 7d b0          	mov    -0x50(%rbp),%rdi
0123   124ba3:	e8 00 00 00 00       	call   124ba8 <do_user_addr_fault+0x128>	124ba4: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0128   124ba8:	48 8b 45 b0          	mov    -0x50(%rbp),%rax
012c   124bac:	f6 00 03             	testb  $0x3,(%rax)
012f   124baf:	0f 84 80 00 00 00    	je     124c35 <do_user_addr_fault+0x1b5>
0135   124bb5:	e8 00 00 00 00       	call   124bba <do_user_addr_fault+0x13a>	124bb6: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
013a   124bba:	31 c0                	xor    %eax,%eax
013c   124bbc:	0f b6 d8             	movzbl %al,%ebx
013f   124bbf:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124bc2: R_X86_64_32S	_ftrace_annotated_branch+0x19170
0146   124bc6:	89 de                	mov    %ebx,%esi
0148   124bc8:	31 d2                	xor    %edx,%edx
014a   124bca:	31 c9                	xor    %ecx,%ecx
014c   124bcc:	e8 00 00 00 00       	call   124bd1 <do_user_addr_fault+0x151>	124bcd: R_X86_64_PLT32	ftrace_likely_update-0x4
0151   124bd1:	84 db                	test   %bl,%bl
0153   124bd3:	74 28                	je     124bfd <do_user_addr_fault+0x17d>
0155   124bd5:	e8 00 00 00 00       	call   124bda <do_user_addr_fault+0x15a>	124bd6: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
015a   124bda:	0f 0b                	ud2
015c   124bdc:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124bdf: R_X86_64_32S	_ftrace_annotated_branch+0x191a0
0163   124be3:	89 de                	mov    %ebx,%esi
0165   124be5:	31 d2                	xor    %edx,%edx
0167   124be7:	31 c9                	xor    %ecx,%ecx
0169   124be9:	e8 00 00 00 00       	call   124bee <do_user_addr_fault+0x16e>	124bea: R_X86_64_PLT32	ftrace_likely_update-0x4
016e   124bee:	e9 0d 03 00 00       	jmp    124f00 <do_user_addr_fault+0x480>
0173   124bf3:	e8 00 00 00 00       	call   124bf8 <do_user_addr_fault+0x178>	124bf4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0178   124bf8:	e9 f5 02 00 00       	jmp    124ef2 <do_user_addr_fault+0x472>
017d   124bfd:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124c00: R_X86_64_32S	_ftrace_annotated_branch+0x191a0
0184   124c04:	89 de                	mov    %ebx,%esi
0186   124c06:	31 d2                	xor    %edx,%edx
0188   124c08:	31 c9                	xor    %ecx,%ecx
018a   124c0a:	e8 00 00 00 00       	call   124c0f <do_user_addr_fault+0x18f>	124c0b: R_X86_64_PLT32	ftrace_likely_update-0x4
018f   124c0f:	44 89 fb             	mov    %r15d,%ebx
0192   124c12:	c1 eb 03             	shr    $0x3,%ebx
0195   124c15:	83 e3 01             	and    $0x1,%ebx
0198   124c18:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124c1b: R_X86_64_32S	_ftrace_annotated_branch+0x191d0
019f   124c1f:	89 de                	mov    %ebx,%esi
01a1   124c21:	31 d2                	xor    %edx,%edx
01a3   124c23:	31 c9                	xor    %ecx,%ecx
01a5   124c25:	e8 00 00 00 00       	call   124c2a <do_user_addr_fault+0x1aa>	124c26: R_X86_64_PLT32	ftrace_likely_update-0x4
01aa   124c2a:	85 db                	test   %ebx,%ebx
01ac   124c2c:	75 2c                	jne    124c5a <do_user_addr_fault+0x1da>
01ae   124c2e:	e8 00 00 00 00       	call   124c33 <do_user_addr_fault+0x1b3>	124c2f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
01b3   124c33:	eb 38                	jmp    124c6d <do_user_addr_fault+0x1ed>
01b5   124c35:	8b 05 00 00 00 00    	mov    0x0(%rip),%eax        # 124c3b <do_user_addr_fault+0x1bb>	124c37: R_X86_64_PC32	pcpu_hot+0x4
01bb   124c3b:	a9 ff ff ff 7f       	test   $0x7fffffff,%eax
01c0   124c40:	0f 84 aa 00 00 00    	je     124cf0 <do_user_addr_fault+0x270>
01c6   124c46:	e8 00 00 00 00       	call   124c4b <do_user_addr_fault+0x1cb>	124c47: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
01cb   124c4b:	e9 ea 00 00 00       	jmp    124d3a <do_user_addr_fault+0x2ba>
01d0   124c50:	e8 00 00 00 00       	call   124c55 <do_user_addr_fault+0x1d5>	124c51: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
01d5   124c55:	e9 98 02 00 00       	jmp    124ef2 <do_user_addr_fault+0x472>
01da   124c5a:	e8 00 00 00 00       	call   124c5f <do_user_addr_fault+0x1df>	124c5b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
01df   124c5f:	4c 89 f7             	mov    %r14,%rdi
01e2   124c62:	4c 89 fe             	mov    %r15,%rsi
01e5   124c65:	4c 89 ea             	mov    %r13,%rdx
01e8   124c68:	e8 83 2f 00 00       	call   127bf0 <pgtable_bad>
01ed   124c6d:	48 8b 5d a0          	mov    -0x60(%rbp),%rbx
01f1   124c71:	e9 00 00 00 00       	jmp    124c76 <do_user_addr_fault+0x1f6>	124c72: R_X86_64_PLT32	.altinstr_aux+0x10ca
01f6   124c76:	e8 00 00 00 00       	call   124c7b <do_user_addr_fault+0x1fb>	124c77: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
01fb   124c7b:	41 f6 c7 04          	test   $0x4,%r15b
01ff   124c7f:	75 53                	jne    124cd4 <do_user_addr_fault+0x254>
0201   124c81:	49 8d 9e 90 00 00 00 	lea    0x90(%r14),%rbx
0208   124c88:	48 89 d8             	mov    %rbx,%rax
020b   124c8b:	48 c1 e8 03          	shr    $0x3,%rax
020f   124c8f:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
0214   124c94:	74 08                	je     124c9e <do_user_addr_fault+0x21e>
0216   124c96:	48 89 df             	mov    %rbx,%rdi
0219   124c99:	e8 00 00 00 00       	call   124c9e <do_user_addr_fault+0x21e>	124c9a: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
021e   124c9e:	48 8b 1b             	mov    (%rbx),%rbx
0221   124ca1:	81 e3 00 00 04 00    	and    $0x40000,%ebx
0227   124ca7:	48 89 de             	mov    %rbx,%rsi
022a   124caa:	48 c1 ee 12          	shr    $0x12,%rsi
022e   124cae:	83 f6 01             	xor    $0x1,%esi
0231   124cb1:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124cb4: R_X86_64_32S	_ftrace_annotated_branch+0x19200
0238   124cb8:	31 d2                	xor    %edx,%edx
023a   124cba:	31 c9                	xor    %ecx,%ecx
023c   124cbc:	e8 00 00 00 00       	call   124cc1 <do_user_addr_fault+0x241>	124cbd: R_X86_64_PLT32	ftrace_likely_update-0x4
0241   124cc1:	48 85 db             	test   %rbx,%rbx
0244   124cc4:	0f 85 a8 00 00 00    	jne    124d72 <do_user_addr_fault+0x2f2>
024a   124cca:	e8 00 00 00 00       	call   124ccf <do_user_addr_fault+0x24f>	124ccb: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
024f   124ccf:	e9 1e 02 00 00       	jmp    124ef2 <do_user_addr_fault+0x472>
0254   124cd4:	e8 00 00 00 00       	call   124cd9 <do_user_addr_fault+0x259>	124cd5: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0259   124cd9:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124cdc: R_X86_64_32S	_ftrace_annotated_branch+0x19200
0260   124ce0:	31 f6                	xor    %esi,%esi
0262   124ce2:	31 d2                	xor    %edx,%edx
0264   124ce4:	31 c9                	xor    %ecx,%ecx
0266   124ce6:	e8 00 00 00 00       	call   124ceb <do_user_addr_fault+0x26b>	124ce7: R_X86_64_PLT32	ftrace_likely_update-0x4
026b   124ceb:	e9 8b 00 00 00       	jmp    124d7b <do_user_addr_fault+0x2fb>
0270   124cf0:	48 8d 5d c8          	lea    -0x38(%rbp),%rbx
0274   124cf4:	48 c1 eb 03          	shr    $0x3,%rbx
0278   124cf8:	42 80 3c 23 00       	cmpb   $0x0,(%rbx,%r12,1)
027d   124cfd:	74 09                	je     124d08 <do_user_addr_fault+0x288>
027f   124cff:	48 8d 7d c8          	lea    -0x38(%rbp),%rdi
0283   124d03:	e8 00 00 00 00       	call   124d08 <do_user_addr_fault+0x288>	124d04: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
0288   124d08:	48 b8 aa aa aa aa aa aa aa aa 	movabs $0xaaaaaaaaaaaaaaaa,%rax
0292   124d12:	48 89 45 c8          	mov    %rax,-0x38(%rbp)
0296   124d16:	9c                   	pushf
0297   124d17:	8f 45 c8             	pop    -0x38(%rbp)
029a   124d1a:	42 80 3c 23 00       	cmpb   $0x0,(%rbx,%r12,1)
029f   124d1f:	74 09                	je     124d2a <do_user_addr_fault+0x2aa>
02a1   124d21:	48 8d 7d c8          	lea    -0x38(%rbp),%rdi
02a5   124d25:	e8 00 00 00 00       	call   124d2a <do_user_addr_fault+0x2aa>	124d26: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
02aa   124d2a:	0f ba 65 c8 09       	btl    $0x9,-0x38(%rbp)
02af   124d2f:	0f 82 84 01 00 00    	jb     124eb9 <do_user_addr_fault+0x439>
02b5   124d35:	e8 00 00 00 00       	call   124d3a <do_user_addr_fault+0x2ba>	124d36: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
02ba   124d3a:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124d3d: R_X86_64_32S	.rodata+0x59f20
02c1   124d41:	e8 00 00 00 00       	call   124d46 <do_user_addr_fault+0x2c6>	124d42: R_X86_64_PLT32	__this_cpu_preempt_check-0x4
02c6   124d46:	48 8b 05 00 00 00 00 	mov    0x0(%rip),%rax        # 124d4d <do_user_addr_fault+0x2cd>	124d49: R_X86_64_PC32	current_kprobe-0x4
02cd   124d4d:	48 85 c0             	test   %rax,%rax
02d0   124d50:	0f 84 c9 00 00 00    	je     124e1f <do_user_addr_fault+0x39f>
02d6   124d56:	e8 00 00 00 00       	call   124d5b <do_user_addr_fault+0x2db>	124d57: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
02db   124d5b:	4c 89 f7             	mov    %r14,%rdi
02de   124d5e:	be 0e 00 00 00       	mov    $0xe,%esi
02e3   124d63:	e8 00 00 00 00       	call   124d68 <do_user_addr_fault+0x2e8>	124d64: R_X86_64_PLT32	kprobe_fault_handler-0x4
02e8   124d68:	85 c0                	test   %eax,%eax
02ea   124d6a:	0f 95 c0             	setne  %al
02ed   124d6d:	e9 4a fe ff ff       	jmp    124bbc <do_user_addr_fault+0x13c>
02f2   124d72:	e8 00 00 00 00       	call   124d77 <do_user_addr_fault+0x2f7>	124d73: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
02f7   124d77:	48 8b 5d a0          	mov    -0x60(%rbp),%rbx
02fb   124d7b:	48 81 c3 34 24 00 00 	add    $0x2434,%rbx
0302   124d82:	48 89 d8             	mov    %rbx,%rax
0305   124d85:	48 c1 e8 03          	shr    $0x3,%rax
0309   124d89:	42 8a 04 20          	mov    (%rax,%r12,1),%al
030d   124d8d:	84 c0                	test   %al,%al
030f   124d8f:	0f 85 b7 04 00 00    	jne    12524c <do_user_addr_fault+0x7cc>
0315   124d95:	83 3b 00             	cmpl   $0x0,(%rbx)
0318   124d98:	0f 85 55 04 00 00    	jne    1251f3 <do_user_addr_fault+0x773>
031e   124d9e:	8b 05 00 00 00 00    	mov    0x0(%rip),%eax        # 124da4 <do_user_addr_fault+0x324>	124da0: R_X86_64_PC32	pcpu_hot+0x4
0324   124da4:	a9 ff ff ff 7f       	test   $0x7fffffff,%eax
0329   124da9:	0f 95 c0             	setne  %al
032c   124dac:	48 83 7d a8 00       	cmpq   $0x0,-0x58(%rbp)
0331   124db1:	0f 94 c1             	sete   %cl
0334   124db4:	08 c1                	or     %al,%cl
0336   124db6:	0f b6 d9             	movzbl %cl,%ebx
0339   124db9:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124dbc: R_X86_64_32S	_ftrace_annotated_branch+0x19230
0340   124dc0:	89 de                	mov    %ebx,%esi
0342   124dc2:	31 d2                	xor    %edx,%edx
0344   124dc4:	31 c9                	xor    %ecx,%ecx
0346   124dc6:	e8 00 00 00 00       	call   124dcb <do_user_addr_fault+0x34b>	124dc7: R_X86_64_PLT32	ftrace_likely_update-0x4
034b   124dcb:	80 fb 01             	cmp    $0x1,%bl
034e   124dce:	75 18                	jne    124de8 <do_user_addr_fault+0x368>
0350   124dd0:	e8 00 00 00 00       	call   124dd5 <do_user_addr_fault+0x355>	124dd1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0355   124dd5:	4c 89 f7             	mov    %r14,%rdi
0358   124dd8:	4c 89 fe             	mov    %r15,%rsi
035b   124ddb:	4c 89 ea             	mov    %r13,%rdx
035e   124dde:	e8 1d 0d 00 00       	call   125b00 <bad_area_nosemaphore>
0363   124de3:	e9 18 01 00 00       	jmp    124f00 <do_user_addr_fault+0x480>
0368   124de8:	48 8b 45 88          	mov    -0x78(%rbp),%rax
036c   124dec:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
0371   124df1:	48 8b 5d b0          	mov    -0x50(%rbp),%rbx
0375   124df5:	74 08                	je     124dff <do_user_addr_fault+0x37f>
0377   124df7:	48 89 df             	mov    %rbx,%rdi
037a   124dfa:	e8 00 00 00 00       	call   124dff <do_user_addr_fault+0x37f>	124dfb: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
037f   124dff:	f6 03 03             	testb  $0x3,(%rbx)
0382   124e02:	0f 84 bb 00 00 00    	je     124ec3 <do_user_addr_fault+0x443>
0388   124e08:	e8 00 00 00 00       	call   124e0d <do_user_addr_fault+0x38d>	124e09: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
038d   124e0d:	e8 00 00 00 00       	call   124e12 <do_user_addr_fault+0x392>	124e0e: R_X86_64_PLT32	trace_hardirqs_on-0x4
0392   124e12:	fb                   	sti
0393   124e13:	c7 45 c4 54 02 00 00 	movl   $0x254,-0x3c(%rbp)
039a   124e1a:	e9 15 01 00 00       	jmp    124f34 <do_user_addr_fault+0x4b4>
039f   124e1f:	e8 00 00 00 00       	call   124e24 <do_user_addr_fault+0x3a4>	124e20: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
03a4   124e24:	e9 91 fd ff ff       	jmp    124bba <do_user_addr_fault+0x13a>
03a9   124e29:	4c 89 e0             	mov    %r12,%rax
03ac   124e2c:	4d 8d a6 80 00 00 00 	lea    0x80(%r14),%r12
03b3   124e33:	4c 89 e3             	mov    %r12,%rbx
03b6   124e36:	48 c1 eb 03          	shr    $0x3,%rbx
03ba   124e3a:	80 3c 03 00          	cmpb   $0x0,(%rbx,%rax,1)
03be   124e3e:	74 08                	je     124e48 <do_user_addr_fault+0x3c8>
03c0   124e40:	4c 89 e7             	mov    %r12,%rdi
03c3   124e43:	e8 00 00 00 00       	call   124e48 <do_user_addr_fault+0x3c8>	124e44: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
03c8   124e48:	4c 89 e8             	mov    %r13,%rax
03cb   124e4b:	48 c1 e8 20          	shr    $0x20,%rax
03cf   124e4f:	0f 85 98 00 00 00    	jne    124eed <do_user_addr_fault+0x46d>
03d5   124e55:	4d 39 2c 24          	cmp    %r13,(%r12)
03d9   124e59:	0f 85 8e 00 00 00    	jne    124eed <do_user_addr_fault+0x46d>
03df   124e5f:	4c 89 75 b8          	mov    %r14,-0x48(%rbp)
03e3   124e63:	4c 89 e8             	mov    %r13,%rax
03e6   124e66:	49 bd 00 00 00 00 ff ff ff ff 	movabs $0xffffffff00000000,%r13
03f0   124e70:	49 89 c6             	mov    %rax,%r14
03f3   124e73:	49 09 c5             	or     %rax,%r13
03f6   124e76:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	124e79: R_X86_64_32S	_stext
03fd   124e7d:	49 39 c5             	cmp    %rax,%r13
0400   124e80:	0f 93 c0             	setae  %al
0403   124e83:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	124e86: R_X86_64_32S	_etext
040a   124e8a:	49 39 cd             	cmp    %rcx,%r13
040d   124e8d:	0f 96 c1             	setbe  %cl
0410   124e90:	84 c8                	test   %cl,%al
0412   124e92:	0f 85 71 02 00 00    	jne    125109 <do_user_addr_fault+0x689>
0418   124e98:	49 8d 85 00 00 00 60 	lea    0x60000000(%r13),%rax
041f   124e9f:	48 3d 01 00 00 5e    	cmp    $0x5e000001,%rax
0425   124ea5:	0f 82 5e 02 00 00    	jb     125109 <do_user_addr_fault+0x689>
042b   124eab:	e8 00 00 00 00       	call   124eb0 <do_user_addr_fault+0x430>	124eac: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0430   124eb0:	4d 89 f5             	mov    %r14,%r13
0433   124eb3:	4c 8b 75 b8          	mov    -0x48(%rbp),%r14
0437   124eb7:	eb 39                	jmp    124ef2 <do_user_addr_fault+0x472>
0439   124eb9:	e8 00 00 00 00       	call   124ebe <do_user_addr_fault+0x43e>	124eba: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
043e   124ebe:	e9 f7 fc ff ff       	jmp    124bba <do_user_addr_fault+0x13a>
0443   124ec3:	49 8d 9e 90 00 00 00 	lea    0x90(%r14),%rbx
044a   124eca:	48 89 d8             	mov    %rbx,%rax
044d   124ecd:	48 c1 e8 03          	shr    $0x3,%rax
0451   124ed1:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
0456   124ed6:	74 08                	je     124ee0 <do_user_addr_fault+0x460>
0458   124ed8:	48 89 df             	mov    %rbx,%rdi
045b   124edb:	e8 00 00 00 00       	call   124ee0 <do_user_addr_fault+0x460>	124edc: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0460   124ee0:	f6 43 01 02          	testb  $0x2,0x1(%rbx)
0464   124ee4:	75 3c                	jne    124f22 <do_user_addr_fault+0x4a2>
0466   124ee6:	e8 00 00 00 00       	call   124eeb <do_user_addr_fault+0x46b>	124ee7: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
046b   124eeb:	eb 40                	jmp    124f2d <do_user_addr_fault+0x4ad>
046d   124eed:	e8 00 00 00 00       	call   124ef2 <do_user_addr_fault+0x472>	124eee: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0472   124ef2:	4c 89 f7             	mov    %r14,%rdi
0475   124ef5:	4c 89 fe             	mov    %r15,%rsi
0478   124ef8:	4c 89 ea             	mov    %r13,%rdx
047b   124efb:	e8 f0 10 00 00       	call   125ff0 <page_fault_oops>
0480   124f00:	65 48 8b 04 25 28 00 00 00 	mov    %gs:0x28,%rax
0489   124f09:	48 3b 45 d0          	cmp    -0x30(%rbp),%rax
048d   124f0d:	0f 85 c8 03 00 00    	jne    1252db <do_user_addr_fault+0x85b>
0493   124f13:	48 83 c4 58          	add    $0x58,%rsp
0497   124f17:	5b                   	pop    %rbx
0498   124f18:	41 5c                	pop    %r12
049a   124f1a:	41 5d                	pop    %r13
049c   124f1c:	41 5e                	pop    %r14
049e   124f1e:	41 5f                	pop    %r15
04a0   124f20:	5d                   	pop    %rbp
04a1   124f21:	c3                   	ret
04a2   124f22:	e8 00 00 00 00       	call   124f27 <do_user_addr_fault+0x4a7>	124f23: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
04a7   124f27:	e8 00 00 00 00       	call   124f2c <do_user_addr_fault+0x4ac>	124f28: R_X86_64_PLT32	trace_hardirqs_on-0x4
04ac   124f2c:	fb                   	sti
04ad   124f2d:	c7 45 c4 14 02 00 00 	movl   $0x214,-0x3c(%rbp)
04b4   124f34:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	124f37: R_X86_64_32S	perf_swevent_enabled+0x8
04bb   124f3b:	48 c1 e8 03          	shr    $0x3,%rax
04bf   124f3f:	42 8a 04 20          	mov    (%rax,%r12,1),%al
04c3   124f43:	84 c0                	test   %al,%al
04c5   124f45:	0f 85 1e 03 00 00    	jne    125269 <do_user_addr_fault+0x7e9>
04cb   124f4b:	83 3d 00 00 00 00 00 	cmpl   $0x0,0x0(%rip)        # 124f52 <do_user_addr_fault+0x4d2>	124f4d: R_X86_64_PC32	perf_swevent_enabled+0x3
04d2   124f52:	7e 1c                	jle    124f70 <do_user_addr_fault+0x4f0>
04d4   124f54:	e8 00 00 00 00       	call   124f59 <do_user_addr_fault+0x4d9>	124f55: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
04d9   124f59:	be 01 00 00 00       	mov    $0x1,%esi
04de   124f5e:	bf 02 00 00 00       	mov    $0x2,%edi
04e3   124f63:	4c 89 f2             	mov    %r14,%rdx
04e6   124f66:	4c 89 e9             	mov    %r13,%rcx
04e9   124f69:	e8 00 00 00 00       	call   124f6e <do_user_addr_fault+0x4ee>	124f6a: R_X86_64_PLT32	__perf_sw_event-0x4
04ee   124f6e:	eb 05                	jmp    124f75 <do_user_addr_fault+0x4f5>
04f0   124f70:	e8 00 00 00 00       	call   124f75 <do_user_addr_fault+0x4f5>	124f71: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
04f5   124f75:	4c 89 eb             	mov    %r13,%rbx
04f8   124f78:	48 81 e3 00 f0 ff ff 	and    $0xfffffffffffff000,%rbx
04ff   124f7f:	31 f6                	xor    %esi,%esi
0501   124f81:	48 81 fb 00 00 60 ff 	cmp    $0xffffffffff600000,%rbx
0508   124f88:	40 0f 94 c6          	sete   %sil
050c   124f8c:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	124f8f: R_X86_64_32S	_ftrace_annotated_branch+0x18f90
0513   124f93:	31 d2                	xor    %edx,%edx
0515   124f95:	31 c9                	xor    %ecx,%ecx
0517   124f97:	e8 00 00 00 00       	call   124f9c <do_user_addr_fault+0x51c>	124f98: R_X86_64_PLT32	ftrace_likely_update-0x4
051c   124f9c:	48 81 fb 00 00 60 ff 	cmp    $0xffffffffff600000,%rbx
0523   124fa3:	4c 89 6d 90          	mov    %r13,-0x70(%rbp)
0527   124fa7:	75 1c                	jne    124fc5 <do_user_addr_fault+0x545>
0529   124fa9:	4c 89 ff             	mov    %r15,%rdi
052c   124fac:	4c 89 f6             	mov    %r14,%rsi
052f   124faf:	4c 89 ea             	mov    %r13,%rdx
0532   124fb2:	e8 00 00 00 00       	call   124fb7 <do_user_addr_fault+0x537>	124fb3: R_X86_64_PLT32	emulate_vsyscall-0x4
0537   124fb7:	84 c0                	test   %al,%al
0539   124fb9:	74 11                	je     124fcc <do_user_addr_fault+0x54c>
053b   124fbb:	e8 00 00 00 00       	call   124fc0 <do_user_addr_fault+0x540>	124fbc: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0540   124fc0:	e9 3b ff ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0545   124fc5:	e8 00 00 00 00       	call   124fca <do_user_addr_fault+0x54a>	124fc6: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
054a   124fca:	eb 05                	jmp    124fd1 <do_user_addr_fault+0x551>
054c   124fcc:	e8 00 00 00 00       	call   124fd1 <do_user_addr_fault+0x551>	124fcd: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0551   124fd1:	4c 89 7d 98          	mov    %r15,-0x68(%rbp)
0555   124fd5:	45 89 fd             	mov    %r15d,%r13d
0558   124fd8:	41 83 e5 02          	and    $0x2,%r13d
055c   124fdc:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	124fdf: R_X86_64_32S	__tracepoint_mmap_lock_start_locking+0x8
0563   124fe3:	48 c1 e8 03          	shr    $0x3,%rax
0567   124fe7:	42 8a 04 20          	mov    (%rax,%r12,1),%al
056b   124feb:	84 c0                	test   %al,%al
056d   124fed:	0f 85 9c 02 00 00    	jne    12528f <do_user_addr_fault+0x80f>
0573   124ff3:	49 d1 ed             	shr    %r13
0576   124ff6:	41 83 e7 10          	and    $0x10,%r15d
057a   124ffa:	83 3d 00 00 00 00 00 	cmpl   $0x0,0x0(%rip)        # 125001 <do_user_addr_fault+0x581>	124ffc: R_X86_64_PC32	__tracepoint_mmap_lock_start_locking+0x3
0581   125001:	4c 89 75 b8          	mov    %r14,-0x48(%rbp)
0585   125005:	7e 15                	jle    12501c <do_user_addr_fault+0x59c>
0587   125007:	e8 00 00 00 00       	call   12500c <do_user_addr_fault+0x58c>	125008: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
058c   12500c:	48 8b 5d a8          	mov    -0x58(%rbp),%rbx
0590   125010:	48 89 df             	mov    %rbx,%rdi
0593   125013:	31 f6                	xor    %esi,%esi
0595   125015:	e8 00 00 00 00       	call   12501a <do_user_addr_fault+0x59a>	125016: R_X86_64_PLT32	__mmap_lock_do_trace_start_locking-0x4
059a   12501a:	eb 09                	jmp    125025 <do_user_addr_fault+0x5a5>
059c   12501c:	e8 00 00 00 00       	call   125021 <do_user_addr_fault+0x5a1>	12501d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
05a1   125021:	48 8b 5d a8          	mov    -0x58(%rbp),%rbx
05a5   125025:	41 c1 e7 04          	shl    $0x4,%r15d
05a9   125029:	48 8d bb e8 00 00 00 	lea    0xe8(%rbx),%rdi
05b0   125030:	48 89 7d 80          	mov    %rdi,-0x80(%rbp)
05b4   125034:	e8 00 00 00 00       	call   125039 <do_user_addr_fault+0x5b9>	125035: R_X86_64_PLT32	down_read_trylock-0x4
05b9   125039:	41 89 c6             	mov    %eax,%r14d
05bc   12503c:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	12503f: R_X86_64_32S	__tracepoint_mmap_lock_acquire_returned+0x8
05c3   125043:	48 c1 e8 03          	shr    $0x3,%rax
05c7   125047:	42 8a 04 20          	mov    (%rax,%r12,1),%al
05cb   12504b:	84 c0                	test   %al,%al
05cd   12504d:	0f 85 62 02 00 00    	jne    1252b5 <do_user_addr_fault+0x835>
05d3   125053:	45 09 ef             	or     %r13d,%r15d
05d6   125056:	83 3d 00 00 00 00 00 	cmpl   $0x0,0x0(%rip)        # 12505d <do_user_addr_fault+0x5dd>	125058: R_X86_64_PC32	__tracepoint_mmap_lock_acquire_returned+0x3
05dd   12505d:	7e 1c                	jle    12507b <do_user_addr_fault+0x5fb>
05df   12505f:	31 db                	xor    %ebx,%ebx
05e1   125061:	45 85 f6             	test   %r14d,%r14d
05e4   125064:	0f 95 c3             	setne  %bl
05e7   125067:	e8 00 00 00 00       	call   12506c <do_user_addr_fault+0x5ec>	125068: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
05ec   12506c:	48 8b 7d a8          	mov    -0x58(%rbp),%rdi
05f0   125070:	31 f6                	xor    %esi,%esi
05f2   125072:	89 da                	mov    %ebx,%edx
05f4   125074:	e8 00 00 00 00       	call   125079 <do_user_addr_fault+0x5f9>	125075: R_X86_64_PLT32	__mmap_lock_do_trace_acquire_returned-0x4
05f9   125079:	eb 05                	jmp    125080 <do_user_addr_fault+0x600>
05fb   12507b:	e8 00 00 00 00       	call   125080 <do_user_addr_fault+0x600>	12507c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0600   125080:	4c 8b 6d 90          	mov    -0x70(%rbp),%r13
0604   125084:	44 0b 7d c4          	or     -0x3c(%rbp),%r15d
0608   125088:	44 89 7d c4          	mov    %r15d,-0x3c(%rbp)
060c   12508c:	31 f6                	xor    %esi,%esi
060e   12508e:	45 85 f6             	test   %r14d,%r14d
0611   125091:	40 0f 94 c6          	sete   %sil
0615   125095:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125098: R_X86_64_32S	_ftrace_annotated_branch+0x19260
061c   12509c:	31 d2                	xor    %edx,%edx
061e   12509e:	31 c9                	xor    %ecx,%ecx
0620   1250a0:	e8 00 00 00 00       	call   1250a5 <do_user_addr_fault+0x625>	1250a1: R_X86_64_PLT32	ftrace_likely_update-0x4
0625   1250a5:	45 85 f6             	test   %r14d,%r14d
0628   1250a8:	74 28                	je     1250d2 <do_user_addr_fault+0x652>
062a   1250aa:	e8 00 00 00 00       	call   1250af <do_user_addr_fault+0x62f>	1250ab: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
062f   1250af:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1250b2: R_X86_64_32S	.rodata+0x59e00
0636   1250b6:	be 76 05 00 00       	mov    $0x576,%esi
063b   1250bb:	e8 00 00 00 00       	call   1250c0 <do_user_addr_fault+0x640>	1250bc: R_X86_64_PLT32	__might_sleep-0x4
0640   1250c0:	e8 00 00 00 00       	call   1250c5 <do_user_addr_fault+0x645>	1250c1: R_X86_64_PLT32	__SCT__might_resched-0x4
0645   1250c5:	48 8b 5d a8          	mov    -0x58(%rbp),%rbx
0649   1250c9:	4c 8b 7d 98          	mov    -0x68(%rbp),%r15
064d   1250cd:	e9 9c 02 00 00       	jmp    12536e <do_user_addr_fault+0x8ee>
0652   1250d2:	48 8b 45 88          	mov    -0x78(%rbp),%rax
0656   1250d6:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
065b   1250db:	4c 8b 75 b0          	mov    -0x50(%rbp),%r14
065f   1250df:	48 8b 5d a8          	mov    -0x58(%rbp),%rbx
0663   1250e3:	74 08                	je     1250ed <do_user_addr_fault+0x66d>
0665   1250e5:	4c 89 f7             	mov    %r14,%rdi
0668   1250e8:	e8 00 00 00 00       	call   1250ed <do_user_addr_fault+0x66d>	1250e9: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
066d   1250ed:	41 f6 06 03          	testb  $0x3,(%r14)
0671   1250f1:	4c 8b 75 b8          	mov    -0x48(%rbp),%r14
0675   1250f5:	4c 8b 7d 98          	mov    -0x68(%rbp),%r15
0679   1250f9:	0f 84 86 00 00 00    	je     125185 <do_user_addr_fault+0x705>
067f   1250ff:	e8 00 00 00 00       	call   125104 <do_user_addr_fault+0x684>	125100: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0684   125104:	e9 eb 01 00 00       	jmp    1252f4 <do_user_addr_fault+0x874>
0689   125109:	44 0f b6 3d 00 00 00 00 	movzbl 0x0(%rip),%r15d        # 125111 <do_user_addr_fault+0x691>	12510d: R_X86_64_PC32	.data.once+0x37
0691   125111:	45 89 fe             	mov    %r15d,%r14d
0694   125114:	41 83 f6 01          	xor    $0x1,%r14d
0698   125118:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	12511b: R_X86_64_32S	_ftrace_annotated_branch+0x193e0
069f   12511f:	44 89 f6             	mov    %r14d,%esi
06a2   125122:	31 d2                	xor    %edx,%edx
06a4   125124:	31 c9                	xor    %ecx,%ecx
06a6   125126:	e8 00 00 00 00       	call   12512b <do_user_addr_fault+0x6ab>	125127: R_X86_64_PLT32	ftrace_likely_update-0x4
06ab   12512b:	45 85 ff             	test   %r15d,%r15d
06ae   12512e:	0f 84 8f 00 00 00    	je     1251c3 <do_user_addr_fault+0x743>
06b4   125134:	e8 00 00 00 00       	call   125139 <do_user_addr_fault+0x6b9>	125135: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
06b9   125139:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	12513c: R_X86_64_32S	_ftrace_annotated_branch+0x19410
06c0   125140:	44 89 f6             	mov    %r14d,%esi
06c3   125143:	31 d2                	xor    %edx,%edx
06c5   125145:	31 c9                	xor    %ecx,%ecx
06c7   125147:	e8 00 00 00 00       	call   12514c <do_user_addr_fault+0x6cc>	125148: R_X86_64_PLT32	ftrace_likely_update-0x4
06cc   12514c:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	12514f: R_X86_64_32S	_ftrace_annotated_branch+0x19440
06d3   125153:	be 01 00 00 00       	mov    $0x1,%esi
06d8   125158:	31 d2                	xor    %edx,%edx
06da   12515a:	b9 01 00 00 00       	mov    $0x1,%ecx
06df   12515f:	e8 00 00 00 00       	call   125164 <do_user_addr_fault+0x6e4>	125160: R_X86_64_PLT32	ftrace_likely_update-0x4
06e4   125164:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
06ee   12516e:	80 3c 03 00          	cmpb   $0x0,(%rbx,%rax,1)
06f2   125172:	74 08                	je     12517c <do_user_addr_fault+0x6fc>
06f4   125174:	4c 89 e7             	mov    %r12,%rdi
06f7   125177:	e8 00 00 00 00       	call   12517c <do_user_addr_fault+0x6fc>	125178: R_X86_64_PLT32	__asan_report_store8_noabort-0x4
06fc   12517c:	4d 89 2c 24          	mov    %r13,(%r12)
0700   125180:	e9 7b fd ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0705   125185:	49 8d 9e 80 00 00 00 	lea    0x80(%r14),%rbx
070c   12518c:	48 89 d8             	mov    %rbx,%rax
070f   12518f:	48 c1 e8 03          	shr    $0x3,%rax
0713   125193:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
0718   125198:	74 08                	je     1251a2 <do_user_addr_fault+0x722>
071a   12519a:	48 89 df             	mov    %rbx,%rdi
071d   12519d:	e8 00 00 00 00       	call   1251a2 <do_user_addr_fault+0x722>	12519e: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0722   1251a2:	48 8b 3b             	mov    (%rbx),%rdi
0725   1251a5:	e8 00 00 00 00       	call   1251aa <do_user_addr_fault+0x72a>	1251a6: R_X86_64_PLT32	search_exception_tables-0x4
072a   1251aa:	48 85 c0             	test   %rax,%rax
072d   1251ad:	74 0a                	je     1251b9 <do_user_addr_fault+0x739>
072f   1251af:	e8 00 00 00 00       	call   1251b4 <do_user_addr_fault+0x734>	1251b0: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0734   1251b4:	e9 b2 05 00 00       	jmp    12576b <do_user_addr_fault+0xceb>
0739   1251b9:	e8 00 00 00 00       	call   1251be <do_user_addr_fault+0x73e>	1251ba: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
073e   1251be:	e9 12 fc ff ff       	jmp    124dd5 <do_user_addr_fault+0x355>
0743   1251c3:	e8 00 00 00 00       	call   1251c8 <do_user_addr_fault+0x748>	1251c4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0748   1251c8:	c6 05 00 00 00 00 01 	movb   $0x1,0x0(%rip)        # 1251cf <do_user_addr_fault+0x74f>	1251ca: R_X86_64_PC32	.data.once+0x36
074f   1251cf:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1251d2: R_X86_64_32S	_ftrace_annotated_branch+0x19410
0756   1251d6:	44 89 f6             	mov    %r14d,%esi
0759   1251d9:	31 d2                	xor    %edx,%edx
075b   1251db:	31 c9                	xor    %ecx,%ecx
075d   1251dd:	e8 00 00 00 00       	call   1251e2 <do_user_addr_fault+0x762>	1251de: R_X86_64_PLT32	ftrace_likely_update-0x4
0762   1251e2:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1251e5: R_X86_64_32S	.rodata+0x5a8e0
0769   1251e9:	e8 00 00 00 00       	call   1251ee <do_user_addr_fault+0x76e>	1251ea: R_X86_64_PLT32	_printk-0x4
076e   1251ee:	e9 59 ff ff ff       	jmp    12514c <do_user_addr_fault+0x6cc>
0773   1251f3:	e8 00 00 00 00       	call   1251f8 <do_user_addr_fault+0x778>	1251f4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0778   1251f8:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1251fb: R_X86_64_32S	_ftrace_annotated_branch+0x19230
077f   1251ff:	be 01 00 00 00       	mov    $0x1,%esi
0784   125204:	31 d2                	xor    %edx,%edx
0786   125206:	31 c9                	xor    %ecx,%ecx
0788   125208:	e8 00 00 00 00       	call   12520d <do_user_addr_fault+0x78d>	125209: R_X86_64_PLT32	ftrace_likely_update-0x4
078d   12520d:	e9 c3 fb ff ff       	jmp    124dd5 <do_user_addr_fault+0x355>
0792   125212:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	125215: R_X86_64_32S	boot_cpu_data+0x1
0799   125219:	80 e1 07             	and    $0x7,%cl
079c   12521c:	38 c1                	cmp    %al,%cl
079e   12521e:	0f 8c fe f8 ff ff    	jl     124b22 <do_user_addr_fault+0xa2>
07a4   125224:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125227: R_X86_64_32S	boot_cpu_data+0x1
07ab   12522b:	e8 00 00 00 00       	call   125230 <do_user_addr_fault+0x7b0>	12522c: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
07b0   125230:	e9 ed f8 ff ff       	jmp    124b22 <do_user_addr_fault+0xa2>
07b5   125235:	0f 8f 0a f9 ff ff    	jg     124b45 <do_user_addr_fault+0xc5>
07bb   12523b:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	12523e: R_X86_64_32S	boot_cpu_data
07c2   125242:	e8 00 00 00 00       	call   125247 <do_user_addr_fault+0x7c7>	125243: R_X86_64_PLT32	__asan_report_load1_noabort-0x4
07c7   125247:	e9 f9 f8 ff ff       	jmp    124b45 <do_user_addr_fault+0xc5>
07cc   12524c:	89 d9                	mov    %ebx,%ecx
07ce   12524e:	80 e1 07             	and    $0x7,%cl
07d1   125251:	80 c1 03             	add    $0x3,%cl
07d4   125254:	38 c1                	cmp    %al,%cl
07d6   125256:	0f 8c 39 fb ff ff    	jl     124d95 <do_user_addr_fault+0x315>
07dc   12525c:	48 89 df             	mov    %rbx,%rdi
07df   12525f:	e8 00 00 00 00       	call   125264 <do_user_addr_fault+0x7e4>	125260: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
07e4   125264:	e9 2c fb ff ff       	jmp    124d95 <do_user_addr_fault+0x315>
07e9   125269:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	12526c: R_X86_64_32S	perf_swevent_enabled+0x8
07f0   125270:	80 e1 07             	and    $0x7,%cl
07f3   125273:	80 c1 03             	add    $0x3,%cl
07f6   125276:	38 c1                	cmp    %al,%cl
07f8   125278:	0f 8c cd fc ff ff    	jl     124f4b <do_user_addr_fault+0x4cb>
07fe   12527e:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125281: R_X86_64_32S	perf_swevent_enabled+0x8
0805   125285:	e8 00 00 00 00       	call   12528a <do_user_addr_fault+0x80a>	125286: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
080a   12528a:	e9 bc fc ff ff       	jmp    124f4b <do_user_addr_fault+0x4cb>
080f   12528f:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	125292: R_X86_64_32S	__tracepoint_mmap_lock_start_locking+0x8
0816   125296:	80 e1 07             	and    $0x7,%cl
0819   125299:	80 c1 03             	add    $0x3,%cl
081c   12529c:	38 c1                	cmp    %al,%cl
081e   12529e:	0f 8c 4f fd ff ff    	jl     124ff3 <do_user_addr_fault+0x573>
0824   1252a4:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1252a7: R_X86_64_32S	__tracepoint_mmap_lock_start_locking+0x8
082b   1252ab:	e8 00 00 00 00       	call   1252b0 <do_user_addr_fault+0x830>	1252ac: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0830   1252b0:	e9 3e fd ff ff       	jmp    124ff3 <do_user_addr_fault+0x573>
0835   1252b5:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	1252b8: R_X86_64_32S	__tracepoint_mmap_lock_acquire_returned+0x8
083c   1252bc:	80 e1 07             	and    $0x7,%cl
083f   1252bf:	80 c1 03             	add    $0x3,%cl
0842   1252c2:	38 c1                	cmp    %al,%cl
0844   1252c4:	0f 8c 89 fd ff ff    	jl     125053 <do_user_addr_fault+0x5d3>
084a   1252ca:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1252cd: R_X86_64_32S	__tracepoint_mmap_lock_acquire_returned+0x8
0851   1252d1:	e8 00 00 00 00       	call   1252d6 <do_user_addr_fault+0x856>	1252d2: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0856   1252d6:	e9 78 fd ff ff       	jmp    125053 <do_user_addr_fault+0x5d3>
085b   1252db:	e8 00 00 00 00       	call   1252e0 <do_user_addr_fault+0x860>	1252dc: R_X86_64_PLT32	__stack_chk_fail-0x4
0860   1252e0:	e8 00 00 00 00       	call   1252e5 <do_user_addr_fault+0x865>	1252e1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0865   1252e5:	e9 91 f9 ff ff       	jmp    124c7b <do_user_addr_fault+0x1fb>
086a   1252ea:	e8 00 00 00 00       	call   1252ef <do_user_addr_fault+0x86f>	1252eb: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
086f   1252ef:	e9 e5 f9 ff ff       	jmp    124cd9 <do_user_addr_fault+0x259>
0874   1252f4:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	1252f7: R_X86_64_32S	__tracepoint_mmap_lock_start_locking+0x8
087b   1252fb:	48 c1 e8 03          	shr    $0x3,%rax
087f   1252ff:	42 8a 04 20          	mov    (%rax,%r12,1),%al
0883   125303:	84 c0                	test   %al,%al
0885   125305:	0f 85 9a 06 00 00    	jne    1259a5 <do_user_addr_fault+0xf25>
088b   12530b:	83 3d 00 00 00 00 00 	cmpl   $0x0,0x0(%rip)        # 125312 <do_user_addr_fault+0x892>	12530d: R_X86_64_PC32	__tracepoint_mmap_lock_start_locking+0x3
0892   125312:	7e 11                	jle    125325 <do_user_addr_fault+0x8a5>
0894   125314:	e8 00 00 00 00       	call   125319 <do_user_addr_fault+0x899>	125315: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0899   125319:	48 89 df             	mov    %rbx,%rdi
089c   12531c:	31 f6                	xor    %esi,%esi
089e   12531e:	e8 00 00 00 00       	call   125323 <do_user_addr_fault+0x8a3>	12531f: R_X86_64_PLT32	__mmap_lock_do_trace_start_locking-0x4
08a3   125323:	eb 05                	jmp    12532a <do_user_addr_fault+0x8aa>
08a5   125325:	e8 00 00 00 00       	call   12532a <do_user_addr_fault+0x8aa>	125326: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
08aa   12532a:	48 8b 7d 80          	mov    -0x80(%rbp),%rdi
08ae   12532e:	e8 00 00 00 00       	call   125333 <do_user_addr_fault+0x8b3>	12532f: R_X86_64_PLT32	down_read-0x4
08b3   125333:	48 c7 c0 00 00 00 00 	mov    $0x0,%rax	125336: R_X86_64_32S	__tracepoint_mmap_lock_acquire_returned+0x8
08ba   12533a:	48 c1 e8 03          	shr    $0x3,%rax
08be   12533e:	42 8a 04 20          	mov    (%rax,%r12,1),%al
08c2   125342:	84 c0                	test   %al,%al
08c4   125344:	0f 85 81 06 00 00    	jne    1259cb <do_user_addr_fault+0xf4b>
08ca   12534a:	83 3d 00 00 00 00 00 	cmpl   $0x0,0x0(%rip)        # 125351 <do_user_addr_fault+0x8d1>	12534c: R_X86_64_PC32	__tracepoint_mmap_lock_acquire_returned+0x3
08d1   125351:	7e 16                	jle    125369 <do_user_addr_fault+0x8e9>
08d3   125353:	e8 00 00 00 00       	call   125358 <do_user_addr_fault+0x8d8>	125354: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
08d8   125358:	48 89 df             	mov    %rbx,%rdi
08db   12535b:	31 f6                	xor    %esi,%esi
08dd   12535d:	ba 01 00 00 00       	mov    $0x1,%edx
08e2   125362:	e8 00 00 00 00       	call   125367 <do_user_addr_fault+0x8e7>	125363: R_X86_64_PLT32	__mmap_lock_do_trace_acquire_returned-0x4
08e7   125367:	eb 05                	jmp    12536e <do_user_addr_fault+0x8ee>
08e9   125369:	e8 00 00 00 00       	call   12536e <do_user_addr_fault+0x8ee>	12536a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
08ee   12536e:	48 89 df             	mov    %rbx,%rdi
08f1   125371:	4c 89 ee             	mov    %r13,%rsi
08f4   125374:	e8 00 00 00 00       	call   125379 <do_user_addr_fault+0x8f9>	125375: R_X86_64_PLT32	find_vma-0x4
08f9   125379:	49 89 c6             	mov    %rax,%r14
08fc   12537c:	31 f6                	xor    %esi,%esi
08fe   12537e:	48 85 c0             	test   %rax,%rax
0901   125381:	40 0f 94 c6          	sete   %sil
0905   125385:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125388: R_X86_64_32S	_ftrace_annotated_branch+0x19290
090c   12538c:	31 d2                	xor    %edx,%edx
090e   12538e:	31 c9                	xor    %ecx,%ecx
0910   125390:	e8 00 00 00 00       	call   125395 <do_user_addr_fault+0x915>	125391: R_X86_64_PLT32	ftrace_likely_update-0x4
0915   125395:	4d 85 f6             	test   %r14,%r14
0918   125398:	0f 84 d6 03 00 00    	je     125774 <do_user_addr_fault+0xcf4>
091e   12539e:	4c 89 f0             	mov    %r14,%rax
0921   1253a1:	48 c1 e8 03          	shr    $0x3,%rax
0925   1253a5:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
092a   1253aa:	74 08                	je     1253b4 <do_user_addr_fault+0x934>
092c   1253ac:	4c 89 f7             	mov    %r14,%rdi
092f   1253af:	e8 00 00 00 00       	call   1253b4 <do_user_addr_fault+0x934>	1253b0: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0934   1253b4:	49 8b 1e             	mov    (%r14),%rbx
0937   1253b7:	31 f6                	xor    %esi,%esi
0939   1253b9:	4c 39 eb             	cmp    %r13,%rbx
093c   1253bc:	40 0f 96 c6          	setbe  %sil
0940   1253c0:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1253c3: R_X86_64_32S	_ftrace_annotated_branch+0x192c0
0947   1253c7:	ba 01 00 00 00       	mov    $0x1,%edx
094c   1253cc:	31 c9                	xor    %ecx,%ecx
094e   1253ce:	e8 00 00 00 00       	call   1253d3 <do_user_addr_fault+0x953>	1253cf: R_X86_64_PLT32	ftrace_likely_update-0x4
0953   1253d3:	4c 39 eb             	cmp    %r13,%rbx
0956   1253d6:	77 07                	ja     1253df <do_user_addr_fault+0x95f>
0958   1253d8:	e8 00 00 00 00       	call   1253dd <do_user_addr_fault+0x95d>	1253d9: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
095d   1253dd:	eb 71                	jmp    125450 <do_user_addr_fault+0x9d0>
095f   1253df:	49 8d 5e 20          	lea    0x20(%r14),%rbx
0963   1253e3:	48 89 d8             	mov    %rbx,%rax
0966   1253e6:	48 c1 e8 03          	shr    $0x3,%rax
096a   1253ea:	42 80 3c 20 00       	cmpb   $0x0,(%rax,%r12,1)
096f   1253ef:	74 08                	je     1253f9 <do_user_addr_fault+0x979>
0971   1253f1:	48 89 df             	mov    %rbx,%rdi
0974   1253f4:	e8 00 00 00 00       	call   1253f9 <do_user_addr_fault+0x979>	1253f5: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0979   1253f9:	8b 1b                	mov    (%rbx),%ebx
097b   1253fb:	c1 eb 08             	shr    $0x8,%ebx
097e   1253fe:	83 e3 01             	and    $0x1,%ebx
0981   125401:	89 de                	mov    %ebx,%esi
0983   125403:	83 f6 01             	xor    $0x1,%esi
0986   125406:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125409: R_X86_64_32S	_ftrace_annotated_branch+0x192f0
098d   12540d:	31 d2                	xor    %edx,%edx
098f   12540f:	31 c9                	xor    %ecx,%ecx
0991   125411:	e8 00 00 00 00       	call   125416 <do_user_addr_fault+0x996>	125412: R_X86_64_PLT32	ftrace_likely_update-0x4
0996   125416:	85 db                	test   %ebx,%ebx
0998   125418:	0f 84 05 04 00 00    	je     125823 <do_user_addr_fault+0xda3>
099e   12541e:	4c 89 f7             	mov    %r14,%rdi
09a1   125421:	4c 89 ee             	mov    %r13,%rsi
09a4   125424:	e8 00 00 00 00       	call   125429 <do_user_addr_fault+0x9a9>	125425: R_X86_64_PLT32	expand_stack-0x4
09a9   125429:	89 c3                	mov    %eax,%ebx
09ab   12542b:	31 f6                	xor    %esi,%esi
09ad   12542d:	85 c0                	test   %eax,%eax
09af   12542f:	40 0f 95 c6          	setne  %sil
09b3   125433:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125436: R_X86_64_32S	_ftrace_annotated_branch+0x19320
09ba   12543a:	31 d2                	xor    %edx,%edx
09bc   12543c:	31 c9                	xor    %ecx,%ecx
09be   12543e:	e8 00 00 00 00       	call   125443 <do_user_addr_fault+0x9c3>	12543f: R_X86_64_PLT32	ftrace_likely_update-0x4
09c3   125443:	85 db                	test   %ebx,%ebx
09c5   125445:	0f 85 df 03 00 00    	jne    12582a <do_user_addr_fault+0xdaa>
09cb   12544b:	e8 00 00 00 00       	call   125450 <do_user_addr_fault+0x9d0>	12544c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
09d0   125450:	41 f6 c7 20          	test   $0x20,%r15b
09d4   125454:	0f 85 24 03 00 00    	jne    12577e <do_user_addr_fault+0xcfe>
09da   12545a:	44 89 fb             	mov    %r15d,%ebx
09dd   12545d:	81 e3 00 80 00 00    	and    $0x8000,%ebx
09e3   125463:	48 89 de             	mov    %rbx,%rsi
09e6   125466:	48 c1 ee 0f          	shr    $0xf,%rsi
09ea   12546a:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	12546d: R_X86_64_32S	_ftrace_annotated_branch+0x19470
09f1   125471:	31 d2                	xor    %edx,%edx
09f3   125473:	31 c9                	xor    %ecx,%ecx
09f5   125475:	e8 00 00 00 00       	call   12547a <do_user_addr_fault+0x9fa>	125476: R_X86_64_PLT32	ftrace_likely_update-0x4
09fa   12547a:	48 85 db             	test   %rbx,%rbx
09fd   12547d:	0f 85 05 03 00 00    	jne    125788 <do_user_addr_fault+0xd08>
0a03   125483:	41 f6 c7 02          	test   $0x2,%r15b
0a07   125487:	75 58                	jne    1254e1 <do_user_addr_fault+0xa61>
0a09   125489:	44 89 fb             	mov    %r15d,%ebx
0a0c   12548c:	83 e3 01             	and    $0x1,%ebx
0a0f   12548f:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125492: R_X86_64_32S	_ftrace_annotated_branch+0x194d0
0a16   125496:	89 de                	mov    %ebx,%esi
0a18   125498:	31 d2                	xor    %edx,%edx
0a1a   12549a:	31 c9                	xor    %ecx,%ecx
0a1c   12549c:	e8 00 00 00 00       	call   1254a1 <do_user_addr_fault+0xa21>	12549d: R_X86_64_PLT32	ftrace_likely_update-0x4
0a21   1254a1:	48 85 db             	test   %rbx,%rbx
0a24   1254a4:	0f 85 99 03 00 00    	jne    125843 <do_user_addr_fault+0xdc3>
0a2a   1254aa:	e8 00 00 00 00       	call   1254af <do_user_addr_fault+0xa2f>	1254ab: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0a2f   1254af:	4c 89 e1             	mov    %r12,%rcx
0a32   1254b2:	4d 89 f4             	mov    %r14,%r12
0a35   1254b5:	49 83 c4 20          	add    $0x20,%r12
0a39   1254b9:	4c 89 e0             	mov    %r12,%rax
0a3c   1254bc:	48 c1 e8 03          	shr    $0x3,%rax
0a40   1254c0:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0a44   1254c4:	74 08                	je     1254ce <do_user_addr_fault+0xa4e>
0a46   1254c6:	4c 89 e7             	mov    %r12,%rdi
0a49   1254c9:	e8 00 00 00 00       	call   1254ce <do_user_addr_fault+0xa4e>	1254ca: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0a4e   1254ce:	31 db                	xor    %ebx,%ebx
0a50   1254d0:	41 f6 04 24 07       	testb  $0x7,(%r12)
0a55   1254d5:	0f 94 c3             	sete   %bl
0a58   1254d8:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1254db: R_X86_64_32S	_ftrace_annotated_branch+0x19500
0a5f   1254df:	eb 35                	jmp    125516 <do_user_addr_fault+0xa96>
0a61   1254e1:	e8 00 00 00 00       	call   1254e6 <do_user_addr_fault+0xa66>	1254e2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0a66   1254e6:	4c 89 e1             	mov    %r12,%rcx
0a69   1254e9:	4d 89 f4             	mov    %r14,%r12
0a6c   1254ec:	49 83 c4 20          	add    $0x20,%r12
0a70   1254f0:	4c 89 e0             	mov    %r12,%rax
0a73   1254f3:	48 c1 e8 03          	shr    $0x3,%rax
0a77   1254f7:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0a7b   1254fb:	74 08                	je     125505 <do_user_addr_fault+0xa85>
0a7d   1254fd:	4c 89 e7             	mov    %r12,%rdi
0a80   125500:	e8 00 00 00 00       	call   125505 <do_user_addr_fault+0xa85>	125501: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0a85   125505:	31 db                	xor    %ebx,%ebx
0a87   125507:	41 f6 04 24 02       	testb  $0x2,(%r12)
0a8c   12550c:	0f 94 c3             	sete   %bl
0a8f   12550f:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125512: R_X86_64_32S	_ftrace_annotated_branch+0x194a0
0a96   125516:	89 de                	mov    %ebx,%esi
0a98   125518:	31 d2                	xor    %edx,%edx
0a9a   12551a:	31 c9                	xor    %ecx,%ecx
0a9c   12551c:	e8 00 00 00 00       	call   125521 <do_user_addr_fault+0xaa1>	12551d: R_X86_64_PLT32	ftrace_likely_update-0x4
0aa1   125521:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125524: R_X86_64_32S	_ftrace_annotated_branch+0x19350
0aa8   125528:	89 de                	mov    %ebx,%esi
0aaa   12552a:	31 d2                	xor    %edx,%edx
0aac   12552c:	31 c9                	xor    %ecx,%ecx
0aae   12552e:	e8 00 00 00 00       	call   125533 <do_user_addr_fault+0xab3>	12552f: R_X86_64_PLT32	ftrace_likely_update-0x4
0ab3   125533:	85 db                	test   %ebx,%ebx
0ab5   125535:	0f 85 57 02 00 00    	jne    125792 <do_user_addr_fault+0xd12>
0abb   12553b:	4c 89 f7             	mov    %r14,%rdi
0abe   12553e:	4c 89 ee             	mov    %r13,%rsi
0ac1   125541:	8b 55 c4             	mov    -0x3c(%rbp),%edx
0ac4   125544:	48 8b 4d b8          	mov    -0x48(%rbp),%rcx
0ac8   125548:	e8 00 00 00 00       	call   12554d <do_user_addr_fault+0xacd>	125549: R_X86_64_PLT32	handle_mm_fault-0x4
0acd   12554d:	89 c3                	mov    %eax,%ebx
0acf   12554f:	41 89 c6             	mov    %eax,%r14d
0ad2   125552:	41 81 e6 00 04 00 00 	and    $0x400,%r14d
0ad9   125559:	75 0e                	jne    125569 <do_user_addr_fault+0xae9>
0adb   12555b:	e8 00 00 00 00       	call   125560 <do_user_addr_fault+0xae0>	12555c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0ae0   125560:	4c 8b 65 a0          	mov    -0x60(%rbp),%r12
0ae4   125564:	e9 bc 01 00 00       	jmp    125725 <do_user_addr_fault+0xca5>
0ae9   125569:	41 89 df             	mov    %ebx,%r15d
0aec   12556c:	4c 8b 65 a0          	mov    -0x60(%rbp),%r12
0af0   125570:	4c 89 e7             	mov    %r12,%rdi
0af3   125573:	be 08 00 00 00       	mov    $0x8,%esi
0af8   125578:	e8 00 00 00 00       	call   12557d <do_user_addr_fault+0xafd>	125579: R_X86_64_PLT32	__kasan_check_read-0x4
0afd   12557d:	4d 89 e5             	mov    %r12,%r13
0b00   125580:	49 c1 ed 03          	shr    $0x3,%r13
0b04   125584:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0b0e   12558e:	41 80 7c 05 00 00    	cmpb   $0x0,0x0(%r13,%rax,1)
0b14   125594:	74 08                	je     12559e <do_user_addr_fault+0xb1e>
0b16   125596:	4c 89 e7             	mov    %r12,%rdi
0b19   125599:	e8 00 00 00 00       	call   12559e <do_user_addr_fault+0xb1e>	12559a: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0b1e   12559e:	49 8b 1c 24          	mov    (%r12),%rbx
0b22   1255a2:	89 de                	mov    %ebx,%esi
0b24   1255a4:	c1 ee 02             	shr    $0x2,%esi
0b27   1255a7:	83 e6 01             	and    $0x1,%esi
0b2a   1255aa:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1255ad: R_X86_64_32S	_ftrace_annotated_branch+0x19590
0b31   1255b1:	31 d2                	xor    %edx,%edx
0b33   1255b3:	31 c9                	xor    %ecx,%ecx
0b35   1255b5:	e8 00 00 00 00       	call   1255ba <do_user_addr_fault+0xb3a>	1255b6: R_X86_64_PLT32	ftrace_likely_update-0x4
0b3a   1255ba:	0f ba e3 02          	bt     $0x2,%ebx
0b3e   1255be:	72 0a                	jb     1255ca <do_user_addr_fault+0xb4a>
0b40   1255c0:	e8 00 00 00 00       	call   1255c5 <do_user_addr_fault+0xb45>	1255c1: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0b45   1255c5:	44 89 fb             	mov    %r15d,%ebx
0b48   1255c8:	eb 56                	jmp    125620 <do_user_addr_fault+0xba0>
0b4a   1255ca:	49 8d 9c 24 18 08 00 00 	lea    0x818(%r12),%rbx
0b52   1255d2:	48 89 d8             	mov    %rbx,%rax
0b55   1255d5:	48 c1 e8 03          	shr    $0x3,%rax
0b59   1255d9:	48 b9 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rcx
0b63   1255e3:	80 3c 08 00          	cmpb   $0x0,(%rax,%rcx,1)
0b67   1255e7:	74 08                	je     1255f1 <do_user_addr_fault+0xb71>
0b69   1255e9:	48 89 df             	mov    %rbx,%rdi
0b6c   1255ec:	e8 00 00 00 00       	call   1255f1 <do_user_addr_fault+0xb71>	1255ed: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0b71   1255f1:	8b 1b                	mov    (%rbx),%ebx
0b73   1255f3:	c1 eb 08             	shr    $0x8,%ebx
0b76   1255f6:	89 de                	mov    %ebx,%esi
0b78   1255f8:	83 e6 01             	and    $0x1,%esi
0b7b   1255fb:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1255fe: R_X86_64_32S	_ftrace_annotated_branch+0x195c0
0b82   125602:	31 d2                	xor    %edx,%edx
0b84   125604:	31 c9                	xor    %ecx,%ecx
0b86   125606:	e8 00 00 00 00       	call   12560b <do_user_addr_fault+0xb8b>	125607: R_X86_64_PLT32	ftrace_likely_update-0x4
0b8b   12560b:	83 e3 01             	and    $0x1,%ebx
0b8e   12560e:	0f 85 75 02 00 00    	jne    125889 <do_user_addr_fault+0xe09>
0b94   125614:	44 89 fb             	mov    %r15d,%ebx
0b97   125617:	e8 00 00 00 00       	call   12561c <do_user_addr_fault+0xb9c>	125618: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0b9c   12561c:	4c 8b 65 a0          	mov    -0x60(%rbp),%r12
0ba0   125620:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0baa   12562a:	48 8b 4d 88          	mov    -0x78(%rbp),%rcx
0bae   12562e:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
0bb2   125632:	48 8b 45 b0          	mov    -0x50(%rbp),%rax
0bb6   125636:	74 0d                	je     125645 <do_user_addr_fault+0xbc5>
0bb8   125638:	48 8b 7d b0          	mov    -0x50(%rbp),%rdi
0bbc   12563c:	e8 00 00 00 00       	call   125641 <do_user_addr_fault+0xbc1>	12563d: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0bc1   125641:	48 8b 45 b0          	mov    -0x50(%rbp),%rax
0bc5   125645:	f6 00 03             	testb  $0x3,(%rax)
0bc8   125648:	0f 84 ca 00 00 00    	je     125718 <do_user_addr_fault+0xc98>
0bce   12564e:	4c 89 e7             	mov    %r12,%rdi
0bd1   125651:	be 08 00 00 00       	mov    $0x8,%esi
0bd6   125656:	e8 00 00 00 00       	call   12565b <do_user_addr_fault+0xbdb>	125657: R_X86_64_PLT32	__kasan_check_read-0x4
0bdb   12565b:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0be5   125665:	41 80 7c 05 00 00    	cmpb   $0x0,0x0(%r13,%rax,1)
0beb   12566b:	74 08                	je     125675 <do_user_addr_fault+0xbf5>
0bed   12566d:	4c 89 e7             	mov    %r12,%rdi
0bf0   125670:	e8 00 00 00 00       	call   125675 <do_user_addr_fault+0xbf5>	125671: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0bf5   125675:	49 8b 1c 24          	mov    (%r12),%rbx
0bf9   125679:	81 e3 00 00 02 00    	and    $0x20000,%ebx
0bff   12567f:	48 89 de             	mov    %rbx,%rsi
0c02   125682:	48 c1 ee 11          	shr    $0x11,%rsi
0c06   125686:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125689: R_X86_64_32S	_ftrace_annotated_branch+0x19560
0c0d   12568d:	31 d2                	xor    %edx,%edx
0c0f   12568f:	31 c9                	xor    %ecx,%ecx
0c11   125691:	e8 00 00 00 00       	call   125696 <do_user_addr_fault+0xc16>	125692: R_X86_64_PLT32	ftrace_likely_update-0x4
0c16   125696:	48 85 db             	test   %rbx,%rbx
0c19   125699:	0f 85 dc 01 00 00    	jne    12587b <do_user_addr_fault+0xdfb>
0c1f   12569f:	4c 89 e7             	mov    %r12,%rdi
0c22   1256a2:	be 08 00 00 00       	mov    $0x8,%esi
0c27   1256a7:	e8 00 00 00 00       	call   1256ac <do_user_addr_fault+0xc2c>	1256a8: R_X86_64_PLT32	__kasan_check_read-0x4
0c2c   1256ac:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0c36   1256b6:	41 80 7c 05 00 00    	cmpb   $0x0,0x0(%r13,%rax,1)
0c3c   1256bc:	74 08                	je     1256c6 <do_user_addr_fault+0xc46>
0c3e   1256be:	4c 89 e7             	mov    %r12,%rdi
0c41   1256c1:	e8 00 00 00 00       	call   1256c6 <do_user_addr_fault+0xc46>	1256c2: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0c46   1256c6:	4d 8b 2c 24          	mov    (%r12),%r13
0c4a   1256ca:	41 c1 ed 02          	shr    $0x2,%r13d
0c4e   1256ce:	44 89 eb             	mov    %r13d,%ebx
0c51   1256d1:	83 e3 01             	and    $0x1,%ebx
0c54   1256d4:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1256d7: R_X86_64_32S	_ftrace_annotated_branch+0x19590
0c5b   1256db:	89 de                	mov    %ebx,%esi
0c5d   1256dd:	31 d2                	xor    %edx,%edx
0c5f   1256df:	31 c9                	xor    %ecx,%ecx
0c61   1256e1:	e8 00 00 00 00       	call   1256e6 <do_user_addr_fault+0xc66>	1256e2: R_X86_64_PLT32	ftrace_likely_update-0x4
0c66   1256e6:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1256e9: R_X86_64_32S	_ftrace_annotated_branch+0x19530
0c6d   1256ed:	89 de                	mov    %ebx,%esi
0c6f   1256ef:	31 d2                	xor    %edx,%edx
0c71   1256f1:	31 c9                	xor    %ecx,%ecx
0c73   1256f3:	e8 00 00 00 00       	call   1256f8 <do_user_addr_fault+0xc78>	1256f4: R_X86_64_PLT32	ftrace_likely_update-0x4
0c78   1256f8:	41 83 e5 01          	and    $0x1,%r13d
0c7c   1256fc:	0f 85 80 01 00 00    	jne    125882 <do_user_addr_fault+0xe02>
0c82   125702:	e8 00 00 00 00       	call   125707 <do_user_addr_fault+0xc87>	125703: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0c87   125707:	4c 8b 6d 90          	mov    -0x70(%rbp),%r13
0c8b   12570b:	4c 8b 65 a0          	mov    -0x60(%rbp),%r12
0c8f   12570f:	44 89 fb             	mov    %r15d,%ebx
0c92   125712:	4c 8b 7d 98          	mov    -0x68(%rbp),%r15
0c96   125716:	eb 1f                	jmp    125737 <do_user_addr_fault+0xcb7>
0c98   125718:	e8 00 00 00 00       	call   12571d <do_user_addr_fault+0xc9d>	125719: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0c9d   12571d:	4c 8b 6d 90          	mov    -0x70(%rbp),%r13
0ca1   125721:	4c 8b 7d 98          	mov    -0x68(%rbp),%r15
0ca5   125725:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125728: R_X86_64_32S	_ftrace_annotated_branch+0x19530
0cac   12572c:	31 f6                	xor    %esi,%esi
0cae   12572e:	31 d2                	xor    %edx,%edx
0cb0   125730:	31 c9                	xor    %ecx,%ecx
0cb2   125732:	e8 00 00 00 00       	call   125737 <do_user_addr_fault+0xcb7>	125733: R_X86_64_PLT32	ftrace_likely_update-0x4
0cb7   125737:	0f ba e3 0e          	bt     $0xe,%ebx
0cbb   12573b:	72 5f                	jb     12579c <do_user_addr_fault+0xd1c>
0cbd   12573d:	44 89 f6             	mov    %r14d,%esi
0cc0   125740:	c1 ee 0a             	shr    $0xa,%esi
0cc3   125743:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125746: R_X86_64_32S	_ftrace_annotated_branch+0x19380
0cca   12574a:	31 d2                	xor    %edx,%edx
0ccc   12574c:	31 c9                	xor    %ecx,%ecx
0cce   12574e:	e8 00 00 00 00       	call   125753 <do_user_addr_fault+0xcd3>	12574f: R_X86_64_PLT32	ftrace_likely_update-0x4
0cd3   125753:	45 85 f6             	test   %r14d,%r14d
0cd6   125756:	74 4e                	je     1257a6 <do_user_addr_fault+0xd26>
0cd8   125758:	e8 00 00 00 00       	call   12575d <do_user_addr_fault+0xcdd>	125759: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0cdd   12575d:	83 4d c4 20          	orl    $0x20,-0x3c(%rbp)
0ce1   125761:	49 bc 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%r12
0ceb   12576b:	48 8b 5d a8          	mov    -0x58(%rbp),%rbx
0cef   12576f:	e9 80 fb ff ff       	jmp    1252f4 <do_user_addr_fault+0x874>
0cf4   125774:	e8 00 00 00 00       	call   125779 <do_user_addr_fault+0xcf9>	125775: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0cf9   125779:	e9 b1 00 00 00       	jmp    12582f <do_user_addr_fault+0xdaf>
0cfe   12577e:	e8 00 00 00 00       	call   125783 <do_user_addr_fault+0xd03>	12577f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d03   125783:	e9 c0 00 00 00       	jmp    125848 <do_user_addr_fault+0xdc8>
0d08   125788:	e8 00 00 00 00       	call   12578d <do_user_addr_fault+0xd0d>	125789: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d0d   12578d:	e9 b6 00 00 00       	jmp    125848 <do_user_addr_fault+0xdc8>
0d12   125792:	e8 00 00 00 00       	call   125797 <do_user_addr_fault+0xd17>	125793: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d17   125797:	e9 c1 00 00 00       	jmp    12585d <do_user_addr_fault+0xddd>
0d1c   12579c:	e8 00 00 00 00       	call   1257a1 <do_user_addr_fault+0xd21>	12579d: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d21   1257a1:	e9 5a f7 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0d26   1257a6:	48 8b 7d a8          	mov    -0x58(%rbp),%rdi
0d2a   1257aa:	e8 41 25 00 00       	call   127cf0 <mmap_read_unlock>
0d2f   1257af:	31 f6                	xor    %esi,%esi
0d31   1257b1:	f7 c3 73 08 00 00    	test   $0x873,%ebx
0d37   1257b7:	40 0f 94 c6          	sete   %sil
0d3b   1257bb:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1257be: R_X86_64_32S	_ftrace_annotated_branch+0x193b0
0d42   1257c2:	ba 01 00 00 00       	mov    $0x1,%edx
0d47   1257c7:	31 c9                	xor    %ecx,%ecx
0d49   1257c9:	e8 00 00 00 00       	call   1257ce <do_user_addr_fault+0xd4e>	1257ca: R_X86_64_PLT32	ftrace_likely_update-0x4
0d4e   1257ce:	f7 c3 73 08 00 00    	test   $0x873,%ebx
0d54   1257d4:	4c 8b 75 b8          	mov    -0x48(%rbp),%r14
0d58   1257d8:	0f 84 93 00 00 00    	je     125871 <do_user_addr_fault+0xdf1>
0d5e   1257de:	4c 89 e7             	mov    %r12,%rdi
0d61   1257e1:	e8 8a 25 00 00       	call   127d70 <fatal_signal_pending>
0d66   1257e6:	85 c0                	test   %eax,%eax
0d68   1257e8:	0f 84 13 01 00 00    	je     125901 <do_user_addr_fault+0xe81>
0d6e   1257ee:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0d78   1257f8:	48 8b 4d 88          	mov    -0x78(%rbp),%rcx
0d7c   1257fc:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
0d80   125800:	4c 8b 65 b0          	mov    -0x50(%rbp),%r12
0d84   125804:	74 08                	je     12580e <do_user_addr_fault+0xd8e>
0d86   125806:	4c 89 e7             	mov    %r12,%rdi
0d89   125809:	e8 00 00 00 00       	call   12580e <do_user_addr_fault+0xd8e>	12580a: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0d8e   12580e:	41 f6 04 24 03       	testb  $0x3,(%r12)
0d93   125813:	0f 84 45 01 00 00    	je     12595e <do_user_addr_fault+0xede>
0d99   125819:	e8 00 00 00 00       	call   12581e <do_user_addr_fault+0xd9e>	12581a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0d9e   12581e:	e9 e3 00 00 00       	jmp    125906 <do_user_addr_fault+0xe86>
0da3   125823:	e8 00 00 00 00       	call   125828 <do_user_addr_fault+0xda8>	125824: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0da8   125828:	eb 05                	jmp    12582f <do_user_addr_fault+0xdaf>
0daa   12582a:	e8 00 00 00 00       	call   12582f <do_user_addr_fault+0xdaf>	12582b: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0daf   12582f:	48 8b 7d b8          	mov    -0x48(%rbp),%rdi
0db3   125833:	4c 89 fe             	mov    %r15,%rsi
0db6   125836:	4c 89 ea             	mov    %r13,%rdx
0db9   125839:	e8 32 24 00 00       	call   127c70 <bad_area>
0dbe   12583e:	e9 bd f6 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0dc3   125843:	e8 00 00 00 00       	call   125848 <do_user_addr_fault+0xdc8>	125844: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0dc8   125848:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	12584b: R_X86_64_32S	_ftrace_annotated_branch+0x19350
0dcf   12584f:	be 01 00 00 00       	mov    $0x1,%esi
0dd4   125854:	31 d2                	xor    %edx,%edx
0dd6   125856:	31 c9                	xor    %ecx,%ecx
0dd8   125858:	e8 00 00 00 00       	call   12585d <do_user_addr_fault+0xddd>	125859: R_X86_64_PLT32	ftrace_likely_update-0x4
0ddd   12585d:	48 8b 7d b8          	mov    -0x48(%rbp),%rdi
0de1   125861:	4c 89 fe             	mov    %r15,%rsi
0de4   125864:	4c 89 ea             	mov    %r13,%rdx
0de7   125867:	e8 44 24 00 00       	call   127cb0 <bad_area_access_error>
0dec   12586c:	e9 8f f6 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0df1   125871:	e8 00 00 00 00       	call   125876 <do_user_addr_fault+0xdf6>	125872: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0df6   125876:	e9 85 f6 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0dfb   12587b:	e8 00 00 00 00       	call   125880 <do_user_addr_fault+0xe00>	12587c: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e00   125880:	eb 0c                	jmp    12588e <do_user_addr_fault+0xe0e>
0e02   125882:	e8 00 00 00 00       	call   125887 <do_user_addr_fault+0xe07>	125883: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e07   125887:	eb 1a                	jmp    1258a3 <do_user_addr_fault+0xe23>
0e09   125889:	e8 00 00 00 00       	call   12588e <do_user_addr_fault+0xe0e>	12588a: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e0e   12588e:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	125891: R_X86_64_32S	_ftrace_annotated_branch+0x19530
0e15   125895:	be 01 00 00 00       	mov    $0x1,%esi
0e1a   12589a:	31 d2                	xor    %edx,%edx
0e1c   12589c:	31 c9                	xor    %ecx,%ecx
0e1e   12589e:	e8 00 00 00 00       	call   1258a3 <do_user_addr_fault+0xe23>	12589f: R_X86_64_PLT32	ftrace_likely_update-0x4
0e23   1258a3:	4c 8b 75 90          	mov    -0x70(%rbp),%r14
0e27   1258a7:	4c 8b 7d b8          	mov    -0x48(%rbp),%r15
0e2b   1258ab:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0e35   1258b5:	48 8b 5d 98          	mov    -0x68(%rbp),%rbx
0e39   1258b9:	48 8b 4d 88          	mov    -0x78(%rbp),%rcx
0e3d   1258bd:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
0e41   1258c1:	48 8b 45 b0          	mov    -0x50(%rbp),%rax
0e45   1258c5:	74 0d                	je     1258d4 <do_user_addr_fault+0xe54>
0e47   1258c7:	48 8b 7d b0          	mov    -0x50(%rbp),%rdi
0e4b   1258cb:	e8 00 00 00 00       	call   1258d0 <do_user_addr_fault+0xe50>	1258cc: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0e50   1258d0:	48 8b 45 b0          	mov    -0x50(%rbp),%rax
0e54   1258d4:	f6 00 03             	testb  $0x3,(%rax)
0e57   1258d7:	74 0a                	je     1258e3 <do_user_addr_fault+0xe63>
0e59   1258d9:	e8 00 00 00 00       	call   1258de <do_user_addr_fault+0xe5e>	1258da: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e5e   1258de:	e9 1d f6 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0e63   1258e3:	e8 00 00 00 00       	call   1258e8 <do_user_addr_fault+0xe68>	1258e4: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e68   1258e8:	4c 89 ff             	mov    %r15,%rdi
0e6b   1258eb:	48 89 de             	mov    %rbx,%rsi
0e6e   1258ee:	4c 89 f2             	mov    %r14,%rdx
0e71   1258f1:	b9 07 00 00 00       	mov    $0x7,%ecx
0e76   1258f6:	41 b8 02 00 00 00    	mov    $0x2,%r8d
0e7c   1258fc:	e9 9a 00 00 00       	jmp    12599b <do_user_addr_fault+0xf1b>
0e81   125901:	e8 00 00 00 00       	call   125906 <do_user_addr_fault+0xe86>	125902: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e86   125906:	f6 c3 01             	test   $0x1,%bl
0e89   125909:	75 1f                	jne    12592a <do_user_addr_fault+0xeaa>
0e8b   12590b:	f6 c3 32             	test   $0x32,%bl
0e8e   12590e:	74 63                	je     125973 <do_user_addr_fault+0xef3>
0e90   125910:	e8 00 00 00 00       	call   125915 <do_user_addr_fault+0xe95>	125911: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0e95   125915:	4c 89 f7             	mov    %r14,%rdi
0e98   125918:	4c 89 fe             	mov    %r15,%rsi
0e9b   12591b:	4c 89 ea             	mov    %r13,%rdx
0e9e   12591e:	89 d9                	mov    %ebx,%ecx
0ea0   125920:	e8 0b 25 00 00       	call   127e30 <do_sigbus>
0ea5   125925:	e9 d6 f5 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0eaa   12592a:	48 b8 00 00 00 00 00 fc ff df 	movabs $0xdffffc0000000000,%rax
0eb4   125934:	48 8b 4d 88          	mov    -0x78(%rbp),%rcx
0eb8   125938:	80 3c 01 00          	cmpb   $0x0,(%rcx,%rax,1)
0ebc   12593c:	48 8b 5d b0          	mov    -0x50(%rbp),%rbx
0ec0   125940:	74 08                	je     12594a <do_user_addr_fault+0xeca>
0ec2   125942:	48 89 df             	mov    %rbx,%rdi
0ec5   125945:	e8 00 00 00 00       	call   12594a <do_user_addr_fault+0xeca>	125946: R_X86_64_PLT32	__asan_report_load8_noabort-0x4
0eca   12594a:	f6 03 03             	testb  $0x3,(%rbx)
0ecd   12594d:	74 33                	je     125982 <do_user_addr_fault+0xf02>
0ecf   12594f:	e8 00 00 00 00       	call   125954 <do_user_addr_fault+0xed4>	125950: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0ed4   125954:	e8 00 00 00 00       	call   125959 <do_user_addr_fault+0xed9>	125955: R_X86_64_PLT32	pagefault_out_of_memory-0x4
0ed9   125959:	e9 a2 f5 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0ede   12595e:	e8 00 00 00 00       	call   125963 <do_user_addr_fault+0xee3>	12595f: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0ee3   125963:	4c 89 f7             	mov    %r14,%rdi
0ee6   125966:	4c 89 fe             	mov    %r15,%rsi
0ee9   125969:	4c 89 ea             	mov    %r13,%rdx
0eec   12596c:	31 c9                	xor    %ecx,%ecx
0eee   12596e:	45 31 c0             	xor    %r8d,%r8d
0ef1   125971:	eb 28                	jmp    12599b <do_user_addr_fault+0xf1b>
0ef3   125973:	f6 c3 40             	test   $0x40,%bl
0ef6   125976:	74 79                	je     1259f1 <do_user_addr_fault+0xf71>
0ef8   125978:	e8 00 00 00 00       	call   12597d <do_user_addr_fault+0xefd>	125979: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0efd   12597d:	e9 53 f4 ff ff       	jmp    124dd5 <do_user_addr_fault+0x355>
0f02   125982:	e8 00 00 00 00       	call   125987 <do_user_addr_fault+0xf07>	125983: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0f07   125987:	4c 89 f7             	mov    %r14,%rdi
0f0a   12598a:	4c 89 fe             	mov    %r15,%rsi
0f0d   12598d:	4c 89 ea             	mov    %r13,%rdx
0f10   125990:	b9 0b 00 00 00       	mov    $0xb,%ecx
0f15   125995:	41 b8 01 00 00 00    	mov    $0x1,%r8d
0f1b   12599b:	e8 40 04 00 00       	call   125de0 <kernelmode_fixup_or_oops>
0f20   1259a0:	e9 5b f5 ff ff       	jmp    124f00 <do_user_addr_fault+0x480>
0f25   1259a5:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	1259a8: R_X86_64_32S	__tracepoint_mmap_lock_start_locking+0x8
0f2c   1259ac:	80 e1 07             	and    $0x7,%cl
0f2f   1259af:	80 c1 03             	add    $0x3,%cl
0f32   1259b2:	38 c1                	cmp    %al,%cl
0f34   1259b4:	0f 8c 51 f9 ff ff    	jl     12530b <do_user_addr_fault+0x88b>
0f3a   1259ba:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1259bd: R_X86_64_32S	__tracepoint_mmap_lock_start_locking+0x8
0f41   1259c1:	e8 00 00 00 00       	call   1259c6 <do_user_addr_fault+0xf46>	1259c2: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0f46   1259c6:	e9 40 f9 ff ff       	jmp    12530b <do_user_addr_fault+0x88b>
0f4b   1259cb:	48 c7 c1 00 00 00 00 	mov    $0x0,%rcx	1259ce: R_X86_64_32S	__tracepoint_mmap_lock_acquire_returned+0x8
0f52   1259d2:	80 e1 07             	and    $0x7,%cl
0f55   1259d5:	80 c1 03             	add    $0x3,%cl
0f58   1259d8:	38 c1                	cmp    %al,%cl
0f5a   1259da:	0f 8c 6a f9 ff ff    	jl     12534a <do_user_addr_fault+0x8ca>
0f60   1259e0:	48 c7 c7 00 00 00 00 	mov    $0x0,%rdi	1259e3: R_X86_64_32S	__tracepoint_mmap_lock_acquire_returned+0x8
0f67   1259e7:	e8 00 00 00 00       	call   1259ec <do_user_addr_fault+0xf6c>	1259e8: R_X86_64_PLT32	__asan_report_load4_noabort-0x4
0f6c   1259ec:	e9 59 f9 ff ff       	jmp    12534a <do_user_addr_fault+0x8ca>
0f71   1259f1:	e8 00 00 00 00       	call   1259f6 <do_user_addr_fault+0xf76>	1259f2: R_X86_64_PLT32	__sanitizer_cov_trace_pc-0x4
0f76   1259f6:	0f 0b                	ud2
0f78   1259f8:	0f 1f 84 00 00 00 00 00 	nopl   0x0(%rax,%rax,1)

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-07-03 13:46 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-07-03 13:45 arch/x86/mm/fault.o: warning: objtool: do_user_addr_fault+0x860: __stack_chk_fail() is missing a __noreturn annotation kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).