Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1759310 Details for
Bug 1932946
bitlk: crypt_init_by_name_and_header() dereferences NULL pointer when data device device for active dm-crypt disappeared
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 100.23 KB, created by
Tom Sundberg
on 2021-02-25 13:23:07 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Tom Sundberg
Created:
2021-02-25 13:23:07 UTC
Size:
100.23 KB
patch
obsolete
>warning: Can't open file /usr/lib64/libpcre2-8.so.0.10.1 (deleted) during file-backed mapping note processing >[New LWP 73606] >[New LWP 1373] >[New LWP 1396] >[New LWP 1562] >[New LWP 1535] >[New LWP 1404] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >Core was generated by `/usr/libexec/udisks2/udisksd'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 device_open (flags=<optimized out>, device=<optimized out>, cd=<optimized out>) at lib/utils_device.c:303 >303 lib/utils_device.c: No such file or directory. >[Current thread is 1 (Thread 0x7fae87b93640 (LWP 73606))] > >Thread 1 (Thread 0x7fae87b93640 (LWP 73606)): >#0 device_open (flags=<optimized out>, device=<optimized out>, cd=<optimized out>) at lib/utils_device.c:303 > device = 0x0 > fve = {signature = "\000\000\000\000\000\000\000", fve_size = 0, fve_version = 0, curr_state = 0, next_state = 0, volume_size = 0, unknown2 = 0, volume_header_size = 0, fve_offset = {0, 0, 0}, volume_header_offset = 0, metadata_size = 0, metadata_version = 0, metadata_header_size = 0, metada_size_copy = 0, guid = {time_low = 0, time_mid = 0, time_hi_and_version = 0, clock_seq_hi = 0 '\000', clock_seq_low = 0 '\000', node = "\000\000\000\000\000"}, next_nonce = 0, encryption = 0, unknown3 = 0, creation_time = 0} > fve_entries = <optimized out> > guid_buf = '\000' <repeats 36 times> > key_size = <optimized out> > fve_metadata_size = <optimized out> > r = <optimized out> > key = <optimized out> > vmk = <optimized out> > devfd = <optimized out> > sig = {boot_code = "\000\000", signature = "\000\000\340S\343\210\256\177", sector_size = 0} > fve_offset = <optimized out> > entry_size = <optimized out> > start = <optimized out> > vmk_p = <optimized out> > entry_vmk = {guid = {time_low = 2295314560, time_mid = 32686, time_hi_and_version = 0, clock_seq_hi = 224 '\340', clock_seq_low = 190 '\276', node = "\317\210\256\177\000"}, modified = "\000\000\000\000\000\000\000", _unknown = 13056, protection = 46890} > i = <optimized out> > sb = {guid = {time_low = 4934657, time_mid = 0, time_hi_and_version = 0, clock_seq_hi = 195 '\303', clock_seq_low = 0 '\000', node = "\330\210\256\177\000"}, fve_offset = {206158430248, 140387578095072, 140387578094880}} > entry_type = <optimized out> > end = <optimized out> > r = 0 >#1 BITLK_read_sb (params=0x7fae780163f0, cd=0x7fae78016370) at lib/bitlk/bitlk.c:470 > device = 0x0 > fve = {signature = "\000\000\000\000\000\000\000", fve_size = 0, fve_version = 0, curr_state = 0, next_state = 0, volume_size = 0, unknown2 = 0, volume_header_size = 0, fve_offset = {0, 0, 0}, volume_header_offset = 0, metadata_size = 0, metadata_version = 0, metadata_header_size = 0, metada_size_copy = 0, guid = {time_low = 0, time_mid = 0, time_hi_and_version = 0, clock_seq_hi = 0 '\000', clock_seq_low = 0 '\000', node = "\000\000\000\000\000"}, next_nonce = 0, encryption = 0, unknown3 = 0, creation_time = 0} > fve_entries = <optimized out> > guid_buf = '\000' <repeats 36 times> > key_size = <optimized out> > fve_metadata_size = <optimized out> > r = <optimized out> > key = <optimized out> > vmk = <optimized out> > devfd = <optimized out> > sig = {boot_code = "\000\000", signature = "\000\000\340S\343\210\256\177", sector_size = 0} > fve_offset = <optimized out> > entry_size = <optimized out> > start = <optimized out> > vmk_p = <optimized out> > entry_vmk = {guid = {time_low = 2295314560, time_mid = 32686, time_hi_and_version = 0, clock_seq_hi = 224 '\340', clock_seq_low = 190 '\276', node = "\317\210\256\177\000"}, modified = "\000\000\000\000\000\000\000", _unknown = 13056, protection = 46890} > i = <optimized out> > sb = {guid = {time_low = 4934657, time_mid = 0, time_hi_and_version = 0, clock_seq_hi = 195 '\303', clock_seq_low = 0 '\000', node = "\330\210\256\177\000"}, fve_offset = {206158430248, 140387578095072, 140387578094880}} > entry_type = <optimized out> > end = <optimized out> > r = 0 >#2 _crypt_load_bitlk.constprop.0 (cd=0x7fae78016370, params=<optimized out>) at lib/setup.c:988 > r = 0 >#3 0x00007fae86b11cfa in _init_by_name_crypt (name=<optimized out>, cd=<optimized out>) at lib/setup.c:1296 > deps = {0x0 <repeats 33 times>} > dev = <optimized out> > tgt = 0x7fae87b92730 > tgti = 0x7fae87b927f0 > found = <optimized out> > namei = <optimized out> > key_nums = 1 > r = 0 > dmdep = {size = 0, flags = 0, uuid = 0x0, holders = 0, segment = {type = DM_CRYPT, direction = 0, offset = 0, size = 0, data_device = 0x0, u = {crypt = {cipher = 0x0, integrity = 0x0, vk = 0x0, offset = 0, iv_offset = 0, tag_size = 0, sector_size = 0}, verity = {hash_device = 0x0, fec_device = 0x0, root_hash = 0x0, root_hash_size = 0, root_hash_sig_key_desc = 0x0, hash_offset = 0, hash_blocks = 0, fec_offset = 0, fec_blocks = 0, vp = 0x0}, integrity = {journal_size = 0, journal_watermark = 0, journal_commit_time = 0, interleave_sectors = 0, tag_size = 0, offset = 0, sector_size = 0, buffer_sectors = 0, integrity = 0x0, vk = 0x0, journal_integrity = 0x0, journal_integrity_key = 0x0, journal_crypt = 0x0, journal_crypt_key = 0x0, meta_device = 0x0, fix_padding = false}, linear = {offset = 0}, zero = {<No data fields>}}, params = 0x0, next = 0x0}} > dep = <optimized out> > cipher_spec = 0x7fae7800e890 "aes-cbc-eboiv" > cipher_mode = "cbc-eboiv\000\001x\256\177\000\000`o\001x\256\177\000\000\207o\001x\256\177\000" > dmd = {size = 209725440, flags = 0, uuid = 0x7fae78015a90 "BITLK-bitlk-2049", holders = 0, segment = {type = DM_CRYPT, direction = TARGET_QUERY, offset = 0, size = 16, data_device = 0x0, u = {crypt = {cipher = 0x7fae78018c00 "aes-cbc-eboiv", integrity = 0x0, vk = 0x7fae78017b20, offset = 92288, iv_offset = 92288, tag_size = 0, sector_size = 512}, verity = {hash_device = 0x7fae78018c00, fec_device = 0x0, root_hash = 0x7fae78017b20 "\377\377\377\377\251\177", root_hash_size = 92288, root_hash_sig_key_desc = 0x16880 <error: Cannot access memory at address 0x16880>, hash_offset = 2199023255552, hash_blocks = 0, fec_offset = 0, fec_blocks = 0, vp = 0x0}, integrity = {journal_size = 140387314404352, journal_watermark = 0, journal_commit_time = 0, interleave_sectors = 2013362976, tag_size = 32686, offset = 92288, sector_size = 92288, buffer_sectors = 0, integrity = 0x20000000000 <error: Cannot access memory at address 0x20000000000>, vk = 0x0, journal_integrity = 0x0, journal_integrity_key = 0x0, journal_crypt = 0x0, journal_crypt_key = 0x0, meta_device = 0x0, fix_padding = false}, linear = {offset = 140387314404352}, zero = {<No data fields>}}, params = 0x0, next = 0x7fae7800a4f0}} > dmdi = {size = 0, flags = 0, uuid = 0x0, holders = 0, segment = {type = DM_CRYPT, direction = 0, offset = 0, size = 0, data_device = 0x0, u = {crypt = {cipher = 0x0, integrity = 0x0, vk = 0x0, offset = 0, iv_offset = 0, tag_size = 0, sector_size = 0}, verity = {hash_device = 0x0, fec_device = 0x0, root_hash = 0x0, root_hash_size = 0, root_hash_sig_key_desc = 0x0, hash_offset = 0, hash_blocks = 0, fec_offset = 0, fec_blocks = 0, vp = 0x0}, integrity = {journal_size = 0, journal_watermark = 0, journal_commit_time = 0, interleave_sectors = 0, tag_size = 0, offset = 0, sector_size = 0, buffer_sectors = 0, integrity = 0x0, vk = 0x0, journal_integrity = 0x0, journal_integrity_key = 0x0, journal_crypt = 0x0, journal_crypt_key = 0x0, meta_device = 0x0, fix_padding = false}, linear = {offset = 0}, zero = {<No data fields>}}, params = 0x0, next = 0x0}} > cipher = "aes\000\256\177\000\000\256\340\316\210\256\177\000\000\000\200\255\373\000\000\000\000`o\001x\256\177\000" > deps_uuid_prefix = "SUBDEV-bitlk-2049\000\001x\200\000\000\000\320\226\001x\256\177\000\000\000\000\001x\256\177\000" > ci = <optimized out> > dmd = {size = 209725440, flags = 0, uuid = 0x7fae780026e0 "BITLK-bitlk-2049", holders = 0, segment = {type = DM_CRYPT, direction = TARGET_QUERY, offset = 0, size = 16, data_device = 0x0, u = {crypt = {cipher = 0x0, integrity = 0x0, vk = 0x0, offset = 92288, iv_offset = 92288, tag_size = 0, sector_size = 512}, verity = {hash_device = 0x0, fec_device = 0x0, root_hash = 0x0, root_hash_size = 92288, root_hash_sig_key_desc = 0x16880 <error: Cannot access memory at address 0x16880>, hash_offset = 2199023255552, hash_blocks = 0, fec_offset = 0, fec_blocks = 0, vp = 0x0}, integrity = {journal_size = 0, journal_watermark = 0, journal_commit_time = 0, interleave_sectors = 0, tag_size = 0, offset = 92288, sector_size = 92288, buffer_sectors = 0, integrity = 0x20000000000 <error: Cannot access memory at address 0x20000000000>, vk = 0x0, journal_integrity = 0x0, journal_integrity_key = 0x0, journal_crypt = 0x0, journal_crypt_key = 0x0, meta_device = 0x0, fix_padding = false}, linear = {offset = 0}, zero = {<No data fields>}}, params = 0x0, next = 0x7fae78005190}} > tgt = 0x7fae87b92670 > r = <optimized out> >#4 crypt_init_by_name_and_header (cd=0x7fae87b92bc0, name=<optimized out>, header_device=<optimized out>) at lib/setup.c:1486 > ci = <optimized out> > dmd = {size = 209725440, flags = 0, uuid = 0x7fae780026e0 "BITLK-bitlk-2049", holders = 0, segment = {type = DM_CRYPT, direction = TARGET_QUERY, offset = 0, size = 16, data_device = 0x0, u = {crypt = {cipher = 0x0, integrity = 0x0, vk = 0x0, offset = 92288, iv_offset = 92288, tag_size = 0, sector_size = 512}, verity = {hash_device = 0x0, fec_device = 0x0, root_hash = 0x0, root_hash_size = 92288, root_hash_sig_key_desc = 0x16880 <error: Cannot access memory at address 0x16880>, hash_offset = 2199023255552, hash_blocks = 0, fec_offset = 0, fec_blocks = 0, vp = 0x0}, integrity = {journal_size = 0, journal_watermark = 0, journal_commit_time = 0, interleave_sectors = 0, tag_size = 0, offset = 92288, sector_size = 92288, buffer_sectors = 0, integrity = 0x20000000000 <error: Cannot access memory at address 0x20000000000>, vk = 0x0, journal_integrity = 0x0, journal_integrity_key = 0x0, journal_crypt = 0x0, journal_crypt_key = 0x0, meta_device = 0x0, fix_padding = false}, linear = {offset = 0}, zero = {<No data fields>}}, params = 0x0, next = 0x7fae78005190}} > tgt = 0x7fae87b92670 > r = <optimized out> >#5 0x00007fae86b7e9a8 in _crypto_close (device=0x7fae74007cb0 "/dev/dm-1", tech_name=<optimized out>, error=0x7fae87b92c00) at crypto.c:1132 > cd = 0x7fae78016370 > ret = 0 > progress_id = 11 > msg = 0x7fae780024f0 "\"n\347\202\251\177" >#6 0x000056351f66390a in run_task_job (task=0x7fae780118f0, source_object=0x7fae6800b100, task_data=<optimized out>, cancellable=0x7fae740022a0) at udisksthreadedjob.c:214 > job = 0x7fae6800b100 > job_error = 0x0 > __func__ = "run_task_job" >#7 0x00007fae89090872 in g_task_thread_pool_thread (thread_data=0x7fae780118f0, pool_data=<optimized out>) at ../gio/gtask.c:1417 > task = 0x7fae780118f0 >#8 0x00007fae88ed8fa4 in g_thread_pool_thread_proxy (data=<optimized out>) at ../glib/gthreadpool.c:354 > task = 0x7fae780118f0 > pool = <optimized out> >#9 0x00007fae88ed6402 in g_thread_proxy (data=0x7fae740054c0) at ../glib/gthread.c:820 > thread = 0x7fae740054c0 > __func__ = "g_thread_proxy" >#10 0x00007fae88a553f9 in start_thread (arg=0x7fae87b93640) at pthread_create.c:463 > ret = <optimized out> > pd = 0x7fae87b93640 > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140387578099264, 8830609253501199255, 140387535492670, 140387535492671, 0, 140387578099264, -8804063218781166697, -8804061049832119401}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 >#11 0x00007fae88d70b53 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95 > >Thread 2 (Thread 0x7fae88395e40 (LWP 1373)): >#0 0x00007fae88d65a5f in __GI___poll (fds=0x7fff4f052150, nfds=2, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:29 > sc_ret = 1 > sc_cancel_oldtype = 0 >#1 0x00007fae893d04ec in _utils_exec_and_report_progress (argv=<optimized out>, extra=<optimized out>, prog_extract=prog_extract@entry=0x0, proc_status=proc_status@entry=0x7fff4f0521c4, stdout=stdout@entry=0x7fff4f0521d0, stderr=stderr@entry=0x7fff4f0521c8, error=0x7fff4f0522a0) at exec.c:366 > args = <optimized out> > args_len = <optimized out> > arg_p = <optimized out> > args_str = 0x5635216fa770 "j\322\070B0V" > extra_p = <optimized out> > task_id = <optimized out> > progress_id = 10 > msg = <optimized out> > pid = 73605 > out_fd = 20 > out_pipe = 0x563521701430 > err_fd = 22 > err_pipe = 0x5635216b1f50 > line = 0x0 > child_ret = -1 > status = 0 > ret = <optimized out> > io_status = <optimized out> > poll_status = <optimized out> > i = <optimized out> > completion = 0 '\000' > fds = {{fd = 20, events = 25, revents = 0}, {fd = 22, events = 25, revents = 1}} > out_done = 0 > err_done = 0 > stdout_data = 0x5635216faf00 > stderr_data = 0x56352165c9a0 > old_env = <optimized out> > new_env = <optimized out> >#2 0x00007fae893d0a65 in bd_utils_exec_and_capture_output (argv=<optimized out>, extra=<optimized out>, output=0x7fff4f052228, error=0x7fff4f0522a0) at exec.c:526 > status = 0 > stdout = 0x0 > stderr = 0x0 > ret = 0 >#3 0x00007fae86467a71 in ext_get_info (device=<optimized out>, error=0x7fff4f0522a0) at ext.c:610 > args = {0x7fae8646c068 "dumpe2fs", 0x7fae8646c071 "-h", 0x5635216f2e60 "/dev/nvme0n1p2", 0x0} > success = 0 > output = 0x0 > table = 0x0 > num_items = 0 > ret = 0x0 >#4 0x000056351f6406e1 in get_filesystem_size (object=object@entry=0x5635216a6250) at udiskslinuxfilesystem.c:180 > info = <optimized out> > size = 0 > device = 0x7fae78003cc0 > dev = 0x5635216f2e60 "/dev/nvme0n1p2" > type = 0x5635216b5200 "ext4" > error = 0x0 >#5 0x000056351f641040 in udisks_linux_filesystem_update (filesystem=0x5635216c19d0, object=0x5635216a6250) at udiskslinuxfilesystem.c:278 > mount_monitor = <optimized out> > device = 0x7fae78003cc0 > ata = <optimized out> > p = <optimized out> > l = <optimized out> > skip_fs_size = <optimized out> > pm_state = 0 '\000' >#6 0x000056351f63469b in filesystem_update (object=<optimized out>, uevent_action=<optimized out>, _iface=0x5635216c19d0) at udiskslinuxblockobject.c:750 >#7 0x000056351f63493f in udisks_linux_block_object_uevent (object=0x5635216a6250, action=0x56351f66a78e "change", device=<optimized out>) at udiskslinuxblockobject.c:880 > module_manager = <optimized out> > modules = <optimized out> > l = <optimized out> > __func__ = "udisks_linux_block_object_uevent" >#8 0x000056351f6356cd in update_all_block_objects (provider=<optimized out>) at udiskslinuxprovider.c:1542 > object = <optimized out> > objects = 0x5635216a4ec0 = {0x5635216a63b0, 0x5635216a6250, 0x5635216a6300, 0x5635216a60f0, 0x5635216a6040, 0x5635216a6670, 0x5635216a61a0} > l = 0x5635216faee0 = {0x5635216a6250, 0x5635216a6300, 0x5635216a60f0, 0x5635216a6040, 0x5635216a6670, 0x5635216a61a0} >#9 0x00007fae88f9ae2a in g_closure_invoke (closure=0x5635216ad310, return_value=0x0, n_param_values=2, param_values=0x7fff4f0525a0, invocation_hint=0x7fff4f052520) at ../gobject/gclosure.c:810 > marshal = 0x7fae88f9d280 <g_cclosure_marshal_VOID__OBJECT> > marshal_data = 0x0 > in_marshal = 0 > real_closure = 0x5635216ad2f0 > __func__ = "g_closure_invoke" >#10 0x00007fae88fc4303 in signal_emit_unlocked_R.isra.0 (node=node@entry=0x563521686270, detail=detail@entry=0, instance=instance@entry=0x5635216800a0, emission_return=emission_return@entry=0x0, instance_and_params=instance_and_params@entry=0x7fff4f0525a0) at ../gobject/gsignal.c:3739 > tmp = <optimized out> > handler = 0x5635216d4640 > accumulator = 0x0 > emission = {next = 0x0, instance = 0x5635216800a0, ihint = {signal_id = 21, detail = 0, run_type = G_SIGNAL_RUN_FIRST}, state = EMISSION_RUN, chain_type = 0x4 [None]} > hlist = <optimized out> > handler_list = 0x5635216d4640 > return_accu = 0x0 > accu = {g_type = 0x0, data = {{v_int = 0, v_uint = 0, v_long = 0, v_ulong = 0, v_int64 = 0, v_uint64 = 0, v_float = 0, v_double = 0, v_pointer = 0x0}, {v_int = 0, v_uint = 0, v_long = 0, v_ulong = 0, v_int64 = 0, v_uint64 = 0, v_float = 0, v_double = 0, v_pointer = 0x0}}} > signal_id = 21 > max_sequential_handler_number = 327 > return_value_altered = <optimized out> >#11 0x00007fae88fb7f02 in g_signal_emit_valist (instance=<optimized out>, signal_id=<optimized out>, detail=<optimized out>, var_args=var_args@entry=0x7fff4f052770) at ../gobject/gsignal.c:3495 > instance_and_params = 0x7fff4f0525a0 > signal_return_type = <optimized out> > param_values = 0x7fff4f0525b8 > node = <optimized out> > i = <optimized out> > n_params = <optimized out> > __func__ = "g_signal_emit_valist" >#12 0x00007fae88fb8123 in g_signal_emit (instance=<optimized out>, signal_id=<optimized out>, detail=<optimized out>) at ../gobject/gsignal.c:3551 > var_args = {{gp_offset = 32, fp_offset = 48, overflow_arg_area = 0x7fff4f052850, reg_save_area = 0x7fff4f052790}} >#13 0x000056351f668897 in reload_utab_entries (monitor=0x5635216800a0) at udisksutabmonitor.c:224 > entry = 0x5635216ef180 > old_tb = 0x5635216852d0 > itr = 0x56352165efa0 > old = 0x5635216ec3c0 > change = 2 > diff = 0x5635216da360 > new = 0x0 > rc = <optimized out> > monitor = 0x5635216800a0 > need_reload = <optimized out> > r = <optimized out> >#14 utab_changed_event (channel=<optimized out>, cond=<optimized out>, user_data=<optimized out>) at udisksutabmonitor.c:281 > monitor = 0x5635216800a0 > need_reload = <optimized out> > r = <optimized out> >#15 0x00007fae88ea8a9f in g_main_dispatch (context=0x56352165c150) at ../glib/gmain.c:3325 > dispatch = <optimized out> > prev_source = 0x0 > begin_time_nsec = 0 > was_in_call = <optimized out> > user_data = 0x5635216800a0 > callback = 0x56351f6685e0 <utab_changed_event> > cb_funcs = 0x7fae88f853a0 <g_source_callback_funcs> > cb_data = 0x563521690ce0 > need_destroy = <optimized out> > source = 0x563521691e40 > current = 0x563521667310 > i = 0 >#16 g_main_context_dispatch (context=0x56352165c150) at ../glib/gmain.c:4043 >#17 0x00007fae88efaa98 in g_main_context_iterate.constprop.0 (context=0x56352165c150, block=block@entry=1, dispatch=dispatch@entry=1, self=<optimized out>) at ../glib/gmain.c:4119 > max_priority = 2147483647 > timeout = 394316 > some_ready = 1 > nfds = <optimized out> > allocated_nfds = <optimized out> > fds = 0x5635216e0010 >#18 0x00007fae88ea8163 in g_main_loop_run (loop=0x5635216577d0) at ../glib/gmain.c:4317 > __func__ = "g_main_loop_run" >#19 0x000056351f62cbdb in main (argc=<optimized out>, argv=<optimized out>) at main.c:184 > error = 0x0 > opt_context = 0x56352165be30 > ret = 1 > name_owner_id = 1 > sigint_id = 1 > __func__ = "main" > >Thread 3 (Thread 0x7fae88394640 (LWP 1396)): >#0 0x00007fae88d65a5f in __GI___poll (fds=0x56352165c090, nfds=2, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:29 > sc_ret = -516 > sc_cancel_oldtype = 0 >#1 0x00007fae88efaa36 in g_main_context_poll (priority=<optimized out>, n_fds=2, fds=0x56352165c090, timeout=<optimized out>, context=0x56352165e430) at ../glib/gmain.c:4422 > ret = <optimized out> > errsv = <optimized out> > poll_func = 0x7fae88eae180 <g_poll> > max_priority = 2147483647 > timeout = -1 > some_ready = <optimized out> > nfds = 2 > allocated_nfds = <optimized out> > fds = 0x56352165c090 >#2 g_main_context_iterate.constprop.0 (context=context@entry=0x56352165e430, block=block@entry=1, dispatch=dispatch@entry=1, self=<optimized out>) at ../glib/gmain.c:4114 > max_priority = 2147483647 > timeout = -1 > some_ready = <optimized out> > nfds = 2 > allocated_nfds = <optimized out> > fds = 0x56352165c090 >#3 0x00007fae88ea5e73 in g_main_context_iteration (context=0x56352165e430, may_block=may_block@entry=1) at ../glib/gmain.c:4184 > retval = <optimized out> >#4 0x00007fae88ea7a91 in glib_worker_main (data=<optimized out>) at ../glib/gmain.c:6077 >#5 0x00007fae88ed6402 in g_thread_proxy (data=0x563521650a40) at ../glib/gthread.c:820 > thread = 0x563521650a40 > __func__ = "g_thread_proxy" >#6 0x00007fae88a553f9 in start_thread (arg=0x7fae88394640) at pthread_create.c:463 > ret = <optimized out> > pd = 0x7fae88394640 > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140387586491968, 8830609253501199255, 140734519125470, 140734519125471, 0, 140387586491968, -8804062118732668009, -8804061049832119401}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 >#7 0x00007fae88d70b53 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95 > >Thread 4 (Thread 0x7fae852f2640 (LWP 1562)): >#0 syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38 >#1 0x00007fae88ef5003 in g_cond_wait (cond=cond@entry=0x7fae78011970, mutex=mutex@entry=0x7fae78011968) at ../glib/gthread-posix.c:1545 > sampled = 0 >#2 0x00007fae8908f78b in g_task_run_in_thread_sync (task=0x7fae780118f0, task_func=<optimized out>) at ../gio/gtask.c:1583 > __func__ = "g_task_run_in_thread_sync" >#3 0x000056351f663d8e in udisks_threaded_job_run_sync (job=0x7fae6800b100, error=0x7fae852f1968) at udisksthreadedjob.c:418 > task = 0x7fae780118f0 > job_result = <optimized out> >#4 0x000056351f66637c in udisks_state_check_unlocked_crypto_dev_entry (devs_to_clean=0x0, check_only=0, value=0x5635216e0830, state=0x563521680000) at udisksstate.c:1332 > data = {device = 0x563521680000 "`kh!5V", map_name = 0x7fae74007cb0 "/dev/dm-1", passphrase = 0x563521680018, new_passphrase = 0x7fae852f19c0, keyfiles = 0x0, keyfiles_count = 94786160058355, pim = 0, hidden = 0, system = 560986976, read_only = 1, type = 0x0} > error = 0x0 > dm_uuid = <optimized out> > attempt_no_cleanup = 0 > details = 0x7fae7c008630 > crypto_device_value = 0x5635216ff750 > keep = 0 > udev_client = <optimized out> > udev_cleartext_device = <optimized out> > udev_crypto_device = <optimized out> > dm_uuid_value = 0x7fae7c0086c0 > s = <optimized out> > cleartext_device = 64769 > crypto_device = <optimized out> > device_file_cleartext = 0x7fae74007cb0 "/dev/dm-1" > is_unlocked = 1 > crypto_device_exists = <optimized out> > iter = {x = {94786194114704, 1, 0, 0, 40, 8, 0, 3579507750, 32, 39, 140387314345696, 0, 31, 8, 0, 94786193719296}} > child = 0x5635216e0830 > changed = 0 > value = 0x5635216e0890 > new_value = <optimized out> > builder = {u = {s = {partial_magic = 0, type = 0x7fae740079c0, y = {140387247225281, 0, 0, 18446744073709551615, 140387247235168, 8, 0, 3, 1033660112, 0, 0, 0, 0, 0}}, x = {0, 140387247225280, 140387247225281, 0, 0, 18446744073709551615, 140387247235168, 8, 0, 3, 1033660112, 0, 0, 0, 0, 0}}} >#5 udisks_state_check_unlocked_crypto_dev (state=state@entry=0x563521680000, check_only=check_only@entry=0, devs_to_clean=devs_to_clean@entry=0x0) at udisksstate.c:1395 > iter = {x = {94786194114704, 1, 0, 0, 40, 8, 0, 3579507750, 32, 39, 140387314345696, 0, 31, 8, 0, 94786193719296}} > child = 0x5635216e0830 > changed = 0 > value = 0x5635216e0890 > new_value = <optimized out> > builder = {u = {s = {partial_magic = 0, type = 0x7fae740079c0, y = {140387247225281, 0, 0, 18446744073709551615, 140387247235168, 8, 0, 3, 1033660112, 0, 0, 0, 0, 0}}, x = {0, 140387247225280, 140387247225281, 0, 0, 18446744073709551615, 140387247235168, 8, 0, 3, 1033660112, 0, 0, 0, 0, 0}}} >#6 0x000056351f666749 in udisks_state_check_in_thread (state=0x563521680000) at udisksstate.c:578 > devs_to_clean = 0x5635216ffb60 >#7 0x000056351f66679c in udisks_state_check_func (user_data=user_data@entry=0x563521680000) at udisksstate.c:405 > state = <optimized out> >#8 0x00007fae88ea7b5b in g_idle_dispatch (source=source@entry=0x5635216f8010, callback=0x56351f666780 <udisks_state_check_func>, user_data=0x563521680000) at ../glib/gmain.c:5836 > again = <optimized out> >#9 0x00007fae88ea8a9f in g_main_dispatch (context=0x5635216d6ad0) at ../glib/gmain.c:3325 > dispatch = <optimized out> > prev_source = 0x0 > begin_time_nsec = 0 > was_in_call = <optimized out> > user_data = 0x563521680000 > callback = 0x56351f666780 <udisks_state_check_func> > cb_funcs = 0x7fae88f853a0 <g_source_callback_funcs> > cb_data = 0x5635216f8d50 > need_destroy = <optimized out> > source = 0x5635216f8010 > current = 0x7fae74000bf0 > i = 0 >#10 g_main_context_dispatch (context=0x5635216d6ad0) at ../glib/gmain.c:4043 >#11 0x00007fae88efaa98 in g_main_context_iterate.constprop.0 (context=0x5635216d6ad0, block=block@entry=1, dispatch=dispatch@entry=1, self=<optimized out>) at ../glib/gmain.c:4119 > max_priority = 2147483647 > timeout = -1 > some_ready = 1 > nfds = <optimized out> > allocated_nfds = <optimized out> > fds = 0x5635216d4a20 >#12 0x00007fae88ea8163 in g_main_loop_run (loop=0x5635216d6b90) at ../glib/gmain.c:4317 > __func__ = "g_main_loop_run" >#13 0x000056351f65f270 in udisks_state_thread_func (user_data=<optimized out>) at udisksstate.c:346 > state = 0x563521680000 >#14 0x00007fae88ed6402 in g_thread_proxy (data=0x5635216d3b60) at ../glib/gthread.c:820 > thread = 0x5635216d3b60 > __func__ = "g_thread_proxy" >#15 0x00007fae88a553f9 in start_thread (arg=0x7fae852f2640) at pthread_create.c:463 > ret = <optimized out> > pd = 0x7fae852f2640 > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140387535496768, 8830609253501199255, 140734519124110, 140734519124111, 0, 140387535496768, -8804068834987777129, -8804061049832119401}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 >#16 0x00007fae88d70b53 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95 > >Thread 5 (Thread 0x7fae85af3640 (LWP 1535)): >#0 syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38 >#1 0x00007fae88ef5003 in g_cond_wait (cond=0x5635216585c8, mutex=0x5635216585c0) at ../glib/gthread-posix.c:1545 > sampled = 20 >#2 0x00007fae88e7909b in g_async_queue_pop_intern_unlocked (queue=queue@entry=0x5635216585c0, wait=wait@entry=1, end_time=end_time@entry=-1) at ../glib/gasyncqueue.c:419 > retval = <optimized out> > __func__ = "g_async_queue_pop_intern_unlocked" >#3 0x00007fae88e790cc in g_async_queue_pop (queue=0x5635216585c0) at ../glib/gasyncqueue.c:453 > retval = <optimized out> > __func__ = "g_async_queue_pop" >#4 0x000056351f6329ea in probe_request_thread_func (user_data=<optimized out>) at udiskslinuxprovider.c:267 > provider = 0x563521693840 > request = <optimized out> > dev_initialized = <optimized out> > n_tries = <optimized out> >#5 0x00007fae88ed6402 in g_thread_proxy (data=0x563521672520) at ../glib/gthread.c:820 > thread = 0x563521672520 > __func__ = "g_thread_proxy" >#6 0x00007fae88a553f9 in start_thread (arg=0x7fae85af3640) at pthread_create.c:463 > ret = <optimized out> > pd = 0x7fae85af3640 > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140387543889472, 8830609253501199255, 140734519123134, 140734519123135, 0, 140387543889472, -8804067737086762089, -8804061049832119401}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 >#7 0x00007fae88d70b53 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95 > >Thread 6 (Thread 0x7fae87392640 (LWP 1404)): >#0 0x00007fae88d65a5f in __GI___poll (fds=0x7fae780113b0, nfds=2, timeout=-1) at ../sysdeps/unix/sysv/linux/poll.c:29 > sc_ret = -516 > sc_cancel_oldtype = 0 >#1 0x00007fae88efaa36 in g_main_context_poll (priority=<optimized out>, n_fds=2, fds=0x7fae780113b0, timeout=<optimized out>, context=0x7fae7800e5b0) at ../glib/gmain.c:4422 > ret = <optimized out> > errsv = <optimized out> > poll_func = 0x7fae88eae180 <g_poll> > max_priority = 2147483647 > timeout = -1 > some_ready = <optimized out> > nfds = 2 > allocated_nfds = <optimized out> > fds = 0x7fae780113b0 >#2 g_main_context_iterate.constprop.0 (context=0x7fae7800e5b0, block=block@entry=1, dispatch=dispatch@entry=1, self=<optimized out>) at ../glib/gmain.c:4114 > max_priority = 2147483647 > timeout = -1 > some_ready = <optimized out> > nfds = 2 > allocated_nfds = <optimized out> > fds = 0x7fae780113b0 >#3 0x00007fae88ea8163 in g_main_loop_run (loop=0x7fae7800e6a0) at ../glib/gmain.c:4317 > __func__ = "g_main_loop_run" >#4 0x00007fae890f301a in gdbus_shared_thread_func (user_data=0x7fae7800e580) at ../gio/gdbusprivate.c:280 > data = 0x7fae7800e580 >#5 0x00007fae88ed6402 in g_thread_proxy (data=0x7fae78001920) at ../glib/gthread.c:820 > thread = 0x7fae78001920 > __func__ = "g_thread_proxy" >#6 0x00007fae88a553f9 in start_thread (arg=0x7fae87392640) at pthread_create.c:463 > ret = <optimized out> > pd = 0x7fae87392640 > unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140387569706560, 8830609253501199255, 140387578095902, 140387578095903, 0, 140387569706560, -8804064316682181737, -8804061049832119401}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} > not_first_call = 0 >#7 0x00007fae88d70b53 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95 >From To Syms Read Shared Object Library >0x00007fae89413450 0x00007fae89414323 Yes /lib64/libgmodule-2.0.so.0 >0x00007fae89409790 0x00007fae8940cf66 Yes /lib64/libgudev-1.0.so.0 >0x00007fae893e0350 0x00007fae893f04f1 Yes /lib64/libblockdev.so.2 >0x00007fae893cf690 0x00007fae893d1dfc Yes /lib64/libbd_utils.so.2 >0x00007fae893be3a0 0x00007fae893c34b9 Yes /lib64/libatasmart.so.4 >0x00007fae89384b90 0x00007fae893acf02 Yes /lib64/libmount.so.1 >0x00007fae893705f0 0x00007fae89373cc7 Yes /lib64/libuuid.so.1 >0x00007fae89356070 0x00007fae8936209d Yes /lib64/libpolkit-gobject-1.so.0 >0x00007fae893462f0 0x00007fae89349e19 Yes /lib64/libacl.so.1 >0x00007fae89299530 0x00007fae89313f74 Yes /lib64/libsystemd.so.0 >0x00007fae891e5a90 0x00007fae89241cd2 Yes /lib64/libudisks2.so.0 >0x00007fae89021350 0x00007fae8912418c Yes /lib64/libgio-2.0.so.0 >0x00007fae88f95e90 0x00007fae88fc4808 Yes /lib64/libgobject-2.0.so.0 >0x00007fae88e72b30 0x00007fae88efb452 Yes /lib64/libglib-2.0.so.0 >0x00007fae88e3d5f0 0x00007fae88e4e195 Yes /lib64/libgcc_s.so.1 >0x00007fae88c95690 0x00007fae88de291d Yes /lib64/libc.so.6 >0x00007fae8943f090 0x00007fae8945ff96 Yes /lib64/ld-linux-x86-64.so.2 >0x00007fae88c6a270 0x00007fae88c6b1c9 Yes /lib64/libdl.so.2 >0x00007fae88c41ef0 0x00007fae88c5acf4 Yes /lib64/libudev.so.1 >0x00007fae88b043d0 0x00007fae88b9f6b8 Yes /lib64/libm.so.6 >0x00007fae88adf7e0 0x00007fae88aedb38 Yes /lib64/libkmod.so.2 >0x00007fae88aae3f0 0x00007fae88acb142 Yes /lib64/libblkid.so.1 >0x00007fae88a81b50 0x00007fae88a99e2d Yes /lib64/libselinux.so.1 >0x00007fae88a71770 0x00007fae88a74a60 Yes /lib64/librt.so.1 >0x00007fae88a53a90 0x00007fae88a62125 Yes /lib64/libpthread.so.0 >0x00007fae88a442b0 0x00007fae88a4631a Yes /lib64/libattr.so.1 >0x00007fae88a199f0 0x00007fae88a3388e Yes /lib64/liblzma.so.5 >0x00007fae8894fda0 0x00007fae88a016d0 Yes /lib64/libzstd.so.1 >0x00007fae889254d0 0x00007fae8893bad9 Yes /lib64/liblz4.so.1 >0x00007fae8880ab40 0x00007fae888e1a50 Yes /lib64/libgcrypt.so.20 >0x00007fae887e75f0 0x00007fae887f4b2b Yes /lib64/libz.so.1 >0x00007fae887cc730 0x00007fae887d969c Yes /lib64/libresolv.so.2 >0x00007fae887bf2c0 0x00007fae887c3d6c Yes /lib64/libffi.so.6 >0x00007fae887461f0 0x00007fae8879b56a Yes /lib64/libpcre.so.1 >0x00007fae884d3000 0x00007fae8867ee50 Yes /lib64/libcrypto.so.1.1 >0x00007fae883c24b0 0x00007fae8842b9df Yes /lib64/libpcre2-8.so.0 >0x00007fae8839da50 0x00007fae883b1d12 Yes /lib64/libgpg-error.so.0 >0x00007fae86b8e290 0x00007fae86b8efab Yes /lib64/libbd_swap.so.2 >0x00007fae86b88200 0x00007fae86b88df0 Yes /lib64/libbd_loop.so.2 >0x00007fae86b7d650 0x00007fae86b819df Yes /lib64/libbd_crypto.so.2 >0x00007fae86b0d000 0x00007fae86b5ddcd Yes /lib64/libcryptsetup.so.12 >0x00007fae86aad230 0x00007fae86ae9413 Yes /lib64/libssl3.so >0x00007fae86a7d130 0x00007fae86a929e7 Yes /lib64/libsmime3.so >0x00007fae86954c50 0x00007fae86a2daa8 Yes /lib64/libnss3.so >0x00007fae869123f0 0x00007fae86922ab8 Yes /lib64/libnssutil3.so >0x00007fae86900110 0x00007fae86900de8 Yes /lib64/libplds4.so >0x00007fae868fa210 0x00007fae868fb962 Yes /lib64/libplc4.so >0x00007fae868c4320 0x00007fae868e5cd3 Yes /lib64/libnspr4.so >0x00007fae868a2870 0x00007fae868ab3c6 Yes /lib64/libvolume_key.so.1 >0x00007fae8684d270 0x00007fae8688240e Yes /lib64/libdevmapper.so.1.02 >0x00007fae867c48f0 0x00007fae86818f16 Yes /lib64/libssl.so.1.1 >0x00007fae8679c290 0x00007fae8679ffde Yes /lib64/libargon2.so.1 >0x00007fae8678c630 0x00007fae86794880 Yes /lib64/libjson-c.so.5 >0x00007fae8673ca60 0x00007fae86771c2f Yes /lib64/libgpgme.so.11 >0x00007fae86723660 0x00007fae8672d3a5 Yes /lib64/libassuan.so.0 >0x00007fae86718390 0x00007fae8671aa36 Yes /lib64/libbd_mdraid.so.2 >0x00007fae8670f990 0x00007fae86711757 Yes /lib64/libbytesize.so.1 >0x00007fae8666ca50 0x00007fae866e8ed3 Yes /lib64/libmpfr.so.6 >0x00007fae865ca480 0x00007fae8664117d Yes /lib64/libgmp.so.10 >0x00007fae865b05c0 0x00007fae865b3fd5 Yes /lib64/libbd_part.so.2 >0x00007fae865a9070 0x00007fae865a91b0 Yes /lib64/libbd_part_err.so.2 >0x00007fae86592310 0x00007fae8659fa4b Yes /lib64/libparted-fs-resize.so.0 >0x00007fae86539790 0x00007fae86572c09 Yes /lib64/libparted.so.2 >0x00007fae8647a430 0x00007fae864fb54e Yes /lib64/libsepol.so.1 >0x00007fae86466990 0x00007fae8646bf82 Yes /lib64/libbd_fs.so.2 >0x00007fae863de4b0 0x00007fae863e4921 Yes /lib64/libnss_sss.so.2 >0x00007fae85af7590 0x00007fae85afd1ec Yes /lib64/libnss_files.so.2 >0x00007fae89432130 0x00007fae89433a0d Yes /usr/lib64/gconv/UTF-16.so >$1 = 0x0 >$2 = 0x0 >rax 0x0 0 >rbx 0x0 0 >rcx 0x0 0 >rdx 0x1 1 >rsi 0x0 0 >rdi 0x7fae87b92590 140387578094992 >rbp 0x7fae87b92a70 0x7fae87b92a70 >rsp 0x7fae87b92420 0x7fae87b92420 >r8 0x7fae78017b00 140387314400000 >r9 0x7fae88df80c0 140387597385920 >r10 0x7fae88df7f01 140387597385473 >r11 0x0 0 >r12 0x7fae78016370 140387314393968 >r13 0x7fae74007cb0 140387247226032 >r14 0x7fae87b92520 140387578094880 >r15 0x4b4c01 4934657 >rip 0x7fae86b59c27 0x7fae86b59c27 <_crypt_load_bitlk.constprop.0+151> >eflags 0x10246 [ PF ZF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 0 (raw 0x00000000000000000000) >st1 0 (raw 0x00000000000000000000) >st2 0 (raw 0x00000000000000000000) >st3 0 (raw 0x00000000000000000000) >st4 0 (raw 0x00000000000000000000) >st5 0 (raw 0x00000000000000000000) >st6 0 (raw 0x00000000000000000000) >st7 0 (raw 0x00000000000000000000) >fctrl 0x37f 895 >fstat 0x0 0 >ftag 0xffff 65535 >fiseg 0x0 0 >fioff 0x0 0 >foseg 0x0 0 >fooff 0x0 0 >fop 0x0 0 >mxcsr 0x9fe0 [ PE DAZ IM DM ZM OM UM PM FZ ] >bndcfgu {raw = 0x0, config = {base = 0x0, reserved = 0x0, preserved = 0x0, enabled = 0x0}} {raw = 0x0, config = {base = 0, reserved = 0, preserved = 0, enabled = 0}} >bndstatus {raw = 0x0, status = {bde = 0x0, error = 0x0}} {raw = 0x0, status = {bde = 0, error = 0}} >ymm0 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm1 {v16_bfloat16 = {0x0, 0x0, 0x0, 0x0 <repeats 13 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 26 times>}, v16_int16 = {0xff, 0x0, 0xff00, 0x0 <repeats 13 times>}, v8_int32 = {0xff, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000ff, 0x0, 0x0, 0x0}, v2_int128 = {0xff00000000ff, 0x0}} >ymm2 {v16_bfloat16 = {0x0, 0x0, 0x0, 0x0 <repeats 13 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xff, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0 <repeats 26 times>}, v16_int16 = {0xff, 0x0, 0xff00, 0x0 <repeats 13 times>}, v8_int32 = {0xff, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xff00000000ff, 0x0, 0x0, 0x0}, v2_int128 = {0xff00000000ff, 0x0}} >ymm3 {v16_bfloat16 = {0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x37, 0x64, 0x63, 0x34, 0x33, 0x38, 0x34, 0x31, 0x35, 0x30, 0x31, 0x31, 0x37, 0x31, 0x20, 0x34, 0x0 <repeats 16 times>}, v16_int16 = {0x6437, 0x3463, 0x3833, 0x3134, 0x3035, 0x3131, 0x3137, 0x3420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x34636437, 0x31343833, 0x31313035, 0x34203137, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x3134383334636437, 0x3420313731313035, 0x0, 0x0}, v2_int128 = {0x34203137313130353134383334636437, 0x0}} >ymm4 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm5 {v16_bfloat16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_float = {0x0, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x7fffffffffffffff, 0x7fffffffffffffff, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0xffff0000, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffff000000000000, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffffffff000000000000, 0x0}} >ymm6 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm7 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm8 {v16_bfloat16 = {0xffff, 0xffff, 0x0, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_float = {0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x7fffffffffffffff, 0x7fffffffffffffff, 0x0, 0x0}, v32_int8 = {0x0, 0x63, 0x62, 0x63, 0x69, 0x0, 0x62, 0x6c, 0x6f, 0x77, 0x66, 0x69, 0x73, 0x68, 0x5f, 0x6c, 0x0 <repeats 16 times>}, v16_int16 = {0x6300, 0x6362, 0x69, 0x6c62, 0x776f, 0x6966, 0x6873, 0x6c5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x63626300, 0x6c620069, 0x6966776f, 0x6c5f6873, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x6c62006963626300, 0x6c5f68736966776f, 0x0, 0x0}, v2_int128 = {0x6c5f68736966776f6c62006963626300, 0x0}} >ymm9 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm10 {v16_bfloat16 = {0x7c00, 0x0, 0x364, 0x0, 0x0, 0x0, 0x7c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_float = {0x305217c, 0x30111, 0x3157834, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x7fffffffffffffff, 0x0, 0x0, 0x0}, v32_int8 = {0x5f, 0x48, 0x41, 0x4c, 0x59, 0x44, 0x40, 0x48, 0xd, 0x5e, 0x45, 0x4c, 0x5f, 0x48, 0x49, 0x17, 0x0 <repeats 16 times>}, v16_int16 = {0x485f, 0x4c41, 0x4459, 0x4840, 0x5e0d, 0x4c45, 0x485f, 0x1749, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x4c41485f, 0x48404459, 0x4c455e0d, 0x1749485f, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x484044594c41485f, 0x1749485f4c455e0d, 0x0, 0x0}, v2_int128 = {0x1749485f4c455e0d484044594c41485f, 0x0}} >ymm11 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm12 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm13 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm14 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >ymm15 {v16_bfloat16 = {0x0 <repeats 16 times>}, v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}} >bnd0 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 >bnd1 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 >bnd2 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 >bnd3 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 {lbound = 0x0, ubound = 0xffffffffffffffff} : size -1 >Dump of assembler code for function _crypt_load_bitlk.constprop.0: > 0x00007fae86b59b90 <+0>: push %r15 > 0x00007fae86b59b92 <+2>: push %r14 > 0x00007fae86b59b94 <+4>: push %r13 > 0x00007fae86b59b96 <+6>: push %r12 > 0x00007fae86b59b98 <+8>: mov %rdi,%r12 > 0x00007fae86b59b9b <+11>: push %rbp > 0x00007fae86b59b9c <+12>: push %rbx > 0x00007fae86b59b9d <+13>: sub $0x188,%rsp > 0x00007fae86b59ba4 <+20>: mov %fs:0x28,%rax > 0x00007fae86b59bad <+29>: mov %rax,0x178(%rsp) > 0x00007fae86b59bb5 <+37>: xor %eax,%eax > 0x00007fae86b59bb7 <+39>: call 0x7fae86b0d470 <init_crypto> > 0x00007fae86b59bbc <+44>: mov %eax,0x34(%rsp) > 0x00007fae86b59bc0 <+48>: test %eax,%eax > 0x00007fae86b59bc2 <+50>: js 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b59bc8 <+56>: mov 0x10(%r12),%rbx > 0x00007fae86b59bcd <+61>: mov 0x8(%r12),%rsi > 0x00007fae86b59bd2 <+66>: mov $0xe,%ecx > 0x00007fae86b59bd7 <+71>: lea 0x100(%rsp),%r14 > 0x00007fae86b59bdf <+79>: mov %r14,%rdi > 0x00007fae86b59be2 <+82>: pxor %xmm0,%xmm0 > 0x00007fae86b59be6 <+86>: movl $0x0,0xc0(%rsp) > 0x00007fae86b59bf1 <+97>: test %rbx,%rbx > 0x00007fae86b59bf4 <+100>: movb $0x0,0xc4(%rsp) > 0x00007fae86b59bfc <+108>: cmove %rsi,%rbx > 0x00007fae86b59c00 <+112>: xor %eax,%eax > 0x00007fae86b59c02 <+114>: movb $0x0,0x7f(%rsp) > 0x00007fae86b59c07 <+119>: rep stos %rax,%es:(%rdi) > 0x00007fae86b59c0a <+122>: mov 0xe8(%r12),%rax > 0x00007fae86b59c12 <+130>: movaps %xmm0,0xa0(%rsp) > 0x00007fae86b59c1a <+138>: movaps %xmm0,0xb0(%rsp) > 0x00007fae86b59c22 <+146>: mov %rax,0x38(%rsp) >=> 0x00007fae86b59c27 <+151>: mov 0x20(%rsi),%rax > 0x00007fae86b59c2b <+155>: movq $0x0,0x73(%rsp) > 0x00007fae86b59c34 <+164>: movl $0x0,0x7b(%rsp) > 0x00007fae86b59c3c <+172>: movq $0x0,0xf0(%rsp) > 0x00007fae86b59c48 <+184>: movq $0x0,0x90(%rsp) > 0x00007fae86b59c54 <+196>: movl $0x0,0x98(%rsp) > 0x00007fae86b59c5f <+207>: movaps %xmm0,0xd0(%rsp) > 0x00007fae86b59c67 <+215>: movaps %xmm0,0xe0(%rsp) > 0x00007fae86b59c6f <+223>: movaps %xmm0,0x80(%rsp) > 0x00007fae86b59c77 <+231>: test %rax,%rax > 0x00007fae86b59c7a <+234>: je 0x7fae86b59c86 <_crypt_load_bitlk.constprop.0+246> > 0x00007fae86b59c7c <+236>: cmpl $0x1,0x8(%rax) > 0x00007fae86b59c80 <+240>: jbe 0x7fae86b59da5 <_crypt_load_bitlk.constprop.0+533> > 0x00007fae86b59c86 <+246>: xor %edx,%edx > 0x00007fae86b59c88 <+248>: mov %r12,%rdi > 0x00007fae86b59c8b <+251>: call 0x7fae86b275b0 <device_open_internal> > 0x00007fae86b59c90 <+256>: mov %eax,%r13d > 0x00007fae86b59c93 <+259>: test %eax,%eax > 0x00007fae86b59c95 <+261>: js 0x7fae86b59d21 <_crypt_load_bitlk.constprop.0+401> > 0x00007fae86b59c9b <+267>: mov %rbx,%rdi > 0x00007fae86b59c9e <+270>: lea 0x73(%rsp),%rbp > 0x00007fae86b59ca3 <+275>: call 0x7fae86b28660 <device_alignment> > 0x00007fae86b59ca8 <+280>: mov %rbx,%rsi > 0x00007fae86b59cab <+283>: mov %r12,%rdi > 0x00007fae86b59cae <+286>: mov %rax,%r15 > 0x00007fae86b59cb1 <+289>: call 0x7fae86b27e10 <device_block_size> > 0x00007fae86b59cb6 <+294>: xor %r9d,%r9d > 0x00007fae86b59cb9 <+297>: mov %rbp,%rcx > 0x00007fae86b59cbc <+300>: mov %r15,%rdx > 0x00007fae86b59cbf <+303>: mov %rax,%rsi > 0x00007fae86b59cc2 <+306>: mov $0xd,%r8d > 0x00007fae86b59cc8 <+312>: mov %r13d,%edi > 0x00007fae86b59ccb <+315>: call 0x7fae86b599e0 <read_lseek_blockwise> > 0x00007fae86b59cd0 <+320>: cmp $0xd,%rax > 0x00007fae86b59cd4 <+324>: jne 0x7fae86b5aca7 <_crypt_load_bitlk.constprop.0+4375> > 0x00007fae86b59cda <+330>: cmpw $0x52eb,0x73(%rsp) > 0x00007fae86b59ce1 <+337>: je 0x7fae86b59d60 <_crypt_load_bitlk.constprop.0+464> > 0x00007fae86b59ce3 <+339>: cmpw $0x58eb,0x73(%rsp) > 0x00007fae86b59cea <+346>: je 0x7fae86b59dc4 <_crypt_load_bitlk.constprop.0+564> > 0x00007fae86b59cf0 <+352>: mov $0x5,%edx > 0x00007fae86b59cf5 <+357>: lea 0x10414(%rip),%rsi # 0x7fae86b6a110 > 0x00007fae86b59cfc <+364>: xor %edi,%edi > 0x00007fae86b59cfe <+366>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b59d03 <+371>: mov $0x1eb,%ecx > 0x00007fae86b59d08 <+376>: mov %rax,%r8 > 0x00007fae86b59d0b <+379>: lea 0x7ea3(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b59d12 <+386>: mov $0x1,%esi > 0x00007fae86b59d17 <+391>: mov %r12,%rdi > 0x00007fae86b59d1a <+394>: xor %eax,%eax > 0x00007fae86b59d1c <+396>: call 0x7fae86b0d220 <logger> > 0x00007fae86b59d21 <+401>: movl $0xffffffea,0x34(%rsp) > 0x00007fae86b59d29 <+409>: mov 0x178(%rsp),%rax > 0x00007fae86b59d31 <+417>: sub %fs:0x28,%rax > 0x00007fae86b59d3a <+426>: jne 0x7fae86b5adc7 <_crypt_load_bitlk.constprop.0+4663> > 0x00007fae86b59d40 <+432>: mov 0x34(%rsp),%eax > 0x00007fae86b59d44 <+436>: add $0x188,%rsp > 0x00007fae86b59d4b <+443>: pop %rbx > 0x00007fae86b59d4c <+444>: pop %rbp > 0x00007fae86b59d4d <+445>: pop %r12 > 0x00007fae86b59d4f <+447>: pop %r13 > 0x00007fae86b59d51 <+449>: pop %r14 > 0x00007fae86b59d53 <+451>: pop %r15 > 0x00007fae86b59d55 <+453>: ret > 0x00007fae86b59d56 <+454>: nopw %cs:0x0(%rax,%rax,1) > 0x00007fae86b59d60 <+464>: cmpb $0x90,0x2(%rbp) > 0x00007fae86b59d64 <+468>: jne 0x7fae86b59ce3 <_crypt_load_bitlk.constprop.0+339> > 0x00007fae86b59d6a <+474>: mov $0x5,%edx > 0x00007fae86b59d6f <+479>: lea 0x1036a(%rip),%rsi # 0x7fae86b6a0e0 > 0x00007fae86b59d76 <+486>: xor %edi,%edi > 0x00007fae86b59d78 <+488>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b59d7d <+493>: mov $0x1e5,%ecx > 0x00007fae86b59d82 <+498>: mov $0x1,%esi > 0x00007fae86b59d87 <+503>: mov %r12,%rdi > 0x00007fae86b59d8a <+506>: mov %rax,%r8 > 0x00007fae86b59d8d <+509>: lea 0x7e21(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b59d94 <+516>: xor %eax,%eax > 0x00007fae86b59d96 <+518>: call 0x7fae86b0d220 <logger> > 0x00007fae86b59d9b <+523>: movl $0xffffffa1,0x34(%rsp) > 0x00007fae86b59da3 <+531>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b59da5 <+533>: lea 0x634c(%rip),%rcx # 0x7fae86b600f8 <__PRETTY_FUNCTION__.6.lto_priv.0> > 0x00007fae86b59dac <+540>: mov $0x12f,%edx > 0x00007fae86b59db1 <+545>: lea 0x43e7(%rip),%rsi # 0x7fae86b5e19f > 0x00007fae86b59db8 <+552>: lea 0x43f3(%rip),%rdi # 0x7fae86b5e1b2 > 0x00007fae86b59dbf <+559>: call 0x7fae86b0c2e0 <__assert_fail@plt> > 0x00007fae86b59dc4 <+564>: cmpb $0x90,0x75(%rsp) > 0x00007fae86b59dc9 <+569>: jne 0x7fae86b59cf0 <_crypt_load_bitlk.constprop.0+352> > 0x00007fae86b59dcf <+575>: movl $0x0,0x34(%rsp) > 0x00007fae86b59dd7 <+583>: movabs $0x2d53462d4556462d,%rax > 0x00007fae86b59de1 <+593>: cmp %rax,0x76(%rsp) > 0x00007fae86b59de6 <+598>: je 0x7fae86b5a3e8 <_crypt_load_bitlk.constprop.0+2136> > 0x00007fae86b59dec <+604>: movabs $0x312e344e4957534d,%rax > 0x00007fae86b59df6 <+614>: cmp %rax,0x76(%rsp) > 0x00007fae86b59dfb <+619>: jne 0x7fae86b5ad6c <_crypt_load_bitlk.constprop.0+4572> > 0x00007fae86b59e01 <+625>: movb $0x1,0x82(%r12) > 0x00007fae86b59e0a <+634>: mov $0x1a8,%ebp > 0x00007fae86b59e0f <+639>: movzwl 0x7e(%rsp),%r15d > 0x00007fae86b59e15 <+645>: mov %r15w,0x80(%r12) > 0x00007fae86b59e1e <+654>: test %r15w,%r15w > 0x00007fae86b59e22 <+658>: je 0x7fae86b5a8ef <_crypt_load_bitlk.constprop.0+3423> > 0x00007fae86b59e28 <+664>: cmp $0x200,%r15w > 0x00007fae86b59e2e <+670>: je 0x7fae86b59e3c <_crypt_load_bitlk.constprop.0+684> > 0x00007fae86b59e30 <+672>: cmp $0x1000,%r15w > 0x00007fae86b59e36 <+678>: jne 0x7fae86b5ad2a <_crypt_load_bitlk.constprop.0+4506> > 0x00007fae86b59e3c <+684>: mov %rbx,%rdi > 0x00007fae86b59e3f <+687>: call 0x7fae86b28660 <device_alignment> > 0x00007fae86b59e44 <+692>: mov %rbx,%rsi > 0x00007fae86b59e47 <+695>: mov %r12,%rdi > 0x00007fae86b59e4a <+698>: mov %rax,%r15 > 0x00007fae86b59e4d <+701>: call 0x7fae86b27e10 <device_block_size> > 0x00007fae86b59e52 <+706>: mov %ebp,%r9d > 0x00007fae86b59e55 <+709>: mov %r15,%rdx > 0x00007fae86b59e58 <+712>: mov %r13d,%edi > 0x00007fae86b59e5b <+715>: mov %rax,%rsi > 0x00007fae86b59e5e <+718>: lea 0xd0(%rsp),%rcx > 0x00007fae86b59e66 <+726>: mov $0x28,%r8d > 0x00007fae86b59e6c <+732>: call 0x7fae86b599e0 <read_lseek_blockwise> > 0x00007fae86b59e71 <+737>: cmp $0x28,%rax > 0x00007fae86b59e75 <+741>: jne 0x7fae86b5acf5 <_crypt_load_bitlk.constprop.0+4453> > 0x00007fae86b59e7b <+747>: mov 0xd0(%rsp),%rax > 0x00007fae86b59e83 <+755>: mov 0xd8(%rsp),%rdx > 0x00007fae86b59e8b <+763>: mov 0x10a96(%rip),%rsi # 0x7fae86b6a928 <BITLK_GUID_NORMAL+8> > 0x00007fae86b59e92 <+770>: mov 0x10a87(%rip),%rcx # 0x7fae86b6a920 <BITLK_GUID_NORMAL> > 0x00007fae86b59e99 <+777>: xor %rdx,%rsi > 0x00007fae86b59e9c <+780>: xor %rax,%rcx > 0x00007fae86b59e9f <+783>: or %rcx,%rsi > 0x00007fae86b59ea2 <+786>: jne 0x7fae86b5a8c0 <_crypt_load_bitlk.constprop.0+3376> > 0x00007fae86b59ea8 <+792>: movl $0x0,0x84(%r12) > 0x00007fae86b59eb4 <+804>: lea 0x7625(%rip),%r9 # 0x7fae86b614e0 > 0x00007fae86b59ebb <+811>: xor %eax,%eax > 0x00007fae86b59ebd <+813>: mov $0x217,%ecx > 0x00007fae86b59ec2 <+818>: mov $0xffffffff,%esi > 0x00007fae86b59ec7 <+823>: mov %r12,%rdi > 0x00007fae86b59eca <+826>: lea 0x7ce4(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b59ed1 <+833>: lea 0xff0d(%rip),%r8 # 0x7fae86b69de5 > 0x00007fae86b59ed8 <+840>: call 0x7fae86b0d220 <logger> > 0x00007fae86b59edd <+845>: mov 0xe8(%rsp),%rax > 0x00007fae86b59ee5 <+853>: mov 0xe0(%rsp),%rdx > 0x00007fae86b59eed <+861>: mov %rax,0xc0(%r12) > 0x00007fae86b59ef5 <+869>: mov 0xf0(%rsp),%rax > 0x00007fae86b59efd <+877>: mov %rdx,0xb8(%r12) > 0x00007fae86b59f05 <+885>: mov %rax,0xc8(%r12) > 0x00007fae86b59f0d <+893>: test %rbx,%rbx > 0x00007fae86b59f10 <+896>: je 0x7fae86b5aaa3 <_crypt_load_bitlk.constprop.0+3859> > 0x00007fae86b59f16 <+902>: mov 0x8(%rbx),%rax > 0x00007fae86b59f1a <+906>: test %rax,%rax > 0x00007fae86b59f1d <+909>: jne 0x7fae86b59f22 <_crypt_load_bitlk.constprop.0+914> > 0x00007fae86b59f1f <+911>: mov (%rbx),%rax > 0x00007fae86b59f22 <+914>: push %rdx > 0x00007fae86b59f23 <+915>: mov $0x70,%r9d > 0x00007fae86b59f29 <+921>: mov $0x21c,%ecx > 0x00007fae86b59f2e <+926>: mov %r12,%rdi > 0x00007fae86b59f31 <+929>: push %rax > 0x00007fae86b59f32 <+930>: lea 0x105df(%rip),%r8 # 0x7fae86b6a518 > 0x00007fae86b59f39 <+937>: mov $0xffffffff,%esi > 0x00007fae86b59f3e <+942>: xor %eax,%eax > 0x00007fae86b59f40 <+944>: lea 0x7c6e(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b59f47 <+951>: call 0x7fae86b0d220 <logger> > 0x00007fae86b59f4c <+956>: pop %rax > 0x00007fae86b59f4d <+957>: mov %rbx,%rdi > 0x00007fae86b59f50 <+960>: pop %rdx > 0x00007fae86b59f51 <+961>: mov 0xb8(%r12),%rbp > 0x00007fae86b59f59 <+969>: call 0x7fae86b28660 <device_alignment> > 0x00007fae86b59f5e <+974>: mov %rbx,%rsi > 0x00007fae86b59f61 <+977>: mov %r12,%rdi > 0x00007fae86b59f64 <+980>: mov %rax,%r15 > 0x00007fae86b59f67 <+983>: call 0x7fae86b27e10 <device_block_size> > 0x00007fae86b59f6c <+988>: mov %rbp,%r9 > 0x00007fae86b59f6f <+991>: mov %r14,%rcx > 0x00007fae86b59f72 <+994>: mov %r15,%rdx > 0x00007fae86b59f75 <+997>: mov %rax,%rsi > 0x00007fae86b59f78 <+1000>: mov $0x70,%r8d > 0x00007fae86b59f7e <+1006>: mov %r13d,%edi > 0x00007fae86b59f81 <+1009>: call 0x7fae86b599e0 <read_lseek_blockwise> > 0x00007fae86b59f86 <+1014>: cmp $0x70,%rax > 0x00007fae86b59f8a <+1018>: jne 0x7fae86b5ac04 <_crypt_load_bitlk.constprop.0+4212> > 0x00007fae86b59f90 <+1024>: movabs $0x2d53462d4556462d,%rax > 0x00007fae86b59f9a <+1034>: cmp %rax,0x100(%rsp) > 0x00007fae86b59fa2 <+1042>: jne 0x7fae86b5ac04 <_crypt_load_bitlk.constprop.0+4212> > 0x00007fae86b59fa8 <+1048>: cmpw $0x2,0x10a(%rsp) > 0x00007fae86b59fb1 <+1057>: jne 0x7fae86b5ac04 <_crypt_load_bitlk.constprop.0+4212> > 0x00007fae86b59fb7 <+1063>: movzwl 0x10c(%rsp),%r9d > 0x00007fae86b59fc0 <+1072>: movzwl 0x10e(%rsp),%edx > 0x00007fae86b59fc8 <+1080>: movb $0x1,0x83(%r12) > 0x00007fae86b59fd1 <+1089>: cmp $0x4,%r9w > 0x00007fae86b59fd6 <+1094>: jne 0x7fae86b59fe3 <_crypt_load_bitlk.constprop.0+1107> > 0x00007fae86b59fd8 <+1096>: mov $0x2,%eax > 0x00007fae86b59fdd <+1101>: cmp $0x4,%dx > 0x00007fae86b59fe1 <+1105>: je 0x7fae86b5a01d <_crypt_load_bitlk.constprop.0+1165> > 0x00007fae86b59fe3 <+1107>: sub $0x8,%rsp > 0x00007fae86b59fe7 <+1111>: mov $0x22d,%ecx > 0x00007fae86b59fec <+1116>: xor %eax,%eax > 0x00007fae86b59fee <+1118>: mov $0xffffffff,%esi > 0x00007fae86b59ff3 <+1123>: movb $0x0,0x83(%r12) > 0x00007fae86b59ffc <+1132>: lea 0x101f5(%rip),%r8 # 0x7fae86b6a1f8 > 0x00007fae86b5a003 <+1139>: mov %r12,%rdi > 0x00007fae86b5a006 <+1142>: push %rdx > 0x00007fae86b5a007 <+1143>: lea 0x7ba7(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a00e <+1150>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a013 <+1155>: movzwl 0x11a(%rsp),%eax > 0x00007fae86b5a01b <+1163>: pop %rdx > 0x00007fae86b5a01c <+1164>: pop %rcx > 0x00007fae86b5a01d <+1165>: mov %eax,0xd0(%r12) > 0x00007fae86b5a025 <+1173>: movzwl 0x164(%rsp),%eax > 0x00007fae86b5a02d <+1181>: mov 0x140(%rsp),%ebp > 0x00007fae86b5a034 <+1188>: add $0x8000,%ax > 0x00007fae86b5a038 <+1192>: cmp $0x5,%ax > 0x00007fae86b5a03c <+1196>: ja 0x7fae86b5aa41 <_crypt_load_bitlk.constprop.0+3761> > 0x00007fae86b5a042 <+1202>: lea 0x108a7(%rip),%rdx # 0x7fae86b6a8f0 > 0x00007fae86b5a049 <+1209>: movzwl %ax,%eax > 0x00007fae86b5a04c <+1212>: movslq (%rdx,%rax,4),%rax > 0x00007fae86b5a050 <+1216>: add %rdx,%rax > 0x00007fae86b5a053 <+1219>: jmp *%rax > 0x00007fae86b5a055 <+1221>: lea 0xfbce(%rip),%rax # 0x7fae86b69c2a > 0x00007fae86b5a05c <+1228>: mov $0x80,%r15d > 0x00007fae86b5a062 <+1234>: mov %rax,0x88(%r12) > 0x00007fae86b5a06a <+1242>: lea 0x70e0(%rip),%rax # 0x7fae86b61151 > 0x00007fae86b5a071 <+1249>: mov %r15w,0x98(%r12) > 0x00007fae86b5a07a <+1258>: mov %rax,0x90(%r12) > 0x00007fae86b5a082 <+1266>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a088 <+1272>: mov 0x150(%rsp),%eax > 0x00007fae86b5a08f <+1279>: lea 0x150(%rsp),%rdi > 0x00007fae86b5a097 <+1287>: rolw $0x8,0x154(%rsp) > 0x00007fae86b5a0a0 <+1296>: rolw $0x8,0x156(%rsp) > 0x00007fae86b5a0a9 <+1305>: bswap %eax > 0x00007fae86b5a0ab <+1307>: mov %eax,0x150(%rsp) > 0x00007fae86b5a0b2 <+1314>: lea 0xa0(%rsp),%rax > 0x00007fae86b5a0ba <+1322>: mov %rax,%r15 > 0x00007fae86b5a0bd <+1325>: mov %rax,%rsi > 0x00007fae86b5a0c0 <+1328>: mov %rax,0x40(%rsp) > 0x00007fae86b5a0c5 <+1333>: call 0x7fae86b0ce20 <uuid_unparse@plt> > 0x00007fae86b5a0ca <+1338>: mov %r15,%rdi > 0x00007fae86b5a0cd <+1341>: call 0x7fae86b0caa0 <strdup@plt> > 0x00007fae86b5a0d2 <+1346>: mov %rax,0xa0(%r12) > 0x00007fae86b5a0da <+1354>: test %rax,%rax > 0x00007fae86b5a0dd <+1357>: je 0x7fae86b5adba <_crypt_load_bitlk.constprop.0+4650> > 0x00007fae86b5a0e3 <+1363>: movabs $0xfe624e212ac18000,%rdx > 0x00007fae86b5a0ed <+1373>: lea -0x30(%rbp),%r14d > 0x00007fae86b5a0f1 <+1377>: mov $0x1,%esi > 0x00007fae86b5a0f6 <+1382>: add 0x168(%rsp),%rdx > 0x00007fae86b5a0fe <+1390>: movabs $0xd6bf94d5e57a42bd,%rcx > 0x00007fae86b5a108 <+1400>: mov %rdx,%rax > 0x00007fae86b5a10b <+1403>: mov %r14,%rdi > 0x00007fae86b5a10e <+1406>: mov %r14d,0x30(%rsp) > 0x00007fae86b5a113 <+1411>: mul %rcx > 0x00007fae86b5a116 <+1414>: shr $0x17,%rdx > 0x00007fae86b5a11a <+1418>: mov %rdx,0xa8(%r12) > 0x00007fae86b5a122 <+1426>: call 0x7fae86b0cc60 <calloc@plt> > 0x00007fae86b5a127 <+1431>: mov %rax,%rbp > 0x00007fae86b5a12a <+1434>: test %rax,%rax > 0x00007fae86b5a12d <+1437>: je 0x7fae86b5adba <_crypt_load_bitlk.constprop.0+4650> > 0x00007fae86b5a133 <+1443>: mov 0xb8(%r12),%rax > 0x00007fae86b5a13b <+1451>: add $0x70,%rax > 0x00007fae86b5a13f <+1455>: test %rbx,%rbx > 0x00007fae86b5a142 <+1458>: je 0x7fae86b5ab40 <_crypt_load_bitlk.constprop.0+4016> > 0x00007fae86b5a148 <+1464>: mov 0x8(%rbx),%rdx > 0x00007fae86b5a14c <+1468>: test %rdx,%rdx > 0x00007fae86b5a14f <+1471>: jne 0x7fae86b5a154 <_crypt_load_bitlk.constprop.0+1476> > 0x00007fae86b5a151 <+1473>: mov (%rbx),%rdx > 0x00007fae86b5a154 <+1476>: push %rax > 0x00007fae86b5a155 <+1477>: mov $0x271,%ecx > 0x00007fae86b5a15a <+1482>: mov $0xffffffff,%esi > 0x00007fae86b5a15f <+1487>: xor %eax,%eax > 0x00007fae86b5a161 <+1489>: push %rdx > 0x00007fae86b5a162 <+1490>: mov 0x40(%rsp),%r9d > 0x00007fae86b5a167 <+1495>: lea 0x7a47(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a16e <+1502>: mov %r12,%rdi > 0x00007fae86b5a171 <+1505>: lea 0x100f0(%rip),%r8 # 0x7fae86b6a268 > 0x00007fae86b5a178 <+1512>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a17d <+1517>: mov 0xb8(%r12),%rax > 0x00007fae86b5a185 <+1525>: lea 0x70(%rax),%r9 > 0x00007fae86b5a189 <+1529>: mov %r9,0x18(%rsp) > 0x00007fae86b5a18e <+1534>: pop %rdi > 0x00007fae86b5a18f <+1535>: mov %rbx,%rdi > 0x00007fae86b5a192 <+1538>: pop %r8 > 0x00007fae86b5a194 <+1540>: call 0x7fae86b28660 <device_alignment> > 0x00007fae86b5a199 <+1545>: mov %rbx,%rsi > 0x00007fae86b5a19c <+1548>: mov %r12,%rdi > 0x00007fae86b5a19f <+1551>: mov %rax,%r15 > 0x00007fae86b5a1a2 <+1554>: call 0x7fae86b27e10 <device_block_size> > 0x00007fae86b5a1a7 <+1559>: mov 0x8(%rsp),%r9 > 0x00007fae86b5a1ac <+1564>: mov %r14,%r8 > 0x00007fae86b5a1af <+1567>: mov %rbp,%rcx > 0x00007fae86b5a1b2 <+1570>: mov %rax,%rsi > 0x00007fae86b5a1b5 <+1573>: mov %r15,%rdx > 0x00007fae86b5a1b8 <+1576>: mov %r13d,%edi > 0x00007fae86b5a1bb <+1579>: call 0x7fae86b599e0 <read_lseek_blockwise> > 0x00007fae86b5a1c0 <+1584>: cmp %rax,%r14 > 0x00007fae86b5a1c3 <+1587>: jne 0x7fae86b5a98a <_crypt_load_bitlk.constprop.0+3578> > 0x00007fae86b5a1c9 <+1593>: cmpl $0x2,0x30(%rsp) > 0x00007fae86b5a1ce <+1598>: jle 0x7fae86b5a286 <_crypt_load_bitlk.constprop.0+1782> > 0x00007fae86b5a1d4 <+1604>: lea 0xb0(%r12),%rax > 0x00007fae86b5a1dc <+1612>: mov %rbp,%r15 > 0x00007fae86b5a1df <+1615>: xor %ebx,%ebx > 0x00007fae86b5a1e1 <+1617>: mov %r12,%rbp > 0x00007fae86b5a1e4 <+1620>: mov %rax,0x58(%rsp) > 0x00007fae86b5a1e9 <+1625>: lea 0x80(%rsp),%rax > 0x00007fae86b5a1f1 <+1633>: mov %rax,0x50(%rsp) > 0x00007fae86b5a1f6 <+1638>: lea 0x68(%rsp),%rax > 0x00007fae86b5a1fb <+1643>: movq $0x0,0x10(%rsp) > 0x00007fae86b5a204 <+1652>: mov %rax,0x48(%rsp) > 0x00007fae86b5a209 <+1657>: jmp 0x7fae86b5a228 <_crypt_load_bitlk.constprop.0+1688> > 0x00007fae86b5a20b <+1659>: nopl 0x0(%rax,%rax,1) > 0x00007fae86b5a210 <+1664>: cmp $0x7,%ax > 0x00007fae86b5a214 <+1668>: je 0x7fae86b5a810 <_crypt_load_bitlk.constprop.0+3200> > 0x00007fae86b5a21a <+1674>: add %r14d,%ebx > 0x00007fae86b5a21d <+1677>: mov 0x30(%rsp),%eax > 0x00007fae86b5a221 <+1681>: sub %ebx,%eax > 0x00007fae86b5a223 <+1683>: cmp $0x2,%eax > 0x00007fae86b5a226 <+1686>: jle 0x7fae86b5a280 <_crypt_load_bitlk.constprop.0+1776> > 0x00007fae86b5a228 <+1688>: movslq %ebx,%r12 > 0x00007fae86b5a22b <+1691>: movzwl (%r15,%r12,1),%r14d > 0x00007fae86b5a230 <+1696>: test %r14w,%r14w > 0x00007fae86b5a234 <+1700>: je 0x7fae86b5a280 <_crypt_load_bitlk.constprop.0+1776> > 0x00007fae86b5a236 <+1702>: movzwl 0x2(%r15,%r12,1),%eax > 0x00007fae86b5a23c <+1708>: cmp $0x2,%ax > 0x00007fae86b5a240 <+1712>: je 0x7fae86b5a400 <_crypt_load_bitlk.constprop.0+2160> > 0x00007fae86b5a246 <+1718>: cmp $0x3,%ax > 0x00007fae86b5a24a <+1722>: je 0x7fae86b5a798 <_crypt_load_bitlk.constprop.0+3080> > 0x00007fae86b5a250 <+1728>: cmp $0xf,%ax > 0x00007fae86b5a254 <+1732>: jne 0x7fae86b5a210 <_crypt_load_bitlk.constprop.0+1664> > 0x00007fae86b5a256 <+1734>: mov 0x10(%r15,%r12,1),%rax > 0x00007fae86b5a25b <+1739>: mov 0x8(%r15,%r12,1),%rdx > 0x00007fae86b5a260 <+1744>: add %r14d,%ebx > 0x00007fae86b5a263 <+1747>: mov %rax,0xe0(%rbp) > 0x00007fae86b5a26a <+1754>: mov 0x30(%rsp),%eax > 0x00007fae86b5a26e <+1758>: mov %rdx,0xd8(%rbp) > 0x00007fae86b5a275 <+1765>: sub %ebx,%eax > 0x00007fae86b5a277 <+1767>: cmp $0x2,%eax > 0x00007fae86b5a27a <+1770>: jg 0x7fae86b5a228 <_crypt_load_bitlk.constprop.0+1688> > 0x00007fae86b5a27c <+1772>: nopl 0x0(%rax) > 0x00007fae86b5a280 <+1776>: mov %rbp,%r12 > 0x00007fae86b5a283 <+1779>: mov %r15,%rbp > 0x00007fae86b5a286 <+1782>: mov %rbp,%rdi > 0x00007fae86b5a289 <+1785>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5a28e <+1790>: mov 0x88(%r12),%rcx > 0x00007fae86b5a296 <+1798>: xor %eax,%eax > 0x00007fae86b5a298 <+1800>: mov 0x90(%r12),%r8 > 0x00007fae86b5a2a0 <+1808>: lea 0xf8(%r12),%rdi > 0x00007fae86b5a2a8 <+1816>: lea 0x851d(%rip),%rdx # 0x7fae86b627cc > 0x00007fae86b5a2af <+1823>: mov $0x1,%esi > 0x00007fae86b5a2b4 <+1828>: call 0x7fae86b0c5f0 <__asprintf_chk@plt> > 0x00007fae86b5a2b9 <+1833>: test %eax,%eax > 0x00007fae86b5a2bb <+1835>: js 0x7fae86b5ad8c <_crypt_load_bitlk.constprop.0+4604> > 0x00007fae86b5a2c1 <+1841>: cmpq $0x0,(%r12) > 0x00007fae86b5a2c6 <+1846>: jne 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5a2cc <+1852>: lea 0x3e64(%rip),%rdi # 0x7fae86b5e137 > 0x00007fae86b5a2d3 <+1859>: call 0x7fae86b0caa0 <strdup@plt> > 0x00007fae86b5a2d8 <+1864>: test %rax,%rax > 0x00007fae86b5a2db <+1867>: mov %rax,(%r12) > 0x00007fae86b5a2df <+1871>: mov $0xfffffff4,%eax > 0x00007fae86b5a2e4 <+1876>: cmovne 0x34(%rsp),%eax > 0x00007fae86b5a2e9 <+1881>: mov %eax,0x34(%rsp) > 0x00007fae86b5a2ed <+1885>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5a2f2 <+1890>: mov $0x80,%eax > 0x00007fae86b5a2f7 <+1895>: mov %ax,0x98(%r12) > 0x00007fae86b5a300 <+1904>: lea 0xf923(%rip),%rax # 0x7fae86b69c2a > 0x00007fae86b5a307 <+1911>: mov %rax,0x88(%r12) > 0x00007fae86b5a30f <+1919>: lea 0xf8b5(%rip),%rax # 0x7fae86b69bcb > 0x00007fae86b5a316 <+1926>: mov %rax,0x90(%r12) > 0x00007fae86b5a31e <+1934>: jmp 0x7fae86b5a088 <_crypt_load_bitlk.constprop.0+1272> > 0x00007fae86b5a323 <+1939>: mov $0x100,%eax > 0x00007fae86b5a328 <+1944>: mov %ax,0x98(%r12) > 0x00007fae86b5a331 <+1953>: lea 0xf8f2(%rip),%rax # 0x7fae86b69c2a > 0x00007fae86b5a338 <+1960>: mov %rax,0x88(%r12) > 0x00007fae86b5a340 <+1968>: lea 0xf88e(%rip),%rax # 0x7fae86b69bd5 > 0x00007fae86b5a347 <+1975>: mov %rax,0x90(%r12) > 0x00007fae86b5a34f <+1983>: jmp 0x7fae86b5a088 <_crypt_load_bitlk.constprop.0+1272> > 0x00007fae86b5a354 <+1988>: mov $0x100,%eax > 0x00007fae86b5a359 <+1993>: mov %ax,0x98(%r12) > 0x00007fae86b5a362 <+2002>: lea 0xf8c1(%rip),%rax # 0x7fae86b69c2a > 0x00007fae86b5a369 <+2009>: mov %rax,0x88(%r12) > 0x00007fae86b5a371 <+2017>: lea 0xf853(%rip),%rax # 0x7fae86b69bcb > 0x00007fae86b5a378 <+2024>: mov %rax,0x90(%r12) > 0x00007fae86b5a380 <+2032>: jmp 0x7fae86b5a088 <_crypt_load_bitlk.constprop.0+1272> > 0x00007fae86b5a385 <+2037>: mov $0x80,%eax > 0x00007fae86b5a38a <+2042>: mov %ax,0x98(%r12) > 0x00007fae86b5a393 <+2051>: lea 0xf890(%rip),%rax # 0x7fae86b69c2a > 0x00007fae86b5a39a <+2058>: mov %rax,0x88(%r12) > 0x00007fae86b5a3a2 <+2066>: lea 0xf82c(%rip),%rax # 0x7fae86b69bd5 > 0x00007fae86b5a3a9 <+2073>: mov %rax,0x90(%r12) > 0x00007fae86b5a3b1 <+2081>: jmp 0x7fae86b5a088 <_crypt_load_bitlk.constprop.0+1272> > 0x00007fae86b5a3b6 <+2086>: lea 0xf86d(%rip),%rax # 0x7fae86b69c2a > 0x00007fae86b5a3bd <+2093>: mov $0x100,%r14d > 0x00007fae86b5a3c3 <+2099>: mov %rax,0x88(%r12) > 0x00007fae86b5a3cb <+2107>: lea 0x6d7f(%rip),%rax # 0x7fae86b61151 > 0x00007fae86b5a3d2 <+2114>: mov %r14w,0x98(%r12) > 0x00007fae86b5a3db <+2123>: mov %rax,0x90(%r12) > 0x00007fae86b5a3e3 <+2131>: jmp 0x7fae86b5a088 <_crypt_load_bitlk.constprop.0+1272> > 0x00007fae86b5a3e8 <+2136>: movb $0x0,0x82(%r12) > 0x00007fae86b5a3f1 <+2145>: mov $0xa0,%ebp > 0x00007fae86b5a3f6 <+2150>: jmp 0x7fae86b59e0f <_crypt_load_bitlk.constprop.0+639> > 0x00007fae86b5a3fb <+2155>: nopl 0x0(%rax,%rax,1) > 0x00007fae86b5a400 <+2160>: mov 0x18(%r15,%r12,1),%rax > 0x00007fae86b5a405 <+2165>: mov $0x1,%esi > 0x00007fae86b5a40a <+2170>: mov $0x50,%edi > 0x00007fae86b5a40f <+2175>: movdqu 0x8(%r15,%r12,1),%xmm4 > 0x00007fae86b5a416 <+2182>: mov %rax,0x90(%rsp) > 0x00007fae86b5a41e <+2190>: mov 0x20(%r15,%r12,1),%eax > 0x00007fae86b5a423 <+2195>: movaps %xmm4,0x80(%rsp) > 0x00007fae86b5a42b <+2203>: mov %eax,0x98(%rsp) > 0x00007fae86b5a432 <+2210>: call 0x7fae86b0cc60 <calloc@plt> > 0x00007fae86b5a437 <+2215>: mov 0x40(%rsp),%r13 > 0x00007fae86b5a43c <+2220>: mov 0x50(%rsp),%rdi > 0x00007fae86b5a441 <+2225>: rolw $0x8,0x84(%rsp) > 0x00007fae86b5a44a <+2234>: rolw $0x8,0x86(%rsp) > 0x00007fae86b5a453 <+2243>: mov %rax,%r12 > 0x00007fae86b5a456 <+2246>: mov 0x80(%rsp),%eax > 0x00007fae86b5a45d <+2253>: mov %r13,%rsi > 0x00007fae86b5a460 <+2256>: bswap %eax > 0x00007fae86b5a462 <+2258>: mov %eax,0x80(%rsp) > 0x00007fae86b5a469 <+2265>: call 0x7fae86b0ce20 <uuid_unparse@plt> > 0x00007fae86b5a46e <+2270>: mov %r13,%rdi > 0x00007fae86b5a471 <+2273>: call 0x7fae86b0caa0 <strdup@plt> > 0x00007fae86b5a476 <+2278>: movzwl 0x9a(%rsp),%edx > 0x00007fae86b5a47e <+2286>: movq $0x0,0x8(%r12) > 0x00007fae86b5a487 <+2295>: mov %rax,(%r12) > 0x00007fae86b5a48b <+2299>: cmp $0x500,%dx > 0x00007fae86b5a490 <+2304>: je 0x7fae86b5a9f7 <_crypt_load_bitlk.constprop.0+3687> > 0x00007fae86b5a496 <+2310>: ja 0x7fae86b5a750 <_crypt_load_bitlk.constprop.0+3008> > 0x00007fae86b5a49c <+2316>: cmp $0x100,%dx > 0x00007fae86b5a4a1 <+2321>: je 0x7fae86b5a8a8 <_crypt_load_bitlk.constprop.0+3352> > 0x00007fae86b5a4a7 <+2327>: movl $0xfffffffe,0x10(%rsp) > 0x00007fae86b5a4af <+2335>: mov $0x2,%eax > 0x00007fae86b5a4b4 <+2340>: cmp $0x200,%dx > 0x00007fae86b5a4b9 <+2345>: je 0x7fae86b5a4d6 <_crypt_load_bitlk.constprop.0+2374> > 0x00007fae86b5a4bb <+2347>: cmp $0x1,%dx > 0x00007fae86b5a4bf <+2351>: sbb %eax,%eax > 0x00007fae86b5a4c1 <+2353>: and $0xfffffff9,%eax > 0x00007fae86b5a4c4 <+2356>: add $0x3,%eax > 0x00007fae86b5a4c7 <+2359>: cmp $0x1,%dx > 0x00007fae86b5a4cb <+2363>: mov %eax,0x10(%rsp) > 0x00007fae86b5a4cf <+2367>: sbb %eax,%eax > 0x00007fae86b5a4d1 <+2369>: not %eax > 0x00007fae86b5a4d3 <+2371>: and $0x7,%eax > 0x00007fae86b5a4d6 <+2374>: mov %eax,0x10(%r12) > 0x00007fae86b5a4db <+2379>: lea (%r14,%rbx,1),%eax > 0x00007fae86b5a4df <+2383>: add $0x24,%ebx > 0x00007fae86b5a4e2 <+2386>: mov %eax,0x8(%rsp) > 0x00007fae86b5a4e6 <+2390>: movq $0x0,0x68(%rsp) > 0x00007fae86b5a4ef <+2399>: cmp $0x26,%r14d > 0x00007fae86b5a4f3 <+2403>: jle 0x7fae86b5a608 <_crypt_load_bitlk.constprop.0+2680> > 0x00007fae86b5a4f9 <+2409>: mov %r12,0x18(%rsp) > 0x00007fae86b5a4fe <+2414>: mov %r15,%r12 > 0x00007fae86b5a501 <+2417>: mov %ebx,%r15d > 0x00007fae86b5a504 <+2420>: jmp 0x7fae86b5a57c <_crypt_load_bitlk.constprop.0+2540> > 0x00007fae86b5a506 <+2422>: nopw %cs:0x0(%rax,%rax,1) > 0x00007fae86b5a510 <+2432>: cmp $0x5,%r13w > 0x00007fae86b5a515 <+2437>: je 0x7fae86b5a640 <_crypt_load_bitlk.constprop.0+2736> > 0x00007fae86b5a51b <+2443>: cmp $0x1,%r13w > 0x00007fae86b5a520 <+2448>: je 0x7fae86b5a6a8 <_crypt_load_bitlk.constprop.0+2840> > 0x00007fae86b5a526 <+2454>: cmp $0x15,%r13w > 0x00007fae86b5a52b <+2459>: je 0x7fae86b5a569 <_crypt_load_bitlk.constprop.0+2521> > 0x00007fae86b5a52d <+2461>: cmp $0x2,%r13w > 0x00007fae86b5a532 <+2466>: je 0x7fae86b5a6d0 <_crypt_load_bitlk.constprop.0+2880> > 0x00007fae86b5a538 <+2472>: cmpl $0x1,0x10(%rsp) > 0x00007fae86b5a53d <+2477>: movzwl %r13w,%r9d > 0x00007fae86b5a541 <+2481>: jbe 0x7fae86b5aa09 <_crypt_load_bitlk.constprop.0+3705> > 0x00007fae86b5a547 <+2487>: mov $0x192,%ecx > 0x00007fae86b5a54c <+2492>: mov $0xffffffff,%esi > 0x00007fae86b5a551 <+2497>: mov %rbp,%rdi > 0x00007fae86b5a554 <+2500>: xor %eax,%eax > 0x00007fae86b5a556 <+2502>: lea 0xff3b(%rip),%r8 # 0x7fae86b6a498 > 0x00007fae86b5a55d <+2509>: lea 0x7651(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a564 <+2516>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a569 <+2521>: mov 0x8(%rsp),%eax > 0x00007fae86b5a56d <+2525>: add %ebx,%r15d > 0x00007fae86b5a570 <+2528>: sub %r15d,%eax > 0x00007fae86b5a573 <+2531>: cmp $0x2,%eax > 0x00007fae86b5a576 <+2534>: jle 0x7fae86b5a600 <_crypt_load_bitlk.constprop.0+2672> > 0x00007fae86b5a57c <+2540>: movslq %r15d,%r14 > 0x00007fae86b5a57f <+2543>: movzwl (%r12,%r14,1),%ebx > 0x00007fae86b5a584 <+2548>: test %bx,%bx > 0x00007fae86b5a587 <+2551>: je 0x7fae86b5a600 <_crypt_load_bitlk.constprop.0+2672> > 0x00007fae86b5a589 <+2553>: movzwl 0x2(%r12,%r14,1),%r9d > 0x00007fae86b5a58f <+2559>: movzwl 0x4(%r12,%r14,1),%r13d > 0x00007fae86b5a595 <+2565>: test %r9w,%r9w > 0x00007fae86b5a599 <+2569>: je 0x7fae86b5a5c8 <_crypt_load_bitlk.constprop.0+2616> > 0x00007fae86b5a59b <+2571>: cmpl $0x1,0x10(%rsp) > 0x00007fae86b5a5a0 <+2576>: jbe 0x7fae86b5a924 <_crypt_load_bitlk.constprop.0+3476> > 0x00007fae86b5a5a6 <+2582>: mov $0x150,%ecx > 0x00007fae86b5a5ab <+2587>: mov $0xffffffff,%esi > 0x00007fae86b5a5b0 <+2592>: mov %rbp,%rdi > 0x00007fae86b5a5b3 <+2595>: xor %eax,%eax > 0x00007fae86b5a5b5 <+2597>: lea 0xfd4c(%rip),%r8 # 0x7fae86b6a308 > 0x00007fae86b5a5bc <+2604>: lea 0x75f2(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a5c3 <+2611>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a5c8 <+2616>: cmp $0x3,%r13w > 0x00007fae86b5a5cd <+2621>: jne 0x7fae86b5a510 <_crypt_load_bitlk.constprop.0+2432> > 0x00007fae86b5a5d3 <+2627>: movdqu 0xc(%r12,%r14,1),%xmm1 > 0x00007fae86b5a5da <+2634>: mov 0x18(%rsp),%rax > 0x00007fae86b5a5df <+2639>: add %ebx,%r15d > 0x00007fae86b5a5e2 <+2642>: movups %xmm1,0x14(%rax) > 0x00007fae86b5a5e6 <+2646>: mov 0x8(%rsp),%eax > 0x00007fae86b5a5ea <+2650>: movaps %xmm1,0x20(%rsp) > 0x00007fae86b5a5ef <+2655>: sub %r15d,%eax > 0x00007fae86b5a5f2 <+2658>: cmp $0x2,%eax > 0x00007fae86b5a5f5 <+2661>: jg 0x7fae86b5a57c <_crypt_load_bitlk.constprop.0+2540> > 0x00007fae86b5a5f7 <+2663>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a600 <+2672>: mov %r12,%r15 > 0x00007fae86b5a603 <+2675>: mov 0x18(%rsp),%r12 > 0x00007fae86b5a608 <+2680>: cmpq $0x0,0xe8(%rbp) > 0x00007fae86b5a610 <+2688>: je 0x7fae86b5a880 <_crypt_load_bitlk.constprop.0+3312> > 0x00007fae86b5a616 <+2694>: mov 0x38(%rsp),%rax > 0x00007fae86b5a61b <+2699>: mov %r12,0x48(%rax) > 0x00007fae86b5a61f <+2703>: mov 0x48(%r12),%rax > 0x00007fae86b5a624 <+2708>: mov 0x8(%rsp),%ebx > 0x00007fae86b5a628 <+2712>: mov %r12,0x38(%rsp) > 0x00007fae86b5a62d <+2717>: mov %rax,0x10(%rsp) > 0x00007fae86b5a632 <+2722>: jmp 0x7fae86b5a21d <_crypt_load_bitlk.constprop.0+1677> > 0x00007fae86b5a637 <+2727>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a640 <+2736>: lea 0x8(%r12,%r14,1),%rax > 0x00007fae86b5a645 <+2741>: mov 0x18(%rsp),%r13 > 0x00007fae86b5a64a <+2746>: movdqu 0x14(%r12,%r14,1),%xmm3 > 0x00007fae86b5a651 <+2753>: lea -0x24(%rbx),%edi > 0x00007fae86b5a654 <+2756>: mov (%rax),%rdx > 0x00007fae86b5a657 <+2759>: mov 0x8(%rax),%eax > 0x00007fae86b5a65a <+2762>: lea 0x24(%r12,%r14,1),%rsi > 0x00007fae86b5a65f <+2767>: movslq %edi,%rdi > 0x00007fae86b5a662 <+2770>: movups %xmm3,0x24(%r13) > 0x00007fae86b5a667 <+2775>: mov %rdx,0x34(%r13) > 0x00007fae86b5a66b <+2779>: mov %eax,0x3c(%r13) > 0x00007fae86b5a66f <+2783>: call 0x7fae86b2c9e0 <crypt_alloc_volume_key> > 0x00007fae86b5a674 <+2788>: mov %rax,%rcx > 0x00007fae86b5a677 <+2791>: test %rax,%rax > 0x00007fae86b5a67a <+2794>: je 0x7fae86b5ada5 <_crypt_load_bitlk.constprop.0+4629> > 0x00007fae86b5a680 <+2800>: mov 0x40(%r13),%rax > 0x00007fae86b5a684 <+2804>: test %rax,%rax > 0x00007fae86b5a687 <+2807>: je 0x7fae86b5a850 <_crypt_load_bitlk.constprop.0+3264> > 0x00007fae86b5a68d <+2813>: nopl (%rax) > 0x00007fae86b5a690 <+2816>: mov %rax,%rdx > 0x00007fae86b5a693 <+2819>: mov 0x18(%rax),%rax > 0x00007fae86b5a697 <+2823>: test %rax,%rax > 0x00007fae86b5a69a <+2826>: jne 0x7fae86b5a690 <_crypt_load_bitlk.constprop.0+2816> > 0x00007fae86b5a69c <+2828>: mov %rcx,0x18(%rdx) > 0x00007fae86b5a6a0 <+2832>: jmp 0x7fae86b5a569 <_crypt_load_bitlk.constprop.0+2521> > 0x00007fae86b5a6a5 <+2837>: nopl (%rax) > 0x00007fae86b5a6a8 <+2840>: mov $0x176,%ecx > 0x00007fae86b5a6ad <+2845>: mov $0xffffffff,%esi > 0x00007fae86b5a6b2 <+2850>: mov %rbp,%rdi > 0x00007fae86b5a6b5 <+2853>: xor %eax,%eax > 0x00007fae86b5a6b7 <+2855>: lea 0xfc92(%rip),%r8 # 0x7fae86b6a350 > 0x00007fae86b5a6be <+2862>: lea 0x74f0(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a6c5 <+2869>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a6ca <+2874>: jmp 0x7fae86b5a569 <_crypt_load_bitlk.constprop.0+2521> > 0x00007fae86b5a6cf <+2879>: nop > 0x00007fae86b5a6d0 <+2880>: lea -0x8(%rbx),%edx > 0x00007fae86b5a6d3 <+2883>: mov 0x48(%rsp),%rcx > 0x00007fae86b5a6d8 <+2888>: lea 0x8(%r12,%r14,1),%rsi > 0x00007fae86b5a6dd <+2893>: mov %rbp,%rdi > 0x00007fae86b5a6e0 <+2896>: movslq %edx,%rdx > 0x00007fae86b5a6e3 <+2899>: call 0x7fae86b4de30 <convert_to_utf8> > 0x00007fae86b5a6e8 <+2904>: test %eax,%eax > 0x00007fae86b5a6ea <+2906>: js 0x7fae86b5abb6 <_crypt_load_bitlk.constprop.0+4134> > 0x00007fae86b5a6f0 <+2912>: mov 0x18(%rsp),%rax > 0x00007fae86b5a6f5 <+2917>: mov 0x68(%rsp),%r9 > 0x00007fae86b5a6fa <+2922>: cmpq $0x0,0x8(%rax) > 0x00007fae86b5a6ff <+2927>: je 0x7fae86b5a860 <_crypt_load_bitlk.constprop.0+3280> > 0x00007fae86b5a705 <+2933>: cmpl $0x1,0x10(%rsp) > 0x00007fae86b5a70a <+2938>: jbe 0x7fae86b5ac51 <_crypt_load_bitlk.constprop.0+4289> > 0x00007fae86b5a710 <+2944>: mov $0x185,%ecx > 0x00007fae86b5a715 <+2949>: mov $0xffffffff,%esi > 0x00007fae86b5a71a <+2954>: mov %rbp,%rdi > 0x00007fae86b5a71d <+2957>: xor %eax,%eax > 0x00007fae86b5a71f <+2959>: lea 0xfcda(%rip),%r8 # 0x7fae86b6a400 > 0x00007fae86b5a726 <+2966>: lea 0x7488(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a72d <+2973>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a732 <+2978>: mov 0x68(%rsp),%rdi > 0x00007fae86b5a737 <+2983>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5a73c <+2988>: movq $0x0,0x68(%rsp) > 0x00007fae86b5a745 <+2997>: jmp 0x7fae86b5a569 <_crypt_load_bitlk.constprop.0+2521> > 0x00007fae86b5a74a <+3002>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a750 <+3008>: cmp $0x1000,%dx > 0x00007fae86b5a755 <+3013>: je 0x7fae86b5a890 <_crypt_load_bitlk.constprop.0+3328> > 0x00007fae86b5a75b <+3019>: movl $0x1,0x10(%rsp) > 0x00007fae86b5a763 <+3027>: mov $0x5,%eax > 0x00007fae86b5a768 <+3032>: cmp $0x2000,%dx > 0x00007fae86b5a76d <+3037>: je 0x7fae86b5a4d6 <_crypt_load_bitlk.constprop.0+2374> > 0x00007fae86b5a773 <+3043>: xor %eax,%eax > 0x00007fae86b5a775 <+3045>: cmp $0x800,%dx > 0x00007fae86b5a77a <+3050>: setne %al > 0x00007fae86b5a77d <+3053>: lea (%rax,%rax,2),%eax > 0x00007fae86b5a780 <+3056>: mov %eax,0x10(%rsp) > 0x00007fae86b5a784 <+3060>: setne %al > 0x00007fae86b5a787 <+3063>: movzbl %al,%eax > 0x00007fae86b5a78a <+3066>: lea 0x4(%rax,%rax,2),%eax > 0x00007fae86b5a78e <+3070>: jmp 0x7fae86b5a4d6 <_crypt_load_bitlk.constprop.0+2374> > 0x00007fae86b5a793 <+3075>: nopl 0x0(%rax,%rax,1) > 0x00007fae86b5a798 <+3080>: mov $0x28,%edi > 0x00007fae86b5a79d <+3085>: call 0x7fae86b0c390 <malloc@plt> > 0x00007fae86b5a7a2 <+3090>: movdqu 0x14(%r15,%r12,1),%xmm5 > 0x00007fae86b5a7a9 <+3097>: lea -0x24(%r14),%edi > 0x00007fae86b5a7ad <+3101>: lea 0x24(%r15,%r12,1),%rsi > 0x00007fae86b5a7b2 <+3106>: mov %rax,%r13 > 0x00007fae86b5a7b5 <+3109>: mov %rax,0xf0(%rbp) > 0x00007fae86b5a7bc <+3116>: lea 0x8(%r15,%r12,1),%rax > 0x00007fae86b5a7c1 <+3121>: movslq %edi,%rdi > 0x00007fae86b5a7c4 <+3124>: mov (%rax),%rdx > 0x00007fae86b5a7c7 <+3127>: mov 0x8(%rax),%eax > 0x00007fae86b5a7ca <+3130>: movups %xmm5,0x0(%r13) > 0x00007fae86b5a7cf <+3135>: mov %rdx,0x10(%r13) > 0x00007fae86b5a7d3 <+3139>: mov %eax,0x18(%r13) > 0x00007fae86b5a7d7 <+3143>: call 0x7fae86b2c9e0 <crypt_alloc_volume_key> > 0x00007fae86b5a7dc <+3148>: mov %rax,0x20(%r13) > 0x00007fae86b5a7e0 <+3152>: mov 0xf0(%rbp),%rax > 0x00007fae86b5a7e7 <+3159>: cmpq $0x0,0x20(%rax) > 0x00007fae86b5a7ec <+3164>: jne 0x7fae86b5a21a <_crypt_load_bitlk.constprop.0+1674> > 0x00007fae86b5a7f2 <+3170>: movl $0xfffffff4,0x34(%rsp) > 0x00007fae86b5a7fa <+3178>: mov %r15,%rbp > 0x00007fae86b5a7fd <+3181>: mov %rbp,%rdi > 0x00007fae86b5a800 <+3184>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5a805 <+3189>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5a80a <+3194>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a810 <+3200>: lea -0x8(%r14),%edx > 0x00007fae86b5a814 <+3204>: mov 0x58(%rsp),%rcx > 0x00007fae86b5a819 <+3209>: lea 0x8(%r15,%r12,1),%rsi > 0x00007fae86b5a81e <+3214>: mov %rbp,%rdi > 0x00007fae86b5a821 <+3217>: movslq %edx,%rdx > 0x00007fae86b5a824 <+3220>: call 0x7fae86b4de30 <convert_to_utf8> > 0x00007fae86b5a829 <+3225>: test %eax,%eax > 0x00007fae86b5a82b <+3227>: jns 0x7fae86b5a21a <_crypt_load_bitlk.constprop.0+1674> > 0x00007fae86b5a831 <+3233>: mov 0x10(%rsp),%rdi > 0x00007fae86b5a836 <+3238>: mov %eax,0x8(%rsp) > 0x00007fae86b5a83a <+3242>: mov %r15,%rbp > 0x00007fae86b5a83d <+3245>: call 0x7fae86b53720 <BITLK_bitlk_vmk_free> > 0x00007fae86b5a842 <+3250>: mov 0x8(%rsp),%eax > 0x00007fae86b5a846 <+3254>: mov %eax,0x34(%rsp) > 0x00007fae86b5a84a <+3258>: jmp 0x7fae86b5a7fd <_crypt_load_bitlk.constprop.0+3181> > 0x00007fae86b5a84c <+3260>: nopl 0x0(%rax) > 0x00007fae86b5a850 <+3264>: mov 0x18(%rsp),%rax > 0x00007fae86b5a855 <+3269>: mov %rcx,0x40(%rax) > 0x00007fae86b5a859 <+3273>: jmp 0x7fae86b5a569 <_crypt_load_bitlk.constprop.0+2521> > 0x00007fae86b5a85e <+3278>: xchg %ax,%ax > 0x00007fae86b5a860 <+3280>: movq $0x0,0x68(%rsp) > 0x00007fae86b5a869 <+3289>: mov 0x18(%rsp),%rax > 0x00007fae86b5a86e <+3294>: mov %r9,0x8(%rax) > 0x00007fae86b5a872 <+3298>: jmp 0x7fae86b5a569 <_crypt_load_bitlk.constprop.0+2521> > 0x00007fae86b5a877 <+3303>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a880 <+3312>: mov %r12,0xe8(%rbp) > 0x00007fae86b5a887 <+3319>: jmp 0x7fae86b5a61f <_crypt_load_bitlk.constprop.0+2703> > 0x00007fae86b5a88c <+3324>: nopl 0x0(%rax) > 0x00007fae86b5a890 <+3328>: movl $0x2,0x10(%rsp) > 0x00007fae86b5a898 <+3336>: mov $0x6,%eax > 0x00007fae86b5a89d <+3341>: jmp 0x7fae86b5a4d6 <_crypt_load_bitlk.constprop.0+2374> > 0x00007fae86b5a8a2 <+3346>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a8a8 <+3352>: movl $0xfffffffd,0x10(%rsp) > 0x00007fae86b5a8b0 <+3360>: mov $0x1,%eax > 0x00007fae86b5a8b5 <+3365>: jmp 0x7fae86b5a4d6 <_crypt_load_bitlk.constprop.0+2374> > 0x00007fae86b5a8ba <+3370>: nopw 0x0(%rax,%rax,1) > 0x00007fae86b5a8c0 <+3376>: xor 0x10051(%rip),%rdx # 0x7fae86b6a918 <BITLK_GUID_EOW+8> > 0x00007fae86b5a8c7 <+3383>: xor 0x10042(%rip),%rax # 0x7fae86b6a910 <BITLK_GUID_EOW> > 0x00007fae86b5a8ce <+3390>: or %rax,%rdx > 0x00007fae86b5a8d1 <+3393>: jne 0x7fae86b5a9df <_crypt_load_bitlk.constprop.0+3663> > 0x00007fae86b5a8d7 <+3399>: movl $0x1,0x84(%r12) > 0x00007fae86b5a8e3 <+3411>: lea 0xf285(%rip),%r9 # 0x7fae86b69b6f > 0x00007fae86b5a8ea <+3418>: jmp 0x7fae86b59ebb <_crypt_load_bitlk.constprop.0+811> > 0x00007fae86b5a8ef <+3423>: mov $0xffffffff,%esi > 0x00007fae86b5a8f4 <+3428>: mov $0x1fe,%ecx > 0x00007fae86b5a8f9 <+3433>: mov %r12,%rdi > 0x00007fae86b5a8fc <+3436>: xor %eax,%eax > 0x00007fae86b5a8fe <+3438>: lea 0xf873(%rip),%r8 # 0x7fae86b6a178 > 0x00007fae86b5a905 <+3445>: lea 0x72a9(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a90c <+3452>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a911 <+3457>: mov $0x200,%esi > 0x00007fae86b5a916 <+3462>: mov %si,0x80(%r12) > 0x00007fae86b5a91f <+3471>: jmp 0x7fae86b59e3c <_crypt_load_bitlk.constprop.0+684> > 0x00007fae86b5a924 <+3476>: mov %rbp,%rax > 0x00007fae86b5a927 <+3479>: mov $0x5,%edx > 0x00007fae86b5a92c <+3484>: xor %edi,%edi > 0x00007fae86b5a92e <+3486>: mov %r9d,0x8(%rsp) > 0x00007fae86b5a933 <+3491>: lea 0xf976(%rip),%rsi # 0x7fae86b6a2b0 > 0x00007fae86b5a93a <+3498>: mov 0x18(%rsp),%r15 > 0x00007fae86b5a93f <+3503>: mov %r12,%rbp > 0x00007fae86b5a942 <+3506>: mov %rax,%r12 > 0x00007fae86b5a945 <+3509>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5a94a <+3514>: mov 0x8(%rsp),%r9d > 0x00007fae86b5a94f <+3519>: mov $0x14d,%ecx > 0x00007fae86b5a954 <+3524>: mov %rax,%r8 > 0x00007fae86b5a957 <+3527>: lea 0x7257(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a95e <+3534>: mov $0x1,%esi > 0x00007fae86b5a963 <+3539>: mov %r12,%rdi > 0x00007fae86b5a966 <+3542>: xor %eax,%eax > 0x00007fae86b5a968 <+3544>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a96d <+3549>: mov %r15,%rdi > 0x00007fae86b5a970 <+3552>: call 0x7fae86b53720 <BITLK_bitlk_vmk_free> > 0x00007fae86b5a975 <+3557>: mov %rbp,%rdi > 0x00007fae86b5a978 <+3560>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5a97d <+3565>: movl $0xffffffea,0x34(%rsp) > 0x00007fae86b5a985 <+3573>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5a98a <+3578>: mov 0x8(%rbx),%r13 > 0x00007fae86b5a98e <+3582>: test %r13,%r13 > 0x00007fae86b5a991 <+3585>: jne 0x7fae86b5a996 <_crypt_load_bitlk.constprop.0+3590> > 0x00007fae86b5a993 <+3587>: mov (%rbx),%r13 > 0x00007fae86b5a996 <+3590>: mov $0x5,%edx > 0x00007fae86b5a99b <+3595>: lea 0xfb46(%rip),%rsi # 0x7fae86b6a4e8 > 0x00007fae86b5a9a2 <+3602>: xor %edi,%edi > 0x00007fae86b5a9a4 <+3604>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5a9a9 <+3609>: mov %r13,%r9 > 0x00007fae86b5a9ac <+3612>: mov $0x278,%ecx > 0x00007fae86b5a9b1 <+3617>: mov %r12,%rdi > 0x00007fae86b5a9b4 <+3620>: mov %rax,%r8 > 0x00007fae86b5a9b7 <+3623>: lea 0x71f7(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5a9be <+3630>: mov $0x1,%esi > 0x00007fae86b5a9c3 <+3635>: xor %eax,%eax > 0x00007fae86b5a9c5 <+3637>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5a9ca <+3642>: mov %rbp,%rdi > 0x00007fae86b5a9cd <+3645>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5a9d2 <+3650>: movl $0xffffffea,0x34(%rsp) > 0x00007fae86b5a9da <+3658>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5a9df <+3663>: movl $0x2,0x84(%r12) > 0x00007fae86b5a9eb <+3675>: lea 0xf18e(%rip),%r9 # 0x7fae86b69b80 > 0x00007fae86b5a9f2 <+3682>: jmp 0x7fae86b59ebb <_crypt_load_bitlk.constprop.0+811> > 0x00007fae86b5a9f7 <+3687>: movl $0xffffffff,0x10(%rsp) > 0x00007fae86b5a9ff <+3695>: mov $0x3,%eax > 0x00007fae86b5aa04 <+3700>: jmp 0x7fae86b5a4d6 <_crypt_load_bitlk.constprop.0+2374> > 0x00007fae86b5aa09 <+3705>: mov %rbp,%rax > 0x00007fae86b5aa0c <+3708>: mov $0x5,%edx > 0x00007fae86b5aa11 <+3713>: xor %edi,%edi > 0x00007fae86b5aa13 <+3715>: mov %r9d,0x8(%rsp) > 0x00007fae86b5aa18 <+3720>: lea 0xfa21(%rip),%rsi # 0x7fae86b6a440 > 0x00007fae86b5aa1f <+3727>: mov 0x18(%rsp),%r15 > 0x00007fae86b5aa24 <+3732>: mov %r12,%rbp > 0x00007fae86b5aa27 <+3735>: mov %rax,%r12 > 0x00007fae86b5aa2a <+3738>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5aa2f <+3743>: mov 0x8(%rsp),%r9d > 0x00007fae86b5aa34 <+3748>: mov $0x18f,%ecx > 0x00007fae86b5aa39 <+3753>: mov %rax,%r8 > 0x00007fae86b5aa3c <+3756>: jmp 0x7fae86b5a957 <_crypt_load_bitlk.constprop.0+3527> > 0x00007fae86b5aa41 <+3761>: mov $0x5,%edx > 0x00007fae86b5aa46 <+3766>: lea 0xf7f3(%rip),%rsi # 0x7fae86b6a240 > 0x00007fae86b5aa4d <+3773>: xor %edi,%edi > 0x00007fae86b5aa4f <+3775>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5aa54 <+3780>: mov $0x257,%ecx > 0x00007fae86b5aa59 <+3785>: mov $0x1,%esi > 0x00007fae86b5aa5e <+3790>: mov %r12,%rdi > 0x00007fae86b5aa61 <+3793>: mov %rax,%r8 > 0x00007fae86b5aa64 <+3796>: lea 0x714a(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5aa6b <+3803>: xor %eax,%eax > 0x00007fae86b5aa6d <+3805>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5aa72 <+3810>: xor %r11d,%r11d > 0x00007fae86b5aa75 <+3813>: movl $0xffffffa1,0x34(%rsp) > 0x00007fae86b5aa7d <+3821>: mov %r11w,0x98(%r12) > 0x00007fae86b5aa86 <+3830>: movq $0x0,0x88(%r12) > 0x00007fae86b5aa92 <+3842>: movq $0x0,0x90(%r12) > 0x00007fae86b5aa9e <+3854>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5aaa3 <+3859>: push %rdx > 0x00007fae86b5aaa4 <+3860>: mov $0x70,%r9d > 0x00007fae86b5aaaa <+3866>: lea 0xfa67(%rip),%r8 # 0x7fae86b6a518 > 0x00007fae86b5aab1 <+3873>: xor %eax,%eax > 0x00007fae86b5aab3 <+3875>: push $0x0 > 0x00007fae86b5aab5 <+3877>: mov $0x21c,%ecx > 0x00007fae86b5aaba <+3882>: mov $0xffffffff,%esi > 0x00007fae86b5aabf <+3887>: mov %r12,%rdi > 0x00007fae86b5aac2 <+3890>: lea 0x70ec(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5aac9 <+3897>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5aace <+3902>: pop %rcx > 0x00007fae86b5aacf <+3903>: xor %edi,%edi > 0x00007fae86b5aad1 <+3905>: pop %rsi > 0x00007fae86b5aad2 <+3906>: mov 0xb8(%r12),%rbp > 0x00007fae86b5aada <+3914>: call 0x7fae86b28660 <device_alignment> > 0x00007fae86b5aadf <+3919>: xor %esi,%esi > 0x00007fae86b5aae1 <+3921>: mov %r12,%rdi > 0x00007fae86b5aae4 <+3924>: mov %rax,%r15 > 0x00007fae86b5aae7 <+3927>: call 0x7fae86b27e10 <device_block_size> > 0x00007fae86b5aaec <+3932>: mov %rbp,%r9 > 0x00007fae86b5aaef <+3935>: mov %r14,%rcx > 0x00007fae86b5aaf2 <+3938>: mov %r15,%rdx > 0x00007fae86b5aaf5 <+3941>: mov %rax,%rsi > 0x00007fae86b5aaf8 <+3944>: mov $0x70,%r8d > 0x00007fae86b5aafe <+3950>: mov %r13d,%edi > 0x00007fae86b5ab01 <+3953>: call 0x7fae86b599e0 <read_lseek_blockwise> > 0x00007fae86b5ab06 <+3958>: cmp $0x70,%rax > 0x00007fae86b5ab0a <+3962>: jne 0x7fae86b5ab2f <_crypt_load_bitlk.constprop.0+3999> > 0x00007fae86b5ab0c <+3964>: movabs $0x2d53462d4556462d,%rax > 0x00007fae86b5ab16 <+3974>: cmp %rax,0x100(%rsp) > 0x00007fae86b5ab1e <+3982>: jne 0x7fae86b5ab2f <_crypt_load_bitlk.constprop.0+3999> > 0x00007fae86b5ab20 <+3984>: cmpw $0x2,0x10a(%rsp) > 0x00007fae86b5ab29 <+3993>: je 0x7fae86b59fb7 <_crypt_load_bitlk.constprop.0+1063> > 0x00007fae86b5ab2f <+3999>: xor %ebp,%ebp > 0x00007fae86b5ab31 <+4001>: jmp 0x7fae86b5ac10 <_crypt_load_bitlk.constprop.0+4224> > 0x00007fae86b5ab36 <+4006>: nopw %cs:0x0(%rax,%rax,1) > 0x00007fae86b5ab40 <+4016>: push %rax > 0x00007fae86b5ab41 <+4017>: lea 0xf720(%rip),%r8 # 0x7fae86b6a268 > 0x00007fae86b5ab48 <+4024>: mov $0x271,%ecx > 0x00007fae86b5ab4d <+4029>: xor %eax,%eax > 0x00007fae86b5ab4f <+4031>: push $0x0 > 0x00007fae86b5ab51 <+4033>: mov 0x40(%rsp),%r9d > 0x00007fae86b5ab56 <+4038>: mov $0xffffffff,%esi > 0x00007fae86b5ab5b <+4043>: mov %r12,%rdi > 0x00007fae86b5ab5e <+4046>: lea 0x7050(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5ab65 <+4053>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5ab6a <+4058>: mov 0xb8(%r12),%rax > 0x00007fae86b5ab72 <+4066>: pop %r9 > 0x00007fae86b5ab74 <+4068>: xor %edi,%edi > 0x00007fae86b5ab76 <+4070>: pop %r10 > 0x00007fae86b5ab78 <+4072>: lea 0x70(%rax),%rbx > 0x00007fae86b5ab7c <+4076>: call 0x7fae86b28660 <device_alignment> > 0x00007fae86b5ab81 <+4081>: xor %esi,%esi > 0x00007fae86b5ab83 <+4083>: mov %r12,%rdi > 0x00007fae86b5ab86 <+4086>: mov %rax,%r15 > 0x00007fae86b5ab89 <+4089>: call 0x7fae86b27e10 <device_block_size> > 0x00007fae86b5ab8e <+4094>: mov %rbx,%r9 > 0x00007fae86b5ab91 <+4097>: mov %r14,%r8 > 0x00007fae86b5ab94 <+4100>: mov %rbp,%rcx > 0x00007fae86b5ab97 <+4103>: mov %rax,%rsi > 0x00007fae86b5ab9a <+4106>: mov %r15,%rdx > 0x00007fae86b5ab9d <+4109>: mov %r13d,%edi > 0x00007fae86b5aba0 <+4112>: call 0x7fae86b599e0 <read_lseek_blockwise> > 0x00007fae86b5aba5 <+4117>: cmp %r14,%rax > 0x00007fae86b5aba8 <+4120>: je 0x7fae86b5a1c9 <_crypt_load_bitlk.constprop.0+1593> > 0x00007fae86b5abae <+4126>: xor %r13d,%r13d > 0x00007fae86b5abb1 <+4129>: jmp 0x7fae86b5a996 <_crypt_load_bitlk.constprop.0+3590> > 0x00007fae86b5abb6 <+4134>: mov %rbp,%rax > 0x00007fae86b5abb9 <+4137>: xor %edi,%edi > 0x00007fae86b5abbb <+4139>: mov $0x5,%edx > 0x00007fae86b5abc0 <+4144>: mov 0x18(%rsp),%r15 > 0x00007fae86b5abc5 <+4149>: lea 0xf7ac(%rip),%rsi # 0x7fae86b6a378 > 0x00007fae86b5abcc <+4156>: mov %r12,%rbp > 0x00007fae86b5abcf <+4159>: mov %rax,%r12 > 0x00007fae86b5abd2 <+4162>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5abd7 <+4167>: mov %r12,%rdi > 0x00007fae86b5abda <+4170>: mov $0x17c,%ecx > 0x00007fae86b5abdf <+4175>: lea 0x6fcf(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5abe6 <+4182>: mov %rax,%r8 > 0x00007fae86b5abe9 <+4185>: mov $0x1,%esi > 0x00007fae86b5abee <+4190>: xor %eax,%eax > 0x00007fae86b5abf0 <+4192>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5abf5 <+4197>: mov 0x68(%rsp),%rdi > 0x00007fae86b5abfa <+4202>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5abff <+4207>: jmp 0x7fae86b5a96d <_crypt_load_bitlk.constprop.0+3549> > 0x00007fae86b5ac04 <+4212>: mov 0x8(%rbx),%rbp > 0x00007fae86b5ac08 <+4216>: test %rbp,%rbp > 0x00007fae86b5ac0b <+4219>: jne 0x7fae86b5ac10 <_crypt_load_bitlk.constprop.0+4224> > 0x00007fae86b5ac0d <+4221>: mov (%rbx),%rbp > 0x00007fae86b5ac10 <+4224>: mov $0x5,%edx > 0x00007fae86b5ac15 <+4229>: lea 0xf5ac(%rip),%rsi # 0x7fae86b6a1c8 > 0x00007fae86b5ac1c <+4236>: xor %edi,%edi > 0x00007fae86b5ac1e <+4238>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5ac23 <+4243>: mov %rbp,%r9 > 0x00007fae86b5ac26 <+4246>: mov $0x224,%ecx > 0x00007fae86b5ac2b <+4251>: mov %r12,%rdi > 0x00007fae86b5ac2e <+4254>: mov %rax,%r8 > 0x00007fae86b5ac31 <+4257>: lea 0x6f7d(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5ac38 <+4264>: mov $0x1,%esi > 0x00007fae86b5ac3d <+4269>: xor %eax,%eax > 0x00007fae86b5ac3f <+4271>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5ac44 <+4276>: movl $0xffffffea,0x34(%rsp) > 0x00007fae86b5ac4c <+4284>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5ac51 <+4289>: xor %edi,%edi > 0x00007fae86b5ac53 <+4291>: mov %rax,%r15 > 0x00007fae86b5ac56 <+4294>: mov $0x5,%edx > 0x00007fae86b5ac5b <+4299>: mov %rbp,%rax > 0x00007fae86b5ac5e <+4302>: lea 0xf74b(%rip),%rsi # 0x7fae86b6a3b0 > 0x00007fae86b5ac65 <+4309>: mov %r9,0x8(%rsp) > 0x00007fae86b5ac6a <+4314>: mov %r12,%rbp > 0x00007fae86b5ac6d <+4317>: mov %rax,%r12 > 0x00007fae86b5ac70 <+4320>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5ac75 <+4325>: mov 0x8(%rsp),%r9 > 0x00007fae86b5ac7a <+4330>: mov %r12,%rdi > 0x00007fae86b5ac7d <+4333>: mov $0x181,%ecx > 0x00007fae86b5ac82 <+4338>: mov %rax,%r8 > 0x00007fae86b5ac85 <+4341>: lea 0x6f29(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5ac8c <+4348>: mov $0x1,%esi > 0x00007fae86b5ac91 <+4353>: xor %eax,%eax > 0x00007fae86b5ac93 <+4355>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5ac98 <+4360>: mov 0x68(%rsp),%rdi > 0x00007fae86b5ac9d <+4365>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5aca2 <+4370>: jmp 0x7fae86b5a96d <_crypt_load_bitlk.constprop.0+3549> > 0x00007fae86b5aca7 <+4375>: test %rbx,%rbx > 0x00007fae86b5acaa <+4378>: je 0x7fae86b5add3 <_crypt_load_bitlk.constprop.0+4675> > 0x00007fae86b5acb0 <+4384>: mov 0x8(%rbx),%rbp > 0x00007fae86b5acb4 <+4388>: test %rbp,%rbp > 0x00007fae86b5acb7 <+4391>: jne 0x7fae86b5acbc <_crypt_load_bitlk.constprop.0+4396> > 0x00007fae86b5acb9 <+4393>: mov (%rbx),%rbp > 0x00007fae86b5acbc <+4396>: mov $0x5,%edx > 0x00007fae86b5acc1 <+4401>: lea 0xf3f0(%rip),%rsi # 0x7fae86b6a0b8 > 0x00007fae86b5acc8 <+4408>: xor %edi,%edi > 0x00007fae86b5acca <+4410>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5accf <+4415>: mov %rbp,%r9 > 0x00007fae86b5acd2 <+4418>: mov $0x1df,%ecx > 0x00007fae86b5acd7 <+4423>: mov %rax,%r8 > 0x00007fae86b5acda <+4426>: lea 0x6ed4(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5ace1 <+4433>: mov $0x1,%esi > 0x00007fae86b5ace6 <+4438>: mov %r12,%rdi > 0x00007fae86b5ace9 <+4441>: xor %eax,%eax > 0x00007fae86b5aceb <+4443>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5acf0 <+4448>: jmp 0x7fae86b59d21 <_crypt_load_bitlk.constprop.0+401> > 0x00007fae86b5acf5 <+4453>: test %rbx,%rbx > 0x00007fae86b5acf8 <+4456>: je 0x7fae86b5adcc <_crypt_load_bitlk.constprop.0+4668> > 0x00007fae86b5acfe <+4462>: mov 0x8(%rbx),%rbp > 0x00007fae86b5ad02 <+4466>: test %rbp,%rbp > 0x00007fae86b5ad05 <+4469>: jne 0x7fae86b5ad0a <_crypt_load_bitlk.constprop.0+4474> > 0x00007fae86b5ad07 <+4471>: mov (%rbx),%rbp > 0x00007fae86b5ad0a <+4474>: mov $0x5,%edx > 0x00007fae86b5ad0f <+4479>: lea 0xf48a(%rip),%rsi # 0x7fae86b6a1a0 > 0x00007fae86b5ad16 <+4486>: xor %edi,%edi > 0x00007fae86b5ad18 <+4488>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5ad1d <+4493>: mov %rbp,%r9 > 0x00007fae86b5ad20 <+4496>: mov $0x20b,%ecx > 0x00007fae86b5ad25 <+4501>: mov %rax,%r8 > 0x00007fae86b5ad28 <+4504>: jmp 0x7fae86b5acda <_crypt_load_bitlk.constprop.0+4426> > 0x00007fae86b5ad2a <+4506>: mov $0x5,%edx > 0x00007fae86b5ad2f <+4511>: lea 0xf093(%rip),%rsi # 0x7fae86b69dc9 > 0x00007fae86b5ad36 <+4518>: xor %edi,%edi > 0x00007fae86b5ad38 <+4520>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5ad3d <+4525>: movzwl %r15w,%r9d > 0x00007fae86b5ad41 <+4529>: mov $0x203,%ecx > 0x00007fae86b5ad46 <+4534>: mov %r12,%rdi > 0x00007fae86b5ad49 <+4537>: mov %rax,%r8 > 0x00007fae86b5ad4c <+4540>: lea 0x6e62(%rip),%rdx # 0x7fae86b61bb5 > 0x00007fae86b5ad53 <+4547>: mov $0x1,%esi > 0x00007fae86b5ad58 <+4552>: xor %eax,%eax > 0x00007fae86b5ad5a <+4554>: call 0x7fae86b0d220 <logger> > 0x00007fae86b5ad5f <+4559>: movl $0xffffffea,0x34(%rsp) > 0x00007fae86b5ad67 <+4567>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5ad6c <+4572>: mov $0x5,%edx > 0x00007fae86b5ad71 <+4577>: lea 0xf3d0(%rip),%rsi # 0x7fae86b6a148 > 0x00007fae86b5ad78 <+4584>: xor %edi,%edi > 0x00007fae86b5ad7a <+4586>: call 0x7fae86b0cab0 <dcgettext@plt> > 0x00007fae86b5ad7f <+4591>: mov $0x1f7,%ecx > 0x00007fae86b5ad84 <+4596>: mov %rax,%r8 > 0x00007fae86b5ad87 <+4599>: jmp 0x7fae86b59d0b <_crypt_load_bitlk.constprop.0+379> > 0x00007fae86b5ad8c <+4604>: movq $0x0,0xf8(%r12) > 0x00007fae86b5ad98 <+4616>: movl $0xfffffff4,0x34(%rsp) > 0x00007fae86b5ada0 <+4624>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5ada5 <+4629>: mov 0x18(%rsp),%r15 > 0x00007fae86b5adaa <+4634>: mov %r15,%rdi > 0x00007fae86b5adad <+4637>: call 0x7fae86b53720 <BITLK_bitlk_vmk_free> > 0x00007fae86b5adb2 <+4642>: mov %r12,%rdi > 0x00007fae86b5adb5 <+4645>: call 0x7fae86b0c5a0 <free@plt> > 0x00007fae86b5adba <+4650>: movl $0xfffffff4,0x34(%rsp) > 0x00007fae86b5adc2 <+4658>: jmp 0x7fae86b59d29 <_crypt_load_bitlk.constprop.0+409> > 0x00007fae86b5adc7 <+4663>: call 0x7fae86b0cb20 <__stack_chk_fail@plt> > 0x00007fae86b5adcc <+4668>: xor %ebp,%ebp > 0x00007fae86b5adce <+4670>: jmp 0x7fae86b5ad0a <_crypt_load_bitlk.constprop.0+4474> > 0x00007fae86b5add3 <+4675>: xor %ebp,%ebp > 0x00007fae86b5add5 <+4677>: jmp 0x7fae86b5acbc <_crypt_load_bitlk.constprop.0+4396> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1932946
: 1759310 |
1759311
|
1759312
|
1759313
|
1759314
|
1759315
|
1759316
|
1759317
|
1759318
|
1759319
|
1759320
|
1759321