====================================== | [ 1630.378916] #PF: supervisor read access in kernel mode | [ 1630.378953] #PF: error_code(0x0000) - not-present page | [ 1630.378984] PGD 1040067 P4D 1040067 PUD 0 | [ 1630.379014] Oops: Oops: 0000 [#1] SMP [ 1630.379104] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1630.379143] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1630.379206] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee 1e 9a 31 c0 eb 0d 48 63 94 00 a8 72 f0 99 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 f0 99 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee 1e mov -0x65e111c0(,%rax,8),%r10 14: 9a 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 f0 movslq -0x660f8d58(%rax,%rax,1),%rdx 20: 99 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 f0 cmpq $0x0,-0x660f8d60(%rax,%rax,1) 3e: 99 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 f0 cmpq $0x0,-0x660f8d60(%rax,%rax,1) 14: 99 00 [ 1630.379326] RSP: 0018:ffffa8dfc0edfbf8 EFLAGS: 00010282 [ 1630.379366] RAX: 0000000000000110 RBX: ffff927f032c25a0 RCX: 0000000000000000 [ 1630.379418] RDX: 0000365cea5ecd10 RSI: 000036601c064790 RDI: 000000000000000f [ 1630.379464] RBP: ffffa8dfc0edfbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1630.379521] R10: ffff927fa3b9f000 R11: 0000000000400cc0 R12: ffff927f07dab540 [ 1630.379567] R13: ffffa8dfc0edfde0 R14: ffff927f032c25c8 R15: 0000000000000001 [ 1630.379615] FS: 00007fc91fb3d800(0000) GS:ffff927fa3c9f000(0000) knlGS:0000000000000000 [ 1630.379667] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1630.379710] CR2: ffffc8dc8e18bd10 CR3: 0000000006d46003 CR4: 0000000000772ef0 [ 1630.379757] PKRU: 55555554 [ 1630.379777] Call Trace: [ 1630.379794] [ 1630.379817] snmp6_seq_show (net/ipv6/proc.c:224) [ 1630.379858] seq_read_iter (fs/seq_file.c:230) [ 1630.379902] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1630.379948] seq_read (fs/seq_file.c:163) [ 1630.379978] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1630.380012] ? __do_sys_newfstat (fs/stat.c:559) [ 1630.380044] vfs_read (fs/read_write.c:570) [ 1630.380080] ksys_read (fs/read_write.c:715) [ 1630.380109] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1630.380139] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1630.380183] RIP: 0033:0x7fc91fcf8292 [ 1630.380218] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1630.380332] RSP: 002b:00007ffe1e4618a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1630.380385] RAX: ffffffffffffffda RBX: 000000003e2b2920 RCX: 00007fc91fcf8292 [ 1630.380437] RDX: 0000000000000400 RSI: 000000003e2b1500 RDI: 0000000000000006 [ 1630.380484] RBP: 00007fc91fdf05c0 R08: 0000000000000006 R09: 0000000000000000 [ 1630.380536] R10: 0000000000000000 R11: 0000000000000246 R12: 000000003e2b2920 Finger prints: snmp6_seq_show:seq_read_iter:seq_read:proc_reg_read:vfs_read