====================================== | [ 1586.545286] #PF: supervisor read access in kernel mode | [ 1586.545327] #PF: error_code(0x0000) - not-present page | [ 1586.545367] PGD 1040067 P4D 1040067 PUD 0 | [ 1586.545400] Oops: Oops: 0000 [#1] SMP [ 1586.545499] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1586.545543] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1586.545600] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee be 9d 31 c0 eb 0d 48 63 94 00 a8 72 90 9d 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 90 9d 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee be mov -0x624111c0(,%rax,8),%r10 14: 9d 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 90 movslq -0x626f8d58(%rax,%rax,1),%rdx 20: 9d 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 90 cmpq $0x0,-0x626f8d60(%rax,%rax,1) 3e: 9d 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 90 cmpq $0x0,-0x626f8d60(%rax,%rax,1) 14: 9d 00 [ 1586.545727] RSP: 0018:ffffa4ce43c3fbf8 EFLAGS: 00010282 [ 1586.545763] RAX: 0000000000000110 RBX: ffff983801c60000 RCX: 0000000000000000 [ 1586.545815] RDX: 00002c928aff0418 RSI: 00002c959fa67e98 RDI: 000000000000000f [ 1586.545873] RBP: ffffa4ce43c3fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1586.545926] R10: ffff9838a019f000 R11: 0000000000400cc0 R12: ffff983806074700 [ 1586.545979] R13: ffffa4ce43c3fde0 R14: ffff983801c60028 R15: 0000000000000001 [ 1586.546033] FS: 00007fb1b1ebc800(0000) GS:ffff9838a019f000(0000) knlGS:0000000000000000 [ 1586.546092] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1586.546141] CR2: ffffc4cb2b18f418 CR3: 0000000009ef2001 CR4: 0000000000772ef0 [ 1586.546206] PKRU: 55555554 [ 1586.546222] Call Trace: [ 1586.546247] [ 1586.546272] snmp6_seq_show (net/ipv6/proc.c:224) [ 1586.546302] seq_read_iter (fs/seq_file.c:230) [ 1586.546341] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1586.546377] seq_read (fs/seq_file.c:163) [ 1586.546411] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1586.546451] ? __do_sys_newfstat (fs/stat.c:559) [ 1586.546484] vfs_read (fs/read_write.c:570) [ 1586.546521] ksys_read (fs/read_write.c:715) [ 1586.546552] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1586.546590] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1586.546635] RIP: 0033:0x7fb1b2077292 [ 1586.546668] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1586.546790] RSP: 002b:00007ffed4a90c88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1586.546848] RAX: ffffffffffffffda RBX: 0000000021bdd920 RCX: 00007fb1b2077292 [ 1586.546900] RDX: 0000000000000400 RSI: 0000000021bdc500 RDI: 0000000000000006 [ 1586.546953] RBP: 00007fb1b216f5c0 R08: 0000000000000006 R09: 0000000000000000 [ 1586.547005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000021bdd920 Finger prints: snmp6_seq_show:seq_read_iter:seq_read:proc_reg_read:vfs_read