====================================== | [ 1437.294228] #PF: supervisor read access in kernel mode | [ 1437.294265] #PF: error_code(0x0000) - not-present page | [ 1437.294304] PGD 1040067 P4D 1040067 PUD 0 | [ 1437.294340] Oops: Oops: 0000 [#1] SMP [ 1437.294458] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1437.294505] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1437.294581] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1437.294726] RSP: 0018:ffffb68fc761fbf8 EFLAGS: 00010282 [ 1437.294771] RAX: 0000000000000110 RBX: ffff9da842ecc0f0 RCX: 0000000000000000 [ 1437.294829] RDX: 000038e39f1f00b8 RSI: 000038e6dac67b38 RDI: 000000000000000f [ 1437.294888] RBP: ffffb68fc761fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1437.294946] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da844f20000 [ 1437.295004] R13: ffffb68fc761fde0 R14: ffff9da842ecc118 R15: 0000000000000001 [ 1437.295070] FS: 00007f6b5c7a6800(0000) GS:ffff9da8e511f000(0000) knlGS:0000000000000000 [ 1437.295135] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1437.295189] CR2: ffffd68c8418f0b8 CR3: 0000000009d20005 CR4: 0000000000772ef0 [ 1437.295254] PKRU: 55555554 [ 1437.295284] Call Trace: [ 1437.295313] [ 1437.295342] snmp6_seq_show (net/ipv6/proc.c:224) [ 1437.295379] seq_read_iter (fs/seq_file.c:230) [ 1437.295434] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1437.295480] seq_read (fs/seq_file.c:163) [ 1437.295516] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1437.295563] ? __do_sys_newfstat (fs/stat.c:559) [ 1437.295602] vfs_read (fs/read_write.c:570) [ 1437.295643] ksys_read (fs/read_write.c:715) [ 1437.295685] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1437.295730] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1437.295785] RIP: 0033:0x7f6b5c961292 [ 1437.295821] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1437.295956] RSP: 002b:00007ffed3e440c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1437.296020] RAX: ffffffffffffffda RBX: 000000002cb30910 RCX: 00007f6b5c961292 [ 1437.296078] RDX: 0000000000000400 RSI: 000000002cb30500 RDI: 0000000000000006 [ 1437.296136] RBP: 00007f6b5ca595c0 R08: 0000000000000006 R09: 0000000000000000 [ 1437.296194] R10: 0000000000000000 R11: 0000000000000246 R12: 000000002cb30910 [ 1437.296261] R13: 0000000000000d68 R14: 00007f6b5ca589c0 R15: 0000000000000d68 | [ 1437.461840] #PF: error_code(0x0000) - not-present page | [ 1437.461891] PGD 1040067 P4D 1040067 PUD 0 | [ 1437.461936] Oops: Oops: 0000 [#2] SMP | [ 1437.462049] Tainted: [D]=DIE [ 1437.462079] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1437.462133] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1437.462192] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1437.462316] RSP: 0018:ffffb68fc7617bf8 EFLAGS: 00010282 [ 1437.462356] RAX: 0000000000000110 RBX: ffff9da841b231e0 RCX: 0000000000000000 [ 1437.462414] RDX: 000038e39f1f00b8 RSI: 000038e6dac67b38 RDI: 000000000000000f [ 1437.462471] RBP: ffffb68fc7617bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1437.462527] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da844f20000 [ 1437.462585] R13: ffffb68fc7617de0 R14: ffff9da841b23208 R15: 0000000000000001 [ 1437.462639] FS: 00007f668974f800(0000) GS:ffff9da8e4f9f000(0000) knlGS:0000000000000000 [ 1437.462706] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1437.462755] CR2: ffffd68c8418f0b8 CR3: 000000000e1b5002 CR4: 0000000000772ef0 [ 1437.462814] PKRU: 55555554 [ 1437.462837] Call Trace: [ 1437.462856] [ 1437.462883] snmp6_seq_show (net/ipv6/proc.c:224) [ 1437.462918] seq_read_iter (fs/seq_file.c:230) [ 1437.462955] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1437.462992] seq_read (fs/seq_file.c:163) [ 1437.463025] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1437.463060] ? __do_sys_newfstat (fs/stat.c:559) [ 1437.463098] vfs_read (fs/read_write.c:570) [ 1437.463136] ksys_read (fs/read_write.c:715) [ 1437.463167] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1437.463202] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1437.463243] RIP: 0033:0x7f668990a292 [ 1437.463274] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1437.463401] RSP: 002b:00007ffff61a2b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1437.463460] RAX: ffffffffffffffda RBX: 000000001f407910 RCX: 00007f668990a292 [ 1437.463517] RDX: 0000000000000400 RSI: 000000001f407500 RDI: 0000000000000006 [ 1437.463569] RBP: 00007f6689a025c0 R08: 0000000000000006 R09: 0000000000000000 [ 1437.463621] R10: 0000000000000000 R11: 0000000000000246 R12: 000000001f407910 [ 1437.463682] R13: 0000000000000d68 R14: 00007f6689a019c0 R15: 0000000000000d68 | [ 1437.519541] #PF: error_code(0x0000) - not-present page | [ 1437.519590] PGD 1040067 P4D 1040067 PUD 0 | [ 1437.519648] Oops: Oops: 0000 [#3] SMP | [ 1437.519799] Tainted: [D]=DIE [ 1437.519827] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1437.519895] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1437.519971] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1437.520140] RSP: 0018:ffffb68fc7657bf8 EFLAGS: 00010282 [ 1437.520199] RAX: 0000000000000110 RBX: ffff9da842ecc0f0 RCX: 0000000000000000 [ 1437.520278] RDX: 000038e39f1f00b8 RSI: 000038e6dac67b38 RDI: 000000000000000f [ 1437.520349] RBP: ffffb68fc7657bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1437.520423] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da844f20000 [ 1437.520495] R13: ffffb68fc7657de0 R14: ffff9da842ecc118 R15: 0000000000000001 [ 1437.520574] FS: 00007f5f41044800(0000) GS:ffff9da8e511f000(0000) knlGS:0000000000000000 [ 1437.520638] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1437.520708] CR2: ffffd68c8418f0b8 CR3: 00000000111f2005 CR4: 0000000000772ef0 [ 1437.520783] PKRU: 55555554 [ 1437.520807] Call Trace: [ 1437.520841] [ 1437.520871] snmp6_seq_show (net/ipv6/proc.c:224) [ 1437.520922] seq_read_iter (fs/seq_file.c:230) [ 1437.520976] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1437.521028] seq_read (fs/seq_file.c:163) [ 1437.521068] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1437.521114] ? __do_sys_newfstat (fs/stat.c:559) [ 1437.521163] vfs_read (fs/read_write.c:570) [ 1437.521207] ksys_read (fs/read_write.c:715) [ 1437.521250] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1437.521293] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1437.521343] RIP: 0033:0x7f5f411ff292 [ 1437.521386] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1437.521551] RSP: 002b:00007ffc226348e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1437.521624] RAX: ffffffffffffffda RBX: 000000002c09f910 RCX: 00007f5f411ff292 [ 1437.521699] RDX: 0000000000000400 RSI: 000000002c09f500 RDI: 0000000000000006 [ 1437.521773] RBP: 00007f5f412f75c0 R08: 0000000000000006 R09: 0000000000000000 [ 1437.521841] R10: 0000000000000000 R11: 0000000000000246 R12: 000000002c09f910 [ 1437.521914] R13: 0000000000000d68 R14: 00007f5f412f69c0 R15: 0000000000000d68 | [ 1437.687676] #PF: error_code(0x0000) - not-present page | [ 1437.687725] PGD 1040067 P4D 1040067 PUD 0 | [ 1437.687765] Oops: Oops: 0000 [#4] SMP | [ 1437.687892] Tainted: [D]=DIE [ 1437.687940] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1437.688014] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1437.688105] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1437.688300] RSP: 0018:ffffb68fc763fbf8 EFLAGS: 00010282 [ 1437.688360] RAX: 0000000000000110 RBX: ffff9da841b231e0 RCX: 0000000000000000 [ 1437.688443] RDX: 000038e39f1f00b8 RSI: 000038e6dac67b38 RDI: 000000000000000f [ 1437.688525] RBP: ffffb68fc763fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1437.688612] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da844f20000 [ 1437.688695] R13: ffffb68fc763fde0 R14: ffff9da841b23208 R15: 0000000000000001 [ 1437.688786] FS: 00007f0582b84800(0000) GS:ffff9da8e4f9f000(0000) knlGS:0000000000000000 [ 1437.688879] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1437.688953] CR2: ffffd68c8418f0b8 CR3: 0000000011eec001 CR4: 0000000000772ef0 [ 1437.689043] PKRU: 55555554 [ 1437.689078] Call Trace: [ 1437.689109] [ 1437.689147] snmp6_seq_show (net/ipv6/proc.c:224) [ 1437.689203] seq_read_iter (fs/seq_file.c:230) [ 1437.689260] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1437.689317] seq_read (fs/seq_file.c:163) [ 1437.689368] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1437.689420] ? __do_sys_newfstat (fs/stat.c:559) [ 1437.689473] vfs_read (fs/read_write.c:570) [ 1437.689524] ksys_read (fs/read_write.c:715) [ 1437.689574] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1437.689627] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1437.689686] RIP: 0033:0x7f0582d3f292 [ 1437.689737] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1437.689948] RSP: 002b:00007fff967ce7d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1437.690045] RAX: ffffffffffffffda RBX: 00000000344a6910 RCX: 00007f0582d3f292 [ 1437.690133] RDX: 0000000000000400 RSI: 00000000344a6500 RDI: 0000000000000006 [ 1437.690222] RBP: 00007f0582e375c0 R08: 0000000000000006 R09: 0000000000000000 [ 1437.690311] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000344a6910 [ 1437.690398] R13: 0000000000000d68 R14: 00007f0582e369c0 R15: 0000000000000d68 | [ 1438.041907] #PF: error_code(0x0000) - not-present page | [ 1438.041937] PGD 1040067 P4D 1040067 PUD 0 | [ 1438.041966] Oops: Oops: 0000 [#5] SMP | [ 1438.042065] Tainted: [D]=DIE [ 1438.042087] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1438.042131] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1438.042180] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1438.042292] RSP: 0018:ffffb68fc7767bf8 EFLAGS: 00010282 [ 1438.042335] RAX: 0000000000000110 RBX: ffff9da8418f3528 RCX: 0000000000000000 [ 1438.042383] RDX: 000038e39f1eca50 RSI: 000038e6dac644d0 RDI: 000000000000000f [ 1438.042428] RBP: ffffb68fc7767bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1438.042487] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a58c0 [ 1438.042543] R13: ffffb68fc7767de0 R14: ffff9da8418f3550 R15: 0000000000000001 [ 1438.042591] FS: 00007fec0d320800(0000) GS:ffff9da8e509f000(0000) knlGS:0000000000000000 [ 1438.042645] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1438.042695] CR2: ffffd68c8418ba50 CR3: 000000000680c002 CR4: 0000000000772ef0 [ 1438.042747] PKRU: 55555554 [ 1438.042767] Call Trace: [ 1438.042790] [ 1438.042811] snmp6_seq_show (net/ipv6/proc.c:224) [ 1438.042842] seq_read_iter (fs/seq_file.c:230) [ 1438.042876] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1438.042909] seq_read (fs/seq_file.c:163) [ 1438.042938] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1438.042969] ? __do_sys_newfstat (fs/stat.c:559) [ 1438.042999] vfs_read (fs/read_write.c:570) [ 1438.043029] ksys_read (fs/read_write.c:715) [ 1438.043057] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1438.043089] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1438.043125] RIP: 0033:0x7fec0d4db292 [ 1438.043155] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1438.043275] RSP: 002b:00007ffe17814e28 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1438.043326] RAX: ffffffffffffffda RBX: 000000000f3dc910 RCX: 00007fec0d4db292 [ 1438.043377] RDX: 0000000000000400 RSI: 000000000f3dc500 RDI: 0000000000000006 [ 1438.043422] RBP: 00007fec0d5d35c0 R08: 0000000000000006 R09: 0000000000000000 [ 1438.043468] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000f3dc910 [ 1438.043531] R13: 0000000000000d68 R14: 00007fec0d5d29c0 R15: 0000000000000d68 | [ 1438.211546] #PF: error_code(0x0000) - not-present page | [ 1438.211585] PGD 1040067 P4D 1040067 PUD 0 | [ 1438.211623] Oops: Oops: 0000 [#6] SMP | [ 1438.211728] Tainted: [D]=DIE [ 1438.211759] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1438.211806] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1438.211863] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1438.211984] RSP: 0018:ffffb68fc763fbf8 EFLAGS: 00010282 [ 1438.212031] RAX: 0000000000000110 RBX: ffff9da8418f3528 RCX: 0000000000000000 [ 1438.212086] RDX: 000038e39f1eca50 RSI: 000038e6dac644d0 RDI: 000000000000000f [ 1438.212142] RBP: ffffb68fc763fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1438.212199] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a58c0 [ 1438.212254] R13: ffffb68fc763fde0 R14: ffff9da8418f3550 R15: 0000000000000001 [ 1438.212312] FS: 00007fc454beb800(0000) GS:ffff9da8e509f000(0000) knlGS:0000000000000000 [ 1438.212368] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1438.212415] CR2: ffffd68c8418ba50 CR3: 000000000680c003 CR4: 0000000000772ef0 [ 1438.212473] PKRU: 55555554 [ 1438.212494] Call Trace: [ 1438.212520] [ 1438.212543] snmp6_seq_show (net/ipv6/proc.c:224) [ 1438.212577] seq_read_iter (fs/seq_file.c:230) [ 1438.212621] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1438.212658] seq_read (fs/seq_file.c:163) [ 1438.212689] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1438.212726] ? __do_sys_newfstat (fs/stat.c:559) [ 1438.212762] vfs_read (fs/read_write.c:570) [ 1438.212799] ksys_read (fs/read_write.c:715) [ 1438.212830] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1438.212867] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1438.212907] RIP: 0033:0x7fc454da6292 [ 1438.212948] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1438.213089] RSP: 002b:00007ffec043b5d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1438.213145] RAX: ffffffffffffffda RBX: 0000000038c3b910 RCX: 00007fc454da6292 [ 1438.213201] RDX: 0000000000000400 RSI: 0000000038c3b500 RDI: 0000000000000006 [ 1438.213257] RBP: 00007fc454e9e5c0 R08: 0000000000000006 R09: 0000000000000000 [ 1438.213313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000038c3b910 [ 1438.213368] R13: 0000000000000d68 R14: 00007fc454e9d9c0 R15: 0000000000000d68 | [ 1439.440627] #PF: error_code(0x0000) - not-present page | [ 1439.440679] PGD 1040067 P4D 1040067 PUD 0 | [ 1439.440718] Oops: Oops: 0000 [#7] SMP | [ 1439.440860] Tainted: [D]=DIE [ 1439.440898] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1439.440963] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1439.441042] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1439.441220] RSP: 0018:ffffb68fc7af7bf8 EFLAGS: 00010282 [ 1439.441271] RAX: 0000000000000110 RBX: ffff9da842ecc0f0 RCX: 0000000000000000 [ 1439.441348] RDX: 000038e39f1ffc18 RSI: 000038e6dac77698 RDI: 000000000000000f [ 1439.441425] RBP: ffffb68fc7af7bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1439.441502] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a2380 [ 1439.441580] R13: ffffb68fc7af7de0 R14: ffff9da842ecc118 R15: 0000000000000001 [ 1439.441659] FS: 00007f4724897800(0000) GS:ffff9da8e511f000(0000) knlGS:0000000000000000 [ 1439.441742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1439.441805] CR2: ffffd68c8419ec18 CR3: 0000000006b42006 CR4: 0000000000772ef0 [ 1439.441892] PKRU: 55555554 [ 1439.441917] Call Trace: [ 1439.441945] [ 1439.441978] snmp6_seq_show (net/ipv6/proc.c:224) [ 1439.442022] seq_read_iter (fs/seq_file.c:230) [ 1439.442069] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1439.442114] seq_read (fs/seq_file.c:163) [ 1439.442154] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1439.442199] ? __do_sys_newfstat (fs/stat.c:559) [ 1439.442244] vfs_read (fs/read_write.c:570) [ 1439.442291] ksys_read (fs/read_write.c:715) [ 1439.442327] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1439.442375] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1439.442426] RIP: 0033:0x7f4724a52292 [ 1439.442464] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1439.442642] RSP: 002b:00007ffe2c0270e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1439.442720] RAX: ffffffffffffffda RBX: 000000001a530910 RCX: 00007f4724a52292 [ 1439.442797] RDX: 0000000000000400 RSI: 000000001a530500 RDI: 0000000000000006 [ 1439.442873] RBP: 00007f4724b4a5c0 R08: 0000000000000006 R09: 0000000000000000 [ 1439.442950] R10: 0000000000000000 R11: 0000000000000246 R12: 000000001a530910 [ 1439.443029] R13: 0000000000000d68 R14: 00007f4724b499c0 R15: 0000000000000d68 | [ 1439.606982] #PF: error_code(0x0000) - not-present page | [ 1439.607027] PGD 1040067 P4D 1040067 PUD 0 | [ 1439.607064] Oops: Oops: 0000 [#8] SMP | [ 1439.607188] Tainted: [D]=DIE [ 1439.607223] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1439.607276] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1439.607334] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1439.607486] RSP: 0018:ffffb68fc7acfbf8 EFLAGS: 00010282 [ 1439.607537] RAX: 0000000000000110 RBX: ffff9da842ecc0f0 RCX: 0000000000000000 [ 1439.607603] RDX: 000038e39f1ffc18 RSI: 000038e6dac77698 RDI: 000000000000000f [ 1439.607658] RBP: ffffb68fc7acfbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1439.607713] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a2380 [ 1439.607769] R13: ffffb68fc7acfde0 R14: ffff9da842ecc118 R15: 0000000000000001 [ 1439.607826] FS: 00007fb4a7743800(0000) GS:ffff9da8e511f000(0000) knlGS:0000000000000000 [ 1439.607891] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1439.607944] CR2: ffffd68c8419ec18 CR3: 0000000012dcb001 CR4: 0000000000772ef0 [ 1439.608006] PKRU: 55555554 [ 1439.608031] Call Trace: [ 1439.608050] [ 1439.608078] snmp6_seq_show (net/ipv6/proc.c:224) [ 1439.608117] seq_read_iter (fs/seq_file.c:230) [ 1439.608154] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1439.608200] seq_read (fs/seq_file.c:163) [ 1439.608234] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1439.608269] ? __do_sys_newfstat (fs/stat.c:559) [ 1439.608303] vfs_read (fs/read_write.c:570) [ 1439.608339] ksys_read (fs/read_write.c:715) [ 1439.608386] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1439.608431] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1439.608476] RIP: 0033:0x7fb4a78fe292 [ 1439.608519] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1439.608653] RSP: 002b:00007fffaa5b2c48 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1439.608715] RAX: ffffffffffffffda RBX: 0000000005723910 RCX: 00007fb4a78fe292 [ 1439.608770] RDX: 0000000000000400 RSI: 0000000005723500 RDI: 0000000000000006 [ 1439.608827] RBP: 00007fb4a79f65c0 R08: 0000000000000006 R09: 0000000000000000 [ 1439.608903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000005723910 [ 1439.608988] R13: 0000000000000d68 R14: 00007fb4a79f59c0 R15: 0000000000000d68 | [ 1440.417697] #PF: error_code(0x0000) - not-present page | [ 1440.417743] PGD 1040067 P4D 1040067 PUD 0 | [ 1440.417776] Oops: Oops: 0000 [#9] SMP | [ 1440.417907] Tainted: [D]=DIE [ 1440.417941] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1440.417998] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1440.418054] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1440.418214] RSP: 0018:ffffb68fc7c4fbf8 EFLAGS: 00010282 [ 1440.418259] RAX: 0000000000000110 RBX: ffff9da842ecc0f0 RCX: 0000000000000000 [ 1440.418325] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1440.418391] RBP: ffffb68fc7c4fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.418456] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1440.418523] R13: ffffb68fc7c4fde0 R14: ffff9da842ecc118 R15: 0000000000000001 [ 1440.418587] FS: 00007f002afcb800(0000) GS:ffff9da8e511f000(0000) knlGS:0000000000000000 [ 1440.418659] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.418713] CR2: ffffd68c841a3a48 CR3: 000000000ffff005 CR4: 0000000000772ef0 [ 1440.418776] PKRU: 55555554 [ 1440.418801] Call Trace: [ 1440.418821] [ 1440.418854] snmp6_seq_show (net/ipv6/proc.c:224) [ 1440.418898] seq_read_iter (fs/seq_file.c:230) [ 1440.418941] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1440.418983] seq_read (fs/seq_file.c:163) [ 1440.419024] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1440.419061] ? __do_sys_newfstat (fs/stat.c:559) [ 1440.419097] vfs_read (fs/read_write.c:570) [ 1440.419141] ksys_read (fs/read_write.c:715) [ 1440.419175] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1440.419216] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1440.419266] RIP: 0033:0x7f002b186292 [ 1440.419307] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1440.419455] RSP: 002b:00007fff89455748 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.419516] RAX: ffffffffffffffda RBX: 000000002cc6e910 RCX: 00007f002b186292 [ 1440.419582] RDX: 0000000000000400 RSI: 000000002cc6e500 RDI: 0000000000000006 [ 1440.419642] RBP: 00007f002b27e5c0 R08: 0000000000000006 R09: 0000000000000000 [ 1440.419710] R10: 0000000000000000 R11: 0000000000000246 R12: 000000002cc6e910 [ 1440.419770] R13: 0000000000000d68 R14: 00007f002b27d9c0 R15: 0000000000000d68 | [ 1440.581478] #PF: error_code(0x0000) - not-present page | [ 1440.581515] PGD 1040067 P4D 1040067 PUD 0 | [ 1440.581555] Oops: Oops: 0000 [#10] SMP | [ 1440.581657] Tainted: [D]=DIE [ 1440.581685] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1440.581729] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1440.581778] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1440.581889] RSP: 0018:ffffb68fc7d07bf8 EFLAGS: 00010282 [ 1440.581926] RAX: 0000000000000110 RBX: ffff9da8418f3528 RCX: 0000000000000000 [ 1440.581977] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1440.582033] RBP: ffffb68fc7d07bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.582079] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1440.582125] R13: ffffb68fc7d07de0 R14: ffff9da8418f3550 R15: 0000000000000001 [ 1440.582178] FS: 00007f0133266800(0000) GS:ffff9da8e509f000(0000) knlGS:0000000000000000 [ 1440.582228] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.582271] CR2: ffffd68c841a3a48 CR3: 0000000012a5c006 CR4: 0000000000772ef0 [ 1440.582329] PKRU: 55555554 [ 1440.582349] Call Trace: [ 1440.582366] [ 1440.582388] snmp6_seq_show (net/ipv6/proc.c:224) [ 1440.582417] seq_read_iter (fs/seq_file.c:230) [ 1440.582446] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1440.582477] seq_read (fs/seq_file.c:163) [ 1440.582506] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1440.582544] ? __do_sys_newfstat (fs/stat.c:559) [ 1440.582574] vfs_read (fs/read_write.c:570) [ 1440.582604] ksys_read (fs/read_write.c:715) [ 1440.582632] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1440.582661] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1440.582701] RIP: 0033:0x7f0133421292 [ 1440.582729] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1440.582841] RSP: 002b:00007ffeb7694908 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.582892] RAX: ffffffffffffffda RBX: 0000000019dea910 RCX: 00007f0133421292 [ 1440.582937] RDX: 0000000000000400 RSI: 0000000019dea500 RDI: 0000000000000006 [ 1440.582982] RBP: 00007f01335195c0 R08: 0000000000000006 R09: 0000000000000000 [ 1440.583044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000019dea910 [ 1440.583090] R13: 0000000000000d68 R14: 00007f01335189c0 R15: 0000000000000d68 | [ 1440.664195] #PF: error_code(0x0000) - not-present page | [ 1440.664229] PGD 1040067 P4D 1040067 PUD 0 | [ 1440.664267] Oops: Oops: 0000 [#11] SMP | [ 1440.664362] Tainted: [D]=DIE [ 1440.664390] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1440.664428] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1440.664478] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1440.664605] RSP: 0018:ffffb68fc7d67bf8 EFLAGS: 00010282 [ 1440.664641] RAX: 0000000000000110 RBX: ffff9da8418f3528 RCX: 0000000000000000 [ 1440.664686] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1440.664731] RBP: ffffb68fc7d67bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.664776] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1440.664828] R13: ffffb68fc7d67de0 R14: ffff9da8418f3550 R15: 0000000000000001 [ 1440.664876] FS: 00007fa73207b800(0000) GS:ffff9da8e509f000(0000) knlGS:0000000000000000 [ 1440.664930] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.664972] CR2: ffffd68c841a3a48 CR3: 000000000d1b2001 CR4: 0000000000772ef0 [ 1440.665025] PKRU: 55555554 [ 1440.665044] Call Trace: [ 1440.665061] [ 1440.665084] snmp6_seq_show (net/ipv6/proc.c:224) [ 1440.665116] seq_read_iter (fs/seq_file.c:230) [ 1440.665148] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1440.665180] seq_read (fs/seq_file.c:163) [ 1440.665209] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1440.665249] ? __do_sys_newfstat (fs/stat.c:559) [ 1440.665287] vfs_read (fs/read_write.c:570) [ 1440.665321] ksys_read (fs/read_write.c:715) [ 1440.665352] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1440.665384] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1440.665423] RIP: 0033:0x7fa732236292 [ 1440.665451] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1440.665570] RSP: 002b:00007fffbd9b7538 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.665621] RAX: ffffffffffffffda RBX: 000000003ffa4910 RCX: 00007fa732236292 [ 1440.665672] RDX: 0000000000000400 RSI: 000000003ffa4500 RDI: 0000000000000006 [ 1440.665723] RBP: 00007fa73232e5c0 R08: 0000000000000006 R09: 0000000000000000 [ 1440.665774] R10: 0000000000000000 R11: 0000000000000246 R12: 000000003ffa4910 [ 1440.665830] R13: 0000000000000d68 R14: 00007fa73232d9c0 R15: 0000000000000d68 | [ 1440.832405] #PF: error_code(0x0000) - not-present page | [ 1440.832453] PGD 1040067 P4D 1040067 PUD 0 | [ 1440.832491] Oops: Oops: 0000 [#12] SMP | [ 1440.832624] Tainted: [D]=DIE [ 1440.832661] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1440.832725] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1440.832802] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1440.832986] RSP: 0018:ffffb68fc7d47bf8 EFLAGS: 00010282 [ 1440.833036] RAX: 0000000000000110 RBX: ffff9da841b231e0 RCX: 0000000000000000 [ 1440.833113] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1440.833188] RBP: ffffb68fc7d47bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1440.833259] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1440.833330] R13: ffffb68fc7d47de0 R14: ffff9da841b23208 R15: 0000000000000001 [ 1440.833408] FS: 00007f787902f800(0000) GS:ffff9da8e4f9f000(0000) knlGS:0000000000000000 [ 1440.833500] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1440.833558] CR2: ffffd68c841a3a48 CR3: 0000000010151003 CR4: 0000000000772ef0 [ 1440.833635] PKRU: 55555554 [ 1440.833659] Call Trace: [ 1440.833685] [ 1440.833712] snmp6_seq_show (net/ipv6/proc.c:224) [ 1440.833754] seq_read_iter (fs/seq_file.c:230) [ 1440.833799] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1440.833843] seq_read (fs/seq_file.c:163) [ 1440.833884] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1440.833923] ? __do_sys_newfstat (fs/stat.c:559) [ 1440.833967] vfs_read (fs/read_write.c:570) [ 1440.834006] ksys_read (fs/read_write.c:715) [ 1440.834044] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1440.834083] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1440.834135] RIP: 0033:0x7f78791ea292 [ 1440.834177] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1440.834364] RSP: 002b:00007fffacb9c2b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1440.834442] RAX: ffffffffffffffda RBX: 00000000225ca910 RCX: 00007f78791ea292 [ 1440.834520] RDX: 0000000000000400 RSI: 00000000225ca500 RDI: 0000000000000006 [ 1440.834595] RBP: 00007f78792e25c0 R08: 0000000000000006 R09: 0000000000000000 [ 1440.834671] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000225ca910 [ 1440.834747] R13: 0000000000000d68 R14: 00007f78792e19c0 R15: 0000000000000d68 | [ 1441.157562] #PF: error_code(0x0000) - not-present page | [ 1441.157598] PGD 1040067 P4D 1040067 PUD 0 | [ 1441.157631] Oops: Oops: 0000 [#13] SMP | [ 1441.157755] Tainted: [D]=DIE [ 1441.157786] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1441.157830] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1441.157886] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1441.158012] RSP: 0018:ffffb68fc7e17bf8 EFLAGS: 00010282 [ 1441.158053] RAX: 0000000000000110 RBX: ffff9da841b231e0 RCX: 0000000000000000 [ 1441.158111] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1441.158167] RBP: ffffb68fc7e17bf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1441.158230] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1441.158284] R13: ffffb68fc7e17de0 R14: ffff9da841b23208 R15: 0000000000000001 [ 1441.158342] FS: 00007f4c0925e800(0000) GS:ffff9da8e4f9f000(0000) knlGS:0000000000000000 [ 1441.158405] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.158452] CR2: ffffd68c841a3a48 CR3: 0000000012651006 CR4: 0000000000772ef0 [ 1441.158515] PKRU: 55555554 [ 1441.158537] Call Trace: [ 1441.158555] [ 1441.158581] snmp6_seq_show (net/ipv6/proc.c:224) [ 1441.158616] seq_read_iter (fs/seq_file.c:230) [ 1441.158651] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1441.158692] seq_read (fs/seq_file.c:163) [ 1441.158726] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1441.158763] ? __do_sys_newfstat (fs/stat.c:559) [ 1441.158797] vfs_read (fs/read_write.c:570) [ 1441.158829] ksys_read (fs/read_write.c:715) [ 1441.158863] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1441.158898] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1441.158937] RIP: 0033:0x7f4c09419292 [ 1441.158972] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1441.159102] RSP: 002b:00007ffc14b9a4d8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1441.159161] RAX: ffffffffffffffda RBX: 000000001b97c910 RCX: 00007f4c09419292 [ 1441.159213] RDX: 0000000000000400 RSI: 000000001b97c500 RDI: 0000000000000006 [ 1441.159273] RBP: 00007f4c095115c0 R08: 0000000000000006 R09: 0000000000000000 [ 1441.159330] R10: 0000000000000000 R11: 0000000000000246 R12: 000000001b97c910 [ 1441.159381] R13: 0000000000000d68 R14: 00007f4c095109c0 R15: 0000000000000d68 | [ 1441.316527] #PF: error_code(0x0000) - not-present page | [ 1441.316576] PGD 1040067 P4D 1040067 PUD 0 | [ 1441.316621] Oops: Oops: 0000 [#14] SMP | [ 1441.316752] Tainted: [D]=DIE [ 1441.316778] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1441.316825] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1441.316882] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1441.317012] RSP: 0018:ffffb68fc7ddfbf8 EFLAGS: 00010282 [ 1441.317047] RAX: 0000000000000110 RBX: ffff9da841b231e0 RCX: 0000000000000000 [ 1441.317100] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1441.317153] RBP: ffffb68fc7ddfbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1441.317223] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1441.317319] R13: ffffb68fc7ddfde0 R14: ffff9da841b23208 R15: 0000000000000001 [ 1441.317379] FS: 00007f983e2e8800(0000) GS:ffff9da8e4f9f000(0000) knlGS:0000000000000000 [ 1441.317458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.317518] CR2: ffffd68c841a3a48 CR3: 0000000010000001 CR4: 0000000000772ef0 [ 1441.317581] PKRU: 55555554 [ 1441.317605] Call Trace: [ 1441.317624] [ 1441.317657] snmp6_seq_show (net/ipv6/proc.c:224) [ 1441.317692] seq_read_iter (fs/seq_file.c:230) [ 1441.317734] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1441.317776] seq_read (fs/seq_file.c:163) [ 1441.317808] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1441.317848] ? __do_sys_newfstat (fs/stat.c:559) [ 1441.317894] vfs_read (fs/read_write.c:570) [ 1441.317937] ksys_read (fs/read_write.c:715) [ 1441.317975] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1441.318021] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1441.318077] RIP: 0033:0x7f983e4a3292 [ 1441.318107] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1441.318292] RSP: 002b:00007fff923a8cf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1441.318353] RAX: ffffffffffffffda RBX: 0000000037f7a910 RCX: 00007f983e4a3292 [ 1441.318434] RDX: 0000000000000400 RSI: 0000000037f7a500 RDI: 0000000000000006 [ 1441.318509] RBP: 00007f983e59b5c0 R08: 0000000000000006 R09: 0000000000000000 [ 1441.318571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000037f7a910 [ 1441.318645] R13: 0000000000000d68 R14: 00007f983e59a9c0 R15: 0000000000000d68 | [ 1441.490463] #PF: error_code(0x0000) - not-present page | [ 1441.490499] PGD 1040067 P4D 1040067 PUD 0 | [ 1441.490533] Oops: Oops: 0000 [#15] SMP | [ 1441.490629] Tainted: [D]=DIE [ 1441.490651] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1441.490701] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1441.490749] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1441.490870] RSP: 0018:ffffb68fc7e9fbf8 EFLAGS: 00010282 [ 1441.490906] RAX: 0000000000000110 RBX: ffff9da8418f3528 RCX: 0000000000000000 [ 1441.490951] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1441.490997] RBP: ffffb68fc7e9fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1441.491043] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1441.491088] R13: ffffb68fc7e9fde0 R14: ffff9da8418f3550 R15: 0000000000000001 [ 1441.491136] FS: 00007f412e62d800(0000) GS:ffff9da8e509f000(0000) knlGS:0000000000000000 [ 1441.491193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.491248] CR2: ffffd68c841a3a48 CR3: 000000000fca8001 CR4: 0000000000772ef0 [ 1441.491319] PKRU: 55555554 [ 1441.491346] Call Trace: [ 1441.491363] [ 1441.491385] snmp6_seq_show (net/ipv6/proc.c:224) [ 1441.491412] seq_read_iter (fs/seq_file.c:230) [ 1441.491441] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1441.491480] seq_read (fs/seq_file.c:163) [ 1441.491510] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1441.491539] ? __do_sys_newfstat (fs/stat.c:559) [ 1441.491567] vfs_read (fs/read_write.c:570) [ 1441.491597] ksys_read (fs/read_write.c:715) [ 1441.491625] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1441.491657] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1441.491697] RIP: 0033:0x7f412e7e8292 [ 1441.491725] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1441.491852] RSP: 002b:00007ffce79df318 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1441.491918] RAX: ffffffffffffffda RBX: 000000000e1a3910 RCX: 00007f412e7e8292 [ 1441.491968] RDX: 0000000000000400 RSI: 000000000e1a3500 RDI: 0000000000000006 [ 1441.492013] RBP: 00007f412e8e05c0 R08: 0000000000000006 R09: 0000000000000000 [ 1441.492058] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000e1a3910 [ 1441.492103] R13: 0000000000000d68 R14: 00007f412e8df9c0 R15: 0000000000000d68 | [ 1441.648528] #PF: error_code(0x0000) - not-present page | [ 1441.648561] PGD 1040067 P4D 1040067 PUD 0 | [ 1441.648595] Oops: Oops: 0000 [#16] SMP | [ 1441.648706] Tainted: [D]=DIE [ 1441.648731] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1441.648773] RIP: 0010:snmp6_seq_show_item64.constprop.0 (net/ipv6/proc.c:211) [ 1441.648828] Code: 83 f9 3f 77 4d 48 63 c1 ba 01 00 00 00 4c 8b 14 c5 40 ee de 98 31 c0 eb 0d 48 63 94 00 a8 72 b0 98 4c 8b 44 05 00 48 8d 14 d6 <4e> 03 04 12 4c 89 44 05 00 48 83 c0 08 48 83 bc 00 a0 72 b0 98 00 All code ======== 0: 83 f9 3f cmp $0x3f,%ecx 3: 77 4d ja 0x52 5: 48 63 c1 movslq %ecx,%rax 8: ba 01 00 00 00 mov $0x1,%edx d: 4c 8b 14 c5 40 ee de mov -0x672111c0(,%rax,8),%r10 14: 98 15: 31 c0 xor %eax,%eax 17: eb 0d jmp 0x26 19: 48 63 94 00 a8 72 b0 movslq -0x674f8d58(%rax,%rax,1),%rdx 20: 98 21: 4c 8b 44 05 00 mov 0x0(%rbp,%rax,1),%r8 26: 48 8d 14 d6 lea (%rsi,%rdx,8),%rdx 2a:* 4e 03 04 12 add (%rdx,%r10,1),%r8 <-- trapping instruction 2e: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 33: 48 83 c0 08 add $0x8,%rax 37: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 3e: 98 00 Code starting with the faulting instruction =========================================== 0: 4e 03 04 12 add (%rdx,%r10,1),%r8 4: 4c 89 44 05 00 mov %r8,0x0(%rbp,%rax,1) 9: 48 83 c0 08 add $0x8,%rax d: 48 83 bc 00 a0 72 b0 cmpq $0x0,-0x674f8d60(%rax,%rax,1) 14: 98 00 [ 1441.648954] RSP: 0018:ffffb68fc7e6fbf8 EFLAGS: 00010282 [ 1441.648992] RAX: 0000000000000110 RBX: ffff9da841b231e0 RCX: 0000000000000000 [ 1441.649047] RDX: 000038e39f204a48 RSI: 000038e6dac7c4c8 RDI: 000000000000000f [ 1441.649100] RBP: ffffb68fc7e6fbf8 R08: 0000000000000000 R09: ffffffffffffffff [ 1441.649156] R10: ffff9da8e4f9f000 R11: 0000000000400cc0 R12: ffff9da8430a4700 [ 1441.649207] R13: ffffb68fc7e6fde0 R14: ffff9da841b23208 R15: 0000000000000001 [ 1441.649262] FS: 00007ff534fbf800(0000) GS:ffff9da8e4f9f000(0000) knlGS:0000000000000000 [ 1441.649319] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1441.649373] CR2: ffffd68c841a3a48 CR3: 0000000012e0d006 CR4: 0000000000772ef0 [ 1441.649431] PKRU: 55555554 [ 1441.649453] Call Trace: [ 1441.649472] [ 1441.649489] snmp6_seq_show (net/ipv6/proc.c:224) [ 1441.649524] seq_read_iter (fs/seq_file.c:230) [ 1441.649560] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1441.649597] seq_read (fs/seq_file.c:163) [ 1441.649630] proc_reg_read (./arch/x86/include/asm/atomic.h:85 ./include/linux/atomic/atomic-arch-fallback.h:787 ./include/linux/atomic/atomic-arch-fallback.h:1238 ./include/linux/atomic/atomic-instrumented.h:611 fs/proc/inode.c:205 fs/proc/inode.c:321) [ 1441.649662] ? __do_sys_newfstat (fs/stat.c:559) [ 1441.649692] vfs_read (fs/read_write.c:570) [ 1441.649724] ksys_read (fs/read_write.c:715) [ 1441.649753] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 1441.649786] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1441.649826] RIP: 0033:0x7ff53517a292 [ 1441.649853] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 6a 15 0c 00 e8 65 e1 01 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 <48> 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24 All code ======== 0: c0 e9 b2 shr $0xb2,%cl 3: fe (bad) 4: ff (bad) 5: ff 50 48 call *0x48(%rax) 8: 8d 3d 6a 15 0c 00 lea 0xc156a(%rip),%edi # 0xc1578 e: e8 65 e1 01 00 call 0x1e178 13: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 18: f3 0f 1e fa endbr64 1c: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 23: 00 24: 85 c0 test %eax,%eax 26: 75 10 jne 0x38 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 56 ja 0x88 32: c3 ret 33: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 38: 48 83 ec 28 sub $0x28,%rsp 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 54 push %rsp 3f: 24 .byte 0x24 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 56 ja 0x5e 8: c3 ret 9: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) e: 48 83 ec 28 sub $0x28,%rsp 12: 48 rex.W 13: 89 .byte 0x89 14: 54 push %rsp 15: 24 .byte 0x24 [ 1441.649977] RSP: 002b:00007ffc5e5a8d88 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1441.650034] RAX: ffffffffffffffda RBX: 0000000028833910 RCX: 00007ff53517a292 [ 1441.650084] RDX: 0000000000000400 RSI: 0000000028833500 RDI: 0000000000000006 [ 1441.650135] RBP: 00007ff5352725c0 R08: 0000000000000006 R09: 0000000000000000 [ 1441.650184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000028833910 Finger prints: snmp6_seq_show:seq_read_iter:seq_read:proc_reg_read:vfs_read