====================================== | [ 1460.674724] #PF: supervisor instruction fetch in kernel mode | [ 1460.674767] #PF: error_code(0x0010) - not-present page | [ 1460.674816] PGD 0 P4D 0 | [ 1460.674839] Oops: Oops: 0010 [#1] PREEMPT SMP NOPTI [ 1460.674937] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1460.674981] RIP: 0010:0x0 [ 1460.675007] Code: Unable to access opcode bytes at 0xffffffffffffffd6. Code starting with the faulting instruction =========================================== [ 1460.675053] RSP: 0018:ffffba1100cd7ed8 EFLAGS: 00010282 [ 1460.675094] RAX: 0000000000000000 RBX: ffff97e482f9e840 RCX: 0000000000000002 [ 1460.675146] RDX: 00007ffed2ae4e70 RSI: 0000000000005401 RDI: ffff97e482f9e840 [ 1460.675198] RBP: ffff97e482f9e840 R08: 0000000000000000 R09: 0000000000000000 [ 1460.675250] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1460.675302] R13: 0000000000005401 R14: 00007ffed2ae4e70 R15: ffff97e48154a540 [ 1460.675362] FS: 00007fdafec791c0(0000) GS:ffff97e4bec80000(0000) knlGS:0000000000000000 [ 1460.675421] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1460.675470] CR2: ffffffffffffffd6 CR3: 000000000ca0c003 CR4: 0000000000772ef0 [ 1460.675523] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1460.675580] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1460.675631] PKRU: 55555554 [ 1460.675648] Call Trace: [ 1460.675667] [ 1460.675690] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434) [ 1460.675728] ? page_fault_oops (arch/x86/mm/fault.c:715) [ 1460.675760] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 1460.675793] ? cp_new_stat (fs/stat.c:496) [ 1460.675825] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539) [ 1460.675861] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623) [ 1460.675893] full_proxy_unlocked_ioctl (fs/debugfs/file.c:399) [ 1460.675938] __x64_sys_ioctl (fs/ioctl.c:51 fs/ioctl.c:906 fs/ioctl.c:892 fs/ioctl.c:892) [ 1460.675972] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 1460.676006] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 1460.676048] RIP: 0033:0x7fdafee98bba [ 1460.676081] Code: f3 0f 1e fa 48 83 ec 38 49 89 f0 be 01 54 00 00 64 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 48 89 e2 b8 10 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e 41 89 c1 85 c0 75 5d 48 8b 04 24 0f b7 54 All code ======== 0: f3 0f 1e fa endbr64 4: 48 83 ec 38 sub $0x38,%rsp 8: 49 89 f0 mov %rsi,%r8 b: be 01 54 00 00 mov $0x5401,%esi 10: 64 48 8b 04 25 28 00 mov %fs:0x28,%rax 17: 00 00 19: 48 89 44 24 28 mov %rax,0x28(%rsp) 1e: 31 c0 xor %eax,%eax 20: 48 89 e2 mov %rsp,%rdx 23: b8 10 00 00 00 mov $0x10,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 7e ja 0xb0 32: 41 89 c1 mov %eax,%r9d 35: 85 c0 test %eax,%eax 37: 75 5d jne 0x96 39: 48 8b 04 24 mov (%rsp),%rax 3d: 0f .byte 0xf 3e: b7 54 mov $0x54,%bh Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 7e ja 0x86 8: 41 89 c1 mov %eax,%r9d b: 85 c0 test %eax,%eax d: 75 5d jne 0x6c f: 48 8b 04 24 mov (%rsp),%rax 13: 0f .byte 0xf 14: b7 54 mov $0x54,%bh [ 1460.676211] RSP: 002b:00007ffed2ae4e70 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1460.676269] RAX: ffffffffffffffda RBX: 00007fdaf0bebb00 RCX: 00007fdafee98bba [ 1460.676321] RDX: 00007ffed2ae4e70 RSI: 0000000000005401 RDI: 0000000000000006 [ 1460.676373] RBP: 0000556d3cfaf8d0 R08: 00007ffed2ae4eb0 R09: 0000000000000000 [ 1460.676425] R10: ad2ad6d68271dae1 R11: 0000000000000246 R12: 0000000000000001 Finger prints: full_proxy_unlocked_ioctl:__x64_sys_ioctl:do_syscall_64