====================================== | [ 10.774274] #PF: supervisor instruction fetch in kernel mode | [ 10.774316] #PF: error_code(0x0010) - not-present page | [ 10.774352] PGD 0 P4D 0 | [ 10.774373] Oops: Oops: 0010 [#1] PREEMPT SMP NOPTI [ 10.774464] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 10.774508] RIP: 0010:0x0 [ 10.774530] Code: Unable to access opcode bytes at 0xffffffffffffffd6. Code starting with the faulting instruction =========================================== [ 10.774571] RSP: 0018:ffffaadc81edfed8 EFLAGS: 00010282 [ 10.774607] RAX: 0000000000000000 RBX: ffff9106050ff9c0 RCX: 0000000000000002 [ 10.774657] RDX: 00007ffc2b768c60 RSI: 0000000000005401 RDI: ffff9106050ff9c0 [ 10.774708] RBP: ffff9106050ff9c0 R08: 0000000000000000 R09: 0000000000000000 [ 10.774759] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 10.774803] R13: 0000000000005401 R14: 00007ffc2b768c60 R15: ffff910610701f00 [ 10.774849] FS: 00007fcb73bb11c0(0000) GS:ffff91063ed00000(0000) knlGS:0000000000000000 [ 10.774900] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 10.774942] CR2: ffffffffffffffd6 CR3: 0000000001cd6006 CR4: 0000000000772ef0 [ 10.774993] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 10.775043] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 10.775088] PKRU: 55555554 [ 10.775103] Call Trace: [ 10.775122] [ 10.775142] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434) [ 10.775173] ? page_fault_oops (arch/x86/mm/fault.c:715) [ 10.775201] ? _copy_to_user (./arch/x86/include/asm/smap.h:29 ./arch/x86/include/asm/uaccess_64.h:134 ./arch/x86/include/asm/uaccess_64.h:147 ./include/linux/uaccess.h:197 lib/usercopy.c:26) [ 10.775229] ? cp_new_stat (fs/stat.c:496) [ 10.775257] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:37 ./arch/x86/include/asm/irqflags.h:92 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539) [ 10.775285] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623) [ 10.775314] full_proxy_unlocked_ioctl (fs/debugfs/file.c:399) [ 10.775352] __x64_sys_ioctl (fs/ioctl.c:51 fs/ioctl.c:906 fs/ioctl.c:892 fs/ioctl.c:892) [ 10.775380] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 10.775409] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 10.775444] RIP: 0033:0x7fcb73dd0bba [ 10.775471] Code: f3 0f 1e fa 48 83 ec 38 49 89 f0 be 01 54 00 00 64 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 48 89 e2 b8 10 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e 41 89 c1 85 c0 75 5d 48 8b 04 24 0f b7 54 All code ======== 0: f3 0f 1e fa endbr64 4: 48 83 ec 38 sub $0x38,%rsp 8: 49 89 f0 mov %rsi,%r8 b: be 01 54 00 00 mov $0x5401,%esi 10: 64 48 8b 04 25 28 00 mov %fs:0x28,%rax 17: 00 00 19: 48 89 44 24 28 mov %rax,0x28(%rsp) 1e: 31 c0 xor %eax,%eax 20: 48 89 e2 mov %rsp,%rdx 23: b8 10 00 00 00 mov $0x10,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 7e ja 0xb0 32: 41 89 c1 mov %eax,%r9d 35: 85 c0 test %eax,%eax 37: 75 5d jne 0x96 39: 48 8b 04 24 mov (%rsp),%rax 3d: 0f .byte 0xf 3e: b7 54 mov $0x54,%bh Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 7e ja 0x86 8: 41 89 c1 mov %eax,%r9d b: 85 c0 test %eax,%eax d: 75 5d jne 0x6c f: 48 8b 04 24 mov (%rsp),%rax 13: 0f .byte 0xf 14: b7 54 mov $0x54,%bh [ 10.775582] RSP: 002b:00007ffc2b768c60 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 10.775633] RAX: ffffffffffffffda RBX: 00007fcb65b20880 RCX: 00007fcb73dd0bba [ 10.775683] RDX: 00007ffc2b768c60 RSI: 0000000000005401 RDI: 0000000000000006 [ 10.775728] RBP: 0000560bc326a8d0 R08: 00007ffc2b768ca0 R09: 0000000000000000 [ 10.775773] R10: 7093ccfba7d2ba3c R11: 0000000000000246 R12: 0000000000000001 Finger prints: full_proxy_unlocked_ioctl:__x64_sys_ioctl:do_syscall_64