====================================== | [ 319.640165][ T1322] netdevsim netdevsim1057 eni1057np1: renamed from eth1 | [ 319.864622][ T1339] netdevsim netdevsim5417 eni5417np1: renamed from eth0 | [ 321.409295][ T1304] Oops: general protection fault, probably for non-canonical address 0xed6d696d6d6d6d71: 0000 [#1] PREEMPT SMP KASAN NOPTI | [ 321.409920][ T1304] KASAN: maybe wild-memory-access in range [0x6b6b6b6b6b6b6b88-0x6b6b6b6b6b6b6b8f] [ 321.410671][ T1304] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 321.410945][ T1304] RIP: 0010:full_proxy_write (fs/debugfs/file.c:394 (discriminator 5)) [ 321.411217][ T1304] Code: ea 03 80 3c 02 00 0f 85 df 00 00 00 4c 8b 23 4d 85 e4 74 54 48 b8 00 00 00 00 00 fc ff df 49 8d 7c 24 20 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 c8 00 00 00 49 8b 44 24 20 48 89 ef 4c 89 fa 4c All code ======== 0: ea (bad) 1: 03 80 3c 02 00 0f add 0xf00023c(%rax),%eax 7: 85 df test %ebx,%edi 9: 00 00 add %al,(%rax) b: 00 4c 8b 23 add %cl,0x23(%rbx,%rcx,4) f: 4d 85 e4 test %r12,%r12 12: 74 54 je 0x68 14: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1b: fc ff df 1e: 49 8d 7c 24 20 lea 0x20(%r12),%rdi 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx 2a:* 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 c8 00 00 00 jne 0xfc 34: 49 8b 44 24 20 mov 0x20(%r12),%rax 39: 48 89 ef mov %rbp,%rdi 3c: 4c 89 fa mov %r15,%rdx 3f: 4c rex.WR Code starting with the faulting instruction =========================================== 0: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 4: 0f 85 c8 00 00 00 jne 0xd2 a: 49 8b 44 24 20 mov 0x20(%r12),%rax f: 48 89 ef mov %rbp,%rdi 12: 4c 89 fa mov %r15,%rdx 15: 4c rex.WR [ 321.411992][ T1304] RSP: 0018:ffffc90001247d08 EFLAGS: 00010206 [ 321.412315][ T1304] RAX: dffffc0000000000 RBX: ffff88800a4f3200 RCX: ffffc90001247eb8 [ 321.412645][ T1304] RDX: 0d6d6d6d6d6d6d71 RSI: 0000000000000004 RDI: 6b6b6b6b6b6b6b8b [ 321.412969][ T1304] RBP: ffff8880052a2200 R08: 0000000000000000 R09: fffff52000248f92 [ 321.413293][ T1304] R10: 0000000000000003 R11: ffff8880052a2250 R12: 6b6b6b6b6b6b6b6b [ 321.413612][ T1304] R13: ffff88800c445240 R14: 0000562f61e17f10 R15: 0000000000000002 [ 321.413917][ T1304] FS: 00007fb9d0abf740(0000) GS:ffff888036180000(0000) knlGS:0000000000000000 [ 321.414196][ T1304] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 321.414379][ T1304] CR2: 0000562f61e17f10 CR3: 00000000091a8002 CR4: 0000000000772ef0 [ 321.414604][ T1304] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 321.414821][ T1304] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 321.415076][ T1304] PKRU: 55555554 [ 321.415212][ T1304] Call Trace: [ 321.415325][ T1304] [ 321.415405][ T1304] ? die_addr (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:460) [ 321.415539][ T1304] ? exc_general_protection (arch/x86/kernel/traps.c:751 arch/x86/kernel/traps.c:693) [ 321.415702][ T1304] ? asm_exc_general_protection (./arch/x86/include/asm/idtentry.h:617) [ 321.415858][ T1304] ? full_proxy_write (fs/debugfs/file.c:394 (discriminator 5)) [ 321.416027][ T1304] ? full_proxy_write (fs/debugfs/file.c:394) [ 321.416177][ T1304] vfs_write (fs/read_write.c:677) [ 321.416306][ T1304] ? __pfx_vfs_write (fs/read_write.c:660) [ 321.416451][ T1304] ? find_held_lock (kernel/locking/lockdep.c:5341) [ 321.416606][ T1304] ? __lock_release (kernel/locking/lockdep.c:5527) [ 321.416756][ T1304] ? do_user_addr_fault (./include/linux/rcupdate.h:347 ./include/linux/rcupdate.h:880 ./include/linux/mm.h:742 arch/x86/mm/fault.c:1340) [ 321.416908][ T1304] ? __pfx___lock_release (kernel/locking/lockdep.c:5503) [ 321.417064][ T1304] ? __up_read (./arch/x86/include/asm/atomic64_64.h:79 ./include/linux/atomic/atomic-arch-fallback.h:2749 ./include/linux/atomic/atomic-long.h:184 ./include/linux/atomic/atomic-instrumented.h:3317 kernel/locking/rwsem.c:1345) [ 321.417211][ T1304] ? __pfx___up_read (kernel/locking/rwsem.c:1337) [ 321.417388][ T1304] ksys_write (fs/read_write.c:731) [ 321.417527][ T1304] ? __pfx_ksys_write (fs/read_write.c:721) [ 321.417679][ T1304] ? do_user_addr_fault (./include/linux/rcupdate.h:882 ./include/linux/mm.h:742 arch/x86/mm/fault.c:1340) [ 321.417828][ T1304] do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83) [ 321.417982][ T1304] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 321.418186][ T1304] RIP: 0033:0x7fb9d0c00b77 [ 321.418369][ T1304] Code: 0b 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24 All code ======== 0: 0b 00 or (%rax),%eax 2: f7 d8 neg %eax 4: 64 89 02 mov %eax,%fs:(%rdx) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b7 jmp 0xffffffffffffffc7 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 01 00 00 00 mov $0x1,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 48 89 54 24 18 mov %rdx,0x18(%rsp) 3c: 48 rex.W 3d: 89 .byte 0x89 3e: 74 24 je 0x64 Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 48 89 54 24 18 mov %rdx,0x18(%rsp) 12: 48 rex.W 13: 89 .byte 0x89 14: 74 24 je 0x3a [ 321.418966][ T1304] RSP: 002b:00007ffe0250a368 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 321.419224][ T1304] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fb9d0c00b77 [ 321.419452][ T1304] RDX: 0000000000000002 RSI: 0000562f61e17f10 RDI: 0000000000000001 [ 321.419715][ T1304] RBP: 0000562f61e17f10 R08: 0000000000000000 R09: 00007fb9d0c734e0 [ 321.419938][ T1304] R10: 00007fb9d0c733e0 R11: 0000000000000246 R12: 0000000000000002 Finger prints: full_proxy_write:vfs_write:ksys_write:do_syscall_64