Page MenuHomePureOS Tracker

[Kernel Stack Trace] General protection fault in user access. Non-canonical address?
Open, Needs TriagePublic

Description

General protection fault in user access. Non-canonical address?
[ 25.823784] WARNING: CPU: 0 PID: 962 at arch/x86/mm/extable.c:77 ex_handler_uaccess+0x4d/0x60
[ 25.823785] Modules linked in: nf_tables nfnetlink uinput fuse ath9k ath9k_common ath9k_hw ath snd_soc_skl snd_soc_hdac_hda snd_hda_codec_hdmi mac80211 snd_hda_ext_core snd_soc_sst_ipc snd_soc_sst_dsp snd_soc_acpi_intel_match snd_soc_acpi snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_soc_core snd_compress snd_hda_intel uvcvideo videobuf2_vmalloc videobuf2_memops x86_pkg_temp_thermal intel_powerclamp snd_intel_dspcfg videobuf2_v4l2 videobuf2_common intel_rapl_msr snd_hda_codec binfmt_misc snd_hda_core cfg80211 kvm_intel videodev intel_cstate essiv snd_hwdep authenc sg snd_pcm mc rfkill joydev intel_uncore iTCO_wdt iTCO_vendor_support intel_rapl_perf pcspkr libarc4 serio_raw watchdog snd_timer snd intel_pch_thermal soundcore tpm_tis tpm_tis_core processor_thermal_device topstar_laptop intel_rapl_common ac sparse_keymap int340x_thermal_zone tpm rng_core intel_soc_dts_iosf evdev nfsd auth_rpcgss nfs_acl lockd coretemp parport_pc grace ppdev sunrpc lp parport ip_tables x_tables
[ 25.823827] autofs4 ext4 crc16 mbcache jbd2 btrfs zstd_decompress zstd_compress dm_crypt dm_mod raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear md_mod vfio_mdev vfio_iommu_type1 mdev vfio sr_mod cdrom kvm irqbypass hid_generic usbhid hid uas usb_storage i915 crc32_pclmul crc32c_intel ghash_clmulni_intel nvme nvme_core t10_pi crc_t10dif video i2c_algo_bit ahci drm_kms_helper aesni_intel libahci xhci_pci libaes xhci_hcd crypto_simd crct10dif_generic cec libata cryptd glue_helper drm usbcore psmouse scsi_mod i2c_i801 usb_common crct10dif_pclmul crct10dif_common battery button
[ 25.823865] CPU: 0 PID: 962 Comm: kworker/u8:6 Not tainted 5.6.0-1-amd64 #1 Debian 5.6.7-1
[ 25.823866] Hardware name: Purism Librem 13 v2/Librem 13 v2, BIOS 4.11-Purism-1 11/26/2019
[ 25.823870] RIP: 0010:ex_handler_uaccess+0x4d/0x60
[ 25.823872] Code: 83 c4 08 b8 01 00 00 00 5b c3 80 3d 73 a1 0a 01 00 75 dc 48 c7 c7 58 c3 8c 8c 48 89 34 24 c6 05 5f a1 0a 01 01 e8 95 69 01 00 <0f> 0b 48 8b 34 24 eb bd 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44
[ 25.823873] RSP: 0000:ffffa0aa0086bb18 EFLAGS: 00010286
[ 25.823875] RAX: 0000000000000000 RBX: ffffffff8c9df74c RCX: 0000000000000000
[ 25.823877] RDX: 000000000000003f RSI: ffffffff8d03e3bf RDI: 0000000000000246
[ 25.823878] RBP: ffffa0aa0086bbe8 R08: 0000000603378d72 R09: 000000000000003f
[ 25.823879] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
[ 25.823879] R13: 000000000000000d R14: 0000000000000000 R15: 0000000000000000
[ 25.823881] FS: 0000000000000000(0000) GS:ffff9511afc00000(0000) knlGS:0000000000000000
[ 25.823882] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 25.823884] CR2: 0000000000000000 CR3: 00000004651f4006 CR4: 00000000003606f0
[ 25.823885] Call Trace:
[ 25.823892] fixup_exception+0x45/0x58
[ 25.823896] do_general_protection+0xda/0x2b0
[ 25.823902] general_protection+0x28/0x30
[ 25.823905] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0
[ 25.823907] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 01 ca c3 66 66
[ 25.823908] RSP: 0000:ffffa0aa0086bc98 EFLAGS: 00050202
[ 25.823910] RAX: 0000000000000001 RBX: ffff9511a2d14ec0 RCX: 0000000000000001
[ 25.823911] RDX: 0000000000000001 RSI: dead000000000122 RDI: ffffa0aa0086bcff
[ 25.823912] RBP: 0000000000000001 R08: dead000000000122 R09: 0000000000000000
[ 25.823913] R10: 00000000000003a4 R11: ffff9511a5230000 R12: ffffffffffffffff
[ 25.823914] R13: dead000000000122 R14: ffffa0aa0086bcff R15: 0000000000000000
[ 25.823920] probe_kernel_read+0x54/0x80
[ 25.823924] process_fetch_insn+0x52b/0x560
[ 25.823927] kprobe_trace_func+0x236/0x2d0
[ 25.823931] ? do_execve+0x5/0x30
[ 25.823933] kprobe_dispatcher+0x39/0x60
[ 25.823935] ? do_execve+0x1/0x30
[ 25.823937] kprobe_ftrace_handler+0x92/0xf0
[ 25.823941] ftrace_ops_assist_func+0x75/0xe0
[ 25.823944] ?
switch_to_asm+0x34/0x70
[ 25.823946] ? switch_to_asm+0x40/0x70
[ 25.823948] ?
switch_to_asm+0x34/0x70
[ 25.823952] ? call_usermodehelper+0xa0/0xa0
[ 25.823954] 0xffffffffc14f30c8
[ 25.823957] ? call_usermodehelper+0xa0/0xa0
[ 25.823959] ? do_execve+0x1/0x30
[ 25.823960] do_execve+0x5/0x30
[ 25.823963] call_usermodehelper_exec_async+0x186/0x1b0
[ 25.823966] ? recalc_sigpending+0x17/0x50
[ 25.823969] ret_from_fork+0x35/0x40
[ 25.823971] ---[ end trace 8817bc114f3587d5 ]---

Event Timeline