Advertisement
Guest User

Untitled

a guest
Oct 19th, 2017
165
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.14 KB | None | 0 0
  1. Fatal trap 12: page fault while in kernel mode
  2. cpuid = 2; apic id = 02
  3. fault virtual address = 0xfffff7ffaa1c9ab8
  4. fault code = supervisor read data, page not present
  5. instruction pointer = 0x20:0xffffffff80edd52a
  6. stack pointer = 0x28:0xfffffe009521d7a0
  7. frame pointer = 0x28:0xfffffe009521d7a0
  8. code segment = base 0x0, limit 0xfffff, type 0x1b
  9. = DPL 0, pres 1, long 1, def32 0, gran 1
  10. processor eflags = interrupt enabled, resume, IOPL = 0
  11. current process = 37844 (syz-executor4)
  12. trap number = 12
  13. panic: page fault
  14. cpuid = 2
  15. KDB: stack backtrace:
  16. #0 0xffffffff80aada97 at kdb_backtrace+0x67
  17. #1 0xffffffff80a6bb76 at vpanic+0x186
  18. #2 0xffffffff80a6b9e3 at panic+0x43
  19. #3 0xffffffff80edf832 at trap_fatal+0x322
  20. #4 0xffffffff80edf889 at trap_pfault+0x49
  21. #5 0xffffffff80edf0c6 at trap+0x286
  22. #6 0xffffffff80ec3641 at calltrap+0x8
  23. #7 0xffffffff80ae96e1 at m_copydata+0x61
  24. #8 0xffffffff80c05ba7 at sctp_sosend+0x157
  25. #9 0xffffffff80afa411 at kern_sendit+0x291
  26. #10 0xffffffff80afa773 at sendit+0x1a3
  27. #11 0xffffffff80afa831 at sys_sendmsg+0x61
  28. #12 0xffffffff80ee0394 at amd64_syscall+0x6c4
  29. #13 0xffffffff80ec392b at Xfast_syscall+0xfb
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement