page_fault: wrong gs 0 expected ffffffff805fb4c0 Unable to handle kernel NULL pointer dereference at virtual address 000000000000 0008 printing rip: ffffffff80110053 PML4 17becb067 PGD 17bec5067 PMD 0 Oops: 0002 CPU 0 Pid: 2218, comm: insmod Not tainted RIP: 0010:[]{system_call+3} RSP: 0018:000001017becde30 EFLAGS: 00010012 RAX: 000000000000005f RBX: ffffffff8040ed20 RCX: ffffffffa00810fa RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000000001b6 RBP: ffffffffa0081000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000212 R12: 0000000000554030 R13: 00000000000000b8 R14: 000000000000000c R15: 000001017c504740 FS: 0000002a9557d4c0(0000) GS:ffffffff805fb4c0(0000) knlGS:ffffffff805fb4c0 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 0000000000000008 CR3: 0000000000101000 CR4: 00000000000006e0 Call Trace: []{:syscall_test:syscall_test_init+28} []{sys_init_module+1686} [] []{system_call+119} Process insmod (pid: 2218, stackpage=1017becd000) Stack: 000001017becde30 0000000000000018 ffffffffa008113c 0000000000554030 ffffffff801256b6 000001017be78000 000001017e893680 000001017e893640 00000000005542c6 000001017be78000 000001017be7a000 ffffff00000e5000 0000000000000246 00000000000000b8 ffffffffa007c000 ffffffffa00810b8 00000000000006a8 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000000000000000 0000002a958aa6c0 0000000000000000 00000000005539d0 00000000005514e0 Call Trace: []{:syscall_test:syscall_test_init+28} []{sys_init_module+1686} [] []{system_call+119} Code: 65 48 89 24 25 08 00 00 00 65 48 8b 24 25 00 00 00 00 fb 48 Kernel panic: Fatal exception ================================= syscall_test_init() dump: 0x0000000000000060 : sub $0x8,%rsp 0x0000000000000064 : mov $0x0,%rdi 0x000000000000006b : xor %eax,%eax 0x000000000000006d : callq 0x72 0x0000000000000072 : mov $0x1b6,%edi 0x0000000000000077 : callq 0x30 0x000000000000007c : mov $0x0,%rdi 0x0000000000000083 : mov %rax,%rsi 0x0000000000000086 : xor %eax,%eax 0x0000000000000088 : callq 0x8d 0x000000000000008d : mov $0x0,%rdi 0x0000000000000094 : xor %eax,%eax 0x0000000000000096 : callq 0x9b 0x000000000000009b : mov $0x1b6,%edi 0x00000000000000a0 : callq 0x0 0x00000000000000a5 : mov $0x0,%rdi 0x00000000000000ac : mov %rax,%rsi 0x00000000000000af : xor %eax,%eax 0x00000000000000b1 : callq 0xb6 0x00000000000000b6 : xor %eax,%eax 0x00000000000000b8 : add $0x8,%rsp 0x00000000000000bc : retq 0x00000000000000bd : data16 0x00000000000000be : data16 0x00000000000000bf : nop