Colin Ian King writes via Kernel.org Bugzilla: arm64 and riscv returns EFAULT too, whereas x86 segfault with my tests: Linux debian-11-all-h3-cc-h5 6.10.6-arm64 #1 SMP Debian 6.10.6-1 (2024-08-19) aarch64 GNU/Linux: mmap(NULL, 4096, PROT_READ, MAP_SHARED|MAP_ANONYMOUS, -1, 0) = 0xffffac174000 getcpu(0xffffac174000, 0xffffac174001, NULL) = -1 EFAULT (Bad address) Linux starfive 5.15.0-starfive #1 SMP Fri Nov 11 06:58:52 EST 2022 riscv64 GNU/Linux: mmap(NULL, 4096, PROT_READ, MAP_SHARED|MAP_ANONYMOUS, -1, 0) = 0x3fb20df000 getcpu(0x3fb20df000, 0x3fb20df001, NULL) = -1 EFAULT (Bad address) Linux t480 6.1.0-25-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.106-3 (2024-08-26) x86_64 GNU/Linux: mmap(NULL, 4096, PROT_READ, MAP_SHARED|MAP_ANONYMOUS, -1, 0) = 0x7ff780a24000 --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_ACCERR, si_addr=0x7ff780a24000} --- +++ killed by SIGSEGV +++ so x86-64 does behave differently with the access. View: https://bugzilla.kernel.org/show_bug.cgi?id=219339#c3 You can reply to this message to join the discussion. -- Deet-doot-dot, I am a bot. Kernel.org Bugzilla (bugspray 0.1-dev)