BUG: unable to handle page fault for address: fffffbfffb11e000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 0 Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 UID: 0 PID: 6067 Comm: syz.4.188 Not tainted 6.12.0-rc2-next-20241008-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:87 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x82/0x290 mm/kasan/generic.c:189 Code: 01 00 00 00 00 fc ff df 4f 8d 3c 31 4c 89 fd 4c 29 dd 48 83 fd 10 7f 29 48 85 ed 0f 84 3e 01 00 00 4c 89 cd 48 f7 d5 48 01 dd <41> 80 3b 00 0f 85 c9 01 00 00 49 ff c3 48 ff c5 75 ee e9 1e 01 00 RSP: 0018:ffffc90000005d18 EFLAGS: 00010286 RAX: 0000000000000001 RBX: 1ffffffffb11e000 RCX: ffffffff81cf65ff RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffffd88f0000 RBP: ffffffffffffffff R08: ffffffffd88f0007 R09: 1ffffffffb11e000 R10: dffffc0000000000 R11: fffffbfffb11e000 R12: ffffffffd88f0000 R13: 0000000000000008 R14: dffffc0000000001 R15: fffffbfffb11e001 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfffb11e000 CR3: 000000000e734000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_read include/linux/instrumented.h:26 [inline] copy_from_kernel_nofault+0x6f/0x2f0 mm/maccess.c:35 bpf_probe_read_kernel_common include/linux/bpf.h:2960 [inline] ____bpf_probe_read_compat kernel/trace/bpf_trace.c:294 [inline] bpf_probe_read_compat+0x10f/0x180 kernel/trace/bpf_trace.c:287 bpf_prog_11e76113e6dc9cb7+0x43/0x45 bpf_dispatcher_nop_func include/linux/bpf.h:1257 [inline] __bpf_prog_run include/linux/filter.h:701 [inline] bpf_prog_run include/linux/filter.h:708 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2318 [inline] bpf_trace_run3+0x33a/0x5a0 kernel/trace/bpf_trace.c:2360 trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x355/0x420 mm/slub.c:4706 packet_rcv+0x16f/0x14b0 net/packet/af_packet.c:2290 dev_queue_xmit_nit+0xad4/0xc10 net/core/dev.c:2347 xmit_one net/core/dev.c:3584 [inline] dev_hard_start_xmit+0x15f/0x7e0 net/core/dev.c:3604 sch_direct_xmit+0x29c/0x5d0 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3821 [inline] __dev_queue_xmit+0x1a2d/0x3ed0 net/core/dev.c:4394 dev_queue_xmit include/linux/netdevice.h:3101 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0xd41/0x1390 net/ipv4/ip_output.c:236 ip_local_out net/ipv4/ip_output.c:130 [inline] __ip_queue_xmit+0x118c/0x1b80 net/ipv4/ip_output.c:536 __tcp_transmit_skb+0x2544/0x3b30 net/ipv4/tcp_output.c:1466 tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline] tcp_write_xmit+0x17b5/0x6bf0 net/ipv4/tcp_output.c:2830 __tcp_push_pending_frames+0x9b/0x360 net/ipv4/tcp_output.c:3015 tcp_push_pending_frames include/net/tcp.h:2107 [inline] tcp_data_snd_check net/ipv4/tcp_input.c:5741 [inline] tcp_rcv_established+0x1111/0x2020 net/ipv4/tcp_input.c:6175 tcp_v4_do_rcv+0x96d/0xc70 net/ipv4/tcp_ipv4.c:1915 tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2350 ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 ip_local_deliver net/ipv4/ip_input.c:254 [inline] dst_input include/net/dst.h:460 [inline] ip_sublist_rcv_finish+0x3be/0x4f0 net/ipv4/ip_input.c:580 ip_list_rcv_finish net/ipv4/ip_input.c:630 [inline] ip_sublist_rcv+0x75d/0xab0 net/ipv4/ip_input.c:638 ip_list_rcv+0x42b/0x480 net/ipv4/ip_input.c:672 __netif_receive_skb_list_ptype net/core/dev.c:5709 [inline] __netif_receive_skb_list_core+0x94e/0x980 net/core/dev.c:5756 __netif_receive_skb_list net/core/dev.c:5808 [inline] netif_receive_skb_list_internal+0xa51/0xe30 net/core/dev.c:5899 gro_normal_list include/net/gro.h:515 [inline] napi_complete_done+0x310/0x8e0 net/core/dev.c:6250 virtqueue_napi_complete drivers/net/virtio_net.c:697 [inline] virtnet_poll+0x2db0/0x3980 drivers/net/virtio_net.c:2831 __napi_poll+0xcb/0x490 net/core/dev.c:6775 napi_poll net/core/dev.c:6844 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:6966 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf4/0x1c0 kernel/softirq.c:637 irq_exit_rcu+0x9/0x30 kernel/softirq.c:649 common_interrupt+0xb9/0xd0 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xd8/0x140 kernel/locking/spinlock.c:194 Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 f7 e8 0e 06 2b f6 f6 44 24 21 02 75 52 41 f7 c7 00 02 00 00 74 01 fb bf 01 00 00 00 c3 99 8f f5 65 8b 05 b4 32 30 74 85 c0 74 43 48 c7 04 24 0e 36 RSP: 0018:ffffc90002efeec0 EFLAGS: 00000206 RAX: c4772427b9b08d00 RBX: 1ffff920005dfddc RCX: ffffffff819cb7ec RDX: dffffc0000000000 RSI: ffffffff8c611440 RDI: 0000000000000001 RBP: ffffc90002efef50 R08: ffffffff901d3f2f R09: 1ffffffff203a7e5 R10: dffffc0000000000 R11: fffffbfff203a7e6 R12: dffffc0000000000 R13: 1ffff920005dfdd8 R14: ffffc90002efeee0 R15: 0000000000000246 __debug_check_no_obj_freed lib/debugobjects.c:998 [inline] debug_check_no_obj_freed+0x561/0x580 lib/debugobjects.c:1019 free_pages_prepare mm/page_alloc.c:1115 [inline] free_unref_folios+0x5a4/0x18d0 mm/page_alloc.c:2722 folios_put_refs+0x76c/0x860 mm/swap.c:1007 folio_batch_release include/linux/pagevec.h:101 [inline] shmem_undo_range+0x64c/0x1cf0 mm/shmem.c:1032 shmem_truncate_range mm/shmem.c:1144 [inline] shmem_evict_inode+0x29b/0xa80 mm/shmem.c:1274 evict+0x4e8/0x9b0 fs/inode.c:808 __dentry_kill+0x20d/0x630 fs/dcache.c:625 dput+0x19f/0x2b0 fs/dcache.c:867 __fput+0x5d2/0x880 fs/file_table.c:439 task_work_run+0x24f/0x310 kernel/task_work.c:228 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0xa2f/0x28e0 kernel/exit.c:939 do_group_exit+0x207/0x2c0 kernel/exit.c:1088 get_signal+0x16a3/0x1740 kernel/signal.c:2917 arch_do_signal_or_restart+0x96/0x860 arch/x86/kernel/signal.c:337 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xc9/0x370 kernel/entry/common.c:218 do_syscall_64+0x100/0x230 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f59d717dff9 Code: Unable to access opcode bytes at 0x7f59d717dfcf. RSP: 002b:00007f59d7f140e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f59d7336060 RCX: 00007f59d717dff9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f59d7336060 RBP: 00007f59d7336058 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59d7336064 R13: 0000000000000000 R14: 00007ffc6b5e2410 R15: 00007ffc6b5e24f8 Modules linked in: CR2: fffffbfffb11e000 ---[ end trace 0000000000000000 ]--- RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:87 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x82/0x290 mm/kasan/generic.c:189 Code: 01 00 00 00 00 fc ff df 4f 8d 3c 31 4c 89 fd 4c 29 dd 48 83 fd 10 7f 29 48 85 ed 0f 84 3e 01 00 00 4c 89 cd 48 f7 d5 48 01 dd <41> 80 3b 00 0f 85 c9 01 00 00 49 ff c3 48 ff c5 75 ee e9 1e 01 00 RSP: 0018:ffffc90000005d18 EFLAGS: 00010286 RAX: 0000000000000001 RBX: 1ffffffffb11e000 RCX: ffffffff81cf65ff RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffffd88f0000 RBP: ffffffffffffffff R08: ffffffffd88f0007 R09: 1ffffffffb11e000 R10: dffffc0000000000 R11: fffffbfffb11e000 R12: ffffffffd88f0000 R13: 0000000000000008 R14: dffffc0000000001 R15: fffffbfffb11e001 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfffb11e000 CR3: 000000000e734000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess), 7 bytes skipped: 0: df 4f 8d fisttps -0x73(%rdi) 3: 3c 31 cmp $0x31,%al 5: 4c 89 fd mov %r15,%rbp 8: 4c 29 dd sub %r11,%rbp b: 48 83 fd 10 cmp $0x10,%rbp f: 7f 29 jg 0x3a 11: 48 85 ed test %rbp,%rbp 14: 0f 84 3e 01 00 00 je 0x158 1a: 4c 89 cd mov %r9,%rbp 1d: 48 f7 d5 not %rbp 20: 48 01 dd add %rbx,%rbp * 23: 41 80 3b 00 cmpb $0x0,(%r11) <-- trapping instruction 27: 0f 85 c9 01 00 00 jne 0x1f6 2d: 49 ff c3 inc %r11 30: 48 ff c5 inc %rbp 33: 75 ee jne 0x23 35: e9 .byte 0xe9 36: 1e (bad) 37: 01 00 add %eax,(%rax)