BUG: unable to handle page fault for address: fffffbfff40802c8 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 16764067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3738 Comm: kworker/0:6 Not tainted 5.19.0-rc6-syzkaller-01417-g2acd1022549e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 Workqueue: events bpf_prog_free_deferred RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1175 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1206 Code: 40 ab f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 32 af f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 b3 ef ff RSP: 0018:ffffc900054f7c88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401640 RCX: 0000000000000000 RDX: 1ffffffff40802c8 RSI: ffffffff8187c20e RDI: ffffffffa0401640 RBP: ffffc90004beb000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 000000000008a07a R12: ffffc90004beb038 R13: 0000000000000001 R14: ffffed100eb5d822 R15: ffff888075aec800 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802c8 CR3: 000000004b287000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_free_deferred+0x538/0x7f0 kernel/bpf/core.c:2598 process_one_work+0x996/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 Modules linked in: CR2: fffffbfff40802c8 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1175 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1206 Code: 40 ab f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 32 af f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 b3 ef ff RSP: 0018:ffffc900054f7c88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401640 RCX: 0000000000000000 RDX: 1ffffffff40802c8 RSI: ffffffff8187c20e RDI: ffffffffa0401640 RBP: ffffc90004beb000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 000000000008a07a R12: ffffc90004beb038 R13: 0000000000000001 R14: ffffed100eb5d822 R15: ffff888075aec800 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802c8 CR3: 000000004b287000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 40 ab rex stos %eax,%es:(%rdi) 2: f2 ff 45 84 repnz incl -0x7c(%rbp) 6: ed in (%dx),%eax 7: 0f 84 fe 00 00 00 je 0x10b d: e8 32 af f2 ff callq 0xfff2af44 12: 48 83 e3 c0 and $0xffffffffffffffc0,%rbx 16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1d: fc ff df 20: 48 89 da mov %rbx,%rdx 23: 48 89 df mov %rbx,%rdi 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 5c 01 00 00 jle 0x196 3a: 8b 1f mov (%rdi),%ebx 3c: e8 .byte 0xe8 3d: b3 ef mov $0xef,%bl 3f: ff .byte 0xff