BUG: unable to handle page fault for address: fffffbfff40802d0 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 15cb0067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3686 Comm: kworker/0:8 Not tainted 5.18.0-rc3-syzkaller-01617-g7aa424e02a04 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events bpf_prog_free_deferred RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1165 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1196 Code: d0 ec f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 e2 e8 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 43 b2 ff RSP: 0018:ffffc9000348fc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401680 RCX: 0000000000000000 RDX: 1ffffffff40802d0 RSI: ffffffff8186447e RDI: ffffffffa0401680 RBP: ffffc9000c249000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff81864470 R11: 0000000000000000 R12: ffffc9000c249038 R13: 0000000000000001 R14: ffff88807a4de000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802d0 CR3: 0000000063646000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_free_deferred+0x5c1/0x790 kernel/bpf/core.c:2579 process_one_work+0x996/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 Modules linked in: CR2: fffffbfff40802d0 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1165 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1196 Code: d0 ec f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 e2 e8 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 43 b2 ff RSP: 0018:ffffc9000348fc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401680 RCX: 0000000000000000 RDX: 1ffffffff40802d0 RSI: ffffffff8186447e RDI: ffffffffa0401680 RBP: ffffc9000c249000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff81864470 R11: 0000000000000000 R12: ffffc9000c249038 R13: 0000000000000001 R14: ffff88807a4de000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802d0 CR3: 0000000063646000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: d0 ec shr %ah 2: f2 ff 45 84 repnz incl -0x7c(%rbp) 6: ed in (%dx),%eax 7: 0f 84 fe 00 00 00 je 0x10b d: e8 e2 e8 f2 ff callq 0xfff2e8f4 12: 48 83 e3 c0 and $0xffffffffffffffc0,%rbx 16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1d: fc ff df 20: 48 89 da mov %rbx,%rdx 23: 48 89 df mov %rbx,%rdi 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 5c 01 00 00 jle 0x196 3a: 8b 1f mov (%rdi),%ebx 3c: e8 .byte 0xe8 3d: 43 b2 ff rex.XB mov $0xff,%r10b