BUG: unable to handle page fault for address: fffff52000969807 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffed067 P4D 23ffed067 PUD 10db9067 PMD 1a169067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 23183 Comm: kworker/1:25 Not tainted 5.16.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events sk_psock_destroy RIP: 0010:__bpf_prog_put.constprop.0+0x21/0x220 kernel/bpf/syscall.c:1812 Code: 2e 0f 1f 84 00 00 00 00 00 41 54 55 48 89 fd 53 e8 94 14 f2 ff 48 8d 7d 38 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ad 01 00 00 48 8b 5d 38 be 08 00 00 00 48 89 df RSP: 0018:ffffc9000709fca8 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 1ffff92000969807 RSI: ffffffff8185962c RDI: ffffc90004b4c038 RBP: ffffc90004b4c000 R08: 0000000000000001 R09: ffff8880535ff02f R10: ffffed100a6bfe05 R11: 0000000000000000 R12: ffff8880535ff3d8 R13: ffff8880535ff030 R14: ffff888078ed8600 R15: ffff8880b9d39280 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffff52000969807 CR3: 0000000073b38000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: psock_set_prog include/linux/skmsg.h:477 [inline] psock_progs_drop include/linux/skmsg.h:495 [inline] sk_psock_destroy+0xad/0x620 net/core/skmsg.c:804 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2298 worker_thread+0x658/0x11f0 kernel/workqueue.c:2445 kthread+0x405/0x4f0 kernel/kthread.c:327 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: CR2: fffff52000969807 ---[ end trace 546335157c8c01ee ]--- RIP: 0010:__bpf_prog_put.constprop.0+0x21/0x220 kernel/bpf/syscall.c:1812 Code: 2e 0f 1f 84 00 00 00 00 00 41 54 55 48 89 fd 53 e8 94 14 f2 ff 48 8d 7d 38 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ad 01 00 00 48 8b 5d 38 be 08 00 00 00 48 89 df RSP: 0018:ffffc9000709fca8 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 1ffff92000969807 RSI: ffffffff8185962c RDI: ffffc90004b4c038 RBP: ffffc90004b4c000 R08: 0000000000000001 R09: ffff8880535ff02f R10: ffffed100a6bfe05 R11: 0000000000000000 R12: ffff8880535ff3d8 R13: ffff8880535ff030 R14: ffff888078ed8600 R15: ffff8880b9d39280 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffff52000969807 CR3: 0000000073b38000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 2e 0f 1f 84 00 00 00 nopl %cs:0x0(%rax,%rax,1) 7: 00 00 9: 41 54 push %r12 b: 55 push %rbp c: 48 89 fd mov %rdi,%rbp f: 53 push %rbx 10: e8 94 14 f2 ff callq 0xfff214a9 15: 48 8d 7d 38 lea 0x38(%rbp),%rdi 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 ad 01 00 00 jne 0x1e1 34: 48 8b 5d 38 mov 0x38(%rbp),%rbx 38: be 08 00 00 00 mov $0x8,%esi 3d: 48 89 df mov %rbx,%rdi