BUG: unable to handle page fault for address: fffffbfff4080308 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 140ae4067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 3725 Comm: kworker/0:7 Not tainted 5.18.0-rc6-syzkaller-00085-gf3f19f939c11 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events bpf_prog_free_deferred RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1165 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1196 Code: d0 ed f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 e2 e9 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 33 b2 ff RSP: 0018:ffffc900044bfc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401840 RCX: 0000000000000000 RDX: 1ffffffff4080308 RSI: ffffffff818656ce RDI: ffffffffa0401840 RBP: ffffc90004073000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff818656c0 R11: 0000000000000000 R12: ffffc90004073038 R13: 0000000000000001 R14: ffff888015dd9000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff4080308 CR3: 0000000046caf000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: bpf_prog_free_deferred+0x5c1/0x790 kernel/bpf/core.c:2569 process_one_work+0x996/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 Modules linked in: CR2: fffffbfff4080308 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1165 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1196 Code: d0 ed f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 e2 e9 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 33 b2 ff RSP: 0018:ffffc900044bfc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401840 RCX: 0000000000000000 RDX: 1ffffffff4080308 RSI: ffffffff818656ce RDI: ffffffffa0401840 RBP: ffffc90004073000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff818656c0 R11: 0000000000000000 R12: ffffc90004073038 R13: 0000000000000001 R14: ffff888015dd9000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff4080308 CR3: 0000000046caf000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 ---------------- Code disassembly (best guess): 0: d0 ed shr %ch 2: f2 ff 45 84 repnz incl -0x7c(%rbp) 6: ed in (%dx),%eax 7: 0f 84 fe 00 00 00 je 0x10b d: e8 e2 e9 f2 ff callq 0xfff2e9f4 12: 48 83 e3 c0 and $0xffffffffffffffc0,%rbx 16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1d: fc ff df 20: 48 89 da mov %rbx,%rdx 23: 48 89 df mov %rbx,%rdi 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 5c 01 00 00 jle 0x196 3a: 8b 1f mov (%rdi),%ebx 3c: e8 .byte 0xe8 3d: 33 .byte 0x33 3e: b2 ff mov $0xff,%dl