BUG: unable to handle page fault for address: fffffbfff40802c8 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 16773067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 25876 Comm: kworker/0:9 Not tainted 5.19.0-rc4-syzkaller-00772-g8e60a041e478 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 Workqueue: events bpf_prog_free_deferred RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1170 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1201 Code: e0 ac f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 d2 b0 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 b3 ef ff RSP: 0018:ffffc9000aecfc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401640 RCX: 0000000000000000 RDX: 1ffffffff40802c8 RSI: ffffffff8187ba7e RDI: ffffffffa0401640 RBP: ffffc9000557f000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffffc9000557f038 R13: 0000000000000001 R14: ffffed10091e4122 R15: ffff88807a8dc800 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802c8 CR3: 000000001d314000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_free_deferred+0x4e5/0x790 kernel/bpf/core.c:2589 process_one_work+0x996/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 Modules linked in: CR2: fffffbfff40802c8 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1170 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1201 Code: e0 ac f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 d2 b0 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 b3 ef ff RSP: 0018:ffffc9000aecfc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa0401640 RCX: 0000000000000000 RDX: 1ffffffff40802c8 RSI: ffffffff8187ba7e RDI: ffffffffa0401640 RBP: ffffc9000557f000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: ffffc9000557f038 R13: 0000000000000001 R14: ffffed10091e4122 R15: ffff88807a8dc800 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802c8 CR3: 000000001d314000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: e0 ac loopne 0xffffffae 2: f2 ff 45 84 repnz incl -0x7c(%rbp) 6: ed in (%dx),%eax 7: 0f 84 fe 00 00 00 je 0x10b d: e8 d2 b0 f2 ff callq 0xfff2b0e4 12: 48 83 e3 c0 and $0xffffffffffffffc0,%rbx 16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1d: fc ff df 20: 48 89 da mov %rbx,%rdx 23: 48 89 df mov %rbx,%rdi 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 5c 01 00 00 jle 0x196 3a: 8b 1f mov (%rdi),%ebx 3c: e8 .byte 0xe8 3d: b3 ef mov $0xef,%bl 3f: ff .byte 0xff