Unable to handle kernel paging request at virtual address dfff800000000000
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
Mem abort info:
  ESR = 0x0000000096000005
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x05: level 1 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[dfff800000000000] address between user and kernel address ranges
Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 9212 Comm: syz-executor.2 Not tainted 6.9.0-rc3-syzkaller-gb5d2afe8745b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : dev_map_enqueue+0x3c/0x38c kernel/bpf/devmap.c:539
lr : dev_map_enqueue+0x38/0x38c kernel/bpf/devmap.c:538
sp : ffff800097da7470
x29: ffff800097da7480 x28: dfff800000000000 x27: ffff0001b3de1110
x26: 0000000000000000 x25: ffff0000da6d8070 x24: dfff800000000000
x23: 000000000000000e x22: 0000000000000000 x21: ffff0001b3de1100
x20: ffff0000da6d8070 x19: ffff0000eef58000 x18: 0000000000000000
x17: 0000000000042fe4 x16: ffff800080752dd0 x15: 0000000000000007
x14: 0000000000000002 x13: 0000000000000019 x12: ffff0000d490bc80
x11: 0000000000040000 x10: 000000000000800c x9 : ffff80009b54b000
x8 : 0000000000000000 x7 : 0000000000000004 x6 : ffff0000da6d8170
x5 : ffff0000da6d8038 x4 : ffff0000da6d8070 x3 : ffff80009bfed000
x2 : ffff0000eef58000 x1 : ffff0000da6d8070 x0 : 0000000000000000
Call trace:
 dev_map_enqueue+0x3c/0x38c kernel/bpf/devmap.c:539
 __xdp_do_redirect_frame net/core/filter.c:4384 [inline]
 xdp_do_redirect_frame+0x268/0x44c net/core/filter.c:4438
 xdp_test_run_batch net/bpf/test_run.c:336 [inline]
 bpf_test_run_xdp_live+0xb70/0x1924 net/bpf/test_run.c:384
 bpf_prog_test_run_xdp+0x6a8/0xfc0 net/bpf/test_run.c:1267
 bpf_prog_test_run+0x2dc/0x364 kernel/bpf/syscall.c:4269
 __sys_bpf+0x314/0x5f0 kernel/bpf/syscall.c:5678
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:5765
 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:48
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:133
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:152
 el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
Code: aa0003f6 f2fbfff8 97f80540 d343fec8 (38786908) 
---[ end trace 0000000000000000 ]---
----------------
Code disassembly (best guess):
   0:	aa0003f6 	mov	x22, x0
   4:	f2fbfff8 	movk	x24, #0xdfff, lsl #48
   8:	97f80540 	bl	0xffffffffffe01508
   c:	d343fec8 	lsr	x8, x22, #3
* 10:	38786908 	ldrb	w8, [x8, x24] <-- trapping instruction