BUG: unable to handle page fault for address: ffffc9000172a030 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD aa000067 P4D aa000067 PUD aa1ee067 PMD a8e09067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 16482 Comm: syz-executor.5 Not tainted 5.9.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:644 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2045 [inline] RIP: 0010:bpf_trace_run3+0x145/0x3f0 kernel/trace/bpf_trace.c:2083 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 c3 00 f7 ff e8 fe 32 c3 06 31 ff 89 c3 89 c6 e8 13 fd RSP: 0018:ffffc900063e7778 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc9000172a000 RCX: ffffffff817e37b0 RDX: 0000000000000000 RSI: ffffc9000172a038 RDI: ffffc900063e77a0 RBP: 1ffff92000c7cef0 R08: 0000000000000000 R09: ffffffff8d7149a7 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: ffff888090924180 R14: 0000000000000001 R15: ffff8880946ae340 FS: 0000000002521940(0000) GS:ffff8880ae400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000172a030 CR3: 00000000626c0000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: __bpf_trace_sched_switch+0xdc/0x120 include/trace/events/sched.h:138 __traceiter_sched_switch+0x64/0xb0 include/trace/events/sched.h:138 trace_sched_switch include/trace/events/sched.h:138 [inline] __schedule+0x1197/0x2200 kernel/sched/core.c:4520 preempt_schedule_irq+0xbf/0x1b0 kernel/sched/core.c:4784 irqentry_exit_cond_resched kernel/entry/common.c:358 [inline] irqentry_exit_cond_resched kernel/entry/common.c:350 [inline] irqentry_exit+0x7a/0xa0 kernel/entry/common.c:388 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:631 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:653 [inline] RIP: 0010:kfree+0x13c/0x2a0 mm/slab.c:3759 Code: 4c 89 f2 48 89 ee 4c 89 ef e8 50 f7 ff ff 4d 85 e4 0f 85 e4 00 00 00 48 83 3d 17 5e 86 08 00 0f 84 5c 01 00 00 48 89 df 57 9d <0f> 1f 44 00 00 5b 5d 41 5c 41 5d 41 5e c3 e8 c1 5e c4 ff e9 28 ff RSP: 0018:ffffc900063e7b08 EFLAGS: 00000282 RAX: 000000000366af17 RBX: 0000000000000282 RCX: ffffffff815a9227 RDX: ffff888090924180 RSI: 0000000000000000 RDI: 0000000000000282 RBP: ffff8880897d1200 R08: 0000000000000001 R09: ffffffff8d714a1f R10: fffffbfff1ae2943 R11: 0000000000000000 R12: 0000000000000200 R13: ffff8880aa040100 R14: ffffffff81a142e2 R15: 0000000000000001 kvfree+0x42/0x50 mm/util.c:603 __vunmap+0x88a/0xac0 mm/vmalloc.c:2276 __vfree mm/vmalloc.c:2320 [inline] vfree+0x88/0x140 mm/vmalloc.c:2350 copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:883 [inline] get_entries net/ipv6/netfilter/ip6_tables.c:1040 [inline] do_ip6t_get_ctl+0x835/0xa10 net/ipv6/netfilter/ip6_tables.c:1669 nf_getsockopt+0x72/0xd0 net/netfilter/nf_sockopt.c:116 ipv6_getsockopt+0x1be/0x270 net/ipv6/ipv6_sockglue.c:1486 tcp_getsockopt+0x86/0xd0 net/ipv4/tcp.c:3880 __sys_getsockopt+0x219/0x4c0 net/socket.c:2173 __do_sys_getsockopt net/socket.c:2188 [inline] __se_sys_getsockopt net/socket.c:2185 [inline] __x64_sys_getsockopt+0xba/0x150 net/socket.c:2185 do_syscall_64+0x2d/0x70 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x46096a Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 88 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 88 fb ff c3 66 0f 1f 84 00 00 00 00 00 RSP: 002b:00007ffe3bc8e388 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 00007ffe3bc8e3b0 RCX: 000000000046096a RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 000000000074bca0 R08: 00007ffe3bc8e3ac R09: 0000000000004000 R10: 00007ffe3bc8e410 R11: 0000000000000212 R12: 00007ffe3bc8e410 R13: 0000000000000003 R14: 000000000074af20 R15: 0000000000000029 Modules linked in: CR2: ffffc9000172a030 ---[ end trace 3add61461811eadc ]--- RIP: 0010:bpf_dispatcher_nop_func include/linux/bpf.h:644 [inline] RIP: 0010:__bpf_trace_run kernel/trace/bpf_trace.c:2045 [inline] RIP: 0010:bpf_trace_run3+0x145/0x3f0 kernel/trace/bpf_trace.c:2083 Code: f7 ff 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 9f 02 00 00 48 8d 73 38 48 8d 7c 24 28 53 30 e8 c3 00 f7 ff e8 fe 32 c3 06 31 ff 89 c3 89 c6 e8 13 fd RSP: 0018:ffffc900063e7778 EFLAGS: 00010086 RAX: 0000000000000000 RBX: ffffc9000172a000 RCX: ffffffff817e37b0 RDX: 0000000000000000 RSI: ffffc9000172a038 RDI: ffffc900063e77a0 RBP: 1ffff92000c7cef0 R08: 0000000000000000 R09: ffffffff8d7149a7 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 R13: ffff888090924180 R14: 0000000000000001 R15: ffff8880946ae340 FS: 0000000002521940(0000) GS:ffff8880ae400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffc9000172a030 CR3: 00000000626c0000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600