BUG: unable to handle page fault for address: fffffbfff40802f8 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 23ffe4067 P4D 23ffe4067 PUD 23ffe3067 PMD 144e3d067 PTE 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4859 Comm: kworker/0:10 Not tainted 5.18.0-rc7-syzkaller-01819-gb6d261449e6e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events bpf_prog_free_deferred RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1165 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1196 Code: 70 ed f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 82 e9 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 43 b2 ff RSP: 0018:ffffc90002f6fc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa04017c0 RCX: 0000000000000000 RDX: 1ffffffff40802f8 RSI: ffffffff8186505e RDI: ffffffffa04017c0 RBP: ffffc90013403000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff81865050 R11: 0000000000000000 R12: ffffc90013403038 R13: 0000000000000001 R14: ffffed100907fd24 R15: ffff8880483ff000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802f8 CR3: 000000000ba8e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_free_deferred+0x4e5/0x790 kernel/bpf/core.c:2563 process_one_work+0x996/0x1610 kernel/workqueue.c:2289 worker_thread+0x665/0x1080 kernel/workqueue.c:2436 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 Modules linked in: CR2: fffffbfff40802f8 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_jit_binary_pack_free kernel/bpf/core.c:1165 [inline] RIP: 0010:bpf_jit_free+0x106/0x2b0 kernel/bpf/core.c:1196 Code: 70 ed f2 ff 45 84 ed 0f 84 fe 00 00 00 e8 82 e9 f2 ff 48 83 e3 c0 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 89 df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 5c 01 00 00 8b 1f e8 43 b2 ff RSP: 0018:ffffc90002f6fc88 EFLAGS: 00010a02 RAX: dffffc0000000000 RBX: ffffffffa04017c0 RCX: 0000000000000000 RDX: 1ffffffff40802f8 RSI: ffffffff8186505e RDI: ffffffffa04017c0 RBP: ffffc90013403000 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff81865050 R11: 0000000000000000 R12: ffffc90013403038 R13: 0000000000000001 R14: ffffed100907fd24 R15: ffff8880483ff000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffbfff40802f8 CR3: 000000000ba8e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 70 ed jo 0xffffffef 2: f2 ff 45 84 repnz incl -0x7c(%rbp) 6: ed in (%dx),%eax 7: 0f 84 fe 00 00 00 je 0x10b d: e8 82 e9 f2 ff callq 0xfff2e994 12: 48 83 e3 c0 and $0xffffffffffffffc0,%rbx 16: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 1d: fc ff df 20: 48 89 da mov %rbx,%rdx 23: 48 89 df mov %rbx,%rdi 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e 5c 01 00 00 jle 0x196 3a: 8b 1f mov (%rdi),%ebx 3c: e8 .byte 0xe8 3d: 43 b2 ff rex.XB mov $0xff,%r10b