Oops: general protection fault, probably for non-canonical address 0xdffffc00000002d4: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x00000000000016a0-0x00000000000016a7] CPU: 1 PID: 13553 Comm: syz.1.2415 Not tainted 6.10.0-syzkaller-08280-g68b59730459e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:__cpu_map_flush+0x48/0x110 kernel/bpf/cpumap.c:766 Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 d1 00 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 26 49 8d 6c 24 c0 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 a1 00 00 00 49 8b 04 24 4d 39 e6 48 8d 58 c0 74 RSP: 0018:ffffc90000a18c88 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: ffffc900033bfa18 RCX: ffffffff88d70d39 RDX: 00000000000002d4 RSI: ffffffff81b4ee34 RDI: ffffc900033bfa58 RBP: 0000000000001662 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff8b2f43c0 R12: 00000000000016a2 R13: ffff8880226206c8 R14: ffffc900033bfa58 R15: ffffc90000a18dd8 FS: 00007fad58db86c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000001ebf4000 CR4: 0000000000350ef0 Call Trace: xdp_do_check_flushed+0x308/0x4e0 net/core/filter.c:4304 __napi_poll.constprop.0+0xd1/0x550 net/core/dev.c:6774 napi_poll net/core/dev.c:6840 [inline] net_rx_action+0xa92/0x1010 net/core/dev.c:6962 handle_softirqs+0x219/0x8f0 kernel/softirq.c:554 __do_softirq kernel/softirq.c:588 [inline] invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu kernel/softirq.c:637 [inline] irq_exit_rcu+0xbb/0x120 kernel/softirq.c:649 common_interrupt+0xb0/0xd0 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 RIP: 0010:do_user_addr_fault+0x282/0x13f0 arch/x86/mm/fault.c:1320 Code: ff 48 25 00 f0 ff ff 48 89 04 24 41 83 e7 03 44 89 fe e8 41 4c 51 00 66 45 85 ff 0f 85 a5 01 00 00 e8 62 51 51 00 4c 8b 3c 24 <48> c7 c7 00 00 60 ff 4c 89 fe e8 7f 4c 51 00 49 81 ff 00 00 60 ff RSP: 0018:ffffc900033bf978 EFLAGS: 00000283 RAX: 00000000000016b5 RBX: 0000000000000000 RCX: ffffc900144df000 RDX: 0000000000040000 RSI: ffffffff813dbdae RDI: 0000000000000003 RBP: ffffc900033bfa08 R08: 0000000000000003 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000214 R14: ffff888011ee4280 R15: 0000000000000000 handle_page_fault arch/x86/mm/fault.c:1481 [inline] exc_page_fault+0x5c/0xc0 arch/x86/mm/fault.c:1539 asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623 RIP: 0010:do_strncpy_from_user lib/strncpy_from_user.c:72 [inline] RIP: 0010:strncpy_from_user+0x23d/0x320 lib/strncpy_from_user.c:139 Code: 0f 84 8b 00 00 00 e8 22 d5 d9 fc 48 83 c3 01 48 83 ed 01 31 ff 48 89 ee e8 40 d0 d9 fc 48 85 ed 74 55 e8 06 d5 d9 fc 45 31 ff <41> 8a 04 1c 31 ff 44 89 fe 41 89 c6 e8 f2 cf d9 fc 45 85 ff 0f 84 RSP: 0018:ffffc900033bfab8 EFLAGS: 00050246 RAX: 00000000000016a2 RBX: 0000000000000000 RCX: ffffc900144df000 RDX: 0000000000040000 RSI: ffffffff84b53a0a RDI: 0000000000000007 RBP: 000000000000007f R08: 0000000000000007 R09: 0000000000000000 R10: 000000000000007f R11: 0000000000000000 R12: 0000000000000000 R13: ffffc900033bfbd0 R14: 0000000000000000 R15: 0000000000000000 strncpy_from_bpfptr include/linux/bpfptr.h:86 [inline] bpf_prog_load+0x1c30/0x2660 kernel/bpf/syscall.c:2849 __sys_bpf+0x8e9/0x4a30 kernel/bpf/syscall.c:5710 __do_sys_bpf kernel/bpf/syscall.c:5817 [inline] __se_sys_bpf kernel/bpf/syscall.c:5815 [inline] __x64_sys_bpf+0x78/0xc0 kernel/bpf/syscall.c:5815 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fad57f75b59 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fad58db8048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fad58105f60 RCX: 00007fad57f75b59 RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 RBP: 00007fad57fe4e5d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007fad58105f60 R15: 00007ffe64c68888 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__cpu_map_flush+0x48/0x110 kernel/bpf/cpumap.c:766 Code: fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 d1 00 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 26 49 8d 6c 24 c0 4c 89 e2 48 c1 ea 03 <80> 3c 02 00 0f 85 a1 00 00 00 49 8b 04 24 4d 39 e6 48 8d 58 c0 74 RSP: 0018:ffffc90000a18c88 EFLAGS: 00010216 RAX: dffffc0000000000 RBX: ffffc900033bfa18 RCX: ffffffff88d70d39 RDX: 00000000000002d4 RSI: ffffffff81b4ee34 RDI: ffffc900033bfa58 RBP: 0000000000001662 R08: 0000000000000005 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff8b2f43c0 R12: 00000000000016a2 R13: ffff8880226206c8 R14: ffffc900033bfa58 R15: ffffc90000a18dd8 FS: 00007fad58db86c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000001ebf4000 CR4: 0000000000350ef0 ---------------- Code disassembly (best guess), 3 bytes skipped: 0: 48 c1 ea 03 shr $0x3,%rdx 4: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 8: 0f 85 d1 00 00 00 jne 0xdf e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 15: fc ff df 18: 4d 8b 26 mov (%r14),%r12 1b: 49 8d 6c 24 c0 lea -0x40(%r12),%rbp 20: 4c 89 e2 mov %r12,%rdx 23: 48 c1 ea 03 shr $0x3,%rdx * 27: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2b: 0f 85 a1 00 00 00 jne 0xd2 31: 49 8b 04 24 mov (%r12),%rax 35: 4d 39 e6 cmp %r12,%r14 38: 48 8d 58 c0 lea -0x40(%rax),%rbx 3c: 74 .byte 0x74