BUG: unable to handle page fault for address: 0000001000000112 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 800000002bf80067 P4D 800000002bf80067 PUD 0 Oops: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 0 PID: 5499 Comm: syz-executor.0 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:bpf_prog_a8e24a805b35c61b+0x19/0x1e Code: cc 40 00 00 00 cc cc cc cc cc cc cc cc cc cc cc cc f3 0f 1e fa 0f 1f 44 00 00 66 90 55 48 89 e5 f3 0f 1e fa 31 c0 48 8b 7f 18 <8b> 7f 00 c9 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc RSP: 0018:ffffc90004b57b30 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc90002fde048 RCX: ffff888019789e00 RDX: 0000000000000000 RSI: ffffc90002fde048 RDI: 0000001000000112 RBP: ffffc90004b57b30 R08: ffffffff81c0af1c R09: 1ffffffff25df6a0 R10: dffffc0000000000 R11: ffffffffa0000950 R12: ffffc90002fde030 R13: ffff88802ced7d28 R14: dffffc0000000000 R15: ffff88802ced7d28 FS: 00007f67ec7016c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001000000112 CR3: 000000002a884000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline] __bpf_prog_run include/linux/filter.h:657 [inline] bpf_prog_run include/linux/filter.h:664 [inline] bpf_prog_run_array_cg kernel/bpf/cgroup.c:51 [inline] __cgroup_bpf_run_filter_setsockopt+0x6fa/0x1040 kernel/bpf/cgroup.c:1830 do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293 __sys_setsockopt+0x1ae/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [inline] __se_sys_setsockopt net/socket.c:2340 [inline] __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f67eba7de69 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f67ec7010c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00007f67ebbabf80 RCX: 00007f67eba7de69 RDX: 0000000000000010 RSI: 0000000000000112 RDI: 0000000000000007 RBP: 00007f67ebaca47a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f67ebbabf80 R15: 00007ffd789e4d28 Modules linked in: CR2: 0000001000000112 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_prog_a8e24a805b35c61b+0x19/0x1e Code: cc 40 00 00 00 cc cc cc cc cc cc cc cc cc cc cc cc f3 0f 1e fa 0f 1f 44 00 00 66 90 55 48 89 e5 f3 0f 1e fa 31 c0 48 8b 7f 18 <8b> 7f 00 c9 c3 cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc RSP: 0018:ffffc90004b57b30 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc90002fde048 RCX: ffff888019789e00 RDX: 0000000000000000 RSI: ffffc90002fde048 RDI: 0000001000000112 RBP: ffffc90004b57b30 R08: ffffffff81c0af1c R09: 1ffffffff25df6a0 R10: dffffc0000000000 R11: ffffffffa0000950 R12: ffffc90002fde030 R13: ffff88802ced7d28 R14: dffffc0000000000 R15: ffff88802ced7d28 FS: 00007f67ec7016c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001000000112 CR3: 000000002a884000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: cc int3 1: 40 00 00 rex add %al,(%rax) 4: 00 cc add %cl,%ah 6: cc int3 7: cc int3 8: cc int3 9: cc int3 a: cc int3 b: cc int3 c: cc int3 d: cc int3 e: cc int3 f: cc int3 10: cc int3 11: f3 0f 1e fa endbr64 15: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 1a: 66 90 xchg %ax,%ax 1c: 55 push %rbp 1d: 48 89 e5 mov %rsp,%rbp 20: f3 0f 1e fa endbr64 24: 31 c0 xor %eax,%eax 26: 48 8b 7f 18 mov 0x18(%rdi),%rdi * 2a: 8b 7f 00 mov 0x0(%rdi),%edi <-- trapping instruction 2d: c9 leave 2e: c3 ret 2f: cc int3 30: cc int3 31: cc int3 32: cc int3 33: cc int3 34: cc int3 35: cc int3 36: cc int3 37: cc int3 38: cc int3 39: cc int3 3a: cc int3 3b: cc int3 3c: cc int3 3d: cc int3 3e: cc int3 3f: cc int3