BUG: unable to handle page fault for address: 0000000000003d50 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.5.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 RIP: 0010:strnchr+0x9/0x30 lib/string.c:403 Code: 00 f3 0f 1e fa 31 d2 0f b6 07 40 38 c6 48 0f 44 d7 48 83 c7 01 84 c0 75 ee 48 89 d0 c3 0f 1f 40 00 f3 0f 1e fa 48 01 fe eb 0f <0f> b6 07 38 d0 74 10 48 83 c7 01 84 c0 74 05 48 39 f7 75 ec 31 c0 RSP: 0018:ffffffff82e03c40 EFLAGS: 00010093 RAX: 0000000000000000 RBX: ffffffff82e03cd0 RCX: 0000000000000003 RDX: 0000000000000000 RSI: 0000000000003d53 RDI: 0000000000003d50 RBP: 0000000000003d50 R08: ffffffff82e03cd0 R09: 0000000000000000 R10: 0000000000080000 R11: 0000000000000000 R12: 0000000000000000 R13: 000000000002ed40 R14: 0000000000000003 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003d50 CR3: 000000010f3c8000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_bprintf_prepare+0x34b/0x710 kernel/bpf/helpers.c:823 ____bpf_trace_printk kernel/trace/bpf_trace.c:385 [inline] bpf_trace_printk+0x63/0x110 kernel/trace/bpf_trace.c:375 ___bpf_prog_run+0x108d/0x2360 kernel/bpf/core.c:1858 __bpf_prog_run32+0x65/0x90 kernel/bpf/core.c:2094 bpf_dispatcher_nop_func include/linux/bpf.h:1180 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2269 [inline] bpf_trace_run1+0x6a/0xf0 kernel/trace/bpf_trace.c:2307 trace_rcu_utilization include/trace/events/rcu.h:27 [inline] rcu_note_context_switch+0x324/0x570 kernel/rcu/tree_plugin.h:318 __schedule+0xa2/0xa10 kernel/sched/core.c:6610 schedule_idle+0x15/0x20 kernel/sched/core.c:6814 cpu_startup_entry+0x18/0x20 kernel/sched/idle.c:379 rest_init+0xf1/0x100 init/main.c:726 arch_call_rest_init+0x9/0x20 init/main.c:823 start_kernel+0x4ea/0x550 init/main.c:1068 x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:556 x86_64_start_kernel+0xad/0xc0 arch/x86/kernel/head64.c:537 secondary_startup_64_no_verify+0x167/0x16b Modules linked in: CR2: 0000000000003d50 ---[ end trace 0000000000000000 ]--- RIP: 0010:strnchr+0x9/0x30 lib/string.c:403 Code: 00 f3 0f 1e fa 31 d2 0f b6 07 40 38 c6 48 0f 44 d7 48 83 c7 01 84 c0 75 ee 48 89 d0 c3 0f 1f 40 00 f3 0f 1e fa 48 01 fe eb 0f <0f> b6 07 38 d0 74 10 48 83 c7 01 84 c0 74 05 48 39 f7 75 ec 31 c0 RSP: 0018:ffffffff82e03c40 EFLAGS: 00010093 RAX: 0000000000000000 RBX: ffffffff82e03cd0 RCX: 0000000000000003 RDX: 0000000000000000 RSI: 0000000000003d53 RDI: 0000000000003d50 RBP: 0000000000003d50 R08: ffffffff82e03cd0 R09: 0000000000000000 R10: 0000000000080000 R11: 0000000000000000 R12: 0000000000000000 R13: 000000000002ed40 R14: 0000000000000003 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000003d50 CR3: 000000010f3c8000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 00 f3 add %dh,%bl 2: 0f 1e fa nop %edx 5: 31 d2 xor %edx,%edx 7: 0f b6 07 movzbl (%rdi),%eax a: 40 38 c6 cmp %al,%sil d: 48 0f 44 d7 cmove %rdi,%rdx 11: 48 83 c7 01 add $0x1,%rdi 15: 84 c0 test %al,%al 17: 75 ee jne 0x7 19: 48 89 d0 mov %rdx,%rax 1c: c3 ret 1d: 0f 1f 40 00 nopl 0x0(%rax) 21: f3 0f 1e fa endbr64 25: 48 01 fe add %rdi,%rsi 28: eb 0f jmp 0x39 * 2a: 0f b6 07 movzbl (%rdi),%eax <-- trapping instruction 2d: 38 d0 cmp %dl,%al 2f: 74 10 je 0x41 31: 48 83 c7 01 add $0x1,%rdi 35: 84 c0 test %al,%al 37: 74 05 je 0x3e 39: 48 39 f7 cmp %rsi,%rdi 3c: 75 ec jne 0x2a 3e: 31 c0 xor %eax,%eax