BUG: unable to handle page fault for address: ffffffffff600000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 2c24067 P4D 2c24067 PUD 2c26067 PMD 2c49067 PTE 0 Oops: 0000 [#1] SMP CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.11.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 RIP: 0010:strncpy_from_kernel_nofault+0x55/0xb0 mm/maccess.c:76 Code: 6f 01 00 83 80 f8 14 00 00 01 31 f6 48 89 ea eb 17 48 83 c2 01 48 83 c3 01 48 89 d0 48 29 e8 84 c9 74 2f 4c 39 e0 7d 2a 89 f0 <8a> 0a 85 c0 88 0b 74 df 65 48 8b 04 25 40 6f 01 00 83 a8 f8 14 00 RSP: 0018:ffffc9000006bd68 EFLAGS: 00010046 RAX: 0000000000000000 RBX: ffffc9000006bde8 RCX: 0000000000000010 RDX: ffffffffff600000 RSI: 0000000000000000 RDI: ffffffffff600000 RBP: ffffffffff600000 R08: 0000000000000046 R09: 0000000000000000 R10: 0000000000080000 R11: ffff888237d2a664 R12: 0000000000000008 R13: ffffffffff600000 R14: ffff888237d2b918 R15: ffff888114854d40 FS: 0000000000000000(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010ca4d000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_probe_read_kernel_str_common kernel/trace/bpf_trace.c:266 [inline] ____bpf_probe_read_compat_str kernel/trace/bpf_trace.c:318 [inline] bpf_probe_read_compat_str+0x84/0xb0 kernel/trace/bpf_trace.c:311 ___bpf_prog_run+0xe0/0x19a0 kernel/bpf/core.c:1513 __bpf_prog_run32+0x34/0x60 kernel/bpf/core.c:1678 bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] bpf_trace_run3+0x57/0xd0 kernel/trace/bpf_trace.c:2126 trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x364/0x7d0 kernel/sched/core.c:5061 schedule_idle+0x15/0x20 kernel/sched/core.c:5171 do_idle+0x14f/0x250 kernel/sched/idle.c:327 cpu_startup_entry+0x14/0x20 kernel/sched/idle.c:396 secondary_startup_64_no_verify+0xb0/0xbb Modules linked in: CR2: ffffffffff600000 ---[ end trace 58313617f7b173dd ]--- RIP: 0010:strncpy_from_kernel_nofault+0x55/0xb0 mm/maccess.c:76 Code: 6f 01 00 83 80 f8 14 00 00 01 31 f6 48 89 ea eb 17 48 83 c2 01 48 83 c3 01 48 89 d0 48 29 e8 84 c9 74 2f 4c 39 e0 7d 2a 89 f0 <8a> 0a 85 c0 88 0b 74 df 65 48 8b 04 25 40 6f 01 00 83 a8 f8 14 00 RSP: 0018:ffffc9000006bd68 EFLAGS: 00010046 RAX: 0000000000000000 RBX: ffffc9000006bde8 RCX: 0000000000000010 RDX: ffffffffff600000 RSI: 0000000000000000 RDI: ffffffffff600000 RBP: ffffffffff600000 R08: 0000000000000046 R09: 0000000000000000 R10: 0000000000080000 R11: ffff888237d2a664 R12: 0000000000000008 R13: ffffffffff600000 R14: ffff888237d2b918 R15: ffff888114854d40 FS: 0000000000000000(0000) GS:ffff888237d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010ca4d000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 6f outsl %ds:(%rsi),(%dx) 1: 01 00 add %eax,(%rax) 3: 83 80 f8 14 00 00 01 addl $0x1,0x14f8(%rax) a: 31 f6 xor %esi,%esi c: 48 89 ea mov %rbp,%rdx f: eb 17 jmp 0x28 11: 48 83 c2 01 add $0x1,%rdx 15: 48 83 c3 01 add $0x1,%rbx 19: 48 89 d0 mov %rdx,%rax 1c: 48 29 e8 sub %rbp,%rax 1f: 84 c9 test %cl,%cl 21: 74 2f je 0x52 23: 4c 39 e0 cmp %r12,%rax 26: 7d 2a jge 0x52 28: 89 f0 mov %esi,%eax * 2a: 8a 0a mov (%rdx),%cl <-- trapping instruction 2c: 85 c0 test %eax,%eax 2e: 88 0b mov %cl,(%rbx) 30: 74 df je 0x11 32: 65 48 8b 04 25 40 6f mov %gs:0x16f40,%rax 39: 01 00 3b: 83 .byte 0x83 3c: a8 f8 test $0xf8,%al 3e: 14 00 adc $0x0,%al