BUG: unable to handle page fault for address: ffffffffff600000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 2c26067 P4D 2c26067 PUD 2c28067 PMD 2c4b067 PTE 0 Oops: 0000 [#1] SMP PTI CPU: 0 PID: 2130 Comm: udevd Not tainted 5.11.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 RIP: 0010:strncpy_from_kernel_nofault+0x55/0xb0 mm/maccess.c:76 Code: 6f 01 00 83 80 f8 14 00 00 01 31 f6 48 89 ea eb 17 48 83 c2 01 48 83 c3 01 48 89 d0 48 29 e8 84 c9 74 2f 4c 39 e0 7d 2a 89 f0 <8a> 0a 85 c0 88 0b 74 df 65 48 8b 04 25 40 6f 01 00 83 a8 f8 14 00 RSP: 0018:ffffc9000016fac0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc9000016fb38 RCX: 0000000000000010 RDX: ffffffffff600000 RSI: 0000000000000000 RDI: ffffffffff600000 RBP: ffffffffff600000 R08: 0000000000000246 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000005 R13: ffffffffff600000 R14: ffffc9000016fc88 R15: ffff8881087ee100 FS: 00007f7303ae5c80(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010ca76000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_probe_read_kernel_str_common kernel/trace/bpf_trace.c:266 [inline] ____bpf_probe_read_kernel_str kernel/trace/bpf_trace.c:279 [inline] bpf_probe_read_kernel_str+0x2e/0x60 kernel/trace/bpf_trace.c:276 ___bpf_prog_run+0xabd/0x1450 kernel/bpf/core.c:1513 __bpf_prog_run32+0x34/0x60 kernel/bpf/core.c:1678 bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2088 [inline] bpf_trace_run2+0x58/0xd0 kernel/trace/bpf_trace.c:2125 trace_kfree include/trace/events/kmem.h:138 [inline] kfree+0x201/0x520 mm/slub.c:4108 skb_release_all net/core/skbuff.c:669 [inline] __kfree_skb net/core/skbuff.c:683 [inline] consume_skb net/core/skbuff.c:839 [inline] consume_skb+0x51/0xc0 net/core/skbuff.c:833 skb_free_datagram+0xc/0x40 net/core/datagram.c:325 unix_dgram_recvmsg+0x279/0x3d0 net/unix/af_unix.c:2179 ____sys_recvmsg+0x85/0x170 net/socket.c:2568 ___sys_recvmsg+0x7d/0x100 net/socket.c:2610 __sys_recvmsg+0x51/0xa0 net/socket.c:2646 do_syscall_64+0x34/0x50 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 RIP: 0033:0x7f7303c1e91e Code: ff 89 ef 48 89 04 24 e8 4f 57 f9 ff 48 8b 04 24 48 83 c4 30 5d c3 c3 64 8b 04 25 18 00 00 00 85 c0 75 21 b8 2f 00 00 00 0f 05 <48> 3d 00 f0 ff ff 76 70 48 8b 15 db c4 0c 00 f7 d8 64 89 02 48 83 RSP: 002b:00007ffdb2b3dbd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002f RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 00007f7303c1e91e RDX: 0000000000000040 RSI: 00007ffdb2b3dca0 RDI: 0000000000000009 RBP: 00007ffdb2b3dca0 R08: 0000000002842947 R09: 00007ffdb2bb8090 R10: 0000000000000b44 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000200000001 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: CR2: ffffffffff600000 ---[ end trace 798e83451ec2edc5 ]--- RIP: 0010:strncpy_from_kernel_nofault+0x55/0xb0 mm/maccess.c:76 Code: 6f 01 00 83 80 f8 14 00 00 01 31 f6 48 89 ea eb 17 48 83 c2 01 48 83 c3 01 48 89 d0 48 29 e8 84 c9 74 2f 4c 39 e0 7d 2a 89 f0 <8a> 0a 85 c0 88 0b 74 df 65 48 8b 04 25 40 6f 01 00 83 a8 f8 14 00 RSP: 0018:ffffc9000016fac0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffffc9000016fb38 RCX: 0000000000000010 RDX: ffffffffff600000 RSI: 0000000000000000 RDI: ffffffffff600000 RBP: ffffffffff600000 R08: 0000000000000246 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000005 R13: ffffffffff600000 R14: ffffc9000016fc88 R15: ffff8881087ee100 FS: 00007f7303ae5c80(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600000 CR3: 000000010ca76000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 6f outsl %ds:(%rsi),(%dx) 1: 01 00 add %eax,(%rax) 3: 83 80 f8 14 00 00 01 addl $0x1,0x14f8(%rax) a: 31 f6 xor %esi,%esi c: 48 89 ea mov %rbp,%rdx f: eb 17 jmp 0x28 11: 48 83 c2 01 add $0x1,%rdx 15: 48 83 c3 01 add $0x1,%rbx 19: 48 89 d0 mov %rdx,%rax 1c: 48 29 e8 sub %rbp,%rax 1f: 84 c9 test %cl,%cl 21: 74 2f je 0x52 23: 4c 39 e0 cmp %r12,%rax 26: 7d 2a jge 0x52 28: 89 f0 mov %esi,%eax * 2a: 8a 0a mov (%rdx),%cl <-- trapping instruction 2c: 85 c0 test %eax,%eax 2e: 88 0b mov %cl,(%rbx) 30: 74 df je 0x11 32: 65 48 8b 04 25 40 6f mov %gs:0x16f40,%rax 39: 01 00 3b: 83 .byte 0x83 3c: a8 f8 test $0xf8,%al 3e: 14 00 adc $0x0,%al