BUG: unable to handle page fault for address: ffffffffa0000fe4 #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD ba8f067 P4D ba8f067 PUD ba90063 PMD 1450dc067 PTE 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 1 PID: 3605 Comm: syz-fuzzer Not tainted 5.19.0-rc8-syzkaller-00122-g9fe2e6f39606 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 RIP: 0010:bpf_prog_9d4bccaf8ccaf0dc_F+0x0/0xd Code: Unable to access opcode bytes at RIP 0xffffffffa0000fba. RSP: 0000:ffffc90002f4fbc0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffffc90003b53000 RCX: 0000000000000000 RDX: 1ffff9200076a606 RSI: ffffc90003b53048 RDI: 00000000ffff8880 RBP: ffffc90002f4fbc8 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000001 R13: ffff888025183b00 R14: ffff88801dfc3b00 R15: 0000000000000000 FS: 000000000183d070(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffa0000fba CR3: 000000004cfc4000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_dispatcher_nop_func include/linux/bpf.h:869 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2046 [inline] bpf_trace_run4+0x124/0x360 kernel/trace/bpf_trace.c:2085 __bpf_trace_sched_switch+0x115/0x160 include/trace/events/sched.h:222 __traceiter_sched_switch+0x68/0xb0 include/trace/events/sched.h:222 trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x145b/0x4b50 kernel/sched/core.c:6455 schedule+0xd2/0x1f0 kernel/sched/core.c:6530 exit_to_user_mode_loop kernel/entry/common.c:157 [inline] exit_to_user_mode_prepare+0x142/0x250 kernel/entry/common.c:201 irqentry_exit_to_user_mode+0x5/0x30 kernel/entry/common.c:307 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:649 RIP: 0033:0x41e6bc Code: 30 77 14 4c 8b 57 48 47 0f b6 14 02 66 90 45 84 e2 0f 84 40 01 00 00 41 0f b6 14 10 41 84 d4 0f 85 9a 00 00 00 90 f0 45 08 21 <48> 8b 15 35 78 44 01 84 02 90 90 48 8b 4f 18 90 49 b8 00 00 00 00 RSP: 002b:00007ffcce1aa6a8 EFLAGS: 00000206 RAX: 000000c00ce3bf50 RBX: 000000c00ce3d400 RCX: 0000000000000005 RDX: 000000000000001f RSI: 000000c000021698 RDI: 00007fbbca872b98 RBP: 00007ffcce1aa6e8 R08: 000000000000003e R09: 00007fbbc247d68e R10: 00000000000001f5 R11: 0000000000000228 R12: 0000000000000020 R13: 000000c00ce3bf50 R14: 000000000183cc00 R15: 0000000000ac7d40 Modules linked in: CR2: ffffffffa0000fe4 ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_prog_9d4bccaf8ccaf0dc_F+0x0/0xd Code: Unable to access opcode bytes at RIP 0xffffffffa0000fba. RSP: 0000:ffffc90002f4fbc0 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffffc90003b53000 RCX: 0000000000000000 RDX: 1ffff9200076a606 RSI: ffffc90003b53048 RDI: 00000000ffff8880 RBP: ffffc90002f4fbc8 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000001 R13: ffff888025183b00 R14: ffff88801dfc3b00 R15: 0000000000000000 FS: 000000000183d070(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffa0000fba CR3: 000000004cfc4000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400