BUG: unable to handle page fault for address: ffffffffa0000ecc #PF: supervisor instruction fetch in kernel mode #PF: error_code(0x0010) - not-present page PGD ba8f067 P4D ba8f067 PUD ba90063 PMD 16a05067 PTE 0 Oops: 0010 [#1] PREEMPT SMP KASAN CPU: 0 PID: 16 Comm: pr/ttyS0 Not tainted 5.19.0-rc2-syzkaller-00498-gb0d93b44641a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 RIP: 0010:bpf_prog_9d4bccaf8ccaf0dc_F+0x0/0xd Code: Unable to access opcode bytes at RIP 0xffffffffa0000ea2. RSP: 0018:ffffc90000157798 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffffc900071a3000 RCX: 0000000000000000 RDX: 1ffff92000e34606 RSI: ffffc900071a3048 RDI: 00000000ffff8880 RBP: ffffc900001577a0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000001 R13: ffff88807f2a5880 R14: ffff888011a85880 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffa0000ea2 CR3: 000000004f0ad000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_dispatcher_nop_func include/linux/bpf.h:890 [inline] __bpf_prog_run include/linux/filter.h:594 [inline] bpf_prog_run include/linux/filter.h:601 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2046 [inline] bpf_trace_run4+0x124/0x360 kernel/trace/bpf_trace.c:2085 __bpf_trace_sched_switch+0x115/0x160 include/trace/events/sched.h:222 __traceiter_sched_switch+0x68/0xb0 include/trace/events/sched.h:222 trace_sched_switch include/trace/events/sched.h:222 [inline] __schedule+0x145b/0x4b30 kernel/sched/core.c:6425 preempt_schedule_common+0x45/0xc0 kernel/sched/core.c:6593 preempt_schedule_thunk+0x16/0x18 arch/x86/entry/thunk_64.S:35 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x57/0x70 kernel/locking/spinlock.c:194 spin_unlock_irqrestore include/linux/spinlock.h:404 [inline] serial8250_console_write+0xd97/0xfe0 drivers/tty/serial/8250/8250_port.c:3465 call_console_driver kernel/printk/printk.c:2075 [inline] __console_emit_next_record+0x896/0xa60 kernel/printk/printk.c:2916 console_emit_next_record kernel/printk/printk.c:3721 [inline] printk_kthread_func.cold+0x702/0x73d kernel/printk/printk.c:3837 kthread+0x2e9/0x3a0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302 Modules linked in: CR2: ffffffffa0000ecc ---[ end trace 0000000000000000 ]--- RIP: 0010:bpf_prog_9d4bccaf8ccaf0dc_F+0x0/0xd Code: Unable to access opcode bytes at RIP 0xffffffffa0000ea2. RSP: 0018:ffffc90000157798 EFLAGS: 00010046 RAX: dffffc0000000000 RBX: ffffc900071a3000 RCX: 0000000000000000 RDX: 1ffff92000e34606 RSI: ffffc900071a3048 RDI: 00000000ffff8880 RBP: ffffc900001577a0 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000001 R13: ffff88807f2a5880 R14: ffff888011a85880 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffa0000ea2 CR3: 000000004f0ad000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400