Oops: general protection fault, probably for non-canonical address 0xdffffc000000000c: 0000 [#1] SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067] CPU: 1 UID: 0 PID: 6038 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:print_reg_state+0x57f/0x16f0 kernel/bpf/log.c:719 Code: ff df 41 80 7c 05 00 00 74 08 4c 89 f7 e8 49 d5 43 00 49 8b 1e 48 83 c3 60 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 b6 0f 00 00 44 0f b6 23 31 ff 44 89 e6 e8 RSP: 0018:ffffc900049eee40 EFLAGS: 00010206 RAX: 000000000000000c RBX: 0000000000000060 RCX: dffffc0000000000 RDX: ffff88802fb29e00 RSI: 0000000000000000 RDI: 0000000000000003 RBP: ffffc900049ef070 R08: ffff888031d606a4 R09: 1ffff110063ac0d4 R10: dffffc0000000000 R11: ffffed10063ac0d5 R12: 0000000000000003 R13: 1ffff1100f594801 R14: ffff88807aca4008 R15: ffffffff8b923920 FS: 000055556f432500(0000) GS:ffff888125d12000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055556f432808 CR3: 000000005cb0a000 CR4: 00000000003526f0 Call Trace: print_verifier_state+0x306/0x1f40 kernel/bpf/log.c:775 do_check+0x55c8/0xe520 kernel/bpf/verifier.c:20071 do_check_common+0x1949/0x24f0 kernel/bpf/verifier.c:23264 do_check_main kernel/bpf/verifier.c:23347 [inline] bpf_check+0x1746a/0x1d2d0 kernel/bpf/verifier.c:24707 bpf_prog_load+0x1318/0x1930 kernel/bpf/syscall.c:2979 __sys_bpf+0x528/0x870 kernel/bpf/syscall.c:6029 __do_sys_bpf kernel/bpf/syscall.c:6139 [inline] __se_sys_bpf kernel/bpf/syscall.c:6137 [inline] __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6137 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc51858eec9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ffde80de128 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 RAX: ffffffffffffffda RBX: 00007fc5187e5fa0 RCX: 00007fc51858eec9 RDX: 0000000000000094 RSI: 0000200000000100 RDI: 0000000000000005 RBP: 00007fc518611f91 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fc5187e5fa0 R14: 00007fc5187e5fa0 R15: 0000000000000003 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:print_reg_state+0x57f/0x16f0 kernel/bpf/log.c:719 Code: ff df 41 80 7c 05 00 00 74 08 4c 89 f7 e8 49 d5 43 00 49 8b 1e 48 83 c3 60 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df <0f> b6 04 08 84 c0 0f 85 b6 0f 00 00 44 0f b6 23 31 ff 44 89 e6 e8 RSP: 0018:ffffc900049eee40 EFLAGS: 00010206 RAX: 000000000000000c RBX: 0000000000000060 RCX: dffffc0000000000 RDX: ffff88802fb29e00 RSI: 0000000000000000 RDI: 0000000000000003 RBP: ffffc900049ef070 R08: ffff888031d606a4 R09: 1ffff110063ac0d4 R10: dffffc0000000000 R11: ffffed10063ac0d5 R12: 0000000000000003 R13: 1ffff1100f594801 R14: ffff88807aca4008 R15: ffffffff8b923920 FS: 000055556f432500(0000) GS:ffff888125c12000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000000100 CR3: 000000005cb0a000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: df 41 80 filds -0x80(%rcx) 3: 7c 05 jl 0xa 5: 00 00 add %al,(%rax) 7: 74 08 je 0x11 9: 4c 89 f7 mov %r14,%rdi c: e8 49 d5 43 00 call 0x43d55a 11: 49 8b 1e mov (%r14),%rbx 14: 48 83 c3 60 add $0x60,%rbx 18: 48 89 d8 mov %rbx,%rax 1b: 48 c1 e8 03 shr $0x3,%rax 1f: 48 b9 00 00 00 00 00 movabs $0xdffffc0000000000,%rcx 26: fc ff df * 29: 0f b6 04 08 movzbl (%rax,%rcx,1),%eax <-- trapping instruction 2d: 84 c0 test %al,%al 2f: 0f 85 b6 0f 00 00 jne 0xfeb 35: 44 0f b6 23 movzbl (%rbx),%r12d 39: 31 ff xor %edi,%edi 3b: 44 89 e6 mov %r12d,%esi 3e: e8 .byte 0xe8