general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] CPU: 1 PID: 23 Comm: ksoftirqd/1 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:____bpf_get_local_storage kernel/bpf/cgroup.c:1575 [inline] RIP: 0010:bpf_get_local_storage+0xb8/0x180 kernel/bpf/cgroup.c:1557 Code: 4e 8d 74 f8 08 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 37 d8 1f 00 4d 8b 36 83 fb 15 75 5e 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 f7 e8 19 d8 1f 00 49 8b 1e e8 c1 c4 3b RSP: 0018:ffffc90000187318 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000015 RCX: 0000000000000100 RDX: ffff888100368000 RSI: 0000000000000015 RDI: 0000000000000015 RBP: ffffc90000187338 R08: dffffc0000000000 R09: ffffc900001874a0 R10: fffff52000030e97 R11: 1ffff92000030e94 R12: dffffc0000000000 R13: ffffc90000a19002 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc0d7b2288 CR3: 0000000006a0f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_prog_3647604f6c8667e9+0x25/0x38 bpf_dispatcher_nop_func include/linux/bpf.h:1001 [inline] __bpf_prog_run include/linux/filter.h:603 [inline] bpf_prog_run include/linux/filter.h:610 [inline] __bpf_prog_run_save_cb include/linux/filter.h:733 [inline] bpf_prog_run_array_cg kernel/bpf/cgroup.c:68 [inline] __cgroup_bpf_run_filter_skb+0x90e/0xf50 kernel/bpf/cgroup.c:1427 sk_filter_trim_cap+0x5bb/0x700 net/core/filter.c:141 tcp_filter net/ipv4/tcp_ipv4.c:1911 [inline] tcp_v4_rcv+0x1e83/0x2a80 net/ipv4/tcp_ipv4.c:2093 ip_protocol_deliver_rcu+0x325/0x6e0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x24e/0x410 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:302 [inline] ip_local_deliver+0x1d8/0x320 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:463 [inline] ip_rcv_finish net/ipv4/ip_input.c:449 [inline] NF_HOOK include/linux/netfilter.h:302 [inline] ip_rcv+0x163/0x270 net/ipv4/ip_input.c:569 __netif_receive_skb_one_core net/core/dev.c:5569 [inline] __netif_receive_skb+0xd7/0x2a0 net/core/dev.c:5683 process_backlog+0x351/0x600 net/core/dev.c:6011 __napi_poll+0xd0/0x5e0 net/core/dev.c:6578 napi_poll net/core/dev.c:6645 [inline] net_rx_action+0x49b/0xaa0 net/core/dev.c:6759 handle_softirqs+0x189/0x510 kernel/softirq.c:596 run_ksoftirqd+0x28/0x30 kernel/softirq.c:963 smpboot_thread_fn+0x4a0/0x910 kernel/smpboot.c:164 kthread+0x281/0x320 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:____bpf_get_local_storage kernel/bpf/cgroup.c:1575 [inline] RIP: 0010:bpf_get_local_storage+0xb8/0x180 kernel/bpf/cgroup.c:1557 Code: 4e 8d 74 f8 08 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 37 d8 1f 00 4d 8b 36 83 fb 15 75 5e 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 74 08 4c 89 f7 e8 19 d8 1f 00 49 8b 1e e8 c1 c4 3b RSP: 0018:ffffc90000187318 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 0000000000000015 RCX: 0000000000000100 RDX: ffff888100368000 RSI: 0000000000000015 RDI: 0000000000000015 RBP: ffffc90000187338 R08: dffffc0000000000 R09: ffffc900001874a0 R10: fffff52000030e97 R11: 1ffff92000030e94 R12: dffffc0000000000 R13: ffffc90000a19002 R14: 0000000000000000 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc0d7b2288 CR3: 0000000006a0f000 CR4: 00000000003506a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 4e 8d 74 f8 08 lea 0x8(%rax,%r15,8),%r14 5: 4c 89 f0 mov %r14,%rax 8: 48 c1 e8 03 shr $0x3,%rax c: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 11: 74 08 je 0x1b 13: 4c 89 f7 mov %r14,%rdi 16: e8 37 d8 1f 00 call 0x1fd852 1b: 4d 8b 36 mov (%r14),%r14 1e: 83 fb 15 cmp $0x15,%ebx 21: 75 5e jne 0x81 23: 4c 89 f0 mov %r14,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 4c 89 f7 mov %r14,%rdi 34: e8 19 d8 1f 00 call 0x1fd852 39: 49 8b 1e mov (%r14),%rbx 3c: e8 .byte 0xe8 3d: c1 c4 3b rol $0x3b,%esp