------------[ cut here ]------------ WARNING: CPU: 0 PID: 4171 at mm/maccess.c:226 copy_from_user_nofault+0x160/0x1c0 mm/maccess.c:226 Modules linked in: CPU: 0 PID: 4171 Comm: syz-executor Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 RIP: 0010:copy_from_user_nofault+0x160/0x1c0 mm/maccess.c:226 Code: 24 45 31 f6 31 ff 89 de e8 6d f7 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f0 f3 d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe RSP: 0018:ffffc900000079c8 EFLAGS: 00010246 RAX: ffffffff819ed660 RBX: 0000000000000008 RCX: ffff888073995940 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff8eed2008 R09: ffffffff8eed2018 R10: ffffffff8eed2010 R11: ffffffff8eed2003 R12: ffff8880739970c8 R13: dffffc0000000000 R14: ffffc90000007a28 R15: 0000000000000000 FS: 0000555589d92500(0000) GS:ffff8880b9000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000073aa1000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: bpf_probe_read_user_common kernel/trace/bpf_trace.c:157 [inline] ____bpf_probe_read_user kernel/trace/bpf_trace.c:166 [inline] bpf_probe_read_user+0x26/0x70 kernel/trace/bpf_trace.c:163 bpf_prog_bc1f0586569ef1e7+0x3d/0x3fc bpf_dispatcher_nop_func include/linux/bpf.h:888 [inline] __bpf_prog_run include/linux/filter.h:621 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1878 [inline] bpf_trace_run1+0x23a/0x2d0 kernel/trace/bpf_trace.c:1914 trace_consume_skb+0x15d/0x1c0 include/trace/events/skb.h:71 napi_consume_skb+0x110/0x260 net/core/skbuff.c:984 free_old_xmit_skbs+0x111/0x2a0 drivers/net/virtio_net.c:1551 virtnet_poll_tx+0x1d4/0x4c0 drivers/net/virtio_net.c:1718 __napi_poll+0xc0/0x430 net/core/dev.c:7075 napi_poll net/core/dev.c:7142 [inline] net_rx_action+0x4a8/0x9c0 net/core/dev.c:7232 handle_softirqs+0x328/0x820 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] invoke_softirq kernel/softirq.c:450 [inline] __irq_exit_rcu+0x12f/0x220 kernel/softirq.c:659 irq_exit_rcu+0x5/0x20 kernel/softirq.c:671 common_interrupt+0xb5/0xd0 arch/x86/kernel/irq.c:242 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:667 RIP: 0010:unwind_next_frame+0xa1d/0x1d90 arch/x86/kernel/unwind_orc.c:548 Code: 80 3c 28 00 4c 8b 74 24 38 4c 8b 7c 24 70 74 08 4c 89 f7 e8 75 b0 87 00 48 8b 44 24 08 49 89 06 48 8b 44 24 68 42 0f b6 04 28 <84> c0 4c 8b 74 24 28 0f 85 40 10 00 00 41 c6 07 00 ba 10 00 00 00 RSP: 0018:ffffc900031ff388 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffc900031ff448 RCX: 1ffff9200063fe01 RDX: 1ffffffff1cc0688 RSI: ffffffff8e603420 RDI: ffffc900031ffbb8 RBP: ffffc900031ff490 R08: 0000000000000011 R09: 0000000000000006 R10: fffff5200063fe95 R11: 1ffff9200063fe93 R12: 1ffffffff1cc0688 R13: dffffc0000000000 R14: ffffc900031ff480 R15: ffffc900031ff47d arch_stack_walk+0x10c/0x140 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x98/0xe0 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] __kasan_slab_alloc+0x9c/0xd0 mm/kasan/common.c:467 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x4c/0x380 mm/slab.h:519 slab_alloc_node mm/slub.c:3225 [inline] kmem_cache_alloc_node+0x12d/0x2d0 mm/slub.c:3261 __alloc_skb+0xf4/0x750 net/core/skbuff.c:415 alloc_skb_fclone include/linux/skbuff.h:1212 [inline] sk_stream_alloc_skb+0x1fa/0xa60 net/ipv4/tcp.c:889 tcp_sendmsg_locked+0xc3e/0x3590 net/ipv4/tcp.c:1314 tcp_sendmsg+0x2b/0x40 net/ipv4/tcp.c:1457 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] sock_write_iter+0x29c/0x380 net/socket.c:1079 call_write_iter include/linux/fs.h:2172 [inline] new_sync_write fs/read_write.c:507 [inline] vfs_write+0x712/0xd00 fs/read_write.c:594 ksys_write+0x14d/0x250 fs/read_write.c:647 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f2fde8b0940 Code: 40 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d 21 ac 22 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89 RSP: 002b:00007ffc643b4228 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 00007ffc643b47a0 RCX: 00007f2fde8b0940 RDX: 0000000000000038 RSI: 0000555589daa578 RDI: 0000000000000003 RBP: 0000000000000000 R08: 00000000000003dc R09: 0000555589dad380 R10: 0000555589daa1b4 R11: 0000000000000202 R12: 0000000000000038 R13: 0000555589daa578 R14: 0000000000000000 R15: 00007ffc643b4780 ---------------- Code disassembly (best guess): 0: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) 4: 4c 8b 74 24 38 mov 0x38(%rsp),%r14 9: 4c 8b 7c 24 70 mov 0x70(%rsp),%r15 e: 74 08 je 0x18 10: 4c 89 f7 mov %r14,%rdi 13: e8 75 b0 87 00 call 0x87b08d 18: 48 8b 44 24 08 mov 0x8(%rsp),%rax 1d: 49 89 06 mov %rax,(%r14) 20: 48 8b 44 24 68 mov 0x68(%rsp),%rax 25: 42 0f b6 04 28 movzbl (%rax,%r13,1),%eax * 2a: 84 c0 test %al,%al <-- trapping instruction 2c: 4c 8b 74 24 28 mov 0x28(%rsp),%r14 31: 0f 85 40 10 00 00 jne 0x1077 37: 41 c6 07 00 movb $0x0,(%r15) 3b: ba 10 00 00 00 mov $0x10,%edx