------------[ cut here ]------------ WARNING: CPU: 1 PID: 3561 at mm/maccess.c:226 copy_from_user_nofault+0x160/0x1c0 mm/maccess.c:226 Modules linked in: CPU: 1 PID: 3561 Comm: udevd Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 RIP: 0010:copy_from_user_nofault+0x160/0x1c0 mm/maccess.c:226 Code: 24 45 31 f6 31 ff 89 de e8 8d f6 d8 ff 85 db 48 c7 c0 f2 ff ff ff 49 0f 44 c6 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 10 f3 d8 ff <0f> 0b e9 1c ff ff ff 44 89 e1 80 e1 07 80 c1 03 38 c1 0f 8c ea fe RSP: 0018:ffffc90000dd0298 EFLAGS: 00010246 RAX: ffffffff819ed900 RBX: 0000000000000000 RCX: ffff88807e19d940 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: dffffc0000000000 R09: ffffed100fc33b29 R10: ffffed100fc33b29 R11: 1ffff1100fc33b28 R12: ffff88807e19f0c8 R13: 00007ffffffff000 R14: ffffc90000dd0308 R15: 0000000000000000 FS: 00007f4177b7e880(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005555683a1808 CR3: 00000000292c6000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: bpf_probe_read_user_common kernel/trace/bpf_trace.c:157 [inline] ____bpf_probe_read_compat kernel/trace/bpf_trace.c:281 [inline] bpf_probe_read_compat+0xdd/0x170 kernel/trace/bpf_trace.c:277 bpf_prog_3d2613b5dfc7747f+0x32/0x5c bpf_dispatcher_nop_func include/linux/bpf.h:888 [inline] __bpf_prog_run include/linux/filter.h:628 [inline] bpf_prog_run include/linux/filter.h:635 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:1878 [inline] bpf_trace_run5+0x1ae/0x370 kernel/trace/bpf_trace.c:1918 __traceiter_neigh_update+0x91/0xe0 include/trace/events/neigh.h:72 trace_neigh_update include/trace/events/neigh.h:72 [inline] __neigh_update+0x1e79/0x1ff0 net/core/neighbour.c:1246 neigh_update net/core/neighbour.c:1429 [inline] neigh_event_ns+0xad/0x120 net/core/neighbour.c:1458 arp_process+0x14fc/0x1a30 net/ipv4/arp.c:830 NF_HOOK+0x2d4/0x360 include/linux/netfilter.h:302 __netif_receive_skb_list_ptype net/core/dev.c:5573 [inline] __netif_receive_skb_list_core+0x6db/0x740 net/core/dev.c:5616 __netif_receive_skb_list net/core/dev.c:5668 [inline] netif_receive_skb_list_internal+0x871/0xb90 net/core/dev.c:5759 gro_normal_list net/core/dev.c:5913 [inline] napi_complete_done+0x37d/0x830 net/core/dev.c:6651 virtqueue_napi_complete drivers/net/virtio_net.c:357 [inline] virtnet_poll+0x912/0xef0 drivers/net/virtio_net.c:1624 __napi_poll+0xc0/0x430 net/core/dev.c:7075 napi_poll net/core/dev.c:7142 [inline] net_rx_action+0x4a8/0x9c0 net/core/dev.c:7232 handle_softirqs+0x328/0x820 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] invoke_softirq kernel/softirq.c:450 [inline] __irq_exit_rcu+0x12f/0x220 kernel/softirq.c:659 irq_exit_rcu+0x5/0x20 kernel/softirq.c:671 common_interrupt+0xb5/0xd0 arch/x86/kernel/irq.c:242 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:667 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/irqflags.h:-1 [inline] RIP: 0010:___slab_alloc+0x994/0xdf0 mm/slub.c:3001 Code: 00 9c 8f 44 24 38 f7 44 24 38 00 02 00 00 4d 89 f4 0f 85 93 00 00 00 41 f7 c7 00 02 00 00 44 8b 74 24 0c 74 01 fb 44 8b 2c 24 <49> bf 00 00 ff 7f ff ff ff ff e9 13 f7 ff ff 4c 8b 2b e8 b5 fa ed RSP: 0018:ffffc90002ebfcd0 EFLAGS: 00000206 RAX: 47411e287340c000 RBX: ffff8880169e9500 RCX: 47411e287340c000 RDX: dffffc0000000000 RSI: ffffffff8a0b1c60 RDI: ffffffff8a59e580 RBP: ffffea0000839a00 R08: dffffc0000000000 R09: fffffbfff1ad33a6 R10: fffffbfff1ad33a6 R11: 1ffffffff1ad33a5 R12: ffff8880b91414d0 R13: 00000000ffffffff R14: 0000000000000cc0 R15: 0000000000000286 __slab_alloc mm/slub.c:3100 [inline] slab_alloc_node mm/slub.c:3191 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc+0x195/0x290 mm/slub.c:3238 getname_flags+0xb5/0x500 fs/namei.c:138 user_path_at_empty+0x2a/0x190 fs/namei.c:2890 do_readlinkat+0xd4/0x480 fs/stat.c:442 __do_sys_readlink fs/stat.c:475 [inline] __se_sys_readlink fs/stat.c:472 [inline] __x64_sys_readlink+0x7b/0x90 fs/stat.c:472 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f4177cda3a7 Code: 00 00 90 48 83 ec 10 48 63 ff 45 31 c9 45 31 c0 6a 00 31 c9 e8 8a 20 f9 ff 48 83 c4 18 c3 0f 1f 44 00 00 b8 59 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 21 ba 0d 00 f7 d8 64 89 02 48 RSP: 002b:00007ffe2e22b8a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 RAX: ffffffffffffffda RBX: 00007ffe2e22bd80 RCX: 00007f4177cda3a7 RDX: 0000000000000400 RSI: 00007ffe2e22b8b0 RDI: 00007ffe2e22bd80 RBP: 00007ffe2e22b8b0 R08: 00005612eeed6a14 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000400 R13: 0000000000000100 R14: 00005612dc0e7be0 R15: 00007ffe2e22c810 ---------------- Code disassembly (best guess): 0: 00 9c 8f 44 24 38 f7 add %bl,-0x8c7dbbc(%rdi,%rcx,4) 7: 44 24 38 rex.R and $0x38,%al a: 00 02 add %al,(%rdx) c: 00 00 add %al,(%rax) e: 4d 89 f4 mov %r14,%r12 11: 0f 85 93 00 00 00 jne 0xaa 17: 41 f7 c7 00 02 00 00 test $0x200,%r15d 1e: 44 8b 74 24 0c mov 0xc(%rsp),%r14d 23: 74 01 je 0x26 25: fb sti 26: 44 8b 2c 24 mov (%rsp),%r13d * 2a: 49 bf 00 00 ff 7f ff movabs $0xffffffff7fff0000,%r15 <-- trapping instruction 31: ff ff ff 34: e9 13 f7 ff ff jmp 0xfffff74c 39: 4c 8b 2b mov (%rbx),%r13 3c: e8 .byte 0xe8 3d: b5 fa mov $0xfa,%ch 3f: ed in (%dx),%eax