IPVS: ovf: UDP 224.0.0.2:0 - no destination available
IPVS: ovf: UDP 224.0.0.2:0 - no destination available
------------[ cut here ]------------
WARNING: CPU: 1 PID: 7688 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x6e7/0x7f0
Modules linked in:
CPU: 1 PID: 7688 Comm: syz.1.992 Not tainted 6.1.110-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
RIP: 0010:inet_sock_destruct+0x6e7/0x7f0 net/ipv4/af_inet.c:154
Code: ff ff e8 3c c1 53 f8 0f 0b e9 21 fe ff ff e8 30 c1 53 f8 0f 0b 41 80 3c 2c 00 0f 85 4c fe ff ff e9 4f fe ff ff e8 19 c1 53 f8 <0f> 0b e9 bb fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 0e fc ff
RSP: 0018:ffffc900001e0b30 EFLAGS: 00010246
RAX: ffffffff8936ee27 RBX: 0000000000000100 RCX: ffff88807634bb80
RDX: 0000000000000100 RSI: 0000000000000100 RDI: 0000000000000000
RBP: ffff88802e03bfc0 R08: ffffffff8936ecdc R09: ffffed1005c07847
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11005c077fd
R13: ffff88802e03c4a8 R14: ffff88802e03bfe8 R15: ffff88802e03bfd2
FS: 00007f3a51c966c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 0000000074b03000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__sk_destruct+0x50/0x5f0 net/core/sock.c:2139
rcu_do_batch kernel/rcu/tree.c:2297 [inline]
rcu_core+0xade/0x1820 kernel/rcu/tree.c:2557
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
__do_softirq kernel/softirq.c:605 [inline]
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:654
irq_exit_rcu+0x5/0x20 kernel/softirq.c:666
sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653
RIP: 0010:shmem_is_huge mm/shmem.c:472 [inline]
RIP: 0010:shmem_get_folio_gfp+0x56f/0x3470 mm/shmem.c:1933
Code: ba 09 00 00 0f b7 1b 81 e3 00 f0 00 00 bf 00 80 00 00 89 de e8 72 d4 c6 ff 81 fb 00 80 00 00 0f 85 2e 07 00 00 43 80 3c 2c 00 <48> 8b 5c 24 68 74 08 48 89 df e8 52 53 1e 00 48 8b 1b be 00 00 00
RSP: 0018:ffffc9000a9ff540 EFLAGS: 00000246
RAX: 0000000000000002 RBX: 0000000000008000 RCX: ffff88807634bb80
RDX: ffff88807634bb80 RSI: 0000000000008000 RDI: 0000000000008000
RBP: ffffc9000a9ff720 R08: ffffffff81c3ddae R09: ffffffff81c3dd14
R10: 0000000000000002 R11: ffff88807634bb80 R12: 1ffff1100a511cc1
R13: dffffc0000000000 R14: 0000000000000002 R15: 1ffff9200153fed4
shmem_fault+0x235/0x9c0 mm/shmem.c:2156
__do_fault+0x136/0x4f0 mm/memory.c:4261
do_read_fault mm/memory.c:4612 [inline]
do_fault mm/memory.c:4741 [inline]
handle_pte_fault mm/memory.c:5012 [inline]
__handle_mm_fault mm/memory.c:5154 [inline]
handle_mm_fault+0x3410/0x5340 mm/memory.c:5275
faultin_page mm/gup.c:1009 [inline]
__get_user_pages+0x4f3/0x1190 mm/gup.c:1233
populate_vma_page_range+0x217/0x2b0 mm/gup.c:1590
__mm_populate+0x275/0x440 mm/gup.c:1704
mm_populate include/linux/mm.h:2801 [inline]
vm_mmap_pgoff+0x22b/0x2d0 mm/util.c:525
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f3a50f7def9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3a51c96038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007f3a51135f80 RCX: 00007f3a50f7def9
RDX: b635773f06ebbeee RSI: 0000000000b36000 RDI: 0000000020000000
RBP: 00007f3a50ff0b76 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f3a51135f80 R15: 00007fff130481c8
----------------
Code disassembly (best guess):
0: ba 09 00 00 0f mov $0xf000009,%edx
5: b7 1b mov $0x1b,%bh
7: 81 e3 00 f0 00 00 and $0xf000,%ebx
d: bf 00 80 00 00 mov $0x8000,%edi
12: 89 de mov %ebx,%esi
14: e8 72 d4 c6 ff call 0xffc6d48b
19: 81 fb 00 80 00 00 cmp $0x8000,%ebx
1f: 0f 85 2e 07 00 00 jne 0x753
25: 43 80 3c 2c 00 cmpb $0x0,(%r12,%r13,1)
* 2a: 48 8b 5c 24 68 mov 0x68(%rsp),%rbx <-- trapping instruction
2f: 74 08 je 0x39
31: 48 89 df mov %rbx,%rdi
34: e8 52 53 1e 00 call 0x1e538b
39: 48 8b 1b mov (%rbx),%rbx
3c: be .byte 0xbe
3d: 00 00 add %al,(%rax)