IPVS: ovf: UDP 224.0.0.2:0 - no destination available IPVS: ovf: UDP 224.0.0.2:0 - no destination available ------------[ cut here ]------------ WARNING: CPU: 1 PID: 7688 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x6e7/0x7f0 Modules linked in: CPU: 1 PID: 7688 Comm: syz.1.992 Not tainted 6.1.110-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 RIP: 0010:inet_sock_destruct+0x6e7/0x7f0 net/ipv4/af_inet.c:154 Code: ff ff e8 3c c1 53 f8 0f 0b e9 21 fe ff ff e8 30 c1 53 f8 0f 0b 41 80 3c 2c 00 0f 85 4c fe ff ff e9 4f fe ff ff e8 19 c1 53 f8 <0f> 0b e9 bb fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 0e fc ff RSP: 0018:ffffc900001e0b30 EFLAGS: 00010246 RAX: ffffffff8936ee27 RBX: 0000000000000100 RCX: ffff88807634bb80 RDX: 0000000000000100 RSI: 0000000000000100 RDI: 0000000000000000 RBP: ffff88802e03bfc0 R08: ffffffff8936ecdc R09: ffffed1005c07847 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff11005c077fd R13: ffff88802e03c4a8 R14: ffff88802e03bfe8 R15: ffff88802e03bfd2 FS: 00007f3a51c966c0(0000) GS:ffff8880b8f00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 0000000074b03000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __sk_destruct+0x50/0x5f0 net/core/sock.c:2139 rcu_do_batch kernel/rcu/tree.c:2297 [inline] rcu_core+0xade/0x1820 kernel/rcu/tree.c:2557 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 __do_softirq kernel/softirq.c:605 [inline] invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x157/0x240 kernel/softirq.c:654 irq_exit_rcu+0x5/0x20 kernel/softirq.c:666 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653 RIP: 0010:shmem_is_huge mm/shmem.c:472 [inline] RIP: 0010:shmem_get_folio_gfp+0x56f/0x3470 mm/shmem.c:1933 Code: ba 09 00 00 0f b7 1b 81 e3 00 f0 00 00 bf 00 80 00 00 89 de e8 72 d4 c6 ff 81 fb 00 80 00 00 0f 85 2e 07 00 00 43 80 3c 2c 00 <48> 8b 5c 24 68 74 08 48 89 df e8 52 53 1e 00 48 8b 1b be 00 00 00 RSP: 0018:ffffc9000a9ff540 EFLAGS: 00000246 RAX: 0000000000000002 RBX: 0000000000008000 RCX: ffff88807634bb80 RDX: ffff88807634bb80 RSI: 0000000000008000 RDI: 0000000000008000 RBP: ffffc9000a9ff720 R08: ffffffff81c3ddae R09: ffffffff81c3dd14 R10: 0000000000000002 R11: ffff88807634bb80 R12: 1ffff1100a511cc1 R13: dffffc0000000000 R14: 0000000000000002 R15: 1ffff9200153fed4 shmem_fault+0x235/0x9c0 mm/shmem.c:2156 __do_fault+0x136/0x4f0 mm/memory.c:4261 do_read_fault mm/memory.c:4612 [inline] do_fault mm/memory.c:4741 [inline] handle_pte_fault mm/memory.c:5012 [inline] __handle_mm_fault mm/memory.c:5154 [inline] handle_mm_fault+0x3410/0x5340 mm/memory.c:5275 faultin_page mm/gup.c:1009 [inline] __get_user_pages+0x4f3/0x1190 mm/gup.c:1233 populate_vma_page_range+0x217/0x2b0 mm/gup.c:1590 __mm_populate+0x275/0x440 mm/gup.c:1704 mm_populate include/linux/mm.h:2801 [inline] vm_mmap_pgoff+0x22b/0x2d0 mm/util.c:525 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x3b/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7f3a50f7def9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3a51c96038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007f3a51135f80 RCX: 00007f3a50f7def9 RDX: b635773f06ebbeee RSI: 0000000000b36000 RDI: 0000000020000000 RBP: 00007f3a50ff0b76 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f3a51135f80 R15: 00007fff130481c8 ---------------- Code disassembly (best guess): 0: ba 09 00 00 0f mov $0xf000009,%edx 5: b7 1b mov $0x1b,%bh 7: 81 e3 00 f0 00 00 and $0xf000,%ebx d: bf 00 80 00 00 mov $0x8000,%edi 12: 89 de mov %ebx,%esi 14: e8 72 d4 c6 ff call 0xffc6d48b 19: 81 fb 00 80 00 00 cmp $0x8000,%ebx 1f: 0f 85 2e 07 00 00 jne 0x753 25: 43 80 3c 2c 00 cmpb $0x0,(%r12,%r13,1) * 2a: 48 8b 5c 24 68 mov 0x68(%rsp),%rbx <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 52 53 1e 00 call 0x1e538b 39: 48 8b 1b mov (%rbx),%rbx 3c: be .byte 0xbe 3d: 00 00 add %al,(%rax)