------------[ cut here ]------------
WARNING: CPU: 1 PID: 7950 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x6e7/0x7f0
Modules linked in:
CPU: 1 PID: 7950 Comm: modprobe Not tainted 6.1.100-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024
RIP: 0010:inet_sock_destruct+0x6e7/0x7f0 net/ipv4/af_inet.c:154
Code: ff ff e8 5c 4f 6e f8 0f 0b e9 21 fe ff ff e8 50 4f 6e f8 0f 0b 41 80 3c 2c 00 0f 85 4c fe ff ff e9 4f fe ff ff e8 39 4f 6e f8 <0f> 0b e9 bb fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 0e fc ff
RSP: 0000:ffffc900001e0b30 EFLAGS: 00010246
RAX: ffffffff891c4b47 RBX: 0000000000000100 RCX: ffff888074be8000
RDX: 0000000000000101 RSI: 0000000000000100 RDI: 0000000000000000
RBP: ffff88814b55cc80 R08: ffffffff891c49fc R09: ffffed10296ab9df
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110296ab995
R13: ffff88814b55d168 R14: ffff88814b55cca8 R15: ffff88814b55cc92
FS: 00007f252c5f3380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f252c6efd87 CR3: 000000007ec69000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__sk_destruct+0x50/0x5f0 net/core/sock.c:2139
rcu_do_batch kernel/rcu/tree.c:2296 [inline]
rcu_core+0xad5/0x1810 kernel/rcu/tree.c:2556
handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571
__do_softirq kernel/softirq.c:605 [inline]
invoke_softirq kernel/softirq.c:445 [inline]
__irq_exit_rcu+0x157/0x240 kernel/softirq.c:654
irq_exit_rcu+0x5/0x20 kernel/softirq.c:666
sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106
asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653
RIP: 0010:lock_release+0x637/0xa20 kernel/locking/lockdep.c:5686
Code: 3c 3b 00 74 08 4c 89 f7 e8 a6 88 77 00 f6 84 24 91 00 00 00 02 75 6f 41 f7 c5 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 27 00 00 00 00 4b c7 44 27 08 00 00 00 00 65 48 8b 04 25
RSP: 0000:ffffc900057df880 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 1ffff92000afbf22 RCX: ffffc900057df903
RDX: 0000000000000003 RSI: ffffffff8aec13c0 RDI: ffffffff8b3d48a0
RBP: ffffc900057df9b0 R08: dffffc0000000000 R09: fffffbfff1ce7086
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000afbf1c
R13: 0000000000000246 R14: ffffc900057df910 R15: dffffc0000000000
page_table_check_pte_set include/linux/page_table_check.h:83 [inline]
set_pte_at arch/x86/include/asm/pgtable.h:1009 [inline]
do_set_pte+0x584/0x590 mm/memory.c:4407
filemap_map_pages+0xc7c/0x12c0 mm/filemap.c:3452
do_fault_around mm/memory.c:4581 [inline]
do_read_fault mm/memory.c:4607 [inline]
do_fault mm/memory.c:4741 [inline]
handle_pte_fault mm/memory.c:5013 [inline]
__handle_mm_fault mm/memory.c:5155 [inline]
handle_mm_fault+0x33e2/0x5340 mm/memory.c:5276
do_user_addr_fault arch/x86/mm/fault.c:1340 [inline]
handle_page_fault arch/x86/mm/fault.c:1431 [inline]
exc_page_fault+0x26f/0x620 arch/x86/mm/fault.c:1487
asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570
RIP: 0033:0x7f252c6efd87
Code: Unable to access opcode bytes at 0x7f252c6efd5d.
RSP: 002b:00007ffe3f64fc48 EFLAGS: 00010206
RAX: 0000000000800000 RBX: 0000000000000001 RCX: 0000000000001000
RDX: fffffffffffff000 RSI: 0000000000000040 RDI: 0000000000000000
RBP: 00007ffe3f64ff10 R08: 000000000000ffff R09: 000000000000000d
R10: 00007ffe3f64fc50 R11: 0000000000000246 R12: 0000000000000000
R13: 0000009231755262 R14: 0000000000000000 R15: 00007f252c9262a0
----------------
Code disassembly (best guess):
0: 3c 3b cmp $0x3b,%al
2: 00 74 08 4c add %dh,0x4c(%rax,%rcx,1)
6: 89 f7 mov %esi,%edi
8: e8 a6 88 77 00 call 0x7788b3
d: f6 84 24 91 00 00 00 testb $0x2,0x91(%rsp)
14: 02
15: 75 6f jne 0x86
17: 41 f7 c5 00 02 00 00 test $0x200,%r13d
1e: 74 01 je 0x21
20: fb sti
21: 48 c7 44 24 60 0e 36 movq $0x45e0360e,0x60(%rsp)
28: e0 45
* 2a: 4b c7 04 27 00 00 00 movq $0x0,(%r15,%r12,1) <-- trapping instruction
31: 00
32: 4b c7 44 27 08 00 00 movq $0x0,0x8(%r15,%r12,1)
39: 00 00
3b: 65 gs
3c: 48 rex.W
3d: 8b .byte 0x8b
3e: 04 25 add $0x25,%al