------------[ cut here ]------------ WARNING: CPU: 1 PID: 7950 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x6e7/0x7f0 Modules linked in: CPU: 1 PID: 7950 Comm: modprobe Not tainted 6.1.100-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 RIP: 0010:inet_sock_destruct+0x6e7/0x7f0 net/ipv4/af_inet.c:154 Code: ff ff e8 5c 4f 6e f8 0f 0b e9 21 fe ff ff e8 50 4f 6e f8 0f 0b 41 80 3c 2c 00 0f 85 4c fe ff ff e9 4f fe ff ff e8 39 4f 6e f8 <0f> 0b e9 bb fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 0e fc ff RSP: 0000:ffffc900001e0b30 EFLAGS: 00010246 RAX: ffffffff891c4b47 RBX: 0000000000000100 RCX: ffff888074be8000 RDX: 0000000000000101 RSI: 0000000000000100 RDI: 0000000000000000 RBP: ffff88814b55cc80 R08: ffffffff891c49fc R09: ffffed10296ab9df R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff110296ab995 R13: ffff88814b55d168 R14: ffff88814b55cca8 R15: ffff88814b55cc92 FS: 00007f252c5f3380(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f252c6efd87 CR3: 000000007ec69000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __sk_destruct+0x50/0x5f0 net/core/sock.c:2139 rcu_do_batch kernel/rcu/tree.c:2296 [inline] rcu_core+0xad5/0x1810 kernel/rcu/tree.c:2556 handle_softirqs+0x2ee/0xa40 kernel/softirq.c:571 __do_softirq kernel/softirq.c:605 [inline] invoke_softirq kernel/softirq.c:445 [inline] __irq_exit_rcu+0x157/0x240 kernel/softirq.c:654 irq_exit_rcu+0x5/0x20 kernel/softirq.c:666 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1106 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:653 RIP: 0010:lock_release+0x637/0xa20 kernel/locking/lockdep.c:5686 Code: 3c 3b 00 74 08 4c 89 f7 e8 a6 88 77 00 f6 84 24 91 00 00 00 02 75 6f 41 f7 c5 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 27 00 00 00 00 4b c7 44 27 08 00 00 00 00 65 48 8b 04 25 RSP: 0000:ffffc900057df880 EFLAGS: 00000206 RAX: 0000000000000001 RBX: 1ffff92000afbf22 RCX: ffffc900057df903 RDX: 0000000000000003 RSI: ffffffff8aec13c0 RDI: ffffffff8b3d48a0 RBP: ffffc900057df9b0 R08: dffffc0000000000 R09: fffffbfff1ce7086 R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92000afbf1c R13: 0000000000000246 R14: ffffc900057df910 R15: dffffc0000000000 page_table_check_pte_set include/linux/page_table_check.h:83 [inline] set_pte_at arch/x86/include/asm/pgtable.h:1009 [inline] do_set_pte+0x584/0x590 mm/memory.c:4407 filemap_map_pages+0xc7c/0x12c0 mm/filemap.c:3452 do_fault_around mm/memory.c:4581 [inline] do_read_fault mm/memory.c:4607 [inline] do_fault mm/memory.c:4741 [inline] handle_pte_fault mm/memory.c:5013 [inline] __handle_mm_fault mm/memory.c:5155 [inline] handle_mm_fault+0x33e2/0x5340 mm/memory.c:5276 do_user_addr_fault arch/x86/mm/fault.c:1340 [inline] handle_page_fault arch/x86/mm/fault.c:1431 [inline] exc_page_fault+0x26f/0x620 arch/x86/mm/fault.c:1487 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7f252c6efd87 Code: Unable to access opcode bytes at 0x7f252c6efd5d. RSP: 002b:00007ffe3f64fc48 EFLAGS: 00010206 RAX: 0000000000800000 RBX: 0000000000000001 RCX: 0000000000001000 RDX: fffffffffffff000 RSI: 0000000000000040 RDI: 0000000000000000 RBP: 00007ffe3f64ff10 R08: 000000000000ffff R09: 000000000000000d R10: 00007ffe3f64fc50 R11: 0000000000000246 R12: 0000000000000000 R13: 0000009231755262 R14: 0000000000000000 R15: 00007f252c9262a0 ---------------- Code disassembly (best guess): 0: 3c 3b cmp $0x3b,%al 2: 00 74 08 4c add %dh,0x4c(%rax,%rcx,1) 6: 89 f7 mov %esi,%edi 8: e8 a6 88 77 00 call 0x7788b3 d: f6 84 24 91 00 00 00 testb $0x2,0x91(%rsp) 14: 02 15: 75 6f jne 0x86 17: 41 f7 c5 00 02 00 00 test $0x200,%r13d 1e: 74 01 je 0x21 20: fb sti 21: 48 c7 44 24 60 0e 36 movq $0x45e0360e,0x60(%rsp) 28: e0 45 * 2a: 4b c7 04 27 00 00 00 movq $0x0,(%r15,%r12,1) <-- trapping instruction 31: 00 32: 4b c7 44 27 08 00 00 movq $0x0,0x8(%r15,%r12,1) 39: 00 00 3b: 65 gs 3c: 48 rex.W 3d: 8b .byte 0x8b 3e: 04 25 add $0x25,%al