------------[ cut here ]------------ WARNING: CPU: 0 PID: 23865 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156 Modules linked in: CPU: 0 UID: 0 PID: 23865 Comm: syz.8.5607 Not tainted 6.16.0-syzkaller-06574-gd9104cec3e8f #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156 Code: 0f 0b 90 e9 62 fe ff ff e8 fa 08 c6 f7 90 0f 0b 90 e9 95 fe ff ff e8 ec 08 c6 f7 90 0f 0b 90 e9 bb fe ff ff e8 de 08 c6 f7 90 <0f> 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc RSP: 0018:ffffc90000007b48 EFLAGS: 00010246 RAX: ffffffff89f9a7d2 RBX: dffffc0000000000 RCX: ffff88805fcc8000 RDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000 RBP: 0000000000000fff R08: ffff88807ccd6e9f R09: 1ffff1100f99add3 R10: dffffc0000000000 R11: ffffed100f99add4 R12: ffff88807ccd6c00 R13: dffffc0000000000 R14: ffff88807ccd6e84 R15: 1ffff1100f99ad82 FS: 00007fd9cd9186c0(0000) GS:ffff888125c80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f1382049160 CR3: 00000000827f6000 CR4: 00000000003526f0 Call Trace: __sk_destruct+0x86/0x660 net/core/sock.c:2339 rcu_do_batch kernel/rcu/tree.c:2576 [inline] rcu_core+0xca8/0x1710 kernel/rcu/tree.c:2832 handle_softirqs+0x283/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:86 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x89/0x2c0 mm/kasan/generic.c:189 Code: ff df 4f 8d 1c 17 49 ff c8 4d 89 c1 49 c1 e9 03 48 bb 01 00 00 00 00 fc ff df 4d 8d 34 19 4d 89 f4 4d 29 dc 49 83 fc 10 7f 29 <4d> 85 e4 0f 84 41 01 00 00 4c 89 cb 48 f7 d3 4c 01 fb 41 80 3b 00 RSP: 0018:ffffc9000c476e40 EFLAGS: 00000283 RAX: 1ffff9200188ed01 RBX: dffffc0000000001 RCX: ffffffff8172d8f8 RDX: 0000000000000001 RSI: 0000000000000010 RDI: ffffc9000c476fb8 RBP: 0000000000000000 R08: ffffc9000c476fc7 R09: 1ffff9200188edf8 R10: dffffc0000000000 R11: fffff5200188edf7 R12: 0000000000000002 R13: ffffc9000c476fb8 R14: fffff5200188edf9 R15: 1ffff9200188edf7 __asan_memset+0x22/0x50 mm/kasan/shadow.c:84 unwind_next_frame+0xc98/0x2390 arch/x86/kernel/unwind_orc.c:592 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25 stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122 save_stack+0xf5/0x1f0 mm/page_owner.c:156 __set_page_owner+0x8d/0x4a0 mm/page_owner.c:329 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1704 prep_new_page mm/page_alloc.c:1712 [inline] get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3669 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:4959 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2419 folio_alloc_mpol_noprof mm/mempolicy.c:2438 [inline] vma_alloc_folio_noprof+0xe4/0x200 mm/mempolicy.c:2473 folio_prealloc+0x30/0x180 mm/memory.c:-1 alloc_anon_folio mm/memory.c:5032 [inline] do_anonymous_page mm/memory.c:5089 [inline] do_pte_missing mm/memory.c:4267 [inline] handle_pte_fault mm/memory.c:6087 [inline] __handle_mm_fault+0x2c88/0x5620 mm/memory.c:6230 handle_mm_fault+0x40a/0x8e0 mm/memory.c:6399 faultin_page mm/gup.c:1186 [inline] __get_user_pages+0x1af4/0x30b0 mm/gup.c:1488 populate_vma_page_range+0x26b/0x340 mm/gup.c:1926 __mm_populate+0x24c/0x380 mm/gup.c:2029 mm_populate include/linux/mm.h:3353 [inline] vm_mmap_pgoff+0x3f0/0x4c0 mm/util.c:584 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fd9ccb8ebe9 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fd9cd918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 RAX: ffffffffffffffda RBX: 00007fd9ccdb5fa0 RCX: 00007fd9ccb8ebe9 RDX: 000000000300000a RSI: 0000000000c00000 RDI: 0000200000001000 RBP: 00007fd9ccc11e19 R08: ffffffffffffffff R09: 0000000000000000 R10: 0000000000003032 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fd9ccdb6038 R14: 00007fd9ccdb5fa0 R15: 00007ffc622bf1b8 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: df 4f 8d fisttps -0x73(%rdi) 3: 1c 17 sbb $0x17,%al 5: 49 ff c8 dec %r8 8: 4d 89 c1 mov %r8,%r9 b: 49 c1 e9 03 shr $0x3,%r9 f: 48 bb 01 00 00 00 00 movabs $0xdffffc0000000001,%rbx 16: fc ff df 19: 4d 8d 34 19 lea (%r9,%rbx,1),%r14 1d: 4d 89 f4 mov %r14,%r12 20: 4d 29 dc sub %r11,%r12 23: 49 83 fc 10 cmp $0x10,%r12 27: 7f 29 jg 0x52 * 29: 4d 85 e4 test %r12,%r12 <-- trapping instruction 2c: 0f 84 41 01 00 00 je 0x173 32: 4c 89 cb mov %r9,%rbx 35: 48 f7 d3 not %rbx 38: 4c 01 fb add %r15,%rbx 3b: 41 80 3b 00 cmpb $0x0,(%r11)