------------[ cut here ]------------
WARNING: CPU: 0 PID: 23865 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156
Modules linked in:
CPU: 0 UID: 0 PID: 23865 Comm: syz.8.5607 Not tainted 6.16.0-syzkaller-06574-gd9104cec3e8f #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156
Code: 0f 0b 90 e9 62 fe ff ff e8 fa 08 c6 f7 90 0f 0b 90 e9 95 fe ff ff e8 ec 08 c6 f7 90 0f 0b 90 e9 bb fe ff ff e8 de 08 c6 f7 90 <0f> 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc
RSP: 0018:ffffc90000007b48 EFLAGS: 00010246
RAX: ffffffff89f9a7d2 RBX: dffffc0000000000 RCX: ffff88805fcc8000
RDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000
RBP: 0000000000000fff R08: ffff88807ccd6e9f R09: 1ffff1100f99add3
R10: dffffc0000000000 R11: ffffed100f99add4 R12: ffff88807ccd6c00
R13: dffffc0000000000 R14: ffff88807ccd6e84 R15: 1ffff1100f99ad82
FS: 00007fd9cd9186c0(0000) GS:ffff888125c80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1382049160 CR3: 00000000827f6000 CR4: 00000000003526f0
Call Trace:
__sk_destruct+0x86/0x660 net/core/sock.c:2339
rcu_do_batch kernel/rcu/tree.c:2576 [inline]
rcu_core+0xca8/0x1710 kernel/rcu/tree.c:2832
handle_softirqs+0x283/0x870 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:86 [inline]
RIP: 0010:memory_is_nonzero mm/kasan/generic.c:104 [inline]
RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:129 [inline]
RIP: 0010:memory_is_poisoned mm/kasan/generic.c:161 [inline]
RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline]
RIP: 0010:kasan_check_range+0x89/0x2c0 mm/kasan/generic.c:189
Code: ff df 4f 8d 1c 17 49 ff c8 4d 89 c1 49 c1 e9 03 48 bb 01 00 00 00 00 fc ff df 4d 8d 34 19 4d 89 f4 4d 29 dc 49 83 fc 10 7f 29 <4d> 85 e4 0f 84 41 01 00 00 4c 89 cb 48 f7 d3 4c 01 fb 41 80 3b 00
RSP: 0018:ffffc9000c476e40 EFLAGS: 00000283
RAX: 1ffff9200188ed01 RBX: dffffc0000000001 RCX: ffffffff8172d8f8
RDX: 0000000000000001 RSI: 0000000000000010 RDI: ffffc9000c476fb8
RBP: 0000000000000000 R08: ffffc9000c476fc7 R09: 1ffff9200188edf8
R10: dffffc0000000000 R11: fffff5200188edf7 R12: 0000000000000002
R13: ffffc9000c476fb8 R14: fffff5200188edf9 R15: 1ffff9200188edf7
__asan_memset+0x22/0x50 mm/kasan/shadow.c:84
unwind_next_frame+0xc98/0x2390 arch/x86/kernel/unwind_orc.c:592
arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
save_stack+0xf5/0x1f0 mm/page_owner.c:156
__set_page_owner+0x8d/0x4a0 mm/page_owner.c:329
set_page_owner include/linux/page_owner.h:32 [inline]
post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1704
prep_new_page mm/page_alloc.c:1712 [inline]
get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3669
__alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:4959
alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2419
folio_alloc_mpol_noprof mm/mempolicy.c:2438 [inline]
vma_alloc_folio_noprof+0xe4/0x200 mm/mempolicy.c:2473
folio_prealloc+0x30/0x180 mm/memory.c:-1
alloc_anon_folio mm/memory.c:5032 [inline]
do_anonymous_page mm/memory.c:5089 [inline]
do_pte_missing mm/memory.c:4267 [inline]
handle_pte_fault mm/memory.c:6087 [inline]
__handle_mm_fault+0x2c88/0x5620 mm/memory.c:6230
handle_mm_fault+0x40a/0x8e0 mm/memory.c:6399
faultin_page mm/gup.c:1186 [inline]
__get_user_pages+0x1af4/0x30b0 mm/gup.c:1488
populate_vma_page_range+0x26b/0x340 mm/gup.c:1926
__mm_populate+0x24c/0x380 mm/gup.c:2029
mm_populate include/linux/mm.h:3353 [inline]
vm_mmap_pgoff+0x3f0/0x4c0 mm/util.c:584
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fd9ccb8ebe9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd9cd918038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009
RAX: ffffffffffffffda RBX: 00007fd9ccdb5fa0 RCX: 00007fd9ccb8ebe9
RDX: 000000000300000a RSI: 0000000000c00000 RDI: 0000200000001000
RBP: 00007fd9ccc11e19 R08: ffffffffffffffff R09: 0000000000000000
R10: 0000000000003032 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fd9ccdb6038 R14: 00007fd9ccdb5fa0 R15: 00007ffc622bf1b8
----------------
Code disassembly (best guess), 1 bytes skipped:
0: df 4f 8d fisttps -0x73(%rdi)
3: 1c 17 sbb $0x17,%al
5: 49 ff c8 dec %r8
8: 4d 89 c1 mov %r8,%r9
b: 49 c1 e9 03 shr $0x3,%r9
f: 48 bb 01 00 00 00 00 movabs $0xdffffc0000000001,%rbx
16: fc ff df
19: 4d 8d 34 19 lea (%r9,%rbx,1),%r14
1d: 4d 89 f4 mov %r14,%r12
20: 4d 29 dc sub %r11,%r12
23: 49 83 fc 10 cmp $0x10,%r12
27: 7f 29 jg 0x52
* 29: 4d 85 e4 test %r12,%r12 <-- trapping instruction
2c: 0f 84 41 01 00 00 je 0x173
32: 4c 89 cb mov %r9,%rbx
35: 48 f7 d3 not %rbx
38: 4c 01 fb add %r15,%rbx
3b: 41 80 3b 00 cmpb $0x0,(%r11)