------------[ cut here ]------------ sk->sk_forward_alloc WARNING: net/ipv4/af_inet.c:162 at inet_sock_destruct+0x62d/0x740 net/ipv4/af_inet.c:162, CPU#0: kworker/0:2/3103 Modules linked in: CPU: 0 UID: 0 PID: 3103 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Workqueue: events bpf_prog_free_deferred RIP: 0010:inet_sock_destruct+0x62d/0x740 net/ipv4/af_inet.c:162 Code: 0f 0b 90 e9 58 fe ff ff e8 30 ce 9e f7 90 0f 0b 90 e9 8b fe ff ff e8 22 ce 9e f7 90 0f 0b 90 e9 b1 fe ff ff e8 14 ce 9e f7 90 <0f> 0b 90 e9 d7 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 95 fc RSP: 0018:ffffc90000007d20 EFLAGS: 00010246 RAX: ffffffff8a26de1c RBX: dffffc0000000000 RCX: ffff888032419ec0 RDX: 0000000000000100 RSI: 0000000000000f70 RDI: 0000000000000000 RBP: 0000000000000f70 R08: ffff88807cc424a7 R09: 1ffff1100f988494 R10: dffffc0000000000 R11: ffffed100f988495 R12: ffff88807cc42200 R13: ffff88807cc42708 R14: ffff88807cc4248c R15: ffffffff8feae0c0 FS: 0000000000000000(0000) GS:ffff888125290000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000000749f0000 CR4: 00000000003526f0 Call Trace: __sk_destruct+0x8d/0x9d0 net/core/sock.c:2352 rcu_do_batch kernel/rcu/tree.c:2617 [inline] rcu_core+0x7cd/0x1070 kernel/rcu/tree.c:2869 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0xca/0x220 kernel/softirq.c:735 irq_exit_rcu+0x9/0x30 kernel/softirq.c:752 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1061 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 RIP: 0010:bytes_is_nonzero mm/kasan/generic.c:98 [inline] RIP: 0010:memory_is_nonzero mm/kasan/generic.c:115 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:140 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:172 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:191 [inline] RIP: 0010:kasan_check_range+0x97/0x2c0 mm/kasan/generic.c:200 Code: 00 fc ff df 4d 8d 34 19 4d 89 f4 4d 29 dc 49 83 fc 10 7f 29 4d 85 e4 0f 84 3d 01 00 00 4c 89 cb 48 f7 d3 4c 01 fb 41 80 3b 00 <0f> 85 9e 01 00 00 49 ff c3 48 ff c3 75 ee e9 1d 01 00 00 44 89 dd RSP: 0018:ffffc9000dbff9a8 EFLAGS: 00000246 RAX: dffffc0000000001 RBX: ffffffffffffffff RCX: ffffffff822045ff RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffffffff8e614780 RBP: 0000000000000000 R08: ffffffff8e614787 R09: 1ffffffff1cc28f0 R10: dffffc0000000000 R11: fffffbfff1cc28f0 R12: 0000000000000001 R13: 1ffff110067448f7 R14: fffffbfff1cc28f1 R15: 1ffffffff1cc28f0 instrument_atomic_read_write include/linux/instrumented.h:112 [inline] atomic_long_add_return_relaxed include/linux/atomic/atomic-instrumented.h:3334 [inline] free_vmap_area_noflush+0x14f/0x4b0 mm/vmalloc.c:2450 free_unmap_vmap_area mm/vmalloc.c:2481 [inline] remove_vm_area+0x2b5/0x300 mm/vmalloc.c:3334 vfree+0x63/0x2f0 mm/vmalloc.c:3453 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 ---------------- Code disassembly (best guess): 0: 00 fc add %bh,%ah 2: ff lcall (bad) 3: df 4d 8d fisttps -0x73(%rbp) 6: 34 19 xor $0x19,%al 8: 4d 89 f4 mov %r14,%r12 b: 4d 29 dc sub %r11,%r12 e: 49 83 fc 10 cmp $0x10,%r12 12: 7f 29 jg 0x3d 14: 4d 85 e4 test %r12,%r12 17: 0f 84 3d 01 00 00 je 0x15a 1d: 4c 89 cb mov %r9,%rbx 20: 48 f7 d3 not %rbx 23: 4c 01 fb add %r15,%rbx 26: 41 80 3b 00 cmpb $0x0,(%r11) * 2a: 0f 85 9e 01 00 00 jne 0x1ce <-- trapping instruction 30: 49 ff c3 inc %r11 33: 48 ff c3 inc %rbx 36: 75 ee jne 0x26 38: e9 1d 01 00 00 jmp 0x15a 3d: 44 89 dd mov %r11d,%ebp