IPVS: dh: UDP 224.0.0.2:0 - no destination available
------------[ cut here ]------------
WARNING: CPU: 0 PID: 19518 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x684/0x830 net/ipv4/af_inet.c:156
Modules linked in:
CPU: 0 UID: 0 PID: 19518 Comm: udevd Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:inet_sock_destruct+0x684/0x830 net/ipv4/af_inet.c:156
Code: 0f 0b 90 e9 12 fe ff ff e8 d9 4c b7 f7 90 0f 0b 90 e9 5e fe ff ff e8 cb 4c b7 f7 90 0f 0b 90 e9 94 fe ff ff e8 bd 4c b7 f7 90 <0f> 0b 90 e9 d3 fe ff ff e8 2f a0 1c f8 e9 d7 fc ff ff 4c 89 ff e8
RSP: 0018:ffffc90000007d90 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff8880788d0d80 RCX: ffffffff8a049a87
RDX: ffff88802888a440 RSI: ffffffff8a049bb3 RDI: 0000000000000005
RBP: 0000000000000fff R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000fff R11: 0000000000000001 R12: ffff8880788d0d80
R13: ffff8880788d0e10 R14: ffffc90000007e90 R15: 0000000000000000
FS: 00007fd3f12aa880(0000) GS:ffff888124720000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffc1afa9e48 CR3: 000000007dcd1000 CR4: 00000000003526f0
Call Trace:
__sk_destruct+0x81/0x980 net/core/sock.c:2347
rcu_do_batch kernel/rcu/tree.c:2576 [inline]
rcu_core+0x799/0x14e0 kernel/rcu/tree.c:2832
handle_softirqs+0x219/0x8e0 kernel/softirq.c:579
__do_softirq kernel/softirq.c:613 [inline]
invoke_softirq kernel/softirq.c:453 [inline]
__irq_exit_rcu+0x109/0x170 kernel/softirq.c:680
irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1050
asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_acquire+0x62/0x350 kernel/locking/lockdep.c:5875
Code: 76 37 12 83 f8 07 0f 87 bc 02 00 00 89 c0 48 0f a3 05 32 b6 10 0f 0f 82 74 02 00 00 8b 35 1a e8 10 0f 85 f6 0f 85 8d 00 00 00 <48> 8b 44 24 30 65 48 2b 05 c9 75 37 12 0f 85 c7 02 00 00 48 83 c4
RSP: 0018:ffffc9000566f858 EFLAGS: 00000206
RAX: 0000000000000046 RBX: ffffffff8e5c4e00 RCX: 00000000ef9d33e4
RDX: 0000000000000000 RSI: ffffffff8de0aca5 RDI: ffffffff8c1573e0
RBP: 0000000000000002 R08: 0ac0d5affe09d4ff R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
rcu_read_lock include/linux/rcupdate.h:841 [inline]
is_bpf_text_address+0x36/0x1a0 kernel/bpf/core.c:772
kernel_text_address kernel/extable.c:125 [inline]
kernel_text_address+0x8d/0x100 kernel/extable.c:94
__kernel_text_address+0xd/0x40 kernel/extable.c:79
unwind_get_return_address+0x59/0xa0 arch/x86/kernel/unwind_orc.c:369
arch_stack_walk+0xa6/0x100 arch/x86/kernel/stacktrace.c:26
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
unpoison_slab_object mm/kasan/common.c:319 [inline]
__kasan_slab_alloc+0x89/0x90 mm/kasan/common.c:345
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4148 [inline]
slab_alloc_node mm/slub.c:4197 [inline]
kmem_cache_alloc_noprof+0x1cb/0x3b0 mm/slub.c:4204
getname_flags.part.0+0x4c/0x550 fs/namei.c:146
getname_flags+0x93/0xf0 include/linux/audit.h:322
getname include/linux/fs.h:2907 [inline]
getname_maybe_null include/linux/fs.h:2914 [inline]
getname_maybe_null include/linux/fs.h:2911 [inline]
vfs_fstatat+0xe1/0xf0 fs/stat.c:370
__do_sys_newfstatat+0x97/0x120 fs/stat.c:542
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fd3f0b11b0a
Code: 48 8b 15 f1 f2 0d 00 f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 07 31 c0 c3 0f 1f 40 00 48 8b 15 b9 f2 0d 00 f7
RSP: 002b:00007ffc1afa9e48 EFLAGS: 00000202 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 00005626890bf01b RCX: 00007fd3f0b11b0a
RDX: 00007ffc1afa9e50 RSI: 00007ffc1afa9ee0 RDI: 00000000ffffff9c
RBP: 00005626b134a6d0 R08: 00005626890bf01b R09: 0000000000000000
R10: 0000000000000100 R11: 0000000000000202 R12: 00005626b134a7c0
R13: 00007ffc1afa9ee0 R14: 00007ffc1afac020 R15: 00005626890c5bcc
----------------
Code disassembly (best guess):
0: 76 37 jbe 0x39
2: 12 83 f8 07 0f 87 adc -0x78f0f808(%rbx),%al
8: bc 02 00 00 89 mov $0x89000002,%esp
d: c0 48 0f a3 rorb $0xa3,0xf(%rax)
11: 05 32 b6 10 0f add $0xf10b632,%eax
16: 0f 82 74 02 00 00 jb 0x290
1c: 8b 35 1a e8 10 0f mov 0xf10e81a(%rip),%esi # 0xf10e83c
22: 85 f6 test %esi,%esi
24: 0f 85 8d 00 00 00 jne 0xb7
* 2a: 48 8b 44 24 30 mov 0x30(%rsp),%rax <-- trapping instruction
2f: 65 48 2b 05 c9 75 37 sub %gs:0x123775c9(%rip),%rax # 0x12377600
36: 12
37: 0f 85 c7 02 00 00 jne 0x304
3d: 48 rex.W
3e: 83 .byte 0x83
3f: c4 .byte 0xc4