------------[ cut here ]------------ WARNING: CPU: 1 PID: 19118 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156 Modules linked in: CPU: 1 UID: 0 PID: 19118 Comm: syz.5.4343 Not tainted 6.16.0-rc4-syzkaller-01139-gea988b450690 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 RIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156 Code: 0f 0b 90 e9 62 fe ff ff e8 ca d2 c8 f7 90 0f 0b 90 e9 95 fe ff ff e8 bc d2 c8 f7 90 0f 0b 90 e9 bb fe ff ff e8 ae d2 c8 f7 90 <0f> 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc RSP: 0018:ffffc90000a08b48 EFLAGS: 00010246 RAX: ffffffff89f78d52 RBX: dffffc0000000000 RCX: ffff888027701e00 RDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000 RBP: 0000000000000fff R08: ffff888024661d9f R09: 1ffff110048cc3b3 R10: dffffc0000000000 R11: ffffed10048cc3b4 R12: ffff888024661b00 R13: dffffc0000000000 R14: ffff888024661d84 R15: 1ffff110048cc362 FS: 00007f3fe98606c0(0000) GS:ffff888125d14000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000f2c030 CR3: 000000002f328000 CR4: 00000000003526f0 Call Trace: __sk_destruct+0x86/0x660 net/core/sock.c:2333 rcu_do_batch kernel/rcu/tree.c:2576 [inline] rcu_core+0xca5/0x1710 kernel/rcu/tree.c:2832 handle_softirqs+0x286/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__might_sleep+0x84/0x100 kernel/sched/core.c:8729 Code: 89 df 41 89 f4 e8 bc 66 91 00 4c 89 f7 44 89 e6 48 83 3b 00 74 09 80 3d 72 7a f9 0d 00 74 11 31 d2 5b 41 5c 41 5d 41 5e 41 5f <5d> e9 86 00 00 00 49 89 fe 41 89 f4 c6 05 52 7a f9 0d 01 90 43 80 RSP: 0018:ffffc9000fcdf9d8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffff888027701e00 RCX: 0000000000000002 RDX: 0000000000000000 RSI: 00000000000000a2 RDI: ffffffff8be24740 RBP: 0000000000000000 R08: ffffc9000fcdfad7 R09: 0000000000000000 R10: ffffc9000fcdfaa0 R11: fffff52001f9bf5b R12: dffffc0000000000 R13: dffffc0000000000 R14: ffffffff8be24740 R15: 0000000000000000 __might_fault+0x77/0x130 mm/memory.c:6969 _inline_copy_from_user include/linux/uaccess.h:162 [inline] _copy_from_user+0x28/0xb0 lib/usercopy.c:18 copy_from_user include/linux/uaccess.h:212 [inline] copy_msghdr_from_user net/socket.c:2544 [inline] recvmsg_copy_msghdr net/socket.c:2800 [inline] ___sys_recvmsg+0x12e/0x510 net/socket.c:2872 do_recvmmsg+0x307/0x770 net/socket.c:2971 __sys_recvmmsg net/socket.c:3045 [inline] __do_sys_recvmmsg net/socket.c:3068 [inline] __se_sys_recvmmsg net/socket.c:3061 [inline] __x64_sys_recvmmsg+0x190/0x240 net/socket.c:3061 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f3fe898e929 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f3fe9860038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 00007f3fe8bb5fa0 RCX: 00007f3fe898e929 RDX: 03fffffffffffdfc RSI: 00002000000099c0 RDI: 0000000000000004 RBP: 00007f3fe8a10b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000010002 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007f3fe8bb5fa0 R15: 00007ffe0f29d0a8 ---------------- Code disassembly (best guess): 0: 89 df mov %ebx,%edi 2: 41 89 f4 mov %esi,%r12d 5: e8 bc 66 91 00 call 0x9166c6 a: 4c 89 f7 mov %r14,%rdi d: 44 89 e6 mov %r12d,%esi 10: 48 83 3b 00 cmpq $0x0,(%rbx) 14: 74 09 je 0x1f 16: 80 3d 72 7a f9 0d 00 cmpb $0x0,0xdf97a72(%rip) # 0xdf97a8f 1d: 74 11 je 0x30 1f: 31 d2 xor %edx,%edx 21: 5b pop %rbx 22: 41 5c pop %r12 24: 41 5d pop %r13 26: 41 5e pop %r14 28: 41 5f pop %r15 * 2a: 5d pop %rbp <-- trapping instruction 2b: e9 86 00 00 00 jmp 0xb6 30: 49 89 fe mov %rdi,%r14 33: 41 89 f4 mov %esi,%r12d 36: c6 05 52 7a f9 0d 01 movb $0x1,0xdf97a52(%rip) # 0xdf97a8f 3d: 90 nop 3e: 43 rex.XB 3f: 80 .byte 0x80