------------[ cut here ]------------ WARNING: CPU: 0 PID: 13405 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x508/0x63c net/ipv4/af_inet.c:155 Modules linked in: CPU: 0 PID: 13405 Comm: syz-executor.0 Not tainted 6.9.0-rc5-syzkaller-00053-ge33c4963bf53 #0 Hardware name: linux,dummy-virt (DT) pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x508/0x63c net/ipv4/af_inet.c:156 lr : instrument_atomic_read include/linux/instrumented.h:68 [inline] lr : atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] lr : refcount_read include/linux/refcount.h:136 [inline] lr : inet_sock_destruct+0x320/0x63c net/ipv4/af_inet.c:154 sp : ffff800080007c50 x29: ffff800080007c50 x28: ffff000013c60d90 x27: 1fffe0000278c23e x26: ffff00000e833c00 x25: ffff000013c611e8 x24: 1fffe0000278c1b2 x23: ffff800084f2b3a0 x22: ffff000013c60d28 x21: 1fffe0000278c1a5 x20: ffff000013c60d00 x19: ffff800087cdb320 x18: ffff00000e834670 x17: 0000000000000000 x16: 0000000000000006 x15: 1fffe00001d068cd x14: 1fffe00001d068e6 x13: 1fffe00001d068ca x12: ffff60000278c1f4 x11: 1fffe0000278c1f3 x10: ffff60000278c1f3 x9 : dfff800000000000 x8 : ffff000013c60f9f x7 : 0000000000000001 x6 : ffff60000278c1f3 x5 : ffff000013c60f9c x4 : ffff60000278c1f4 x3 : 1fffe0000278c1f0 x2 : 0000000000000000 x1 : 0000000000000007 x0 : 0000000000000400 Call trace: inet_sock_destruct+0x508/0x63c net/ipv4/af_inet.c:155 inet6_sock_destruct+0x20/0x30 net/ipv6/af_inet6.c:116 __sk_destruct+0x4c/0x548 net/core/sock.c:2175 rcu_do_batch kernel/rcu/tree.c:2196 [inline] rcu_core+0x960/0x1bd0 kernel/rcu/tree.c:2471 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2488 __do_softirq+0x2e8/0xde8 kernel/softirq.c:554 ____do_softirq+0x10/0x1c arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x1c/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x334/0x434 kernel/softirq.c:633 irq_exit_rcu+0x14/0x80 kernel/softirq.c:645 __el1_irq arch/arm64/kernel/entry-common.c:537 [inline] el1_interrupt+0x38/0x54 arch/arm64/kernel/entry-common.c:551 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:556 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:176 [inline] arch_local_irq_restore arch/arm64/include/asm/irqflags.h:196 [inline] lock_acquire kernel/locking/lockdep.c:5757 [inline] lock_acquire+0x4fc/0x7f0 kernel/locking/lockdep.c:5719 fs_reclaim_acquire mm/page_alloc.c:3715 [inline] fs_reclaim_acquire+0xcc/0x178 mm/page_alloc.c:3706 might_alloc include/linux/sched/mm.h:312 [inline] slab_pre_alloc_hook mm/slub.c:3746 [inline] slab_alloc_node mm/slub.c:3827 [inline] __do_kmalloc_node mm/slub.c:3965 [inline] __kmalloc+0xb8/0x3d0 mm/slub.c:3979 kmalloc include/linux/slab.h:632 [inline] kzalloc include/linux/slab.h:749 [inline] ext4_htree_store_dirent+0x84/0x484 fs/ext4/dir.c:474 htree_dirblock_to_tree+0x498/0xac4 fs/ext4/namei.c:1140 ext4_htree_fill_tree+0x234/0x820 fs/ext4/namei.c:1219 ext4_dx_readdir fs/ext4/dir.c:597 [inline] ext4_readdir+0x125c/0x254c fs/ext4/dir.c:142 iterate_dir+0x300/0x744 fs/readdir.c:110 __do_sys_getdents64 fs/readdir.c:409 [inline] __se_sys_getdents64 fs/readdir.c:394 [inline] __arm64_sys_getdents64+0x10c/0x290 fs/readdir.c:394 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x6c/0x25c arch/arm64/kernel/syscall.c:48 el0_svc_common.constprop.0+0xac/0x230 arch/arm64/kernel/syscall.c:133 do_el0_svc_compat+0x40/0x64 arch/arm64/kernel/syscall.c:158 el0_svc_compat+0x4c/0x17c arch/arm64/kernel/entry-common.c:852 el0t_32_sync_handler+0x98/0x13c arch/arm64/kernel/entry-common.c:862 el0t_32_sync+0x194/0x198 arch/arm64/kernel/entry.S:603 irq event stamp: 257899 hardirqs last enabled at (257898): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (257898): [] _raw_spin_unlock_irqrestore+0x80/0xac kernel/locking/spinlock.c:194 hardirqs last disabled at (257899): [] el1_dbg+0x24/0x9c arch/arm64/kernel/entry-common.c:470 softirqs last enabled at (257838): [] softirq_handle_end kernel/softirq.c:400 [inline] softirqs last enabled at (257838): [] __do_softirq+0x8d4/0xde8 kernel/softirq.c:583 softirqs last disabled at (257845): [] ____do_softirq+0x10/0x1c arch/arm64/kernel/irq.c:81 ---[ end trace 0000000000000000 ]--- TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.