------------[ cut here ]------------ WARNING: CPU: 0 PID: 5937 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:155 Modules linked in: CPU: 0 PID: 5937 Comm: syz-executor138 Not tainted 6.7.0-rc8-syzkaller-g0802e17d9aca #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:155 lr : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:155 sp : ffff800080007c90 x29: ffff800080007c90 x28: ffff0000cd5eb8e8 x27: 0000000000000007 x26: 1fffe00019abd6ac x25: dfff800000000000 x24: 1fffe00019abd682 x23: 1fffe00019abd685 x22: 0000000000000007 x21: 0000000000000000 x20: 0000000000000300 x19: ffff0000cd5eb400 x18: ffff0001b4145d68 x17: ffff800125cea000 x16: ffff80008051d40c x15: 0000000000000001 x14: 1fffe00019abd6ce x13: 0000000000000000 x12: 0000000000000000 x11: ffff600019abd6cf x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000cac99e00 x7 : ffff8000803d5328 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff8000892da374 x2 : 0000000000000000 x1 : 0000000000000300 x0 : 0000000000000000 Call trace: inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:155 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:115 __sk_destruct+0x5c/0x74c net/core/sock.c:2170 rcu_do_batch kernel/rcu/tree.c:2158 [inline] rcu_core+0x890/0x1b34 kernel/rcu/tree.c:2431 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2448 __do_softirq+0x2d8/0xce4 kernel/softirq.c:553 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:886 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:434 [inline] __irq_exit_rcu+0x1d8/0x434 kernel/softirq.c:632 irq_exit_rcu+0x14/0x84 kernel/softirq.c:644 __el1_irq arch/arm64/kernel/entry-common.c:503 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:517 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:522 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:591 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:176 [inline] arch_local_irq_restore arch/arm64/include/asm/irqflags.h:196 [inline] mod_lruvec_page_state include/linux/vmstat.h:569 [inline] lruvec_stat_mod_folio include/linux/vmstat.h:645 [inline] lruvec_stat_sub_folio include/linux/vmstat.h:657 [inline] pagetable_pud_dtor+0x164/0x200 include/linux/mm.h:3080 __pud_free_tlb arch/arm64/include/asm/tlb.h:106 [inline] free_pud_range mm/memory.c:262 [inline] free_p4d_range mm/memory.c:280 [inline] free_pgd_range+0xba4/0xce8 mm/memory.c:360 free_pgtables+0x590/0x670 exit_mmap+0x3c0/0xc28 mm/mmap.c:3319 __mmput+0xec/0x390 kernel/fork.c:1349 mmput+0x70/0xac kernel/fork.c:1371 exit_mm+0x148/0x210 kernel/exit.c:567 do_exit+0x478/0x1f64 kernel/exit.c:856 do_group_exit+0x194/0x22c kernel/exit.c:1018 __do_sys_exit_group kernel/exit.c:1029 [inline] __se_sys_exit_group kernel/exit.c:1027 [inline] pid_child_should_wake+0x0/0x1dc kernel/exit.c:1027 __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155 el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595 irq event stamp: 1349 hardirqs last enabled at (1348): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (1348): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (1349): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:436 softirqs last enabled at (960): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs last enabled at (960): [] release_sock+0x154/0x1b8 net/core/sock.c:3543 softirqs last disabled at (1179): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 ---[ end trace 0000000000000000 ]---