------------[ cut here ]------------ WARNING: CPU: 1 PID: 46 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x534/0x62c net/ipv4/af_inet.c:156 Modules linked in: CPU: 1 UID: 0 PID: 46 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc5-syzkaller-gc32f8dc5aaf9 #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x534/0x62c net/ipv4/af_inet.c:156 lr : inet_sock_destruct+0x534/0x62c net/ipv4/af_inet.c:156 sp : ffff800080017c30 x29: ffff800080017c40 x28: ffff80008903de8c x27: 0000000000000003 x26: 1fffe0001dcc5372 x25: dfff800000000000 x24: ffff0000ee629fe8 x23: ffff0000ee629b00 x22: ffff0000ee629b90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 1fffe00033871676 x17: ffff80010d12e000 x16: ffff80008adb421c x15: 0000000000000001 x14: 1fffe0001dcc53b3 x13: 0000000000000000 x12: 0000000000000000 x11: ffff60001dcc53b4 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000c2753d00 x7 : ffff8000805c2030 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff800089946254 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x534/0x62c net/ipv4/af_inet.c:156 (P) inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:116 __sk_destruct+0x80/0x760 net/core/sock.c:2298 rcu_do_batch kernel/rcu/tree.c:2568 [inline] rcu_core+0x848/0x17a4 kernel/rcu/tree.c:2824 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2841 handle_softirqs+0x328/0xc88 kernel/softirq.c:579 __do_softirq+0x14/0x20 kernel/softirq.c:613 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:891 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:460 [inline] __irq_exit_rcu+0x1b0/0x478 kernel/softirq.c:680 irq_exit_rcu+0x14/0x84 kernel/softirq.c:696 __el1_irq arch/arm64/kernel/entry-common.c:584 [inline] el1_interrupt+0x38/0x54 arch/arm64/kernel/entry-common.c:598 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:603 el1h_64_irq+0x6c/0x70 arch/arm64/kernel/entry.S:596 __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P) arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P) __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (P) _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 (P) spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline] pl011_console_device_unlock+0x90/0xc8 drivers/tty/serial/amba-pl011.c:2603 nbcon_emit_one kernel/printk/nbcon.c:1123 [inline] nbcon_kthread_func+0x588/0x6cc kernel/printk/nbcon.c:1210 kthread+0x5fc/0x75c kernel/kthread.c:464 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847 irq event stamp: 32983 hardirqs last enabled at (32982): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (32982): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (32983): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:511 softirqs last enabled at (32930): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (32930): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (32939): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]---