------------[ cut here ]------------ WARNING: CPU: 0 PID: 6004 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154 Modules linked in: CPU: 0 PID: 6004 Comm: syz-executor231 Not tainted 6.4.0-rc5-syzkaller-g177239177378 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154 lr : inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154 sp : ffff800080007cb0 x29: ffff800080007cb0 x28: ffff0000d516d170 x27: 1fffe0001bcb4001 x26: 1fffe0001aa2d9bc x25: dfff800000000000 x24: 1fffe0001aa2d992 x23: 1fffe0001aa2d995 x22: 0000000000000007 x21: 0000000000000000 x20: 0000000000000d00 x19: ffff0000d516cc80 x18: 1fffe0001bcb4087 x17: 00000000cdfcd450 x16: ffff80008050c16c x15: 0000000000000100 x14: 1ffff00011bd80ac x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000100 x10: 0000000000000100 x9 : 0000000000000000 x8 : ffff0000de5a0000 x7 : ffff8000803ca5ec x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff800088f420c8 x2 : 0000000000000000 x1 : 0000000000000d00 x0 : 0000000000000000 Call trace: inet_sock_destruct+0x56c/0x664 net/ipv4/af_inet.c:154 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:115 __sk_destruct+0x5c/0x770 net/core/sock.c:2130 rcu_do_batch kernel/rcu/tree.c:2115 [inline] rcu_core+0x7f8/0x19f4 kernel/rcu/tree.c:2377 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2394 __do_softirq+0x2d0/0xd54 kernel/softirq.c:571 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:882 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:85 invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0x28c/0x534 kernel/softirq.c:650 irq_exit_rcu+0x14/0x84 kernel/softirq.c:662 __el1_irq arch/arm64/kernel/entry-common.c:474 [inline] el1_interrupt+0x38/0x68 arch/arm64/kernel/entry-common.c:488 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:493 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:587 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:33 [inline] arch_local_irq_enable arch/arm64/include/asm/irqflags.h:55 [inline] __local_bh_enable_ip+0x250/0x4ac kernel/softirq.c:401 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 tun_rx_batched+0x56c/0x6e4 tun_get_user+0x2298/0x35e0 drivers/net/tun.c:1997 tun_chr_write_iter+0xfc/0x204 drivers/net/tun.c:2043 call_write_iter include/linux/fs.h:1868 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x618/0x918 fs/read_write.c:584 ksys_write+0x15c/0x26c fs/read_write.c:637 __do_sys_write fs/read_write.c:649 [inline] __se_sys_write fs/read_write.c:646 [inline] __arm64_sys_write+0x7c/0x90 fs/read_write.c:646 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2c0 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x244 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x64/0x198 arch/arm64/kernel/syscall.c:191 el0_svc+0x4c/0x160 arch/arm64/kernel/entry-common.c:647 el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:665 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:591 irq event stamp: 291 hardirqs last enabled at (290): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (290): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (291): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:407 softirqs last enabled at (82): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (85): [] ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:80 ---[ end trace 0000000000000000 ]---