------------[ cut here ]------------ WARNING: CPU: 1 PID: 5082 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x723/0x830 net/ipv4/af_inet.c:156 Modules linked in: CPU: 1 PID: 5082 Comm: syz-fuzzer Not tainted 6.9.0-rc4-next-20240418-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 RIP: 0010:inet_sock_destruct+0x723/0x830 net/ipv4/af_inet.c:156 Code: 0f 0b 90 e9 c6 fd ff ff e8 9a 5a 9a f7 90 0f 0b 90 e9 01 fe ff ff e8 8c 5a 9a f7 90 0f 0b 90 e9 2f fe ff ff e8 7e 5a 9a f7 90 <0f> 0b 90 e9 be fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c d0 fb RSP: 0018:ffffc90000a18b70 EFLAGS: 00010246 RAX: ffffffff89fc0312 RBX: 0000000000000400 RCX: ffff88801e2a1e00 RDX: 0000000000000102 RSI: 0000000000000400 RDI: 0000000000000000 RBP: ffff888024023400 R08: ffffffff89fc01cc R09: 1ffff110048046d3 R10: dffffc0000000000 R11: ffffed10048046d4 R12: 1ffff11004804685 R13: ffff8880240238e8 R14: ffff888024023428 R15: ffff888024023412 FS: 000000c000058890(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f87c8d7c038 CR3: 000000007eb72000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __sk_destruct+0x58/0x5f0 net/core/sock.c:2175 rcu_do_batch kernel/rcu/tree.c:2565 [inline] rcu_core+0xafd/0x1830 kernel/rcu/tree.c:2839 __do_softirq+0x2c6/0x980 kernel/softirq.c:554 invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633 irq_exit_rcu+0x9/0x30 kernel/softirq.c:645 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xd8/0x140 kernel/locking/spinlock.c:194 Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 f7 e8 de b4 6a f6 f6 44 24 21 02 75 52 41 f7 c7 00 02 00 00 74 01 fb bf 01 00 00 00 53 e4 d4 f5 65 8b 05 a4 db 72 74 85 c0 74 43 48 c7 04 24 0e 36 RSP: 0018:ffffc900034efb60 EFLAGS: 00000206 RAX: 8c8993af1c585f00 RBX: 1ffff9200069df70 RCX: ffffffff94773703 RDX: dffffc0000000000 RSI: ffffffff8bcab360 RDI: 0000000000000001 RBP: ffffc900034efbf0 R08: ffffffff8fabdf2f R09: 1ffffffff1f57be5 R10: dffffc0000000000 R11: fffffbfff1f57be6 R12: dffffc0000000000 R13: 1ffff9200069df6c R14: ffffc900034efb80 R15: 0000000000000246 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] unlock_task_sighand include/linux/sched/signal.h:754 [inline] do_send_sig_info kernel/signal.c:1302 [inline] group_send_sig_info+0x2e0/0x310 kernel/signal.c:1453 bpf_send_signal_common+0x2dd/0x430 kernel/trace/bpf_trace.c:881 ____bpf_send_signal kernel/trace/bpf_trace.c:886 [inline] bpf_send_signal+0x19/0x30 kernel/trace/bpf_trace.c:884 ---------------- Code disassembly (best guess): 0: 9c pushf 1: 8f 44 24 20 pop 0x20(%rsp) 5: 42 80 3c 23 00 cmpb $0x0,(%rbx,%r12,1) a: 74 08 je 0x14 c: 4c 89 f7 mov %r14,%rdi f: e8 de b4 6a f6 call 0xf66ab4f2 14: f6 44 24 21 02 testb $0x2,0x21(%rsp) 19: 75 52 jne 0x6d 1b: 41 f7 c7 00 02 00 00 test $0x200,%r15d 22: 74 01 je 0x25 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 53 e4 d4 f5 call 0xf5d4e482 <-- trapping instruction 2f: 65 8b 05 a4 db 72 74 mov %gs:0x7472dba4(%rip),%eax # 0x7472dbda 36: 85 c0 test %eax,%eax 38: 74 43 je 0x7d 3a: 48 rex.W 3b: c7 .byte 0xc7 3c: 04 24 add $0x24,%al 3e: 0e (bad) 3f: 36 ss