------------[ cut here ]------------
WARNING: CPU: 1 PID: 13358 at net/ipv4/inet_connection_sock.c:548 inet_csk_get_port+0xac8/0xaf0 net/ipv4/inet_connection_sock.c:548
Modules linked in:
CPU: 1 PID: 13358 Comm: syz-executor.4 Not tainted 6.1.0-rc6-syzkaller-32662-g6d464646530f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022
pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : inet_csk_get_port+0xac8/0xaf0 net/ipv4/inet_connection_sock.c:548
lr : inet_csk_get_port+0xac8/0xaf0 net/ipv4/inet_connection_sock.c:548
sp : ffff80001510bc50
x29: ffff80001510bcb0 x28: ffff0000c99b2300 x27: 0000000000000000
x26: ffff00010a5ba680 x25: ffff80000f1dcd10 x24: 0000000000004e22
x23: ffff0001157fbd40 x22: ffff0000cb823680 x21: 0000000000000001
x20: ffff800012273028 x19: ffff00010a5ba680 x18: 0000000000000000
x17: 0000000000000000 x16: ffff80000dbe6158 x15: ffff00010a141a40
x14: 00000000000000a8 x13: 00000000ffffffff x12: 0000000000040000
x11: 0000000000000d31 x10: ffff80001a480000 x9 : ffff80000b612cb4
x8 : 0000000000000d32 x7 : ffff80000b224e34 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000
x2 : 0000000000000002 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 inet_csk_get_port+0xac8/0xaf0 net/ipv4/inet_connection_sock.c:548
 inet_csk_listen_start+0x80/0x12c net/ipv4/inet_connection_sock.c:1205
 inet_listen+0x14c/0x2f4 net/ipv4/af_inet.c:228
 __sys_listen+0xfc/0x144 net/socket.c:1810
 __do_sys_listen net/socket.c:1819 [inline]
 __se_sys_listen net/socket.c:1817 [inline]
 __arm64_sys_listen+0x24/0x38 net/socket.c:1817
 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline]
 invoke_syscall arch/arm64/kernel/syscall.c:52 [inline]
 el0_svc_common+0x138/0x220 arch/arm64/kernel/syscall.c:142
 do_el0_svc+0x48/0x164 arch/arm64/kernel/syscall.c:206
 el0_svc+0x58/0x150 arch/arm64/kernel/entry-common.c:637
 el0t_64_sync_handler+0x84/0xf0 arch/arm64/kernel/entry-common.c:655
 el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:584
irq event stamp: 873
hardirqs last  enabled at (872): [<ffff800008106f78>] __local_bh_enable_ip+0x13c/0x1a4 kernel/softirq.c:401
hardirqs last disabled at (873): [<ffff80000c07d8b4>] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:405
softirqs last  enabled at (848): [<ffff80000b2282f4>] spin_unlock_bh include/linux/spinlock.h:395 [inline]
softirqs last  enabled at (848): [<ffff80000b2282f4>] lock_sock_nested+0xc0/0xd8 net/core/sock.c:3454
softirqs last disabled at (850): [<ffff80000b6122cc>] spin_lock_bh include/linux/spinlock.h:355 [inline]
softirqs last disabled at (850): [<ffff80000b6122cc>] inet_csk_get_port+0xe0/0xaf0 net/ipv4/inet_connection_sock.c:496
---[ end trace 0000000000000000 ]---