------------[ cut here ]------------ WARNING: CPU: 1 PID: 3186 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x508/0x63c net/ipv4/af_inet.c:155 Modules linked in: CPU: 1 PID: 3186 Comm: syz-fuzzer Not tainted 6.9.0-rc4-syzkaller-00274-g3b68086599f8 #0 Hardware name: linux,dummy-virt (DT) pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x508/0x63c net/ipv4/af_inet.c:156 lr : instrument_atomic_read include/linux/instrumented.h:68 [inline] lr : atomic_read include/linux/atomic/atomic-instrumented.h:32 [inline] lr : refcount_read include/linux/refcount.h:136 [inline] lr : inet_sock_destruct+0x320/0x63c net/ipv4/af_inet.c:154 sp : ffff8000895f7c50 x29: ffff8000895f7c50 x28: ffff0000160a5b90 x27: 1fffe00002c14bfe x26: ffff00000ee99e00 x25: ffff0000160a5fe8 x24: 1fffe00002c14b72 x23: ffff800084f2b3a0 x22: ffff0000160a5b28 x21: 1fffe00002c14b65 x20: ffff0000160a5b00 x19: ffff800087cdb3e0 x18: ffff00000ee9a870 x17: 0000000000000000 x16: 0000000000000006 x15: 1fffe00001dd350d x14: 1fffe00001dd3512 x13: 1fffe00001dd350a x12: ffff600002c14bb4 x11: 1fffe00002c14bb3 x10: ffff600002c14bb3 x9 : dfff800000000000 x8 : ffff0000160a5d9f x7 : 0000000000000001 x6 : ffff600002c14bb3 x5 : ffff0000160a5d9c x4 : ffff600002c14bb4 x3 : 1fffe00002c14bb0 x2 : 0000000000000000 x1 : 0000000000000007 x0 : 0000000000000400 Call trace: inet_sock_destruct+0x508/0x63c net/ipv4/af_inet.c:155 inet6_sock_destruct+0x20/0x30 net/ipv6/af_inet6.c:116 __sk_destruct+0x4c/0x548 net/core/sock.c:2175 rcu_do_batch kernel/rcu/tree.c:2196 [inline] rcu_core+0x960/0x1bd0 kernel/rcu/tree.c:2471 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2488 __do_softirq+0x2e8/0xde8 kernel/softirq.c:554 ____do_softirq+0x10/0x1c arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x1c/0x2c arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x334/0x434 kernel/softirq.c:633 irq_exit_rcu+0x14/0x80 kernel/softirq.c:645 __el1_irq arch/arm64/kernel/entry-common.c:537 [inline] el1_interrupt+0x38/0x54 arch/arm64/kernel/entry-common.c:551 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:556 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:27 [inline] arch_local_irq_enable arch/arm64/include/asm/irqflags.h:49 [inline] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] _raw_spin_unlock_irq+0x34/0x8c kernel/locking/spinlock.c:202 spin_unlock_irq include/linux/spinlock.h:401 [inline] get_signal+0x127c/0x1b24 kernel/signal.c:2914 do_signal+0x268/0x2b68 arch/arm64/kernel/signal.c:1308 do_notify_resume+0x190/0x25c arch/arm64/kernel/entry-common.c:148 exit_to_user_mode_prepare arch/arm64/kernel/entry-common.c:169 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:178 [inline] el0_interrupt+0x140/0x1e0 arch/arm64/kernel/entry-common.c:797 __el0_irq_handler_common+0x18/0x24 arch/arm64/kernel/entry-common.c:802 el0t_64_irq_handler+0x10/0x1c arch/arm64/kernel/entry-common.c:807 el0t_64_irq+0x190/0x194 arch/arm64/kernel/entry.S:599 irq event stamp: 1144005 hardirqs last enabled at (1144004): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (1144004): [] _raw_spin_unlock_irqrestore+0x80/0xac kernel/locking/spinlock.c:194 hardirqs last disabled at (1144005): [] el1_dbg+0x24/0x9c arch/arm64/kernel/entry-common.c:470 softirqs last enabled at (1143854): [] fpsimd_restore_current_state+0x44/0xe4 arch/arm64/kernel/fpsimd.c:1784 softirqs last disabled at (1143867): [] ____do_softirq+0x10/0x1c arch/arm64/kernel/irq.c:81 ---[ end trace 0000000000000000 ]--- TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.