------------[ cut here ]------------ WARNING: CPU: 1 PID: 14795 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x198/0x1b8 net/ipv4/af_inet.c:161 Modules linked in: CPU: 1 PID: 14795 Comm: syz-executor.0 Not tainted 6.9.0-rc5-syzkaller-00031-g71b1543c83d6 #0 Hardware name: linux,dummy-virt (DT) pstate: 60401009 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--) pc : inet_sock_destruct+0x198/0x1b8 net/ipv4/af_inet.c:156 lr : inet6_sock_destruct+0x20/0x30 net/ipv6/af_inet6.c:116 sp : ffff80008000be40 x29: ffff80008000be40 x28: ffff80008013b418 x27: 000000000000000a x26: fff000007f8efdb8 x25: ffff80008268c4c0 x24: 0000000000000000 x23: 0000000000000007 x22: ffff80008000bf30 x21: fff000007f8efd40 x20: f8f0000006e0d090 x19: f8f0000006e0d000 x18: 0000000000000000 x17: fff07ffffd392000 x16: ffff800080008000 x15: 0000000000000000 x14: 0000000000000025 x13: 0000000000000025 x12: 0000000000000001 x11: 0000000000000001 x10: 0000000000000002 x9 : 0000000000000009 x8 : fff000007f8ef000 x7 : 0000000000000001 x6 : 0000000000000002 x5 : fff000007f8ef000 x4 : 0000000000000001 x3 : 0000000000000007 x2 : f8f0000006e0d978 x1 : 0000000000000000 x0 : 0000000000000400 Call trace: inet_sock_destruct+0x198/0x1b8 net/ipv4/af_inet.c:161 inet6_sock_destruct+0x20/0x30 net/ipv6/af_inet6.c:116 __sk_destruct+0x2c/0x260 net/core/sock.c:2175 rcu_do_batch kernel/rcu/tree.c:2196 [inline] rcu_core+0x258/0x658 kernel/rcu/tree.c:2471 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2488 __do_softirq+0x10c/0x264 kernel/softirq.c:554 ____do_softirq+0x10/0x1c arch/arm64/kernel/irq.c:81 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:889 do_softirq_own_stack+0x1c/0x28 arch/arm64/kernel/irq.c:86 invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu kernel/softirq.c:633 [inline] irq_exit_rcu+0xb8/0xd4 kernel/softirq.c:645 __el1_irq arch/arm64/kernel/entry-common.c:537 [inline] el1_interrupt+0x38/0x64 arch/arm64/kernel/entry-common.c:551 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:556 el1h_64_irq+0x64/0x68 arch/arm64/kernel/entry.S:594 __preempt_count_dec_and_test arch/arm64/include/asm/preempt.h:74 [inline] __d_alloc+0x120/0x1e0 fs/dcache.c:1688 d_alloc+0x1c/0x80 fs/dcache.c:1704 lookup_one_qstr_excl+0x60/0xd0 fs/namei.c:1603 filename_create+0xb4/0x194 fs/namei.c:3893 do_symlinkat+0x5c/0x14c fs/namei.c:4500 __do_sys_symlinkat fs/namei.c:4523 [inline] __se_sys_symlinkat fs/namei.c:4520 [inline] __arm64_sys_symlinkat+0x50/0x68 fs/namei.c:4520 __invoke_syscall arch/arm64/kernel/syscall.c:34 [inline] invoke_syscall+0x48/0x118 arch/arm64/kernel/syscall.c:48 el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:133 do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:152 el0_svc+0x34/0xf8 arch/arm64/kernel/entry-common.c:712 el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730 el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598 ---[ end trace 0000000000000000 ]--- TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.