------------[ cut here ]------------ WARNING: CPU: 0 PID: 534 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x54c/0x62c net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 534 Comm: kworker/u4:4 Not tainted 5.15.169-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: bat_events batadv_nc_worker pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x54c/0x62c net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x54c/0x62c net/ipv4/af_inet.c:157 sp : ffff800008007bd0 x29: ffff800008007bd0 x28: 0000000000000004 x27: dfff800000000000 x26: 1fffe0001adb168a x25: dfff800000000000 x24: dfff800000000000 x23: ffff800008007d60 x22: 1fffe0001adb1662 x21: 0000000000000007 x20: 0000000000000100 x19: ffff0000d6d8b300 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000084c5304 x15: 00000000c0000000 x14: 1ffff0000295606a x13: dfff800000000000 x12: 0000000000000001 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff0000c8410000 x8 : ffff800010793a20 x7 : ffff800008392828 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff8000107938c4 x2 : 0000000000000000 x1 : 0000000000000100 x0 : 0000000000000000 Call trace: inet_sock_destruct+0x54c/0x62c net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x600 net/core/sock.c:1955 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x830/0x1b34 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x384/0xdbc kernel/softirq.c:558 __do_softirq kernel/softirq.c:592 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:439 [inline] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 irq_exit+0x14/0x88 kernel/softirq.c:665 handle_domain_irq+0xf4/0x178 kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:758 call_on_irq_stack+0x24/0x4c arch/arm64/kernel/entry.S:899 do_interrupt_handler+0x74/0x94 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable arch/arm64/include/asm/irqflags.h:35 [inline] __local_bh_enable_ip+0x238/0x470 kernel/softirq.c:388 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline] _raw_spin_unlock_bh+0xf8/0x180 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:408 [inline] batadv_nc_purge_paths+0x308/0x38c net/batman-adv/network-coding.c:475 batadv_nc_worker+0x314/0x580 net/batman-adv/network-coding.c:726 process_one_work+0x790/0x11b8 kernel/workqueue.c:2310 worker_thread+0x910/0x1034 kernel/workqueue.c:2457 kthread+0x37c/0x45c kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:870 irq event stamp: 2071303 hardirqs last enabled at (2071302): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (2071302): [] _raw_spin_unlock_irqrestore+0xac/0x158 kernel/locking/spinlock.c:194 hardirqs last disabled at (2071303): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (2071264): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (2071264): [] batadv_nc_purge_paths+0x308/0x38c net/batman-adv/network-coding.c:475 softirqs last disabled at (2071267): [] __do_softirq kernel/softirq.c:592 [inline] softirqs last disabled at (2071267): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (2071267): [] invoke_softirq kernel/softirq.c:439 [inline] softirqs last disabled at (2071267): [] __irq_exit_rcu+0x268/0x4d8 kernel/softirq.c:641 ---[ end trace fd9bf591a67fba76 ]---