------------[ cut here ]------------ WARNING: CPU: 0 PID: 3652 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3652 Comm: udevd Not tainted 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0e82 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d36872c0 x22: ffff0000d3687410 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: ffff80000835683c x16: ffff8000111bc798 x15: ffff80000850cc38 x14: ffff8000081e7128 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d6b88000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 qlist_free_all+0x38/0xa8 mm/kasan/quarantine.c:174 kasan_quarantine_reduce+0x124/0x130 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x34/0xcc mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x74/0x408 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] slab_alloc mm/slub.c:3228 [inline] __kmalloc+0x208/0x44c mm/slub.c:4403 kmalloc include/linux/slab.h:609 [inline] tomoyo_realpath_from_path+0xcc/0x510 security/tomoyo/realpath.c:254 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_perm+0x1b4/0x440 security/tomoyo/file.c:822 tomoyo_inode_getattr+0x28/0x38 security/tomoyo/tomoyo.c:122 security_inode_getattr+0xd8/0x124 security/security.c:1348 vfs_getattr fs/stat.c:157 [inline] vfs_fstat fs/stat.c:182 [inline] __do_sys_newfstat fs/stat.c:421 [inline] __se_sys_newfstat fs/stat.c:418 [inline] __arm64_sys_newfstat+0xe8/0x1d0 fs/stat.c:418 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1043731 hardirqs last enabled at (1043730): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1043730): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1043731): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1041846): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (1043697): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1043697): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1043697): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1043697): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b73 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 277469 hardirqs last enabled at (277468): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (277468): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (277469): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (277314): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (277314): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (277385): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (277385): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (277385): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (277385): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b74 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0e82 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d36872c0 x22: ffff0000d3687410 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 339747 hardirqs last enabled at (339746): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (339746): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (339747): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (339588): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (339588): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (339593): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4b79 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 339777 hardirqs last enabled at (339776): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (339776): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (339777): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (339588): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (339588): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (339593): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4b7a ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d04f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3682640 x22: ffff0000d3682790 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 342909 hardirqs last enabled at (342908): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (342908): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (342909): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (342376): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (342376): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (342381): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4b80 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 343007 hardirqs last enabled at (343006): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (343006): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (343007): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (342942): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (342942): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (342947): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4b81 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 280807 hardirqs last enabled at (280806): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (280806): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (280807): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (280696): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (280696): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (280715): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (280715): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (280715): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (280715): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b83 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4952 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4952 Comm: syz.0.40 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2e71b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 627 hardirqs last enabled at (626): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (626): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (627): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (552): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (552): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (577): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (577): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (577): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (577): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b89 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4956 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4956 Comm: syz.0.42 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d04f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3682640 x22: ffff0000d3682790 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000ccf90000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 677 hardirqs last enabled at (676): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (676): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (677): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (618): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (618): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (635): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (635): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (635): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (635): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b8a ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d09ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3684c80 x22: ffff0000d3684dd0 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 281323 hardirqs last enabled at (281322): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (281322): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (281323): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (281206): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (281206): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (281287): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (281287): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (281287): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (281287): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b8b ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3652 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3652 Comm: udevd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d6b88000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 tomoyo_check_acl+0xb0/0x378 security/tomoyo/domain.c:173 tomoyo_path_permission+0x164/0x310 security/tomoyo/file.c:586 tomoyo_path_perm+0x328/0x440 security/tomoyo/file.c:838 tomoyo_inode_getattr+0x28/0x38 security/tomoyo/tomoyo.c:122 security_inode_getattr+0xd8/0x124 security/security.c:1348 vfs_getattr fs/stat.c:157 [inline] vfs_fstat fs/stat.c:182 [inline] __do_sys_newfstat fs/stat.c:421 [inline] __se_sys_newfstat fs/stat.c:418 [inline] __arm64_sys_newfstat+0xe8/0x1d0 fs/stat.c:418 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1109433 hardirqs last enabled at (1109432): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1109432): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1109433): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1108424): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (1109337): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1109337): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1109337): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1109337): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b8c ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4892 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4892 Comm: udevd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d068a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683300 x22: ffff0000d3683450 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d415b680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 stack_depot_save+0x180/0x49c lib/stackdepot.c:280 kasan_save_stack+0x54/0x68 mm/kasan/common.c:40 kasan_record_aux_stack+0xcc/0x114 mm/kasan/generic.c:348 task_work_add+0x40/0x294 kernel/task_work.c:38 fput_many+0x108/0x218 fs/file_table.c:367 fput+0x24/0x34 fs/file_table.c:383 filp_close+0x104/0x160 fs/open.c:1369 close_fd+0x74/0x84 fs/file.c:654 __do_sys_close fs/open.c:1382 [inline] __se_sys_close fs/open.c:1380 [inline] __arm64_sys_close+0x3c/0x80 fs/open.c:1380 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 68939 hardirqs last enabled at (68938): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (68938): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (68939): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (66838): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (68895): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (68895): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (68895): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (68895): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b8d ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4892 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4892 Comm: udevd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e7822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3bfc0 x22: ffff0000d4f3c110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d415b680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 kernfs_fop_open+0x254/0xa8c fs/kernfs/file.c:616 do_dentry_open+0x760/0xebc fs/open.c:826 vfs_open+0x7c/0x90 fs/open.c:956 do_open fs/namei.c:3608 [inline] path_openat+0x1f80/0x26e4 fs/namei.c:3742 do_filp_open+0x164/0x330 fs/namei.c:3769 do_sys_openat2+0x128/0x3d8 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 69363 hardirqs last enabled at (69362): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (69362): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (69363): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (69234): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (69313): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (69313): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (69313): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (69313): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b8e ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d068a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683300 x22: ffff0000d3683450 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 352661 hardirqs last enabled at (352660): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (352660): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (352661): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (352024): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (352024): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (352029): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4b93 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4978 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4978 Comm: syz.0.53 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000ccf951c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 833 hardirqs last enabled at (832): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (832): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (833): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (770): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (770): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (795): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (795): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (795): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (795): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b95 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d068a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683300 x22: ffff0000d3683450 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 282081 hardirqs last enabled at (282080): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (282080): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (282081): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (281894): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (281894): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (282043): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (282043): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (282043): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (282043): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b96 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d04f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3682640 x22: ffff0000d3682790 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 282363 hardirqs last enabled at (282362): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (282362): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (282363): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (282286): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (282286): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (282317): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (282317): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (282317): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (282317): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b98 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4990 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4990 Comm: syz.0.59 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d04f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3682640 x22: ffff0000d3682790 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000ce1e9b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable arch/arm64/include/asm/irqflags.h:35 [inline] preempt_schedule_irq+0x88/0x214 kernel/sched/core.c:6779 arm64_preempt_schedule_irq+0x14c/0x21c arch/arm64/kernel/entry-common.c:260 el1_interrupt+0x40/0x58 arch/arm64/kernel/entry-common.c:463 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 711 hardirqs last enabled at (710): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (710): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (711): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (670): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (670): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (681): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (681): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (681): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (681): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b9c ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 148 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 148 Comm: kworker/u4:2 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d068a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683300 x22: ffff0000d3683450 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2c38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable arch/arm64/include/asm/irqflags.h:35 [inline] __local_bh_enable_ip+0x200/0x380 kernel/softirq.c:406 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline] _raw_spin_unlock_bh+0xec/0x174 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:408 [inline] addrconf_ifdown+0x5b4/0x1688 net/ipv6/addrconf.c:3830 addrconf_notify+0x2f4/0xc6c net/ipv6/addrconf.c:-1 notifier_call_chain kernel/notifier.c:83 [inline] raw_notifier_call_chain+0xd4/0x164 kernel/notifier.c:391 call_netdevice_notifiers_info net/core/dev.c:2049 [inline] call_netdevice_notifiers_extack net/core/dev.c:2061 [inline] call_netdevice_notifiers net/core/dev.c:2075 [inline] dev_close_many+0x2cc/0x440 net/core/dev.c:1650 unregister_netdevice_many+0x3d4/0x17d0 net/core/dev.c:11110 default_device_exit_batch+0x444/0x4a4 net/core/dev.c:11667 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x644/0xa98 net/core/net_namespace.c:635 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1757693 hardirqs last enabled at (1757692): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1757692): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1757693): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1757646): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (1757646): [] addrconf_ifdown+0x5b4/0x1688 net/ipv6/addrconf.c:3830 softirqs last disabled at (1757649): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1757649): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1757649): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1757649): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4b9d ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000001 x17: 0000000000000000 x16: ffff8000111bc798 x15: 0000000000000002 x14: 0000000000ff0100 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 358089 hardirqs last enabled at (358088): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (358088): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (358089): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (358070): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (358070): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (358075): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4b9e ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 351 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 351 Comm: kworker/u4:4 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: bat_events batadv_nc_worker pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e79ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3cc80 x22: ffff0000d4f3cdd0 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c80fd1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable arch/arm64/include/asm/irqflags.h:35 [inline] __local_bh_enable_ip+0x200/0x380 kernel/softirq.c:406 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:176 [inline] _raw_spin_unlock_bh+0xec/0x174 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:408 [inline] batadv_nc_purge_paths+0x308/0x390 net/batman-adv/network-coding.c:475 batadv_nc_worker+0x300/0x554 net/batman-adv/network-coding.c:726 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 824691 hardirqs last enabled at (824690): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (824690): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (824691): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (824470): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (824470): [] batadv_nc_purge_paths+0x308/0x390 net/batman-adv/network-coding.c:475 softirqs last disabled at (824473): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (824473): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (824473): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (824473): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4ba0 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 283575 hardirqs last enabled at (283574): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (283574): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (283575): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (283160): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (283160): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (283491): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (283491): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (283491): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (283491): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4ba1 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e7b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3d940 x22: ffff0000d4f3da90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 360821 hardirqs last enabled at (360820): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (360820): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (360821): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (360572): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (360572): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (360579): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4ba3 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 361141 hardirqs last enabled at (361140): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (361140): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (361141): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (361050): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (361050): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (361057): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4ba4 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5010 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5010 Comm: syz.0.69 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d04f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3682640 x22: ffff0000d3682790 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000ccbe9b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 bpf_prog_4353eec266269c27+0x0/0x864 sk_psock_msg_verdict+0x270/0x69c net/core/skmsg.c:890 tcp_bpf_send_verdict+0x140/0xcb8 net/ipv4/tcp_bpf.c:356 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 593 hardirqs last enabled at (592): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (592): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (593): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (542): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (542): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (549): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (549): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (549): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (549): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4ba5 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5011 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5011 Comm: syz-executor Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e71c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f38cc0 x22: ffff0000d4f38e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d9c91b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_page_memcg+0x120/0x234 mm/memcontrol.c:2059 page_add_file_rmap+0x148/0x8e4 mm/rmap.c:1219 do_set_pte+0x394/0x4e0 mm/memory.c:4069 filemap_map_pages+0x9c4/0xc50 mm/filemap.c:3344 do_fault_around mm/memory.c:4243 [inline] do_read_fault mm/memory.c:4258 [inline] do_fault mm/memory.c:4392 [inline] handle_pte_fault mm/memory.c:4650 [inline] __handle_mm_fault mm/memory.c:4785 [inline] handle_mm_fault+0x19c0/0x2950 mm/memory.c:4883 __do_page_fault arch/arm64/mm/fault.c:505 [inline] do_page_fault+0x694/0xad4 arch/arm64/mm/fault.c:605 do_translation_fault+0xe0/0x130 arch/arm64/mm/fault.c:686 do_mem_abort+0x6c/0x1ac arch/arm64/mm/fault.c:819 el0_ia+0xe0/0x2d0 arch/arm64/kernel/entry-common.c:512 el0t_64_sync_handler+0xc0/0xe4 arch/arm64/kernel/entry-common.c:632 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 237 hardirqs last enabled at (236): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (236): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (237): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (34): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (217): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (217): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (217): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (217): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4ba6 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5012 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5012 Comm: syz.0.70 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000ce38b680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 621 hardirqs last enabled at (620): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (620): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (621): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (552): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (552): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (569): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (569): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (569): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (569): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4ba7 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4892 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4892 Comm: udevd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d04f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3682640 x22: ffff0000d3682790 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d415b680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] ___slab_alloc+0x2e8/0xda8 mm/slub.c:2944 __slab_alloc+0x68/0xc0 mm/slub.c:3095 slab_alloc_node mm/slub.c:3186 [inline] slab_alloc mm/slub.c:3228 [inline] __kmalloc+0x2ec/0x44c mm/slub.c:4403 kmalloc include/linux/slab.h:609 [inline] tomoyo_realpath_from_path+0xcc/0x510 security/tomoyo/realpath.c:254 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_check_open_permission+0x168/0x2fc security/tomoyo/file.c:771 tomoyo_file_open+0x130/0x1b0 security/tomoyo/tomoyo.c:311 security_file_open+0x6c/0xac security/security.c:1668 do_dentry_open+0x29c/0xebc fs/open.c:813 vfs_open+0x7c/0x90 fs/open.c:956 do_open fs/namei.c:3608 [inline] path_openat+0x1f80/0x26e4 fs/namei.c:3742 do_filp_open+0x164/0x330 fs/namei.c:3769 do_sys_openat2+0x128/0x3d8 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 119999 hardirqs last enabled at (119998): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (119998): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (119999): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (119044): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (119915): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (119915): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (119915): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (119915): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4ba9 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3652 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3652 Comm: udevd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d6b88000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 __sanitizer_cov_trace_pc+0x0/0xac kernel/audit_tree.c:174 vsnprintf+0xd0/0x1890 lib/vsprintf.c:2763 tomoyo_supervisor+0x12c/0xf48 security/tomoyo/common.c:2069 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission+0x1e8/0x310 security/tomoyo/file.c:587 tomoyo_check_open_permission+0x1d0/0x2fc security/tomoyo/file.c:777 tomoyo_file_open+0x130/0x1b0 security/tomoyo/tomoyo.c:311 security_file_open+0x6c/0xac security/security.c:1668 do_dentry_open+0x29c/0xebc fs/open.c:813 vfs_open+0x7c/0x90 fs/open.c:956 do_open fs/namei.c:3608 [inline] path_openat+0x1f80/0x26e4 fs/namei.c:3742 do_filp_open+0x164/0x330 fs/namei.c:3769 do_sys_openat2+0x128/0x3d8 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1217955 hardirqs last enabled at (1217954): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1217954): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1217955): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1217396): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (1217396): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (1217917): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1217917): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1217917): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1217917): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bb1 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3641 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3641 Comm: klogd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e768a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3b300 x22: ffff0000d4f3b450 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d5e59b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] ___slab_alloc+0x2e8/0xda8 mm/slub.c:2944 __slab_alloc+0x68/0xc0 mm/slub.c:3095 slab_alloc_node mm/slub.c:3186 [inline] kmem_cache_alloc_node+0x2d0/0x41c mm/slub.c:3256 __alloc_skb+0x134/0x67c net/core/skbuff.c:415 alloc_skb include/linux/skbuff.h:1162 [inline] alloc_skb_with_frags+0xa0/0x54c net/core/skbuff.c:6170 sock_alloc_send_pskb+0x78c/0x8a8 net/core/sock.c:2531 unix_dgram_sendmsg+0x43c/0x1188 net/unix/af_unix.c:1809 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] __sys_sendto+0x2e8/0x3d8 net/socket.c:2063 __do_sys_sendto net/socket.c:2075 [inline] __se_sys_sendto net/socket.c:2071 [inline] __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2071 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 95389 hardirqs last enabled at (95388): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (95388): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (95389): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (95308): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (95329): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (95329): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (95329): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (95329): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bb2 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d01c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3680cc0 x22: ffff0000d3680e10 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 371483 hardirqs last enabled at (371482): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (371482): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (371483): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (371002): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (371002): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (371007): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bb5 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4120 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4120 Comm: kworker/0:8 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: events_long defense_work_handler pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001f5075c0 x29: ffff80001f5075d0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: ffff80000fd8258c x14: ffff80000819dcbc x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c7df0000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] do_softirq+0xfc/0x1b0 kernel/softirq.c:477 __local_bh_enable_ip+0x250/0x380 kernel/softirq.c:401 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:32 update_defense_level+0x628/0xa08 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x30/0xdc net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 2161 hardirqs last enabled at (2160): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (2160): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (2161): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1788): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (1789): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1789): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1789): [] do_softirq+0xfc/0x1b0 kernel/softirq.c:477 ---[ end trace f3f657ac026e4bb6 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0cea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3686600 x22: ffff0000d3686750 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 372181 hardirqs last enabled at (372180): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (372180): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (372181): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (372136): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (372136): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (372141): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bb7 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5047 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5047 Comm: syz-executor Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000ce000000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 do_set_pte+0x3a0/0x4e0 mm/memory.c:4071 filemap_map_pages+0x9c4/0xc50 mm/filemap.c:3344 do_fault_around mm/memory.c:4243 [inline] do_read_fault mm/memory.c:4258 [inline] do_fault mm/memory.c:4392 [inline] handle_pte_fault mm/memory.c:4650 [inline] __handle_mm_fault mm/memory.c:4785 [inline] handle_mm_fault+0x19c0/0x2950 mm/memory.c:4883 __do_page_fault arch/arm64/mm/fault.c:505 [inline] do_page_fault+0x694/0xad4 arch/arm64/mm/fault.c:605 do_translation_fault+0xe0/0x130 arch/arm64/mm/fault.c:686 do_mem_abort+0x6c/0x1ac arch/arm64/mm/fault.c:819 el0_da+0x90/0x1fc arch/arm64/kernel/entry-common.c:494 el0t_64_sync_handler+0xd8/0xe4 arch/arm64/kernel/entry-common.c:629 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 489 hardirqs last enabled at (488): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (488): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (489): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (14): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (455): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (455): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (455): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (455): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bb8 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5050 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5050 Comm: syz.0.89 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e7e82 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3f2c0 x22: ffff0000d4f3f410 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d6a58000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable arch/arm64/include/asm/irqflags.h:35 [inline] preempt_schedule_irq+0x88/0x214 kernel/sched/core.c:6779 arm64_preempt_schedule_irq+0x14c/0x21c arch/arm64/kernel/entry-common.c:260 el1_interrupt+0x40/0x58 arch/arm64/kernel/entry-common.c:463 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 837 hardirqs last enabled at (836): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (836): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (837): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (796): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (796): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (807): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (807): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (807): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (807): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bba ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5052 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5052 Comm: syz.0.90 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d1a951c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 627 hardirqs last enabled at (626): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (626): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (627): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (548): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (548): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (565): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (565): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (565): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (565): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bbb ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3652 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3652 Comm: udevd Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0cea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3686600 x22: ffff0000d3686750 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d6b88000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] _raw_spin_unlock_irqrestore+0xb8/0x14c kernel/locking/spinlock.c:194 __debug_check_no_obj_freed lib/debugobjects.c:982 [inline] debug_check_no_obj_freed+0x450/0x46c lib/debugobjects.c:1003 slab_free_hook mm/slub.c:1680 [inline] slab_free_freelist_hook+0x9c/0x1e8 mm/slub.c:1731 slab_free mm/slub.c:3499 [inline] kmem_cache_free+0xdc/0x3b4 mm/slub.c:3515 putname+0x104/0x15c fs/namei.c:271 do_sys_openat2+0x1c0/0x3d8 fs/open.c:1262 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1248223 hardirqs last enabled at (1248222): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1248222): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1248223): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1246614): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (1248185): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1248185): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1248185): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1248185): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bbc ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000001 x17: 0000000000000000 x16: ffff8000111bc798 x15: 0000000000000002 x14: 0000000000ff0100 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 375025 hardirqs last enabled at (375024): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (375024): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (375025): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (375006): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (375006): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (375011): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bbd ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 375147 hardirqs last enabled at (375146): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (375146): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (375147): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (375054): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (375054): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (375059): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bbe ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 288407 hardirqs last enabled at (288406): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (288406): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (288407): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (288270): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (288270): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (288347): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (288347): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (288347): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (288347): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bc2 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5070 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5070 Comm: syz.0.99 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000eb4e0000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 707 hardirqs last enabled at (706): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (706): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (707): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (588): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (588): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (605): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (605): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (605): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (605): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bc4 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 377737 hardirqs last enabled at (377736): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (377736): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (377737): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (377256): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (377256): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (377263): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bc6 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e768a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3b300 x22: ffff0000d4f3b450 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 379089 hardirqs last enabled at (379088): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (379088): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (379089): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (378558): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (378558): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (378563): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bc7 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4053 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4053 Comm: kworker/0:3 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: events nsim_fib_event_work pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001f1772e0 x29: ffff80001f1772f0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: ffff80000d14ac38 x14: ffff80000d14acb4 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c9319b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] do_softirq+0xfc/0x1b0 kernel/softirq.c:477 __local_bh_enable_ip+0x250/0x380 kernel/softirq.c:401 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:32 rht_assign_unlock+0xa0/0xc0 include/linux/rhashtable.h:404 __rhashtable_insert_fast include/linux/rhashtable.h:788 [inline] rhashtable_insert_fast+0x570/0xb70 include/linux/rhashtable.h:825 nsim_fib6_rt_add drivers/net/netdevsim/fib.c:684 [inline] nsim_fib6_rt_insert drivers/net/netdevsim/fib.c:757 [inline] nsim_fib6_event drivers/net/netdevsim/fib.c:854 [inline] nsim_fib_event drivers/net/netdevsim/fib.c:887 [inline] nsim_fib_event_work+0x1798/0x2704 drivers/net/netdevsim/fib.c:1483 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 process_scheduled_works kernel/workqueue.c:2373 [inline] worker_thread+0xb64/0x101c kernel/workqueue.c:2459 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 177595 hardirqs last enabled at (177594): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (177594): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (177595): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (177392): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (177393): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (177393): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (177393): [] do_softirq+0xfc/0x1b0 kernel/softirq.c:477 ---[ end trace f3f657ac026e4bc8 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e7e82 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3f2c0 x22: ffff0000d4f3f410 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 382009 hardirqs last enabled at (382008): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (382008): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (382009): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (381716): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (381716): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (381723): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bcc ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 382191 hardirqs last enabled at (382190): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (382190): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (382191): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (382036): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (382036): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (382041): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bcd ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 148 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 148 Comm: kworker/u4:2 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2c38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_release+0x4a0/0x8e8 kernel/locking/lockdep.c:5646 rcu_lock_release+0x2c/0x50 include/linux/rcupdate.h:317 rcu_read_unlock include/linux/rcupdate.h:772 [inline] inet_twsk_purge+0x710/0x7ac net/ipv4/inet_timewait_sock.c:309 dccp_v6_exit_batch+0x20/0x2c net/dccp/ipv6.c:1123 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x644/0xa98 net/core/net_namespace.c:635 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1929965 hardirqs last enabled at (1929964): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1929964): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1929965): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1929922): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (1929922): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (1929947): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1929947): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1929947): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1929947): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bce ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5098 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5098 Comm: syz.0.113 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a9e79ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d4f3cc80 x22: ffff0000d4f3cdd0 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000d7d4b680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 587 hardirqs last enabled at (586): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (586): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (587): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (530): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (530): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (547): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (547): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (547): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (547): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bd1 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 148 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 148 Comm: kworker/u4:2 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2c38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_acquire+0x234/0x620 kernel/locking/lockdep.c:5626 rcu_lock_acquire+0x40/0x4c include/linux/rcupdate.h:312 rcu_read_lock include/linux/rcupdate.h:739 [inline] inet_twsk_purge+0x10c/0x7ac net/ipv4/inet_timewait_sock.c:268 dccp_v4_exit_batch+0x20/0x2c net/dccp/ipv4.c:1040 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x644/0xa98 net/core/net_namespace.c:635 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1931515 hardirqs last enabled at (1931514): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1931514): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1931515): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1931464): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (1931464): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (1931481): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1931481): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1931481): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1931481): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bd2 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 148 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 148 Comm: kworker/u4:2 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2c38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 debug_lockdep_rcu_enabled+0x10/0x40 kernel/rcu/update.c:280 inet_twsk_purge+0x104/0x7ac net/ipv4/inet_timewait_sock.c:267 dccp_v4_exit_batch+0x20/0x2c net/dccp/ipv4.c:1040 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x644/0xa98 net/core/net_namespace.c:635 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1931603 hardirqs last enabled at (1931602): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1931602): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1931603): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1931544): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (1931544): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (1931555): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1931555): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1931555): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1931555): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bd3 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 148 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 148 Comm: kworker/u4:2 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0cea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3686600 x22: ffff0000d3686750 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2c38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_acquire+0x234/0x620 kernel/locking/lockdep.c:5626 rcu_lock_acquire+0x40/0x4c include/linux/rcupdate.h:312 rcu_read_lock include/linux/rcupdate.h:739 [inline] inet_twsk_purge+0x10c/0x7ac net/ipv4/inet_timewait_sock.c:268 dccp_v4_exit_batch+0x20/0x2c net/dccp/ipv4.c:1040 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x644/0xa98 net/core/net_namespace.c:635 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1931769 hardirqs last enabled at (1931768): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1931768): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1931769): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1931724): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (1931724): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (1931729): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1931729): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1931729): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1931729): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bd4 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0cea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3686600 x22: ffff0000d3686750 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 387545 hardirqs last enabled at (387544): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (387544): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (387545): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (387400): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (387400): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (387407): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bd9 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b337a20 x29: ffff80001b337a30 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0b52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3685940 x22: ffff0000d3685a90 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 387837 hardirqs last enabled at (387836): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (387836): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (387837): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (387790): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (387790): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (387795): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace f3f657ac026e4bda ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 148 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 148 Comm: kworker/u4:2 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3683fc0 x22: ffff0000d3684110 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000c2c38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_test_bit include/asm-generic/bitops/non-atomic.h:118 [inline] cpumask_test_cpu include/linux/cpumask.h:344 [inline] cpu_online include/linux/cpumask.h:895 [inline] trace_lock_release include/trace/events/lock.h:58 [inline] lock_release+0x90/0x8e8 kernel/locking/lockdep.c:5634 rcu_lock_release+0x2c/0x50 include/linux/rcupdate.h:317 rcu_read_unlock include/linux/rcupdate.h:772 [inline] inet_twsk_purge+0x710/0x7ac net/ipv4/inet_timewait_sock.c:309 tcp_sk_exit_batch+0x34/0xa4 net/ipv4/tcp_ipv4.c:3234 ops_exit_list net/core/net_namespace.c:177 [inline] cleanup_net+0x644/0xa98 net/core/net_namespace.c:635 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 2023609 hardirqs last enabled at (2023608): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (2023608): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (2023609): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (2023518): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (2023518): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (2023565): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (2023565): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (2023565): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (2023565): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bdb ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 5119 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 5119 Comm: syz-executor Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0cea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3686600 x22: ffff0000d3686750 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff0000cebcd1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 memset+0x24/0x88 mm/kasan/shadow.c:44 unwind_frame+0x124/0x668 arch/arm64/kernel/stacktrace.c:70 walk_stackframe arch/arm64/kernel/stacktrace.c:148 [inline] arch_stack_walk+0x200/0x2b4 arch/arm64/kernel/stacktrace.c:238 stack_trace_save+0x94/0xd8 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track+0x4c/0x84 mm/kasan/common.c:46 kasan_set_free_info+0x28/0x4c mm/kasan/generic.c:360 ____kasan_slab_free+0x118/0x164 mm/kasan/common.c:366 __kasan_slab_free+0x18/0x28 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1705 [inline] slab_free_freelist_hook+0x128/0x1e8 mm/slub.c:1731 slab_free mm/slub.c:3499 [inline] kfree+0x170/0x40c mm/slub.c:4559 tomoyo_path_perm+0x334/0x440 security/tomoyo/file.c:842 tomoyo_path_symlink+0xa8/0xec security/tomoyo/tomoyo.c:199 security_path_symlink+0xec/0x13c security/security.c:1179 do_symlinkat+0x108/0x5a8 fs/namei.c:4453 __do_sys_symlinkat fs/namei.c:4475 [inline] __se_sys_symlinkat fs/namei.c:4472 [inline] __arm64_sys_symlinkat+0xa4/0xbc fs/namei.c:4472 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1011 hardirqs last enabled at (1010): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1010): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1011): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (14): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (989): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (989): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (989): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (989): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bdd ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.189-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001132aac0 x27: dfff800000000000 x26: 1fffe0001a6d0cea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3686600 x22: ffff0000d3686750 x21: 0000000000000007 x20: 0000000000000fff x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111bc798 x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000282e06b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff12670 x8 : ffff800014193880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff12510 x2 : 0000000000000000 x1 : 0000000000000fff x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 290155 hardirqs last enabled at (290154): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (290154): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (290155): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (290004): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (290004): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (290119): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (290119): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (290119): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (290119): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace f3f657ac026e4bdf ]---