------------[ cut here ]------------ WARNING: CPU: 0 PID: 4420 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4420 Comm: dhcpcd-run-hook Not tainted 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f1c2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc78cc0 x22: ffff0000ddc78e10 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: ffff80000835683c x16: ffff8000111d162c x15: ffff80000850daa0 x14: ffff8000081e7128 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c10c0000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] seqcount_lockdep_reader_access+0x15c/0x230 include/linux/seqlock.h:105 read_seqbegin include/linux/seqlock.h:897 [inline] zone_span_seqbegin include/linux/memory_hotplug.h:83 [inline] page_outside_zone_boundaries mm/page_alloc.c:580 [inline] bad_range+0xa0/0x2a0 mm/page_alloc.c:607 rmqueue mm/page_alloc.c:3760 [inline] get_page_from_freelist+0x2954/0x2aa8 mm/page_alloc.c:4189 __alloc_pages+0x1a0/0x470 mm/page_alloc.c:5474 alloc_pages+0x34c/0x5c0 mm/mempolicy.c:-1 __pte_alloc_one include/asm-generic/pgalloc.h:63 [inline] pte_alloc_one+0x2c/0x258 include/asm-generic/pgalloc.h:85 __pte_alloc+0x34/0x21c mm/memory.c:439 copy_pte_range mm/memory.c:1032 [inline] copy_pmd_range mm/memory.c:1167 [inline] copy_pud_range mm/memory.c:1204 [inline] copy_p4d_range mm/memory.c:1228 [inline] copy_page_range+0x1da8/0x22b8 mm/memory.c:1301 dup_mmap kernel/fork.c:615 [inline] dup_mm kernel/fork.c:1466 [inline] copy_mm+0x9c8/0x1084 kernel/fork.c:1518 copy_process+0x14d8/0x34ac kernel/fork.c:2290 kernel_clone+0x1d8/0x9d4 kernel/fork.c:2679 __do_sys_clone kernel/fork.c:2796 [inline] __se_sys_clone kernel/fork.c:2764 [inline] __arm64_sys_clone+0x138/0x190 kernel/fork.c:2764 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 8015 hardirqs last enabled at (8014): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (8014): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (8015): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (7896): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (7973): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (7973): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (7973): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (7973): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc317 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4313 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4313 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc79980 x22: ffff0000ddc79ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d3303680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 unwind_frame+0x3ec/0x668 arch/arm64/kernel/stacktrace.c:114 walk_stackframe arch/arm64/kernel/stacktrace.c:148 [inline] arch_stack_walk+0x200/0x2b4 arch/arm64/kernel/stacktrace.c:238 stack_trace_save+0x94/0xd8 kernel/stacktrace.c:122 kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] __kasan_slab_alloc+0x8c/0xcc mm/kasan/common.c:467 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x74/0x408 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc+0x1e0/0x3e4 mm/slub.c:3233 kmem_cache_zalloc include/linux/slab.h:725 [inline] jbd2_alloc_handle include/linux/jbd2.h:1597 [inline] new_handle fs/jbd2/transaction.c:477 [inline] jbd2__journal_start+0x150/0x744 fs/jbd2/transaction.c:504 __ext4_journal_start_sb+0x350/0x67c fs/ext4/ext4_jbd2.c:105 __ext4_new_inode+0xeb8/0x32b0 fs/ext4/ialloc.c:1084 ext4_mkdir+0x328/0xa40 fs/ext4/namei.c:3066 vfs_mkdir+0x314/0x4d4 fs/namei.c:4065 do_mkdirat+0x1bc/0x508 fs/namei.c:4090 __do_sys_mkdirat fs/namei.c:4105 [inline] __se_sys_mkdirat fs/namei.c:4103 [inline] __arm64_sys_mkdirat+0x90/0xa8 fs/namei.c:4103 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 172691 hardirqs last enabled at (172690): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (172690): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (172691): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (171686): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (172601): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (172601): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (172601): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (172601): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc318 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf1980 x22: ffff0000d3bf1ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: ffff80000835683c x16: ffff8000111d162c x15: ffff80000850daa0 x14: ffff8000081e7128 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 236107 hardirqs last enabled at (236106): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (236106): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (236107): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (235828): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (235828): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (235833): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc319 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 136 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 136 Comm: kworker/u4:1 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: writeback wb_workfn (flush-259:0) pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc79980 x22: ffff0000ddc79ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c2243680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] mod_lruvec_page_state include/linux/vmstat.h:497 [inline] dec_lruvec_page_state include/linux/vmstat.h:555 [inline] clear_page_dirty_for_io+0x548/0x864 mm/page-writeback.c:2761 mpage_submit_page fs/ext4/inode.c:2093 [inline] mpage_map_and_submit_buffers fs/ext4/inode.c:2361 [inline] mpage_map_and_submit_extent fs/ext4/inode.c:2500 [inline] ext4_writepages+0x155c/0x2c14 fs/ext4/inode.c:2829 do_writepages+0x36c/0x578 mm/page-writeback.c:2386 __writeback_single_inode+0x148/0x11f0 fs/fs-writeback.c:1647 writeback_sb_inodes+0x7fc/0x1378 fs/fs-writeback.c:1930 __writeback_inodes_wb+0x110/0x394 fs/fs-writeback.c:2001 wb_writeback+0x3ec/0xe44 fs/fs-writeback.c:2106 wb_check_old_data_flush fs/fs-writeback.c:2206 [inline] wb_do_writeback fs/fs-writeback.c:2259 [inline] wb_workfn+0xa18/0xdd8 fs/fs-writeback.c:2288 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 worker_thread+0x8f4/0x101c kernel/workqueue.c:2457 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1210747 hardirqs last enabled at (1210746): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1210746): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1210747): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1205614): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (1205614): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (1210727): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1210727): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1210727): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1210727): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc31a ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4463 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4463 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc79980 x22: ffff0000ddc79ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c7e7b680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_page_memcg+0x120/0x234 mm/memcontrol.c:2059 page_remove_rmap+0x3c/0xfd0 mm/rmap.c:1351 zap_pte_range mm/memory.c:1384 [inline] zap_pmd_range mm/memory.c:1505 [inline] zap_pud_range mm/memory.c:1534 [inline] zap_p4d_range mm/memory.c:1555 [inline] unmap_page_range+0xbb4/0x1958 mm/memory.c:1576 unmap_single_vma+0x13c/0x1e4 mm/memory.c:1621 unmap_vmas+0x104/0x200 mm/memory.c:1653 exit_mmap+0x2a8/0x4e0 mm/mmap.c:3212 __mmput+0xec/0x3b8 kernel/fork.c:1127 mmput+0x80/0xc8 kernel/fork.c:1148 exit_mm+0x4a0/0x684 kernel/exit.c:550 do_exit+0x4ec/0x1f58 kernel/exit.c:870 do_group_exit+0x100/0x268 kernel/exit.c:997 get_signal+0x73c/0x1340 kernel/signal.c:2900 do_signal arch/arm64/kernel/signal.c:893 [inline] do_notify_resume+0x35c/0x3128 arch/arm64/kernel/signal.c:946 prepare_exit_to_user_mode arch/arm64/kernel/entry-common.c:133 [inline] exit_to_user_mode arch/arm64/kernel/entry-common.c:138 [inline] el0_svc+0xf0/0x1e0 arch/arm64/kernel/entry-common.c:609 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1485 hardirqs last enabled at (1484): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1484): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1485): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (810): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (1465): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1465): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1465): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1465): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc31d ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4473 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4473 Comm: cmp Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d54f8000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:331 [inline] rcu_is_watching+0x50/0x134 kernel/rcu/tree.c:1123 rcu_read_lock include/linux/rcupdate.h:740 [inline] blk_cgroup_congested include/linux/blk-cgroup.h:280 [inline] __cgroup_throttle_swaprate+0x94/0x55c mm/swapfile.c:3809 cgroup_throttle_swaprate include/linux/swap.h:728 [inline] do_anonymous_page mm/memory.c:3844 [inline] handle_pte_fault mm/memory.c:4648 [inline] __handle_mm_fault mm/memory.c:4785 [inline] handle_mm_fault+0x1e50/0x2950 mm/memory.c:4883 __do_page_fault arch/arm64/mm/fault.c:505 [inline] do_page_fault+0x694/0xad4 arch/arm64/mm/fault.c:605 do_translation_fault+0xe0/0x130 arch/arm64/mm/fault.c:686 do_mem_abort+0x6c/0x1ac arch/arm64/mm/fault.c:819 el0_da+0x90/0x1fc arch/arm64/kernel/entry-common.c:494 el0t_64_sync_handler+0xd8/0xe4 arch/arm64/kernel/entry-common.c:629 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 5109 hardirqs last enabled at (5108): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (5108): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (5109): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (3992): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (5077): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (5077): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (5077): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (5077): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc31e ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4475 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4475 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f68a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7b300 x22: ffff0000ddc7b450 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d9121b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 835 hardirqs last enabled at (834): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (834): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (835): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (746): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (746): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (777): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (777): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (777): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (777): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc31f ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4313 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4313 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e68a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf3300 x22: ffff0000d3bf3450 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d3303680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 lock_release+0x34/0x8e8 kernel/locking/lockdep.c:5631 __might_fault+0xf4/0x128 mm/memory.c:5357 filldir64+0x398/0x9e4 fs/readdir.c:336 dir_emit include/linux/fs.h:3713 [inline] call_filldir fs/ext4/dir.c:548 [inline] ext4_dx_readdir fs/ext4/dir.c:624 [inline] ext4_readdir+0x28d4/0x2fc8 fs/ext4/dir.c:145 iterate_dir+0x1f0/0x4cc fs/readdir.c:-1 __do_sys_getdents64 fs/readdir.c:369 [inline] __se_sys_getdents64 fs/readdir.c:354 [inline] __arm64_sys_getdents64+0x11c/0x340 fs/readdir.c:354 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 204411 hardirqs last enabled at (204410): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (204410): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (204411): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (203598): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (203843): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (203843): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (203843): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (203843): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc320 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f68a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7b300 x22: ffff0000ddc7b450 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 239687 hardirqs last enabled at (239686): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (239686): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (239687): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (239294): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (239294): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (239299): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc321 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 240067 hardirqs last enabled at (240066): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (240066): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (240067): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (239798): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (239798): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (239803): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc322 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc79980 x22: ffff0000ddc79ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 240723 hardirqs last enabled at (240722): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (240722): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (240723): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (240242): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (240242): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (240247): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc323 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3653 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3653 Comm: udevd Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc79980 x22: ffff0000ddc79ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d618d1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 __lse_atomic64_or arch/arm64/include/asm/atomic_lse.h:177 [inline] arch_atomic64_or arch/arm64/include/asm/atomic.h:65 [inline] arch_atomic_long_or include/linux/atomic/atomic-long.h:329 [inline] arch_set_bit include/asm-generic/bitops/atomic.h:18 [inline] set_bit include/asm-generic/bitops/instrumented-atomic.h:29 [inline] unwind_frame+0x394/0x668 arch/arm64/kernel/stacktrace.c:105 walk_stackframe+0x6c/0xa8 arch/arm64/kernel/stacktrace.c:148 return_address+0xd0/0x144 arch/arm64/kernel/return_address.c:46 get_lock_parent_ip include/linux/ftrace.h:859 [inline] preempt_latency_start kernel/sched/core.c:5471 [inline] preempt_count_add+0x13c/0x3bc kernel/sched/core.c:5496 __raw_spin_lock include/linux/spinlock_api_smp.h:141 [inline] _raw_spin_lock+0x24/0x10c kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:363 [inline] fast_dput fs/dcache.c:768 [inline] dput+0x26c/0x458 fs/dcache.c:880 step_into+0x27c/0xa24 fs/namei.c:1815 walk_component+0x1f0/0x3a8 fs/namei.c:1982 link_path_walk+0x590/0xb8c fs/namei.c:-1 path_openat+0x1c0/0x26e4 fs/namei.c:3738 do_filp_open+0x164/0x330 fs/namei.c:3769 do_sys_openat2+0x128/0x3d8 fs/open.c:1253 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 936773 hardirqs last enabled at (936772): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (936772): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (936773): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (936638): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (936735): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (936735): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (936735): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (936735): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc326 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 244919 hardirqs last enabled at (244918): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (244918): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (244919): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (244758): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (244758): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (244763): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc327 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4550 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4550 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf3fc0 x22: ffff0000d3bf4110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000ccf33680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 741 hardirqs last enabled at (740): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (740): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (741): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (692): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (692): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (701): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (701): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (701): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (701): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc328 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3618 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3618 Comm: jbd2/nvme0n1p2- Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf2640 x22: ffff0000d3bf2790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000102 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000102 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d4a71b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 __blist_del_buffer fs/jbd2/transaction.c:2017 [inline] __jbd2_journal_temp_unlink_buffer+0x280/0x4b8 fs/jbd2/transaction.c:2066 __jbd2_journal_file_buffer+0x240/0x66c fs/jbd2/transaction.c:2545 jbd2_journal_file_buffer+0x68/0xa4 fs/jbd2/transaction.c:2582 jbd2_journal_commit_transaction+0x2d74/0x5994 fs/jbd2/commit.c:877 kjournald2+0x3a8/0x750 fs/jbd2/journal.c:213 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 4851 hardirqs last enabled at (4850): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (4850): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (4851): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (2688): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (2688): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (4811): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (4811): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (4811): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (4811): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc329 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4577 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4577 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000cee38000 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] lock_acquire+0x234/0x620 kernel/locking/lockdep.c:5626 rcu_lock_acquire+0x40/0x4c include/linux/rcupdate.h:312 rcu_read_lock include/linux/rcupdate.h:739 [inline] count_memcg_event_mm+0x2c/0x308 include/linux/memcontrol.h:1078 handle_mm_fault+0x1a0/0x2950 mm/memory.c:4863 __do_page_fault arch/arm64/mm/fault.c:505 [inline] do_page_fault+0x694/0xad4 arch/arm64/mm/fault.c:605 do_translation_fault+0xe0/0x130 arch/arm64/mm/fault.c:686 do_mem_abort+0x6c/0x1ac arch/arm64/mm/fault.c:819 el0_da+0x90/0x1fc arch/arm64/kernel/entry-common.c:494 el0t_64_sync_handler+0xd8/0xe4 arch/arm64/kernel/entry-common.c:629 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 71 hardirqs last enabled at (70): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (70): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (71): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (8): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (15): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (15): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (15): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (15): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc32a ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f35a x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc79980 x22: ffff0000ddc79ad0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 247899 hardirqs last enabled at (247898): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (247898): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (247899): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (247700): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (247700): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (247705): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc32b ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7bfc0 x22: ffff0000ddc7c110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000001 x17: 0000000000000000 x16: ffff8000111d162c x15: 0000000000000002 x14: 0000000000ff0100 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 248009 hardirqs last enabled at (248008): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (248008): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (248009): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (247992): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (247992): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (247997): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc32c ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3653 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3653 Comm: udevd Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77ecea x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf6600 x22: ffff0000d3bf6750 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d618d1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 qlink_to_cache mm/kasan/quarantine.c:120 [inline] qlist_free_all+0x84/0xa8 mm/kasan/quarantine.c:173 kasan_quarantine_reduce+0x124/0x130 mm/kasan/quarantine.c:283 __kasan_slab_alloc+0x34/0xcc mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook+0x74/0x408 mm/slab.h:519 slab_alloc_node mm/slub.c:3220 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc+0x1e0/0x3e4 mm/slub.c:3233 getname_flags+0xb8/0x450 fs/namei.c:138 getname+0x28/0x38 fs/namei.c:217 do_sys_openat2+0xd0/0x3d8 fs/open.c:1247 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 959447 hardirqs last enabled at (959446): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (959446): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (959447): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (959112): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (959401): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (959401): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (959401): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (959401): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc32e ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77eb52 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf5940 x22: ffff0000d3bf5a90 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000001 x17: 0000000000000000 x16: ffff8000111d162c x15: 0000000000000002 x14: 0000000000ff0100 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 260047 hardirqs last enabled at (260046): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (260046): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (260047): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (260028): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (260028): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (260033): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc332 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7bfc0 x22: ffff0000ddc7c110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 260453 hardirqs last enabled at (260452): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (260452): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (260453): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (260326): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (260326): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (260355): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc333 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7bfc0 x22: ffff0000ddc7c110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 263607 hardirqs last enabled at (263606): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (263606): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (263607): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (263462): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (263462): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (263467): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc335 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3653 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3653 Comm: udevd Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7bfc0 x22: ffff0000ddc7c110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d618d1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] kasan_quarantine_put+0xd4/0x204 mm/kasan/quarantine.c:231 ____kasan_slab_free+0x124/0x164 mm/kasan/common.c:368 __kasan_slab_free+0x18/0x28 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1705 [inline] slab_free_freelist_hook+0x128/0x1e8 mm/slub.c:1731 slab_free mm/slub.c:3499 [inline] kmem_cache_free+0xdc/0x3b4 mm/slub.c:3515 putname fs/namei.c:271 [inline] do_unlinkat+0x568/0x600 fs/namei.c:4371 __do_sys_unlinkat fs/namei.c:4391 [inline] __se_sys_unlinkat fs/namei.c:4384 [inline] __arm64_sys_unlinkat+0xe0/0xfc fs/namei.c:4384 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 988755 hardirqs last enabled at (988754): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (988754): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (988755): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (988514): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (988735): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (988735): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (988735): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (988735): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc337 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3653 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3653 Comm: udevd Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d618d1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] kasan_quarantine_put+0xd4/0x204 mm/kasan/quarantine.c:231 ____kasan_slab_free+0x124/0x164 mm/kasan/common.c:368 __kasan_slab_free+0x18/0x28 mm/kasan/common.c:374 kasan_slab_free include/linux/kasan.h:230 [inline] slab_free_hook mm/slub.c:1705 [inline] slab_free_freelist_hook+0x128/0x1e8 mm/slub.c:1731 slab_free mm/slub.c:3499 [inline] kmem_cache_free+0xdc/0x3b4 mm/slub.c:3515 putname+0x104/0x15c fs/namei.c:271 do_sys_openat2+0x1c0/0x3d8 fs/open.c:1262 do_sys_open fs/open.c:1269 [inline] __do_sys_openat fs/open.c:1285 [inline] __se_sys_openat fs/open.c:1280 [inline] __arm64_sys_openat+0x120/0x154 fs/open.c:1280 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 993093 hardirqs last enabled at (993092): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (993092): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (993093): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (992918): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (993011): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (993011): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (993011): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (993011): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc338 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4717 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4717 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000cc9ab680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] console_unlock+0xc90/0x133c kernel/printk/printk.c:2748 vprintk_emit+0x13c/0x218 kernel/printk/printk.c:2274 vprintk_default+0x54/0x80 kernel/printk/printk.c:2289 vprintk+0x1e8/0x284 kernel/printk/printk_safe.c:45 _printk+0xd0/0x118 kernel/printk/printk.c:2299 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x3a0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 705 hardirqs last enabled at (704): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (704): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (705): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (650): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (650): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (673): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (673): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (673): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (673): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc33c ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 3653 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 3653 Comm: udevd Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7bfc0 x22: ffff0000ddc7c110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d618d1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 preempt_count arch/arm64/include/asm/preempt.h:12 [inline] check_kcov_mode kernel/kcov.c:172 [inline] __sanitizer_cov_trace_pc+0x2c/0xac kernel/kcov.c:206 check_preemption_disabled+0x38/0x164 lib/smp_processor_id.c:16 debug_smp_processor_id+0x20/0x2c lib/smp_processor_id.c:60 rcu_dynticks_curr_cpu_in_eqs kernel/rcu/tree.c:331 [inline] rcu_is_watching+0x50/0x134 kernel/rcu/tree.c:1123 trace_lock_release include/trace/events/lock.h:58 [inline] lock_release+0xb4/0x8e8 kernel/locking/lockdep.c:5634 up_read+0x8c/0xe8 kernel/locking/rwsem.c:1593 kernfs_iop_permission+0x1cc/0x2e0 fs/kernfs/inode.c:289 do_inode_permission fs/namei.c:459 [inline] inode_permission+0x1d0/0x3c0 fs/namei.c:526 may_lookup fs/namei.c:1693 [inline] link_path_walk+0x268/0xb8c fs/namei.c:2245 path_lookupat+0x90/0x3d0 fs/namei.c:2454 filename_lookup+0x180/0x414 fs/namei.c:2484 user_path_at_empty+0x5c/0x1a0 fs/namei.c:2883 user_path_at include/linux/namei.h:57 [inline] vfs_statx+0xf4/0x458 fs/stat.c:221 vfs_fstatat fs/stat.c:243 [inline] __do_sys_newfstatat fs/stat.c:411 [inline] __se_sys_newfstatat fs/stat.c:405 [inline] __arm64_sys_newfstatat+0x10c/0x190 fs/stat.c:405 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 1000397 hardirqs last enabled at (1000396): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1000396): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1000397): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1000140): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (1000371): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1000371): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1000371): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1000371): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc33d ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7cc80 x22: ffff0000ddc7cdd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff8000141a3880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 204139 hardirqs last enabled at (204138): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (204138): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (204139): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (204086): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (204086): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (204111): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (204111): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (204111): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (204111): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc33e ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4735 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4735 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77ee82 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf72c0 x22: ffff0000d3bf7410 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d1a251c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 767 hardirqs last enabled at (766): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (766): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (767): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (668): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (668): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (705): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (705): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (705): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (705): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc341 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4313 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4313 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7cc80 x22: ffff0000ddc7cdd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d3303680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] seqcount_lockdep_reader_access include/linux/seqlock.h:105 [inline] get_counters net/ipv4/netfilter/ip_tables.c:758 [inline] alloc_counters+0x3f8/0x7a4 net/ipv4/netfilter/ip_tables.c:805 copy_entries_to_user net/ipv6/netfilter/ip6_tables.c:839 [inline] get_entries net/ipv6/netfilter/ip6_tables.c:1041 [inline] do_ip6t_get_ctl+0xaf4/0x13a8 net/ipv6/netfilter/ip6_tables.c:1679 nf_getsockopt+0x264/0x284 net/netfilter/nf_sockopt.c:116 ipv6_getsockopt+0x52c/0x2584 net/ipv6/ipv6_sockglue.c:1492 tcp_getsockopt+0x214/0x2e74 net/ipv4/tcp.c:4313 sock_common_getsockopt+0xa8/0xc4 net/core/sock.c:3418 __sys_getsockopt+0x1e0/0x45c net/socket.c:2247 __do_sys_getsockopt net/socket.c:2262 [inline] __se_sys_getsockopt net/socket.c:2259 [inline] __arm64_sys_getsockopt+0xb8/0xd4 net/socket.c:2259 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 339077 hardirqs last enabled at (339076): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (339076): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (339077): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (338960): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (338960): [] release_sock+0x1d0/0x258 net/core/sock.c:3277 softirqs last disabled at (339051): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (339051): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (339051): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (339051): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc342 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7bfc0 x22: ffff0000ddc7c110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 274523 hardirqs last enabled at (274522): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (274522): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (274523): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (274474): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (274474): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (274479): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc343 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf2640 x22: ffff0000d3bf2790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff8000141a3880 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_enable+0xc/0x18 arch/arm64/include/asm/irqflags.h:35 default_idle_call+0xcc/0x418 kernel/sched/idle.c:112 cpuidle_idle_call kernel/sched/idle.c:194 [inline] do_idle+0x1c8/0x480 kernel/sched/idle.c:306 cpu_startup_entry+0x24/0x28 kernel/sched/idle.c:403 rest_init+0x360/0x390 init/main.c:741 arch_call_rest_init+0x14/0x20 init/main.c:893 start_kernel+0x49c/0x54c init/main.c:1140 __primary_switched+0xa8/0xb0 arch/arm64/kernel/head.S:468 irq event stamp: 208143 hardirqs last enabled at (208142): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (208142): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (208143): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (208044): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (208044): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (208105): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (208105): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (208105): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (208105): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc346 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4751 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4751 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000cee0d1c0 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] console_unlock+0xc90/0x133c kernel/printk/printk.c:2748 vprintk_emit+0x13c/0x218 kernel/printk/printk.c:2274 vprintk_default+0x54/0x80 kernel/printk/printk.c:2289 vprintk+0x1e8/0x284 kernel/printk/printk_safe.c:45 _printk+0xd0/0x118 kernel/printk/printk.c:2299 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x3a0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 949 hardirqs last enabled at (948): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (948): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (949): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (830): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (830): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (849): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (849): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (849): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (849): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc349 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7cc80 x22: ffff0000ddc7cdd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 276501 hardirqs last enabled at (276500): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (276500): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (276501): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (276334): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (276334): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (276339): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc34a ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7cc80 x22: ffff0000ddc7cdd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 277867 hardirqs last enabled at (277866): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (277866): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (277867): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (277620): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (277620): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (277625): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc34d ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4313 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4313 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf4c80 x22: ffff0000d3bf4dd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000d3303680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore+0x8/0x10 arch/arm64/include/asm/irqflags.h:122 lock_is_held include/linux/lockdep.h:287 [inline] rcu_read_lock_held+0x34/0x50 kernel/rcu/update.c:311 ext4_get_group_info+0x1cc/0x390 fs/ext4/balloc.c:332 ext4_free_inode+0x428/0xe6c fs/ext4/ialloc.c:295 ext4_evict_inode+0xd78/0x11dc fs/ext4/inode.c:334 evict+0x3c8/0x810 fs/inode.c:647 iput_final fs/inode.c:1769 [inline] iput+0x6c4/0x77c fs/inode.c:1795 do_unlinkat+0x360/0x600 fs/namei.c:4355 __do_sys_unlinkat fs/namei.c:4391 [inline] __se_sys_unlinkat fs/namei.c:4384 [inline] __arm64_sys_unlinkat+0xe0/0xfc fs/namei.c:4384 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 380115 hardirqs last enabled at (380114): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (380114): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (380115): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (379700): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:31 softirqs last disabled at (380083): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (380083): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (380083): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (380083): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc34e ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 278537 hardirqs last enabled at (278536): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (278536): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (278537): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (278478): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (278478): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (278483): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc34f ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 14 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff80001b347a20 x29: ffff80001b347a30 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f4f2 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7a640 x22: ffff0000ddc7a790 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c0951b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 smpboot_thread_fn+0x4b0/0x920 kernel/smpboot.c:164 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 279893 hardirqs last enabled at (279892): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (279892): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (279893): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (279854): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (279854): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (279857): [] run_ksoftirqd+0x7c/0x2a0 kernel/softirq.c:943 ---[ end trace b6898b22664cc351 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 136 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 136 Comm: kworker/u4:1 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: events_power_efficient gc_worker pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7cc80 x22: ffff0000ddc7cdd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000c2243680 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 lock_is_held_type+0x148/0x198 kernel/locking/lockdep.c:5671 lock_is_held include/linux/lockdep.h:287 [inline] ___might_sleep+0x48/0x4d4 kernel/sched/core.c:9605 gc_worker+0xb70/0x11a4 net/netfilter/nf_conntrack_core.c:1544 process_one_work+0x79c/0x1140 kernel/workqueue.c:2310 process_scheduled_works kernel/workqueue.c:2373 [inline] worker_thread+0xb64/0x101c kernel/workqueue.c:2459 kthread+0x374/0x454 kernel/kthread.c:334 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:855 irq event stamp: 1345779 hardirqs last enabled at (1345778): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (1345778): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (1345779): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (1332288): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (1332288): [] batadv_nc_purge_paths+0x308/0x390 net/batman-adv/network-coding.c:475 softirqs last disabled at (1345757): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (1345757): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (1345757): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (1345757): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc352 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4775 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4775 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001a77e822 x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000d3bf3fc0 x22: ffff0000d3bf4110 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000101 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000101 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000dae71b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] console_unlock+0xc90/0x133c kernel/printk/printk.c:2748 vprintk_emit+0x13c/0x218 kernel/printk/printk.c:2274 vprintk_default+0x54/0x80 kernel/printk/printk.c:2289 vprintk+0x1e8/0x284 kernel/printk/printk_safe.c:45 _printk+0xd0/0x118 kernel/printk/printk.c:2299 fail_dump lib/fault-inject.c:45 [inline] should_fail+0x3a0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 675 hardirqs last enabled at (674): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (674): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (675): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (626): [] spin_unlock_bh include/linux/spinlock.h:408 [inline] softirqs last enabled at (626): [] lock_sock_nested+0x14c/0x1d4 net/core/sock.c:3258 softirqs last disabled at (649): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (649): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (649): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (649): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc355 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 4775 at net/ipv4/af_inet.c:157 inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 Modules linked in: CPU: 0 PID: 4775 Comm: syz-executor.0 Tainted: G W 5.15.187-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 sp : ffff800008007bc0 x29: ffff800008007bd0 x28: ffff80001133aac0 x27: dfff800000000000 x26: 1fffe0001bb8f9ba x25: dfff800000000000 x24: dfff800000000000 x23: ffff0000ddc7cc80 x22: ffff0000ddc7cdd0 x21: 0000000000000007 x20: 0000000000000fec x19: 0000000000800301 x18: 0000000000000100 x17: 0000000000000000 x16: ffff8000111d162c x15: 00000000c0000000 x14: 00000000ffff8000 x13: 1ffff0000283006b x12: 0000000000ff0100 x11: 0000000000000100 x10: 0000000000000000 x9 : ffff80000ff2652c x8 : ffff0000dae71b40 x7 : ffff800008357810 x6 : 0000000000000000 x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffff80000ff263cc x2 : 0000000000000000 x1 : 0000000000000fec x0 : 0000000000000000 Call trace: inet_sock_destruct+0x560/0x640 net/ipv4/af_inet.c:157 inet6_sock_destruct+0x28/0x38 net/ipv6/af_inet6.c:114 __sk_destruct+0x5c/0x604 net/core/sock.c:1956 rcu_do_batch kernel/rcu/tree.c:2523 [inline] rcu_core+0x7c8/0x1764 kernel/rcu/tree.c:2763 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2776 handle_softirqs+0x344/0xbf0 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] invoke_softirq kernel/softirq.c:457 [inline] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 irq_exit+0x14/0x88 kernel/softirq.c:683 handle_domain_irq+0x14c/0x1fc kernel/irq/irqdesc.c:711 gic_handle_irq+0x78/0x1c8 drivers/irqchip/irq-gic-v3.c:765 call_on_irq_stack+0x24/0x30 arch/arm64/kernel/entry.S:855 do_interrupt_handler+0x6c/0x88 arch/arm64/kernel/entry-common.c:267 el1_interrupt+0x30/0x58 arch/arm64/kernel/entry-common.c:454 el1h_64_irq_handler+0x18/0x24 arch/arm64/kernel/entry-common.c:470 el1h_64_irq+0x78/0x7c arch/arm64/kernel/entry.S:522 arch_local_irq_restore arch/arm64/include/asm/irqflags.h:122 [inline] dump_stack_lvl+0x140/0x160 lib/dump_stack.c:107 dump_stack+0x1c/0x5c lib/dump_stack.c:113 fail_dump lib/fault-inject.c:52 [inline] should_fail+0x3c0/0x51c lib/fault-inject.c:146 __should_failslab+0xbc/0x10c mm/failslab.c:33 should_failslab+0x10/0x28 mm/slab_common.c:1350 slab_pre_alloc_hook+0x64/0xec mm/slab.h:494 slab_alloc_node mm/slub.c:3134 [inline] slab_alloc mm/slub.c:3228 [inline] kmem_cache_alloc_trace+0x98/0x3fc mm/slub.c:3245 kmalloc include/linux/slab.h:604 [inline] kzalloc include/linux/slab.h:735 [inline] tcp_bpf_send_verdict+0xafc/0xcb8 net/ipv4/tcp_bpf.c:364 tcp_bpf_sendmsg+0x510/0x930 net/ipv4/tcp_bpf.c:516 inet6_sendmsg+0xb4/0xd8 net/ipv6/af_inet6.c:667 sock_sendmsg_nosec net/socket.c:704 [inline] __sock_sendmsg net/socket.c:716 [inline] ____sys_sendmsg+0x61c/0x920 net/socket.c:2436 ___sys_sendmsg+0x1d0/0x240 net/socket.c:2490 __sys_sendmsg net/socket.c:2519 [inline] __do_sys_sendmsg net/socket.c:2528 [inline] __se_sys_sendmsg net/socket.c:2526 [inline] __arm64_sys_sendmsg+0x1a8/0x254 net/socket.c:2526 __invoke_syscall arch/arm64/kernel/syscall.c:38 [inline] invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:52 el0_svc_common+0x138/0x258 arch/arm64/kernel/syscall.c:142 do_el0_svc+0x58/0x14c arch/arm64/kernel/syscall.c:181 el0_svc+0x78/0x1e0 arch/arm64/kernel/entry-common.c:608 el0t_64_sync_handler+0xcc/0xe4 arch/arm64/kernel/entry-common.c:626 el0t_64_sync+0x1a0/0x1a4 arch/arm64/kernel/entry.S:584 irq event stamp: 951 hardirqs last enabled at (950): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:160 [inline] hardirqs last enabled at (950): [] _raw_spin_unlock_irqrestore+0xa8/0x14c kernel/locking/spinlock.c:194 hardirqs last disabled at (951): [] el1_dbg+0x24/0x80 arch/arm64/kernel/entry-common.c:396 softirqs last enabled at (758): [] softirq_handle_end kernel/softirq.c:419 [inline] softirqs last enabled at (758): [] handle_softirqs+0xa4c/0xbf0 kernel/softirq.c:604 softirqs last disabled at (915): [] __do_softirq kernel/softirq.c:610 [inline] softirqs last disabled at (915): [] do_softirq_own_stack include/asm-generic/softirq_stack.h:10 [inline] softirqs last disabled at (915): [] invoke_softirq kernel/softirq.c:457 [inline] softirqs last disabled at (915): [] __irq_exit_rcu+0x240/0x440 kernel/softirq.c:659 ---[ end trace b6898b22664cc356 ]---