------------[ cut here ]------------ WARNING: net/ipv4/af_inet.c:157 at inet_sock_destruct+0x538/0x630 net/ipv4/af_inet.c:157, CPU#1: syz.1.168/7607 Modules linked in: CPU: 1 UID: 0 PID: 7607 Comm: syz.1.168 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 43400005 (nZcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : inet_sock_destruct+0x538/0x630 net/ipv4/af_inet.c:157 lr : inet_sock_destruct+0x538/0x630 net/ipv4/af_inet.c:157 sp : ffff800097bd7c30 x29: ffff800097bd7c40 x28: ffff8000891a8074 x27: 0000000000000007 x26: 1fffe0001a76753a x25: dfff800000000000 x24: ffff0000d3b3ae48 x23: ffff0000d3b3a940 x22: ffff0000d3b3a9d0 x21: ffff0000c9f14b80 x20: 0000000000000f70 x19: 0000000000800101 x18: 1fffe00033781890 x17: ffff80010c451000 x16: ffff8000805387e4 x15: 0000000000000001 x14: 1fffe0001a76757c x13: 0000000000000000 x12: 0000000000000000 x11: ffff60001a76757d x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000dada5580 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000001 x3 : ffff800089af72d0 x2 : 0000000000000000 x1 : 0000000000000f70 x0 : 0000000000000000 Call trace: inet_sock_destruct+0x538/0x630 net/ipv4/af_inet.c:157 (P) udp_destruct_sock+0x28/0x38 net/ipv4/udp.c:1836 __sk_destruct+0x80/0x924 net/core/sock.c:2350 rcu_do_batch kernel/rcu/tree.c:2605 [inline] rcu_core+0x848/0x1774 kernel/rcu/tree.c:2857 rcu_core_si+0x10/0x1c kernel/rcu/tree.c:2874 handle_softirqs+0x31c/0xc88 kernel/softirq.c:622 __do_softirq+0x14/0x20 kernel/softirq.c:656 ____do_softirq+0x14/0x20 arch/arm64/kernel/irq.c:68 call_on_irq_stack+0x30/0x48 arch/arm64/kernel/entry.S:891 do_softirq_own_stack+0x20/0x2c arch/arm64/kernel/irq.c:73 do_softirq+0x90/0xf8 kernel/softirq.c:523 __local_bh_enable_ip+0x240/0x35c kernel/softirq.c:450 local_bh_enable+0x28/0x34 include/linux/bottom_half.h:33 bpf_test_run+0x2f4/0x7bc net/bpf/test_run.c:426 bpf_prog_test_run_skb+0xb20/0x18dc net/bpf/test_run.c:1158 bpf_prog_test_run+0x2b4/0x33c kernel/bpf/syscall.c:4703 __sys_bpf+0x4d0/0x638 kernel/bpf/syscall.c:6182 __do_sys_bpf kernel/bpf/syscall.c:6274 [inline] __se_sys_bpf kernel/bpf/syscall.c:6272 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:6272 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x26c arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 irq event stamp: 60493 hardirqs last enabled at (60492): [] kasan_quarantine_put+0x1a0/0x1c8 mm/kasan/quarantine.c:234 hardirqs last disabled at (60493): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:412 softirqs last enabled at (60330): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (60331): [] __do_softirq+0x14/0x20 kernel/softirq.c:656 ---[ end trace 0000000000000000 ]--- vcan0: j1939_tp_rxtimer: 0x0000000018e8f9ac: rx timeout, send abort vcan0: j1939_tp_rxtimer: 0x0000000009c57171: rx timeout, send abort vcan0: j1939_xtp_rx_abort_one: 0x0000000009c57171: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. vcan0: j1939_tp_rxtimer: 0x0000000018e8f9ac: abort rx timeout. Force session deactivation