Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe002: 0000 [#1] SMP KASAN NOPTI
KASAN: probably user-memory-access in range [0x00000000ffff0010-0x00000000ffff0017]
CPU: 1 UID: 0 PID: 7142 Comm: kworker/u8:12 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Workqueue: netns cleanup_net
RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]
RIP: 0010:do_raw_spin_lock+0x6d/0x2b0 kernel/locking/spinlock_debug.c:115
Code: 98 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 65 48 8b 15 d9 2f 3e 12 48 89 54 24 60 31 d2 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e4
RSP: 0018:ffffc9000b5178a8 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 00000000ffff0010 RCX: 0000000000000000
RDX: 000000001fffe002 RSI: 0000000000000000 RDI: 00000000ffff0014
RBP: 1ffff920016a2f16 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000002c10 R12: ffff888025623428
R13: ffff88807468f690 R14: ffff888025623410 R15: ffff888025623400
FS: 0000000000000000(0000) GS:ffff8881247bc000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000019680 CR3: 000000005c69e000 CR4: 00000000003526f0
Call Trace:
<TASK>
spin_lock include/linux/spinlock.h:351 [inline]
kobj_kset_leave+0x50/0x200 lib/kobject.c:191
__kobject_del+0x11d/0x1f0 lib/kobject.c:608
kobject_del lib/kobject.c:627 [inline]
kobject_del+0x3f/0x60 lib/kobject.c:619
destroy_gid_attrs drivers/infiniband/core/sysfs.c:1183 [inline]
ib_free_port_attrs+0x280/0x490 drivers/infiniband/core/sysfs.c:1407
remove_one_compat_dev drivers/infiniband/core/device.c:1038 [inline]
rdma_dev_exit_net+0x2b5/0x590 drivers/infiniband/core/device.c:1176
ops_exit_list net/core/net_namespace.c:198 [inline]
ops_undo_list+0x2eb/0xab0 net/core/net_namespace.c:251
cleanup_net+0x408/0x890 net/core/net_namespace.c:682
process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3236
process_scheduled_works kernel/workqueue.c:3319 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400
kthread+0x3c2/0x780 kernel/kthread.c:463
ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
</TASK>
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]
RIP: 0010:do_raw_spin_lock+0x6d/0x2b0 kernel/locking/spinlock_debug.c:115
Code: 98 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 65 48 8b 15 d9 2f 3e 12 48 89 54 24 60 31 d2 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e4
RSP: 0018:ffffc9000b5178a8 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 00000000ffff0010 RCX: 0000000000000000
RDX: 000000001fffe002 RSI: 0000000000000000 RDI: 00000000ffff0014
RBP: 1ffff920016a2f16 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000002c10 R12: ffff888025623428
R13: ffff88807468f690 R14: ffff888025623410 R15: ffff888025623400
FS: 0000000000000000(0000) GS:ffff8881247bc000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000019680 CR3: 000000005c69e000 CR4: 00000000003526f0
----------------
Code disassembly (best guess):
0: 98 cwtl
1: 81 48 8d 54 05 00 c7 orl $0xc7000554,-0x73(%rax)
8: 02 f1 add %cl,%dh
a: f1 int1
b: f1 int1
c: f1 int1
d: c7 42 04 04 f3 f3 f3 movl $0xf3f3f304,0x4(%rdx)
14: 65 48 8b 15 d9 2f 3e mov %gs:0x123e2fd9(%rip),%rdx # 0x123e2ff5
1b: 12
1c: 48 89 54 24 60 mov %rdx,0x60(%rsp)
21: 31 d2 xor %edx,%edx
23: 48 89 fa mov %rdi,%rdx
26: 48 c1 ea 03 shr $0x3,%rdx
* 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction
2e: 48 89 f8 mov %rdi,%rax
31: 83 e0 07 and $0x7,%eax
34: 83 c0 03 add $0x3,%eax
37: 38 d0 cmp %dl,%al
39: 7c 08 jl 0x43
3b: 84 d2 test %dl,%dl
3d: 0f .byte 0xf
3e: 85 e4 test %esp,%esp