bridge_slave_1: left promiscuous mode bridge0: port 2(bridge_slave_1) entered disabled state bridge_slave_0: left allmulticast mode bridge_slave_0: left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state batman_adv: batadv0: Interface deactivated: ip6gretap1 BUG: spinlock bad magic on CPU#0, kworker/u8:9/3009 Oops: general protection fault, probably for non-canonical address 0xe0001bffe00020b9: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: maybe wild-memory-access in range [0x0000ffff000105c8-0x0000ffff000105cf] CPU: 0 UID: 0 PID: 3009 Comm: kworker/u8:9 Not tainted 6.12.0-rc3-syzkaller-00217-g4d939780b705 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: netns cleanup_net RIP: 0010:task_pid_nr include/linux/pid.h:232 [inline] RIP: 0010:spin_dump kernel/locking/spinlock_debug.c:64 [inline] RIP: 0010:spin_bug+0x100/0x1d0 kernel/locking/spinlock_debug.c:78 Code: 08 84 d2 0f 85 db 00 00 00 48 85 ed 44 8b 4b 08 74 7d 48 8d bd c8 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 68 44 8b 85 c8 05 00 00 48 8d 8d RSP: 0018:ffffc900099c77e0 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: ffff888061398020 RCX: ffffffff816d46e9 RDX: 00001fffe00020b9 RSI: ffffffff816defe6 RDI: 0000ffff000105c8 RBP: 0000ffff00010000 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000080000001 R11: 205d393030335420 R12: ffffffff8b6d3760 R13: ffff88802fcbda00 R14: ffffc900099c7920 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fddedbdd800 CR3: 00000000325b6000 CR4: 00000000003526f0 Call Trace: debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline] do_raw_spin_lock+0x225/0x2c0 kernel/locking/spinlock_debug.c:115 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0x42/0x60 kernel/locking/spinlock.c:162 down+0x2a/0xa0 kernel/locking/semaphore.c:59 netpoll_poll_disable+0x79/0x110 net/core/netpoll.c:225 __dev_close_many+0xd9/0x310 net/core/dev.c:1532 dev_close_many+0x24c/0x6a0 net/core/dev.c:1585 unregister_netdevice_many_notify+0x489/0x1e50 net/core/dev.c:11377 cleanup_net+0x58c/0xb40 net/core/net_namespace.c:621 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:task_pid_nr include/linux/pid.h:232 [inline] RIP: 0010:spin_dump kernel/locking/spinlock_debug.c:64 [inline] RIP: 0010:spin_bug+0x100/0x1d0 kernel/locking/spinlock_debug.c:78 Code: 08 84 d2 0f 85 db 00 00 00 48 85 ed 44 8b 4b 08 74 7d 48 8d bd c8 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 68 44 8b 85 c8 05 00 00 48 8d 8d RSP: 0018:ffffc900099c77e0 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: ffff888061398020 RCX: ffffffff816d46e9 RDX: 00001fffe00020b9 RSI: ffffffff816defe6 RDI: 0000ffff000105c8 RBP: 0000ffff00010000 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000080000001 R11: 205d393030335420 R12: ffffffff8b6d3760 R13: ffff88802fcbda00 R14: ffffc900099c7920 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fddedbdd800 CR3: 00000000325b6000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 08 84 d2 0f 85 db 00 or %al,0xdb850f(%rdx,%rdx,8) 7: 00 00 add %al,(%rax) 9: 48 85 ed test %rbp,%rbp c: 44 8b 4b 08 mov 0x8(%rbx),%r9d 10: 74 7d je 0x8f 12: 48 8d bd c8 05 00 00 lea 0x5c8(%rbp),%rdi 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 04 je 0x36 32: 3c 03 cmp $0x3,%al 34: 7e 68 jle 0x9e 36: 44 8b 85 c8 05 00 00 mov 0x5c8(%rbp),%r8d 3d: 48 rex.W 3e: 8d .byte 0x8d 3f: 8d .byte 0x8d