bridge_slave_0: left allmulticast mode bridge_slave_0: left promiscuous mode bridge0: port 1(bridge_slave_0) entered disabled state BUG: spinlock bad magic on CPU#2, kworker/u32:15/17418 Oops: general protection fault, probably for non-canonical address 0xe0001bffe00020b9: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: maybe wild-memory-access in range [0x0000ffff000105c8-0x0000ffff000105cf] CPU: 2 UID: 0 PID: 17418 Comm: kworker/u32:15 Not tainted 6.12.0-rc7-syzkaller-00070-g0a9b9d17f3a7 #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Workqueue: netns cleanup_net RIP: 0010:task_pid_nr include/linux/pid.h:232 [inline] RIP: 0010:spin_dump kernel/locking/spinlock_debug.c:64 [inline] RIP: 0010:spin_bug+0x100/0x1d0 kernel/locking/spinlock_debug.c:78 Code: 08 84 d2 0f 85 db 00 00 00 48 85 ed 44 8b 4b 08 74 7d 48 8d bd c8 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 68 44 8b 85 c8 05 00 00 48 8d 8d RSP: 0018:ffffc90007b977e0 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: ffff8880292a8020 RCX: ffffffff816d3e69 RDX: 00001fffe00020b9 RSI: ffffffff816de786 RDI: 0000ffff000105c8 RBP: 0000ffff00010000 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000080000001 R11: 697073203a475542 R12: ffffffff8b6d36e0 R13: ffff88804d682440 R14: ffffc90007b97920 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88806a800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d5586af9f8 CR3: 0000000053474000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline] do_raw_spin_lock+0x225/0x2c0 kernel/locking/spinlock_debug.c:115 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0x42/0x60 kernel/locking/spinlock.c:162 down+0x2a/0xa0 kernel/locking/semaphore.c:59 netpoll_poll_disable+0x79/0x110 net/core/netpoll.c:225 __dev_close_many+0xd9/0x310 net/core/dev.c:1532 dev_close_many+0x24c/0x6a0 net/core/dev.c:1585 unregister_netdevice_many_notify+0x489/0x1e50 net/core/dev.c:11381 cleanup_net+0x58c/0xb40 net/core/net_namespace.c:621 process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:task_pid_nr include/linux/pid.h:232 [inline] RIP: 0010:spin_dump kernel/locking/spinlock_debug.c:64 [inline] RIP: 0010:spin_bug+0x100/0x1d0 kernel/locking/spinlock_debug.c:78 Code: 08 84 d2 0f 85 db 00 00 00 48 85 ed 44 8b 4b 08 74 7d 48 8d bd c8 05 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 04 3c 03 7e 68 44 8b 85 c8 05 00 00 48 8d 8d RSP: 0018:ffffc90007b977e0 EFLAGS: 00010002 RAX: dffffc0000000000 RBX: ffff8880292a8020 RCX: ffffffff816d3e69 RDX: 00001fffe00020b9 RSI: ffffffff816de786 RDI: 0000ffff000105c8 RBP: 0000ffff00010000 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000080000001 R11: 697073203a475542 R12: ffffffff8b6d36e0 R13: ffff88804d682440 R14: ffffc90007b97920 R15: 0000000000000001 FS: 0000000000000000(0000) GS:ffff88806a800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d5586af9f8 CR3: 0000000053474000 CR4: 0000000000352ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 08 84 d2 0f 85 db 00 or %al,0xdb850f(%rdx,%rdx,8) 7: 00 00 add %al,(%rax) 9: 48 85 ed test %rbp,%rbp c: 44 8b 4b 08 mov 0x8(%rbx),%r9d 10: 74 7d je 0x8f 12: 48 8d bd c8 05 00 00 lea 0x5c8(%rbp),%rdi 19: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 20: fc ff df 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 04 je 0x36 32: 3c 03 cmp $0x3,%al 34: 7e 68 jle 0x9e 36: 44 8b 85 c8 05 00 00 mov 0x5c8(%rbp),%r8d 3d: 48 rex.W 3e: 8d .byte 0x8d 3f: 8d .byte 0x8d