------------[ cut here ]------------ WARNING: CPU: 0 PID: 6662 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3303 Modules linked in: CPU: 0 UID: 0 PID: 6662 Comm: kworker/u8:7 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 Workqueue: netns cleanup_net pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3303 lr : xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3303 sp : ffff8000a17778a0 x29: ffff8000a17778a0 x28: 0000000000000001 x27: 1ffff0001254d151 x26: ffff800092a68a88 x25: ffff800092b6e1a0 x24: ffff0000de32a4e8 x23: ffff800092b6e1c0 x22: dfff800000000000 x21: dfff800000000000 x20: ffff0000de32b8c0 x19: ffff0000de32a440 x18: 1fffe00033797688 x17: ffff80008f7de000 x16: ffff80008b0156e8 x15: 0000000000000001 x14: 1fffe0003379e7f0 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800093323be8 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000ccfa9e80 x7 : ffff800080426310 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : 0000000000000080 x0 : 0000000000000000 Call trace: xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3303 (P) xfrm_net_exit+0x38/0x78 net/xfrm/xfrm_policy.c:4348 ops_exit_list net/core/net_namespace.c:198 [inline] ops_undo_list+0x3c0/0x7ec net/core/net_namespace.c:251 cleanup_net+0x3e4/0x6c0 net/core/net_namespace.c:682 process_one_work+0x7e8/0x155c kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 irq event stamp: 1642312 hardirqs last enabled at (1642311): [] __raw_spin_unlock_irq include/linux/spinlock_api_smp.h:159 [inline] hardirqs last enabled at (1642311): [] _raw_spin_unlock_irq+0x30/0x80 kernel/locking/spinlock.c:202 hardirqs last disabled at (1642312): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1642308): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs last enabled at (1642308): [] xfrm_state_flush+0x744/0x760 net/xfrm/xfrm_state.c:952 softirqs last disabled at (1642306): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs last disabled at (1642306): [] xfrm_state_flush+0x48/0x760 net/xfrm/xfrm_state.c:924 ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 6662 at net/xfrm/xfrm_state.c:3310 xfrm_state_fini+0x274/0x2b0 net/xfrm/xfrm_state.c:3310 Modules linked in: CPU: 0 UID: 0 PID: 6662 Comm: kworker/u8:7 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 Workqueue: netns cleanup_net pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xfrm_state_fini+0x274/0x2b0 net/xfrm/xfrm_state.c:3310 lr : xfrm_state_fini+0x274/0x2b0 net/xfrm/xfrm_state.c:3310 sp : ffff8000a17778a0 x29: ffff8000a17778a0 x28: 0000000000000001 x27: 1ffff0001254d151 x26: ffff800092a68a88 x25: ffff800092b6e1a0 x24: 1fffe0001bc6571b x23: 0000000000000038 x22: dfff800000000000 x21: ffff0000ca0f2b80 x20: ffff0000de32b8d8 x19: ffff0000de32a440 x18: 1fffe00033797688 x17: ffff80008f7de000 x16: ffff800080528e24 x15: 0000000000000001 x14: 0000000080451e3c x13: 000000007cc799fa x12: ffff8000801fb550 x11: ffff800093323be8 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000ccfa9e80 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : 0000000000000080 x0 : 0000000000000001 Call trace: xfrm_state_fini+0x274/0x2b0 net/xfrm/xfrm_state.c:3310 (P) xfrm_net_exit+0x38/0x78 net/xfrm/xfrm_policy.c:4348 ops_exit_list net/core/net_namespace.c:198 [inline] ops_undo_list+0x3c0/0x7ec net/core/net_namespace.c:251 cleanup_net+0x3e4/0x6c0 net/core/net_namespace.c:682 process_one_work+0x7e8/0x155c kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 irq event stamp: 1642410 hardirqs last enabled at (1642409): [] kasan_quarantine_put+0x1a0/0x1c8 mm/kasan/quarantine.c:234 hardirqs last disabled at (1642410): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1642396): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (1642396): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (1642315): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 6662 at net/xfrm/xfrm_state.c:3312 xfrm_state_fini+0x288/0x2b0 net/xfrm/xfrm_state.c:3312 Modules linked in: CPU: 0 UID: 0 PID: 6662 Comm: kworker/u8:7 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/30/2025 Workqueue: netns cleanup_net pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xfrm_state_fini+0x288/0x2b0 net/xfrm/xfrm_state.c:3312 lr : xfrm_state_fini+0x288/0x2b0 net/xfrm/xfrm_state.c:3312 sp : ffff8000a17778a0 x29: ffff8000a17778a0 x28: 0000000000000001 x27: 1ffff0001254d151 x26: ffff800092a68a88 x25: ffff800092b6e1a0 x24: 1fffe0001bc6571a x23: 0000000000000038 x22: dfff800000000000 x21: ffff0000c1de5080 x20: ffff0000de32b8d0 x19: ffff0000de32a440 x18: 1fffe00033797688 x17: ffff80008f7de000 x16: ffff800080528e24 x15: 0000000000000001 x14: 0000000080451e3c x13: 00000000e14dfbb6 x12: ffff8000801fb550 x11: ffff800093323be8 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000ccfa9e80 x7 : 0000000000000000 x6 : 000000000000003f x5 : 0000000000000040 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : 0000000000000080 x0 : 0000000000000001 Call trace: xfrm_state_fini+0x288/0x2b0 net/xfrm/xfrm_state.c:3312 (P) xfrm_net_exit+0x38/0x78 net/xfrm/xfrm_policy.c:4348 ops_exit_list net/core/net_namespace.c:198 [inline] ops_undo_list+0x3c0/0x7ec net/core/net_namespace.c:251 cleanup_net+0x3e4/0x6c0 net/core/net_namespace.c:682 process_one_work+0x7e8/0x155c kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3400 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 irq event stamp: 1642470 hardirqs last enabled at (1642469): [] kasan_quarantine_put+0x1a0/0x1c8 mm/kasan/quarantine.c:234 hardirqs last disabled at (1642470): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:434 softirqs last enabled at (1642444): [] softirq_handle_end kernel/softirq.c:425 [inline] softirqs last enabled at (1642444): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:607 softirqs last disabled at (1642413): [] __do_softirq+0x14/0x20 kernel/softirq.c:613 ---[ end trace 0000000000000000 ]---