bond0 (unregistering): (slave bond_slave_1): Releasing backup interface bond0 (unregistering): (slave bond_slave_0): Releasing backup interface bond0 (unregistering): Released all slaves 8<--- cut here --- Unable to handle kernel NULL pointer dereference at virtual address 00000000 [00000000] *pgd=80000080004003, *pmd=00000000 Internal error: Oops: 207 [#1] PREEMPT SMP ARM Modules linked in: CPU: 0 PID: 20019 Comm: kworker/u4:3 Not tainted 5.18.0-syzkaller #0 Hardware name: ARM-Versatile Express Workqueue: netns cleanup_net PC is at __list_del_entry_valid+0x28/0xa0 lib/list_debug.c:51 LR is at __list_del_entry include/linux/list.h:134 [inline] LR is at list_del include/linux/list.h:148 [inline] LR is at cttimeout_net_exit+0x88/0xf0 net/netfilter/nfnetlink_cttimeout.c:617 pc : [<80796448>] lr : [<813db428>] psr: 80000013 sp : ebb79e50 ip : ebb79e60 fp : ebb79e5c r10: 812993b8 r9 : 84c48014 r8 : 00000100 r7 : 00000122 r6 : 84349d88 r5 : 84349d88 r4 : 854349bc r3 : 00000000 r2 : 00000000 r1 : 00000122 r0 : 854349f8 Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user Control: 30c5387d Table: 84211e00 DAC: fffffffd Register r0 information: slab kmalloc-128 start 85434980 pointer offset 120 size 128 Register r1 information: non-paged memory Register r2 information: NULL pointer Register r3 information: NULL pointer Register r4 information: slab kmalloc-128 start 85434980 pointer offset 60 size 128 Register r5 information: slab kmalloc-64 start 84349d80 pointer offset 8 size 64 Register r6 information: slab kmalloc-64 start 84349d80 pointer offset 8 size 64 Register r7 information: non-paged memory Register r8 information: non-paged memory Register r9 information: slab net_namespace start 84c48000 pointer offset 20 Register r10 information: non-slab/vmalloc memory Register r11 information: 2-page vmalloc region starting at 0xebb78000 allocated at kernel_clone+0x9c/0x42c kernel/fork.c:2642 Register r12 information: 2-page vmalloc region starting at 0xebb78000 allocated at kernel_clone+0x9c/0x42c kernel/fork.c:2642 Process kworker/u4:3 (pid: 20019, stack limit = 0xebb78000) Stack: (0xebb79e50 to 0xebb7a000) 9e40: ebb79e84 ebb79e60 813db428 8079642c 9e60: 84e90000 ebb79ec4 825c01d8 ebb79ec4 825b4d00 84c48014 ebb79ea4 ebb79e88 9e80: 81299390 813db3ac 825c01d8 825b4d08 825b4d08 ebb79ec4 ebb79efc ebb79ea8 9ea0: 81299b8c 8129935c ebb79efc ebb79eb8 80796f28 825b4cc0 82404d40 84c48000 9ec0: ebb79f04 84e90024 84e90024 ebf7c468 00000000 825b4cd8 855d1f80 8280e800 9ee0: 82816600 00000110 852c9780 82816615 ebb79f44 ebb79f00 80261cf8 81299944 9f00: 80275f58 802a0d34 ebb79f2c ebb79f18 80263748 00000000 8280e800 855d1f80 9f20: 8280e800 855d1f98 8280e81c 82404d40 00000088 8280e800 ebb79f84 ebb79f48 9f40: 802620ec 80261af8 ebb79f64 81d71d34 825d5ce5 852c9780 ebb79f84 8529e740 9f60: 852c9780 80262080 855d1f80 8529e340 ebec5e8c 00000000 ebb79fac ebb79f88 9f80: 8026a8a8 8026208c 8529e740 8026a7b8 00000000 00000000 00000000 00000000 9fa0: 00000000 ebb79fb0 80200100 8026a7c4 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000 Backtrace: [<80796420>] (__list_del_entry_valid) from [<813db428>] (__list_del_entry include/linux/list.h:134 [inline]) [<80796420>] (__list_del_entry_valid) from [<813db428>] (list_del include/linux/list.h:148 [inline]) [<80796420>] (__list_del_entry_valid) from [<813db428>] (cttimeout_net_exit+0x88/0xf0 net/netfilter/nfnetlink_cttimeout.c:617) [<813db3a0>] (cttimeout_net_exit) from [<81299390>] (ops_exit_list+0x40/0x68 net/core/net_namespace.c:162) r9:84c48014 r8:825b4d00 r7:ebb79ec4 r6:825c01d8 r5:ebb79ec4 r4:84e90000 [<81299350>] (ops_exit_list) from [<81299b8c>] (cleanup_net+0x254/0x404 net/core/net_namespace.c:594) r7:ebb79ec4 r6:825b4d08 r5:825b4d08 r4:825c01d8 [<81299938>] (cleanup_net) from [<80261cf8>] (process_one_work+0x20c/0x594 kernel/workqueue.c:2289) r10:82816615 r9:852c9780 r8:00000110 r7:82816600 r6:8280e800 r5:855d1f80 r4:825b4cd8 [<80261aec>] (process_one_work) from [<802620ec>] (worker_thread+0x6c/0x4e0 kernel/workqueue.c:2436) r10:8280e800 r9:00000088 r8:82404d40 r7:8280e81c r6:855d1f98 r5:8280e800 r4:855d1f80 [<80262080>] (worker_thread) from [<8026a8a8>] (kthread+0xf0/0x120 kernel/kthread.c:376) r10:00000000 r9:ebec5e8c r8:8529e340 r7:855d1f80 r6:80262080 r5:852c9780 r4:8529e740 [<8026a7b8>] (kthread) from [<80200100>] (ret_from_fork+0x14/0x34 arch/arm/kernel/entry-common.S:148) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026a7b8 r4:8529e740 Code: 0a00000a e3001122 e1520001 0a000018 (e5921000) ---[ end trace 0000000000000000 ]--- ---------------- Code disassembly (best guess): 0: 0a00000a beq 0x30 4: e3001122 movw r1, #290 ; 0x122 8: e1520001 cmp r2, r1 c: 0a000018 beq 0x74 * 10: e5921000 ldr r1, [r2] <-- trapping instruction