------------[ cut here ]------------ kernel BUG at arch/x86/mm/physaddr.c:28! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI CPU: 1 UID: 0 PID: 5954 Comm: kworker/u8:7 Not tainted 6.16.0-rc5-syzkaller-00204-gdae7f9cbd190 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 Workqueue: netns cleanup_net RIP: 0010:__phys_addr+0x16b/0x180 arch/x86/mm/physaddr.c:28 Code: 49 af 00 e9 45 ff ff ff e8 32 c7 4b 00 48 c7 c7 d0 f6 fa 8d 48 89 de 4c 89 f2 e8 a0 c4 82 03 e9 4d ff ff ff e8 16 c7 4b 00 90 <0f> 0b e8 0e c7 4b 00 90 0f 0b e8 06 c7 4b 00 90 0f 0b 0f 1f 00 90 RSP: 0018:ffffc90000a08b58 EFLAGS: 00010246 RAX: ffffffff81746f5a RBX: 00007780ffff0000 RCX: ffff88802e4c5a00 RDX: 0000000000000100 RSI: 000000017fff0000 RDI: 00007780ffff0000 RBP: ffffc90000a08e30 R08: 0000000000000000 R09: ffffffff81a8c5a4 R10: dffffc0000000000 R11: ffffffff89f64d50 R12: ffffffff89f64d50 R13: ffffffff81a8c5a4 R14: 000000017fff0000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888125d1b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000557608fe6f80 CR3: 000000000df38000 CR4: 00000000003526f0 Call Trace: virt_to_folio include/linux/mm.h:1178 [inline] kfree+0x77/0x440 mm/slub.c:4834 in_dev_free_rcu+0x49/0x60 net/ipv4/devinet.c:245 rcu_do_batch kernel/rcu/tree.c:2576 [inline] rcu_core+0xca8/0x1710 kernel/rcu/tree.c:2832 handle_softirqs+0x286/0x870 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline] sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1050 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xa8/0x110 kernel/locking/spinlock.c:194 Code: 74 05 e8 3b fd 55 f6 48 c7 44 24 20 00 00 00 00 9c 8f 44 24 20 f6 44 24 21 02 75 4f f7 c3 00 02 00 00 74 01 fb bf 01 00 00 00 03 1e 1f f6 65 8b 05 ac 8a 2e 07 85 c0 74 40 48 c7 04 24 0e 36 RSP: 0018:ffffc9000ace70c0 EFLAGS: 00000206 RAX: 44fe3823f13a5f00 RBX: 0000000000000a06 RCX: 44fe3823f13a5f00 RDX: 0000000000000006 RSI: ffffffff8d998bbb RDI: 0000000000000001 RBP: ffffc9000ace7150 R08: ffffffff8fa1f3f7 R09: 1ffffffff1f43e7e R10: dffffc0000000000 R11: fffffbfff1f43e7f R12: dffffc0000000000 R13: ffff888072e10e00 R14: ffffffff99d7b708 R15: 1ffff9200159ce18 debug_object_activate+0x2e2/0x420 lib/debugobjects.c:836 debug_rcu_head_queue kernel/rcu/rcu.h:236 [inline] __call_rcu_common kernel/rcu/tree.c:3079 [inline] call_rcu+0xaa/0x9c0 kernel/rcu/tree.c:3214 kernfs_put+0x19e/0x480 fs/kernfs/dir.c:591 kernfs_remove_by_name_ns+0xb7/0x130 fs/kernfs/dir.c:1718 kernfs_remove_by_name include/linux/kernfs.h:633 [inline] remove_files fs/sysfs/group.c:28 [inline] sysfs_remove_group+0xfc/0x2c0 fs/sysfs/group.c:322 sysfs_remove_groups+0x54/0xb0 fs/sysfs/group.c:346 device_remove_groups drivers/base/core.c:2846 [inline] device_remove_attrs+0x208/0x260 drivers/base/core.c:2982 device_del+0x509/0x8e0 drivers/base/core.c:3880 unregister_netdevice_many_notify+0x1d52/0x2320 net/core/dev.c:12112 unregister_netdevice_many net/core/dev.c:12140 [inline] default_device_exit_batch+0x819/0x890 net/core/dev.c:12644 ops_exit_list net/core/net_namespace.c:206 [inline] ops_undo_list+0x522/0x990 net/core/net_namespace.c:253 cleanup_net+0x4c5/0x800 net/core/net_namespace.c:686 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402 kthread+0x70e/0x8a0 kernel/kthread.c:464 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:__phys_addr+0x16b/0x180 arch/x86/mm/physaddr.c:28 Code: 49 af 00 e9 45 ff ff ff e8 32 c7 4b 00 48 c7 c7 d0 f6 fa 8d 48 89 de 4c 89 f2 e8 a0 c4 82 03 e9 4d ff ff ff e8 16 c7 4b 00 90 <0f> 0b e8 0e c7 4b 00 90 0f 0b e8 06 c7 4b 00 90 0f 0b 0f 1f 00 90 RSP: 0018:ffffc90000a08b58 EFLAGS: 00010246 RAX: ffffffff81746f5a RBX: 00007780ffff0000 RCX: ffff88802e4c5a00 RDX: 0000000000000100 RSI: 000000017fff0000 RDI: 00007780ffff0000 RBP: ffffc90000a08e30 R08: 0000000000000000 R09: ffffffff81a8c5a4 R10: dffffc0000000000 R11: ffffffff89f64d50 R12: ffffffff89f64d50 R13: ffffffff81a8c5a4 R14: 000000017fff0000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888125d1b000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000557608fe6f80 CR3: 000000000df38000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 74 05 je 0x7 2: e8 3b fd 55 f6 call 0xf655fd42 7: 48 c7 44 24 20 00 00 movq $0x0,0x20(%rsp) e: 00 00 10: 9c pushf 11: 8f 44 24 20 pop 0x20(%rsp) 15: f6 44 24 21 02 testb $0x2,0x21(%rsp) 1a: 75 4f jne 0x6b 1c: f7 c3 00 02 00 00 test $0x200,%ebx 22: 74 01 je 0x25 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 03 1e 1f f6 call 0xf61f1e32 <-- trapping instruction 2f: 65 8b 05 ac 8a 2e 07 mov %gs:0x72e8aac(%rip),%eax # 0x72e8ae2 36: 85 c0 test %eax,%eax 38: 74 40 je 0x7a 3a: 48 rex.W 3b: c7 .byte 0xc7 3c: 04 24 add $0x24,%al 3e: 0e (bad) 3f: 36 ss