Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe002: 0000 [#1] SMP KASAN NOPTI KASAN: probably user-memory-access in range [0x00000000ffff0010-0x00000000ffff0017] CPU: 1 UID: 0 PID: 7142 Comm: kworker/u8:12 Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Workqueue: netns cleanup_net RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline] RIP: 0010:do_raw_spin_lock+0x6d/0x2b0 kernel/locking/spinlock_debug.c:115 Code: 98 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 65 48 8b 15 d9 2f 3e 12 48 89 54 24 60 31 d2 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e4 RSP: 0018:ffffc9000b5178a8 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 00000000ffff0010 RCX: 0000000000000000 RDX: 000000001fffe002 RSI: 0000000000000000 RDI: 00000000ffff0014 RBP: 1ffff920016a2f16 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000002c10 R12: ffff888025623428 R13: ffff88807468f690 R14: ffff888025623410 R15: ffff888025623400 FS: 0000000000000000(0000) GS:ffff8881247bc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000019680 CR3: 000000005c69e000 CR4: 00000000003526f0 Call Trace: spin_lock include/linux/spinlock.h:351 [inline] kobj_kset_leave+0x50/0x200 lib/kobject.c:191 __kobject_del+0x11d/0x1f0 lib/kobject.c:608 kobject_del lib/kobject.c:627 [inline] kobject_del+0x3f/0x60 lib/kobject.c:619 destroy_gid_attrs drivers/infiniband/core/sysfs.c:1183 [inline] ib_free_port_attrs+0x280/0x490 drivers/infiniband/core/sysfs.c:1407 remove_one_compat_dev drivers/infiniband/core/device.c:1038 [inline] rdma_dev_exit_net+0x2b5/0x590 drivers/infiniband/core/device.c:1176 ops_exit_list net/core/net_namespace.c:198 [inline] ops_undo_list+0x2eb/0xab0 net/core/net_namespace.c:251 cleanup_net+0x408/0x890 net/core/net_namespace.c:682 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3236 process_scheduled_works kernel/workqueue.c:3319 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400 kthread+0x3c2/0x780 kernel/kthread.c:463 ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Modules linked in: ---[ end trace 0000000000000000 ]--- RIP: 0010:debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline] RIP: 0010:do_raw_spin_lock+0x6d/0x2b0 kernel/locking/spinlock_debug.c:115 Code: 98 81 48 8d 54 05 00 c7 02 f1 f1 f1 f1 c7 42 04 04 f3 f3 f3 65 48 8b 15 d9 2f 3e 12 48 89 54 24 60 31 d2 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e4 RSP: 0018:ffffc9000b5178a8 EFLAGS: 00010203 RAX: dffffc0000000000 RBX: 00000000ffff0010 RCX: 0000000000000000 RDX: 000000001fffe002 RSI: 0000000000000000 RDI: 00000000ffff0014 RBP: 1ffff920016a2f16 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000002c10 R12: ffff888025623428 R13: ffff88807468f690 R14: ffff888025623410 R15: ffff888025623400 FS: 0000000000000000(0000) GS:ffff8881247bc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000019680 CR3: 000000005c69e000 CR4: 00000000003526f0 ---------------- Code disassembly (best guess): 0: 98 cwtl 1: 81 48 8d 54 05 00 c7 orl $0xc7000554,-0x73(%rax) 8: 02 f1 add %cl,%dh a: f1 int1 b: f1 int1 c: f1 int1 d: c7 42 04 04 f3 f3 f3 movl $0xf3f3f304,0x4(%rdx) 14: 65 48 8b 15 d9 2f 3e mov %gs:0x123e2fd9(%rip),%rdx # 0x123e2ff5 1b: 12 1c: 48 89 54 24 60 mov %rdx,0x60(%rsp) 21: 31 d2 xor %edx,%edx 23: 48 89 fa mov %rdi,%rdx 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx <-- trapping instruction 2e: 48 89 f8 mov %rdi,%rax 31: 83 e0 07 and $0x7,%eax 34: 83 c0 03 add $0x3,%eax 37: 38 d0 cmp %dl,%al 39: 7c 08 jl 0x43 3b: 84 d2 test %dl,%dl 3d: 0f .byte 0xf 3e: 85 e4 test %esp,%esp