------------[ cut here ]------------ refcount_t: decrement hit 0; leaking memory. WARNING: lib/refcount.c:31 at refcount_warn_saturate+0x7c/0x130 lib/refcount.c:31, CPU#0: kworker/u8:6/334 Modules linked in: CPU: 0 UID: 0 PID: 334 Comm: kworker/u8:6 Not tainted syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: events_unbound linkwatch_event RIP: 0010:refcount_warn_saturate+0x7c/0x130 lib/refcount.c:31 Code: 60 2e 8e 87 e8 35 dc f1 fe 83 fd 02 0f 84 a1 00 00 00 76 27 83 fd 03 74 7d 83 fd 04 75 3e e8 0b e1 f1 fe 48 8d 3d c4 ca 11 08 <67> 48 0f b9 3a e8 fa e0 f1 fe 5b 5d e9 d3 1e 97 04 85 ed 74 3a e8 RSP: 0018:ffffc9000167f820 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff88811addc614 RCX: ffffffff82bf5adb RDX: ffff888106b857c0 RSI: ffffffff82bf5af5 RDI: ffffffff8ad125c0 RBP: 0000000000000004 R08: 0000000000000005 R09: 0000000000000004 R10: 0000000000000004 R11: 0000000000000000 R12: 1ffff920002cff09 R13: ffff88811addc614 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88826896a000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff1ee7ecfe0 CR3: 00000001165dc000 CR4: 00000000003506f0 Call Trace: __refcount_dec include/linux/refcount.h:461 [inline] refcount_dec include/linux/refcount.h:476 [inline] ref_tracker_free+0x5cd/0x6c0 lib/ref_tracker.c:304 netdev_tracker_free include/linux/netdevice.h:4420 [inline] netdev_put include/linux/netdevice.h:4437 [inline] netdev_put include/linux/netdevice.h:4433 [inline] netdev_watchdog_down net/sched/sch_generic.c:575 [inline] dev_deactivate_many+0x288/0xc40 net/sched/sch_generic.c:1366 dev_deactivate+0xf8/0x1c0 net/sched/sch_generic.c:1397 linkwatch_do_dev+0x113/0x160 net/core/link_watch.c:184 __linkwatch_run_queue+0x3a7/0x7a0 net/core/link_watch.c:244 linkwatch_event+0x8f/0xc0 net/core/link_watch.c:304 process_one_work+0x9c2/0x1840 kernel/workqueue.c:3257 process_scheduled_works kernel/workqueue.c:3340 [inline] worker_thread+0x5da/0xe40 kernel/workqueue.c:3421 kthread+0x3b3/0x730 kernel/kthread.c:463 ret_from_fork+0x6c3/0xa20 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 ---------------- Code disassembly (best guess), 1 bytes skipped: 0: 2e 8e 87 e8 35 dc f1 cs mov -0xe23ca18(%rdi),%es 7: fe 83 fd 02 0f 84 incb -0x7bf0fd03(%rbx) d: a1 00 00 00 76 27 83 movabs 0x3fd832776000000,%eax 14: fd 03 16: 74 7d je 0x95 18: 83 fd 04 cmp $0x4,%ebp 1b: 75 3e jne 0x5b 1d: e8 0b e1 f1 fe call 0xfef1e12d 22: 48 8d 3d c4 ca 11 08 lea 0x811cac4(%rip),%rdi # 0x811caed * 29: 67 48 0f b9 3a ud1 (%edx),%rdi <-- trapping instruction 2e: e8 fa e0 f1 fe call 0xfef1e12d 33: 5b pop %rbx 34: 5d pop %rbp 35: e9 d3 1e 97 04 jmp 0x4971f0d 3a: 85 ed test %ebp,%ebp 3c: 74 3a je 0x78 3e: e8 .byte 0xe8