veth0_vlan: left promiscuous mode team0 (unregistering): Port device team_slave_1 removed team0 (unregistering): Port device team_slave_0 removed ------------[ cut here ]------------ WARNING: CPU: 0 PID: 248 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0x88/0x100 net/ipv6/xfrm6_tunnel.c:341 Modules linked in: CPU: 0 UID: 0 PID: 248 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Workqueue: netns cleanup_net pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xfrm6_tunnel_net_exit+0x88/0x100 net/ipv6/xfrm6_tunnel.c:341 lr : xfrm6_tunnel_net_exit+0x88/0x100 net/ipv6/xfrm6_tunnel.c:341 sp : ffff80009c1f78d0 x29: ffff80009c1f78d0 x28: 0000000000000001 x27: 1ffff0001250d5b9 x26: ffff80009286adc8 x25: ffff80009299b2e0 x24: ffff0000c27680a8 x23: ffff80009299b300 x22: 0000000000000000 x21: dfff800000000000 x20: ffff0000cbc28000 x19: ffff0000cbc28000 x18: 1fffe000337d6e90 x17: ffff80008f59e000 x16: ffff80008052bd88 x15: 0000000000000001 x14: 1ffff00012ebb949 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800093124c88 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000c6250000 x7 : ffff800082defa74 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : 0000000000000080 x0 : 0000000000000001 Call trace: xfrm6_tunnel_net_exit+0x88/0x100 net/ipv6/xfrm6_tunnel.c:341 (P) ops_exit_list net/core/net_namespace.c:199 [inline] ops_undo_list+0x3c0/0x7ec net/core/net_namespace.c:252 cleanup_net+0x3f8/0x6dc net/core/net_namespace.c:695 process_one_work+0x7e8/0x155c kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3427 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 irq event stamp: 730324 hardirqs last enabled at (730323): [] class_irqsave_destructor include/linux/irqflags.h:266 [inline] hardirqs last enabled at (730323): [] __free_object+0x508/0x720 lib/debugobjects.c:524 hardirqs last disabled at (730324): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:412 softirqs last enabled at (730310): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs last enabled at (730310): [] xfrm_state_flush+0x744/0x760 net/xfrm/xfrm_state.c:952 softirqs last disabled at (730308): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs last disabled at (730308): [] xfrm_state_flush+0x5cc/0x760 net/xfrm/xfrm_state.c:946 ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 248 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0xdc/0x100 net/ipv6/xfrm6_tunnel.c:344 Modules linked in: CPU: 0 UID: 0 PID: 248 Comm: kworker/u8:4 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Workqueue: netns cleanup_net pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xfrm6_tunnel_net_exit+0xdc/0x100 net/ipv6/xfrm6_tunnel.c:344 lr : xfrm6_tunnel_net_exit+0xdc/0x100 net/ipv6/xfrm6_tunnel.c:344 sp : ffff80009c1f78d0 x29: ffff80009c1f78d0 x28: 0000000000000001 x27: 1ffff0001250d5b9 x26: ffff80009286adc8 x25: ffff80009299b2e0 x24: ffff0000c27680a8 x23: ffff80009299b300 x22: ffff0000cbc28800 x21: dfff800000000000 x20: 0000000000000008 x19: ffff0000cbc28808 x18: 1fffe000337d6e90 x17: ffff80008f59e000 x16: ffff80008052bd88 x15: 0000000000000001 x14: 1ffff00012ebb949 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800093124c88 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000c6250000 x7 : ffff800082defa74 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : 0000000000000080 x0 : 0000000000000001 Call trace: xfrm6_tunnel_net_exit+0xdc/0x100 net/ipv6/xfrm6_tunnel.c:344 (P) ops_exit_list net/core/net_namespace.c:199 [inline] ops_undo_list+0x3c0/0x7ec net/core/net_namespace.c:252 cleanup_net+0x3f8/0x6dc net/core/net_namespace.c:695 process_one_work+0x7e8/0x155c kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3427 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 irq event stamp: 730472 hardirqs last enabled at (730471): [] irqentry_exit+0xd8/0x108 kernel/entry/common.c:214 hardirqs last disabled at (730472): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:412 softirqs last enabled at (730466): [] softirq_handle_end kernel/softirq.c:468 [inline] softirqs last enabled at (730466): [] handle_softirqs+0xaf8/0xc88 kernel/softirq.c:650 softirqs last disabled at (730327): [] __do_softirq+0x14/0x20 kernel/softirq.c:656 ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ WARNING: CPU: 0 PID: 248 at net/xfrm/xfrm_state.c:3306 xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3306 Modules linked in: CPU: 0 UID: 0 PID: 248 Comm: kworker/u8:4 Tainted: G W syzkaller #0 PREEMPT Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Workqueue: netns cleanup_net pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3306 lr : xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3306 sp : ffff80009c1f78a0 x29: ffff80009c1f78a0 x28: 0000000000000001 x27: 1ffff0001250d5b9 x26: ffff80009286adc8 x25: ffff800092972860 x24: ffff0000c27680a8 x23: ffff800092972880 x22: dfff800000000000 x21: dfff800000000000 x20: ffff0000c27694c0 x19: ffff0000c2768000 x18: 1fffe000337d6e90 x17: ffff80008f59e000 x16: ffff80008052bd88 x15: 0000000000000001 x14: 1ffff00012ebb949 x13: 0000000000000000 x12: 0000000000000000 x11: ffff800093124c88 x10: 0000000000ff0100 x9 : 0000000000000000 x8 : ffff0000c6250000 x7 : ffff800082defa74 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000007 x1 : 0000000000000080 x0 : 0000000000000001 Call trace: xfrm_state_fini+0x248/0x2b0 net/xfrm/xfrm_state.c:3306 (P) xfrm_net_exit+0x38/0x78 net/xfrm/xfrm_policy.c:4354 ops_exit_list net/core/net_namespace.c:199 [inline] ops_undo_list+0x3c0/0x7ec net/core/net_namespace.c:252 cleanup_net+0x3f8/0x6dc net/core/net_namespace.c:695 process_one_work+0x7e8/0x155c kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3427 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 irq event stamp: 733096 hardirqs last enabled at (733095): [] class_irqsave_destructor include/linux/irqflags.h:266 [inline] hardirqs last enabled at (733095): [] __free_object+0x508/0x720 lib/debugobjects.c:524 hardirqs last disabled at (733096): [] el1_brk64+0x20/0x54 arch/arm64/kernel/entry-common.c:412 softirqs last enabled at (733082): [] spin_unlock_bh include/linux/spinlock.h:396 [inline] softirqs last enabled at (733082): [] xfrm_state_flush+0x744/0x760 net/xfrm/xfrm_state.c:952 softirqs last disabled at (733080): [] spin_lock_bh include/linux/spinlock.h:356 [inline] softirqs last disabled at (733080): [] xfrm_state_flush+0x48/0x760 net/xfrm/xfrm_state.c:924 ---[ end trace 0000000000000000 ]---