------------[ cut here ]------------
VFS: brelse: Trying to free free buffer
WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 __brelse fs/buffer.c:1229 [inline]
WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 brelse include/linux/buffer_head.h:324 [inline]
WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 __invalidate_bh_lrus fs/buffer.c:1498 [inline]
WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 invalidate_bh_lru+0x102/0x1b0 fs/buffer.c:1511
Modules linked in:
CPU: 0 UID: 0 PID: 3603 Comm: kworker/u8:6 Not tainted 6.13.0-rc3-syzkaller-00017-gf44d154d6e3d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024
Workqueue: netns cleanup_net
RIP: 0010:__brelse fs/buffer.c:1229 [inline]
RIP: 0010:brelse include/linux/buffer_head.h:324 [inline]
RIP: 0010:__invalidate_bh_lrus fs/buffer.c:1498 [inline]
RIP: 0010:invalidate_bh_lru+0x102/0x1b0 fs/buffer.c:1511
Code: a4 30 dc ff f0 ff 0b eb 25 e8 5a 50 78 ff 41 80 3c 2e 00 75 2a eb 30 e8 4c 50 78 ff 90 48 c7 c7 20 ee 18 8c e8 6f f3 38 ff 90 <0f> 0b 90 90 48 bd 00 00 00 00 00 fc ff df 41 80 3c 2e 00 74 08 4c
RSP: 0018:ffffc90000007f30 EFLAGS: 00010046
RAX: 33453e1cb0f7c000 RBX: ffff88807295b970 RCX: ffff8880329e5a00
RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffffffff81601962 R09: 1ffff110170c519a
R10: dffffc0000000000 R11: ffffed10170c519b R12: ffff8880b8639838
R13: 0000000000000000 R14: 1ffff110170c7307 R15: ffff8880b8639838
FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8ddb592130 CR3: 00000000790be000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
csd_do_func kernel/smp.c:134 [inline]
__flush_smp_call_function_queue+0x3fc/0x1620 kernel/smp.c:540
__sysvec_call_function_single+0xb8/0x430 arch/x86/kernel/smp.c:271
instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline]
sysvec_call_function_single+0x9e/0xc0 arch/x86/kernel/smp.c:266
asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709
RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
RIP: 0010:_raw_spin_unlock_irqrestore+0xd8/0x140 kernel/locking/spinlock.c:194
Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 f7 e8 9e f6 3f f6 f6 44 24 21 02 75 52 41 f7 c7 00 02 00 00 74 01 fb bf 01 00 00 00 53 27 aa f5 65 8b 05 c4 79 40 74 85 c0 74 43 48 c7 04 24 0e 36
RSP: 0018:ffffc9000cb0f0c0 EFLAGS: 00000206
RAX: 33453e1cb0f7c000 RBX: 1ffff92001961e1c RCX: ffffffff817b270a
RDX: dffffc0000000000 RSI: ffffffff8c0a9760 RDI: 0000000000000001
RBP: ffffc9000cb0f150 R08: ffffffff942708b7 R09: 1ffffffff284e116
R10: dffffc0000000000 R11: fffffbfff284e117 R12: dffffc0000000000
R13: 1ffff92001961e18 R14: ffffc9000cb0f0e0 R15: 0000000000000246
__debug_check_no_obj_freed lib/debugobjects.c:1108 [inline]
debug_check_no_obj_freed+0x561/0x580 lib/debugobjects.c:1129
free_pages_prepare mm/page_alloc.c:1134 [inline]
free_unref_page+0x4c6/0x1000 mm/page_alloc.c:2657
discard_slab mm/slub.c:2688 [inline]
__put_partials+0x160/0x1c0 mm/slub.c:3157
put_cpu_partial+0x17c/0x250 mm/slub.c:3232
__slab_free+0x290/0x380 mm/slub.c:4483
qlink_free mm/kasan/quarantine.c:163 [inline]
qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
__kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329
kasan_slab_alloc include/linux/kasan.h:250 [inline]
slab_post_alloc_hook mm/slub.c:4119 [inline]
slab_alloc_node mm/slub.c:4168 [inline]
kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4220
__alloc_skb+0x1c3/0x440 net/core/skbuff.c:668
alloc_skb include/linux/skbuff.h:1323 [inline]
nlmsg_new include/net/netlink.h:1018 [inline]
inet6_netconf_notify_devconf+0xfc/0x1c0 net/ipv6/addrconf.c:589
__addrconf_sysctl_unregister net/ipv6/addrconf.c:7273 [inline]
addrconf_sysctl_unregister net/ipv6/addrconf.c:7297 [inline]
addrconf_ifdown+0x1887/0x1bd0 net/ipv6/addrconf.c:4030
addrconf_notify+0x3cb/0x1020
notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85
call_netdevice_notifiers_extack net/core/dev.c:2034 [inline]
call_netdevice_notifiers net/core/dev.c:2048 [inline]
unregister_netdevice_many_notify+0xedd/0x1da0 net/core/dev.c:11526
cleanup_net+0x75d/0xd50 net/core/net_namespace.c:643
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
worker_thread+0x870/0xd30 kernel/workqueue.c:3391
kthread+0x2f0/0x390 kernel/kthread.c:389
ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
----------------
Code disassembly (best guess):
0: 9c pushf
1: 8f 44 24 20 pop 0x20(%rsp)
5: 42 80 3c 23 00 cmpb $0x0,(%rbx,%r12,1)
a: 74 08 je 0x14
c: 4c 89 f7 mov %r14,%rdi
f: e8 9e f6 3f f6 call 0xf63ff6b2
14: f6 44 24 21 02 testb $0x2,0x21(%rsp)
19: 75 52 jne 0x6d
1b: 41 f7 c7 00 02 00 00 test $0x200,%r15d
22: 74 01 je 0x25
24: fb sti
25: bf 01 00 00 00 mov $0x1,%edi
* 2a: e8 53 27 aa f5 call 0xf5aa2782 <-- trapping instruction
2f: 65 8b 05 c4 79 40 74 mov %gs:0x744079c4(%rip),%eax # 0x744079fa
36: 85 c0 test %eax,%eax
38: 74 43 je 0x7d
3a: 48 rex.W
3b: c7 .byte 0xc7
3c: 04 24 add $0x24,%al
3e: 0e (bad)
3f: 36 ss