------------[ cut here ]------------ VFS: brelse: Trying to free free buffer WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 __brelse fs/buffer.c:1229 [inline] WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 brelse include/linux/buffer_head.h:324 [inline] WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 __invalidate_bh_lrus fs/buffer.c:1498 [inline] WARNING: CPU: 0 PID: 3603 at fs/buffer.c:1229 invalidate_bh_lru+0x102/0x1b0 fs/buffer.c:1511 Modules linked in: CPU: 0 UID: 0 PID: 3603 Comm: kworker/u8:6 Not tainted 6.13.0-rc3-syzkaller-00017-gf44d154d6e3d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 Workqueue: netns cleanup_net RIP: 0010:__brelse fs/buffer.c:1229 [inline] RIP: 0010:brelse include/linux/buffer_head.h:324 [inline] RIP: 0010:__invalidate_bh_lrus fs/buffer.c:1498 [inline] RIP: 0010:invalidate_bh_lru+0x102/0x1b0 fs/buffer.c:1511 Code: a4 30 dc ff f0 ff 0b eb 25 e8 5a 50 78 ff 41 80 3c 2e 00 75 2a eb 30 e8 4c 50 78 ff 90 48 c7 c7 20 ee 18 8c e8 6f f3 38 ff 90 <0f> 0b 90 90 48 bd 00 00 00 00 00 fc ff df 41 80 3c 2e 00 74 08 4c RSP: 0018:ffffc90000007f30 EFLAGS: 00010046 RAX: 33453e1cb0f7c000 RBX: ffff88807295b970 RCX: ffff8880329e5a00 RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffff81601962 R09: 1ffff110170c519a R10: dffffc0000000000 R11: ffffed10170c519b R12: ffff8880b8639838 R13: 0000000000000000 R14: 1ffff110170c7307 R15: ffff8880b8639838 FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8ddb592130 CR3: 00000000790be000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: csd_do_func kernel/smp.c:134 [inline] __flush_smp_call_function_queue+0x3fc/0x1620 kernel/smp.c:540 __sysvec_call_function_single+0xb8/0x430 arch/x86/kernel/smp.c:271 instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline] sysvec_call_function_single+0x9e/0xc0 arch/x86/kernel/smp.c:266 asm_sysvec_call_function_single+0x1a/0x20 arch/x86/include/asm/idtentry.h:709 RIP: 0010:__raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] RIP: 0010:_raw_spin_unlock_irqrestore+0xd8/0x140 kernel/locking/spinlock.c:194 Code: 9c 8f 44 24 20 42 80 3c 23 00 74 08 4c 89 f7 e8 9e f6 3f f6 f6 44 24 21 02 75 52 41 f7 c7 00 02 00 00 74 01 fb bf 01 00 00 00 53 27 aa f5 65 8b 05 c4 79 40 74 85 c0 74 43 48 c7 04 24 0e 36 RSP: 0018:ffffc9000cb0f0c0 EFLAGS: 00000206 RAX: 33453e1cb0f7c000 RBX: 1ffff92001961e1c RCX: ffffffff817b270a RDX: dffffc0000000000 RSI: ffffffff8c0a9760 RDI: 0000000000000001 RBP: ffffc9000cb0f150 R08: ffffffff942708b7 R09: 1ffffffff284e116 R10: dffffc0000000000 R11: fffffbfff284e117 R12: dffffc0000000000 R13: 1ffff92001961e18 R14: ffffc9000cb0f0e0 R15: 0000000000000246 __debug_check_no_obj_freed lib/debugobjects.c:1108 [inline] debug_check_no_obj_freed+0x561/0x580 lib/debugobjects.c:1129 free_pages_prepare mm/page_alloc.c:1134 [inline] free_unref_page+0x4c6/0x1000 mm/page_alloc.c:2657 discard_slab mm/slub.c:2688 [inline] __put_partials+0x160/0x1c0 mm/slub.c:3157 put_cpu_partial+0x17c/0x250 mm/slub.c:3232 __slab_free+0x290/0x380 mm/slub.c:4483 qlink_free mm/kasan/quarantine.c:163 [inline] qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286 __kasan_slab_alloc+0x23/0x80 mm/kasan/common.c:329 kasan_slab_alloc include/linux/kasan.h:250 [inline] slab_post_alloc_hook mm/slub.c:4119 [inline] slab_alloc_node mm/slub.c:4168 [inline] kmem_cache_alloc_node_noprof+0x1d9/0x380 mm/slub.c:4220 __alloc_skb+0x1c3/0x440 net/core/skbuff.c:668 alloc_skb include/linux/skbuff.h:1323 [inline] nlmsg_new include/net/netlink.h:1018 [inline] inet6_netconf_notify_devconf+0xfc/0x1c0 net/ipv6/addrconf.c:589 __addrconf_sysctl_unregister net/ipv6/addrconf.c:7273 [inline] addrconf_sysctl_unregister net/ipv6/addrconf.c:7297 [inline] addrconf_ifdown+0x1887/0x1bd0 net/ipv6/addrconf.c:4030 addrconf_notify+0x3cb/0x1020 notifier_call_chain+0x1a5/0x3f0 kernel/notifier.c:85 call_netdevice_notifiers_extack net/core/dev.c:2034 [inline] call_netdevice_notifiers net/core/dev.c:2048 [inline] unregister_netdevice_many_notify+0xedd/0x1da0 net/core/dev.c:11526 cleanup_net+0x75d/0xd50 net/core/net_namespace.c:643 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310 worker_thread+0x870/0xd30 kernel/workqueue.c:3391 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ---------------- Code disassembly (best guess): 0: 9c pushf 1: 8f 44 24 20 pop 0x20(%rsp) 5: 42 80 3c 23 00 cmpb $0x0,(%rbx,%r12,1) a: 74 08 je 0x14 c: 4c 89 f7 mov %r14,%rdi f: e8 9e f6 3f f6 call 0xf63ff6b2 14: f6 44 24 21 02 testb $0x2,0x21(%rsp) 19: 75 52 jne 0x6d 1b: 41 f7 c7 00 02 00 00 test $0x200,%r15d 22: 74 01 je 0x25 24: fb sti 25: bf 01 00 00 00 mov $0x1,%edi * 2a: e8 53 27 aa f5 call 0xf5aa2782 <-- trapping instruction 2f: 65 8b 05 c4 79 40 74 mov %gs:0x744079c4(%rip),%eax # 0x744079fa 36: 85 c0 test %eax,%eax 38: 74 43 je 0x7d 3a: 48 rex.W 3b: c7 .byte 0xc7 3c: 04 24 add $0x24,%al 3e: 0e (bad) 3f: 36 ss