================================================================== BUG: KASAN: use-after-free in read_pnet include/net/net_namespace.h:419 [inline] BUG: KASAN: use-after-free in dev_net include/linux/netdevice.h:2741 [inline] BUG: KASAN: use-after-free in nf_hook_entry_head+0x1f1/0x2c0 net/netfilter/core.c:319 Read of size 8 at addr ffff888053ee4108 by task syz.1.6671/1255 CPU: 0 UID: 0 PID: 1255 Comm: syz.1.6671 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0xba/0x230 mm/kasan/report.c:482 kasan_report+0x117/0x150 mm/kasan/report.c:595 read_pnet include/net/net_namespace.h:419 [inline] dev_net include/linux/netdevice.h:2741 [inline] nf_hook_entry_head+0x1f1/0x2c0 net/netfilter/core.c:319 __nf_unregister_net_hook+0x74/0x6f0 net/netfilter/core.c:491 nft_unregister_flowtable_ops net/netfilter/nf_tables_api.c:9059 [inline] __nft_unregister_flowtable_net_hooks net/netfilter/nf_tables_api.c:9074 [inline] nft_unregister_flowtable_net_hooks net/netfilter/nf_tables_api.c:9086 [inline] nf_tables_commit+0x4270/0xa400 net/netfilter/nf_tables_api.c:11245 nfnetlink_rcv_batch net/netfilter/nfnetlink.c:576 [inline] nfnetlink_rcv_skb_batch net/netfilter/nfnetlink.c:649 [inline] nfnetlink_rcv+0x1c1b/0x27b0 net/netfilter/nfnetlink.c:667 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x80f/0x9b0 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x813/0xb40 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0x1bd/0x2a0 net/socket.c:2681 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7ff191d9bf79 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff18fff6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007ff192015fa0 RCX: 00007ff191d9bf79 RDX: 0000000000000000 RSI: 000020000000c2c0 RDI: 0000000000000006 RBP: 00007ff191e327e0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ff192016038 R14: 00007ff192015fa0 R15: 00007ff19213fa48 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888053ee4000 pfn:0x53ee4 flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000000 0000000000000000 dead000000000122 0000000000000000 raw: ffff888053ee4000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 3, migratetype Unmovable, gfp_mask 0x152dc0(GFP_USER|__GFP_ZERO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 646, tgid 645 (syz.7.6489), ts 2254894216916, free_ts 2254993580570 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x231/0x280 mm/page_alloc.c:1888 prep_new_page mm/page_alloc.c:1896 [inline] get_page_from_freelist+0x24dc/0x2580 mm/page_alloc.c:3961 __alloc_frozen_pages_noprof+0x18d/0x380 mm/page_alloc.c:5249 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2485 alloc_frozen_pages_noprof mm/mempolicy.c:2556 [inline] alloc_pages_noprof+0xa8/0x190 mm/mempolicy.c:2576 get_free_pages_noprof+0xf/0x80 mm/page_alloc.c:5308 alloc_one_pg_vec_page net/packet/af_packet.c:4368 [inline] alloc_pg_vec net/packet/af_packet.c:4398 [inline] packet_set_ring+0x735/0x2490 net/packet/af_packet.c:4483 packet_setsockopt+0xd9c/0x1510 net/packet/af_packet.c:3839 do_sock_setsockopt+0x17c/0x1b0 net/socket.c:2322 __sys_setsockopt net/socket.c:2347 [inline] __do_sys_setsockopt net/socket.c:2353 [inline] __se_sys_setsockopt net/socket.c:2350 [inline] __x64_sys_setsockopt+0x13d/0x1b0 net/socket.c:2350 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f page last free pid 653 tgid 645 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] __free_pages_prepare mm/page_alloc.c:1432 [inline] __free_frozen_pages+0xc00/0xd90 mm/page_alloc.c:2977 free_pg_vec net/packet/af_packet.c:4354 [inline] packet_set_ring+0x1a21/0x2490 net/packet/af_packet.c:4573 packet_setsockopt+0xd9c/0x1510 net/packet/af_packet.c:3839 do_sock_setsockopt+0x17c/0x1b0 net/socket.c:2322 __sys_setsockopt net/socket.c:2347 [inline] __do_sys_setsockopt net/socket.c:2353 [inline] __se_sys_setsockopt net/socket.c:2350 [inline] __x64_sys_setsockopt+0x13d/0x1b0 net/socket.c:2350 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Memory state around the buggy address: ffff888053ee4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888053ee4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff888053ee4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888053ee4180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888053ee4200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================