KASAN: use-after-free Read in __nf_hook_entries_try_shrink bond0 (unregistering): (slave bond_slave_1): Releasing backup interface bond0 (unregistering): (slave bond_slave_0): Releasing backup interface bond0 (unregistering): Released all slaves ================================================================== BUG: KASAN: use-after-free in hooks_validate net/netfilter/core.c:177 [inline] BUG: KASAN: use-after-free in __nf_hook_entries_try_shrink+0x5b8/0x660 net/netfilter/core.c:260 Read of size 4 at addr ffff88801dc20a48 by task kworker/u4:0/9 CPU: 1 PID: 9 Comm: kworker/u4:0 Not tainted 5.12.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: netns cleanup_net Call Trace: __dump_stack lib/dump_stack.c:79 [inline] dump_stack+0x176/0x24e lib/dump_stack.c:120 print_address_description+0x5f/0x3a0 mm/kasan/report.c:233 __kasan_report mm/kasan/report.c:419 [inline] kasan_report+0x15c/0x200 mm/kasan/report.c:436 hooks_validate net/netfilter/core.c:177 [inline] __nf_hook_entries_try_shrink+0x5b8/0x660 net/netfilter/core.c:260 __nf_unregister_net_hook+0x47b/0x680 net/netfilter/core.c:483 ops_exit_list net/core/net_namespace.c:175 [inline] cleanup_net+0x708/0xbd0 net/core/net_namespace.c:595 process_one_work+0x789/0xfd0 kernel/workqueue.c:2275 worker_thread+0xac1/0x1300 kernel/workqueue.c:2421 kthread+0x39a/0x3c0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 Allocated by task 8111: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:428 [inline] ____kasan_kmalloc+0xc4/0xf0 mm/kasan/common.c:507 kasan_kmalloc include/linux/kasan.h:246 [inline] kmem_cache_alloc_trace+0x96/0x340 mm/slub.c:2939 kmalloc include/linux/slab.h:556 [inline] kernfs_get_open_node fs/kernfs/file.c:552 [inline] kernfs_fop_open+0x909/0xbd0 fs/kernfs/file.c:698 do_dentry_open+0x7cb/0x1010 fs/open.c:826 do_open fs/namei.c:3361 [inline] path_openat+0x27c9/0x3860 fs/namei.c:3494 do_filp_open+0x1a3/0x3b0 fs/namei.c:3521 do_sys_openat2+0xba/0x380 fs/open.c:1187 do_sys_open fs/open.c:1203 [inline] __do_sys_open fs/open.c:1211 [inline] __se_sys_open fs/open.c:1207 [inline] __x64_sys_open+0x1af/0x1e0 fs/open.c:1207 do_syscall_64+0x3f/0xb0 arch/x86/entry/common.c:47 entry_SYSCALL_64_after_hwframe+0x44/0xae Freed by task 9: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track+0x3d/0x70 mm/kasan/common.c:46 kasan_set_free_info+0x1f/0x40 mm/kasan/generic.c:357 ____kasan_slab_free+0x109/0x150 mm/kasan/common.c:360 kasan_slab_free include/linux/kasan.h:212 [inline] slab_free_hook mm/slub.c:1581 [inline] slab_free_freelist_hook+0x1d8/0x290 mm/slub.c:1606 slab_free mm/slub.c:3166 [inline] kfree+0xcf/0x2d0 mm/slub.c:4225 xt_unregister_table+0x211/0x2c0 net/netfilter/x_tables.c:1501 __arpt_unregister_table net/ipv4/netfilter/arp_tables.c:1488 [inline] arpt_unregister_table+0x78/0x3f0 net/ipv4/netfilter/arp_tables.c:1577 ops_exit_list net/core/net_namespace.c:175 [inline] cleanup_net+0x708/0xbd0 net/core/net_namespace.c:595 process_one_work+0x789/0xfd0 kernel/workqueue.c:2275 worker_thread+0xac1/0x1300 kernel/workqueue.c:2421 kthread+0x39a/0x3c0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:294 The buggy address belongs to the object at ffff88801dc20a00 which belongs to the cache kmalloc-128 of size 128 The buggy address is located 72 bytes inside of 128-byte region [ffff88801dc20a00, ffff88801dc20a80) The buggy address belongs to the page: page:ffffea0000770800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1dc20 flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000000200 ffffea00004ff980 0000000400000004 ffff8880100418c0 raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88801dc20900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff88801dc20980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff88801dc20a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88801dc20a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88801dc20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2021/05/09 20:22:49 fuzzer started 2021/05/09 20:22:49 connecting to host at 10.128.0.169:37955 2021/05/09 20:22:49 checking machine... 2021/05/09 20:22:49 checking revisions... 2021/05/09 20:22:49 testing simple program... syzkaller login: [ 51.061543][ T8381] chnl_net:caif_netlink_parms(): no params data found [ 51.111884][ T8381] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.119735][ T8381] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.129048][ T8381] device bridge_slave_0 entered promiscuous mode [ 51.138812][ T8381] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.146495][ T8381] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.155884][ T8381] device bridge_slave_1 entered promiscuous mode [ 51.175171][ T8381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.187240][ T8381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.209511][ T8381] team0: Port device team_slave_0 added [ 51.216804][ T8381] team0: Port device team_slave_1 added [ 51.233815][ T8381] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 51.241175][ T8381] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.268937][ T8381] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 51.283578][ T8381] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 51.290714][ T8381] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 51.319201][ T8381] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 51.345825][ T8381] device hsr_slave_0 entered promiscuous mode [ 51.354026][ T8381] device hsr_slave_1 entered promiscuous mode [ 51.446468][ T8381] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 51.456870][ T8381] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 51.468545][ T8381] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 51.477650][ T8381] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 51.503104][ T8381] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.510523][ T8381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.518754][ T8381] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.526074][ T8381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.568723][ T8381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.581147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.594500][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.603544][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.612102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 51.627246][ T8381] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.638762][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.648107][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.655304][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.675869][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.685239][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.692559][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.701395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.710533][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.723265][ T4100] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.740070][ T8381] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 51.752686][ T8381] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 51.767670][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.777435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.786998][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.808929][ T8381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.816625][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 51.824425][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 51.842304][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 51.860098][ T4100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 51.869628][ T4100] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 51.878732][ T4100] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 51.890288][ T8381] device veth0_vlan entered promiscuous mode [ 51.903856][ T8381] device veth1_vlan entered promiscuous mode [ 51.924835][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 51.933834][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 51.943614][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 51.955502][ T8381] device veth0_macvtap entered promiscuous mode [ 51.967773][ T8381] device veth1_macvtap entered promiscuous mode [ 51.985936][ T8381] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 51.995174][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 52.006657][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 52.019331][ T8381] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 52.027900][ T4100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 52.040086][ T8381] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.052122][ T8381] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.061072][ T8381] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.071885][ T8381] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 52.141748][ T8381] DC ieee80211_if_add: calling ieee80211_setup_sdata [ 52.149444][ T8381] DC ieee80211_setup_sdata: type:(2) memset(sdata->u): ffff888014605810 [ 52.160113][ T8381] DC ieee80211_sta_setup_sdata: timer_setup: ffff888014605810 [ 52.177218][ T8381] DC cfg80211_change_iface: from otype(2) to ntype(1) [ 52.184754][ T8381] DC cfg80211_mlme_down: [ 52.189219][ T8381] DC cfg80211_mlme_down: A [ 52.194533][ T8381] DC cfg80211_mlme_down: B [ 52.198969][ T8381] DC cfg80211_mlme_deauth: [ 52.203906][ T8381] DC cfg80211_mlme_deauth: A [ 52.208850][ T8381] DC rdev_deauth: ops->deauth [ 52.214268][ T8381] DC ieee80211_change_iface: type: 1 [ 52.222829][ T8381] DC ieee80211_if_change_type: calling ieee80211_setup_sdata [ 52.230335][ T8381] DC ieee80211_setup_sdata: type:(1) memset(sdata->u): ffff888014605810 [ 52.238956][ T8381] DC ieee80211_ibss_setup_sdata: timer_setup: ffff888014605810 [ 52.252237][ T73] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 52.260198][ T73] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 52.267886][ T8381] DC ieee80211_if_add: calling ieee80211_setup_sdata [ 52.267913][ T8381] DC ieee80211_setup_sdata: type:(2) memset(sdata->u): ffff888030339810 [ 52.267944][ T8381] DC ieee80211_sta_setup_sdata: timer_setup: ffff888030339810 [ 52.278109][ T8381] DC cfg80211_change_iface: from otype(2) to ntype(1) [ 52.300690][ T8381] DC cfg80211_mlme_down: [ 52.305206][ T8381] DC cfg80211_mlme_down: A [ 52.310078][ T8381] DC cfg80211_mlme_down: B [ 52.315565][ T8381] DC cfg80211_mlme_deauth: [ 52.326719][ T8381] DC cfg80211_mlme_deauth: A [ 52.332583][ T8381] DC rdev_deauth: ops->deauth [ 52.337573][ T8381] DC ieee80211_change_iface: type: 1 [ 52.346861][ T8381] DC ieee80211_if_change_type: calling ieee80211_setup_sdata [ 52.355459][ T8381] DC ieee80211_setup_sdata: type:(1) memset(sdata->u): ffff888030339810 [ 52.364249][ T8381] DC ieee80211_ibss_setup_sdata: timer_setup: ffff888030339810 [ 52.374642][ T8602] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 52.385124][ T73] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 52.393441][ T73] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 52.402974][ T8602] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready executing program 2021/05/09 20:22:52 building call list... [ 52.977375][ T9] arp_tables: DC arpt_unregister_table_pre_exit: name: filter [ 53.120252][ T9] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 54.786721][ T8373] can: request_module (can-proto-0) failed. executing program [ 55.408111][ T9] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 57.768580][ T9] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 57.908120][ T9] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 executing program [ 59.495887][ T9] DC ieee80211_ibss_leave: del_timer_sync: ffff888030339810 [ 59.656666][ T9] DC ieee80211_ibss_leave: del_timer_sync: ffff888014605810 [ 59.846771][ T9] device hsr_slave_0 left promiscuous mode [ 59.853643][ T9] device hsr_slave_1 left promiscuous mode [ 59.862899][ T9] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 59.871107][ T9] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 59.880969][ T9] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 59.888723][ T9] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 59.898934][ T9] device bridge_slave_1 left promiscuous mode [ 59.906707][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.918900][ T9] device bridge_slave_0 left promiscuous mode [ 59.926190][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.943466][ T9] device veth1_macvtap left promiscuous mode [ 59.950940][ T9] device veth0_macvtap left promiscuous mode [ 59.957492][ T9] device veth1_vlan left promiscuous mode [ 59.964474][ T9] device veth0_vlan left promiscuous mode executing program [ 63.264654][ T9] team0 (unregistering): Port device team_slave_1 removed [ 63.278487][ T9] team0 (unregistering): Port device team_slave_0 removed [ 63.293924][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 63.307602][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 63.355343][ T9] bond0 (unregistering): Released all slaves [ 64.322038][ T9] ================================================================== [ 64.330686][ T9] BUG: KASAN: use-after-free in __nf_hook_entries_try_shrink+0x5b8/0x660 [ 64.339544][ T9] Read of size 4 at addr ffff88801dc20a48 by task kworker/u4:0/9 [ 64.347888][ T9] [ 64.350293][ T9] CPU: 1 PID: 9 Comm: kworker/u4:0 Not tainted 5.12.0-syzkaller #0 [ 64.358187][ T9] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.368227][ T9] Workqueue: netns cleanup_net [ 64.373033][ T9] Call Trace: [ 64.376563][ T9] dump_stack+0x176/0x24e [ 64.380979][ T9] print_address_description+0x5f/0x3a0 [ 64.386515][ T9] kasan_report+0x15c/0x200 [ 64.391000][ T9] ? __nf_hook_entries_try_shrink+0x2d0/0x660 [ 64.397048][ T9] ? __nf_hook_entries_try_shrink+0x5b8/0x660 [ 64.403110][ T9] __nf_hook_entries_try_shrink+0x5b8/0x660 [ 64.408996][ T9] __nf_unregister_net_hook+0x47b/0x680 [ 64.414548][ T9] cleanup_net+0x708/0xbd0 [ 64.418977][ T9] process_one_work+0x789/0xfd0 [ 64.423915][ T9] worker_thread+0xac1/0x1300 [ 64.428956][ T9] ? rcu_lock_release+0x20/0x20 [ 64.433791][ T9] kthread+0x39a/0x3c0 [ 64.437845][ T9] ? rcu_lock_release+0x20/0x20 [ 64.442674][ T9] ? kthread_blkcg+0xd0/0xd0 [ 64.447270][ T9] ret_from_fork+0x1f/0x30 [ 64.451778][ T9] [ 64.454097][ T9] Allocated by task 8111: [ 64.458413][ T9] ____kasan_kmalloc+0xc4/0xf0 [ 64.463680][ T9] kmem_cache_alloc_trace+0x96/0x340 [ 64.468978][ T9] kernfs_fop_open+0x909/0xbd0 [ 64.473830][ T9] do_dentry_open+0x7cb/0x1010 [ 64.478751][ T9] path_openat+0x27c9/0x3860 [ 64.483338][ T9] do_filp_open+0x1a3/0x3b0 [ 64.488202][ T9] do_sys_openat2+0xba/0x380 [ 64.492817][ T9] __x64_sys_open+0x1af/0x1e0 [ 64.497589][ T9] do_syscall_64+0x3f/0xb0 [ 64.502252][ T9] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 64.508231][ T9] [ 64.510848][ T9] Freed by task 9: [ 64.514704][ T9] kasan_set_track+0x3d/0x70 [ 64.519294][ T9] kasan_set_free_info+0x1f/0x40 [ 64.524318][ T9] ____kasan_slab_free+0x109/0x150 [ 64.529597][ T9] slab_free_freelist_hook+0x1d8/0x290 [ 64.535341][ T9] kfree+0xcf/0x2d0 [ 64.539158][ T9] xt_unregister_table+0x211/0x2c0 [ 64.544254][ T9] arpt_unregister_table+0x78/0x3f0 [ 64.549438][ T9] cleanup_net+0x708/0xbd0 [ 64.554012][ T9] process_one_work+0x789/0xfd0 [ 64.559059][ T9] worker_thread+0xac1/0x1300 [ 64.563728][ T9] kthread+0x39a/0x3c0 [ 64.567783][ T9] ret_from_fork+0x1f/0x30 [ 64.572182][ T9] [ 64.574718][ T9] The buggy address belongs to the object at ffff88801dc20a00 [ 64.574718][ T9] which belongs to the cache kmalloc-128 of size 128 [ 64.588932][ T9] The buggy address is located 72 bytes inside of [ 64.588932][ T9] 128-byte region [ffff88801dc20a00, ffff88801dc20a80) [ 64.602822][ T9] The buggy address belongs to the page: [ 64.608624][ T9] page:ffffea0000770800 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1dc20 [ 64.618851][ T9] flags: 0xfff00000000200(slab|node=0|zone=1|lastcpupid=0x7ff) [ 64.626911][ T9] raw: 00fff00000000200 ffffea00004ff980 0000000400000004 ffff8880100418c0 [ 64.635570][ T9] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000 [ 64.644154][ T9] page dumped because: kasan: bad access detected [ 64.650584][ T9] [ 64.652929][ T9] Memory state around the buggy address: [ 64.658948][ T9] ffff88801dc20900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 executing program [ 64.667035][ T9] ffff88801dc20980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.675094][ T9] >ffff88801dc20a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.683482][ T9] ^ [ 64.690068][ T9] ffff88801dc20a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.698380][ T9] ffff88801dc20b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 64.706821][ T9] ================================================================== [ 64.715393][ T9] Disabling lock debugging due to kernel taint [ 64.722097][ T9] Kernel panic - not syncing: panic_on_warn set ... [ 64.728789][ T9] CPU: 1 PID: 9 Comm: kworker/u4:0 Tainted: G B 5.12.0-syzkaller #0 [ 64.738245][ T9] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 64.748730][ T9] Workqueue: netns cleanup_net [ 64.753485][ T9] Call Trace: [ 64.756748][ T9] dump_stack+0x176/0x24e [ 64.761157][ T9] panic+0x291/0x800 [ 64.765043][ T9] ? trace_hardirqs_on+0x30/0x80 [ 64.770166][ T9] kasan_report+0x1ff/0x200 [ 64.774749][ T9] ? __nf_hook_entries_try_shrink+0x2d0/0x660 [ 64.781060][ T9] ? __nf_hook_entries_try_shrink+0x5b8/0x660 [ 64.787200][ T9] __nf_hook_entries_try_shrink+0x5b8/0x660 [ 64.793168][ T9] __nf_unregister_net_hook+0x47b/0x680 [ 64.798696][ T9] cleanup_net+0x708/0xbd0 [ 64.803132][ T9] process_one_work+0x789/0xfd0 [ 64.808073][ T9] worker_thread+0xac1/0x1300 [ 64.812840][ T9] ? rcu_lock_release+0x20/0x20 [ 64.817673][ T9] kthread+0x39a/0x3c0 [ 64.821722][ T9] ? rcu_lock_release+0x20/0x20 [ 64.826922][ T9] ? kthread_blkcg+0xd0/0xd0 [ 64.831592][ T9] ret_from_fork+0x1f/0x30 [ 64.837627][ T9] Kernel Offset: disabled [ 64.842033][ T9] Rebooting in 86400 seconds..