[ 24.100326][ T299] br0: port 1(veth1) entered blocking state [ 24.101255][ T299] br0: port 1(veth1) entered disabled state [ 24.102030][ T299] veth1: entered allmulticast mode [ 24.106118][ T299] veth1: entered promiscuous mode [ 24.274093][ T301] br0: port 2(veth2) entered blocking state [ 24.274663][ T301] br0: port 2(veth2) entered disabled state [ 24.275265][ T301] veth2: entered allmulticast mode [ 24.279443][ T301] veth2: entered promiscuous mode [ 24.596295][ T36] br0: port 1(veth1) entered blocking state [ 24.597268][ T36] br0: port 1(veth1) entered forwarding state [ 24.739093][ T36] br0: port 2(veth2) entered blocking state [ 24.739806][ T36] br0: port 2(veth2) entered forwarding state [ 39.974764][ T355] GACT probability NOT on [ 260.971941][ T1597] br0: port 1(veth1) entered disabled state [ 266.362197][ T1602] br0: port 1(veth1) entered forwarding state [ 272.047888][ T1610] br0: vlan filtering disabled, automatically disabling multicast vlan snooping [ 283.755535][ T1634] br0: vlan filtering disabled, automatically disabling multicast vlan snooping [ 284.004965][ T1641] br0: port 2(veth2) entered disabled state [ 284.139211][ T1642] br0: port 1(veth1) entered disabled state [ 284.304395][ T1643] veth2: left allmulticast mode [ 284.304818][ T1643] veth2: left promiscuous mode [ 284.305386][ T1643] br0: port 2(veth2) entered disabled state [ 284.308517][ T1643] veth1: left allmulticast mode [ 284.309000][ T1643] veth1: left promiscuous mode [ 284.309671][ T1643] br0: port 1(veth1) entered disabled state [ 284.362478][ T1643] ================================================================== [ 284.362890][ T1643] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 284.363215][ T1643] Read of size 1 at addr ffff88800bbf26ac by task ip/1643 [ 284.363473][ T1643] [ 284.363588][ T1643] CPU: 0 UID: 0 PID: 1643 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 284.363594][ T1643] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 284.363601][ T1643] Call Trace: [ 284.363604][ T1643] [ 284.363608][ T1643] dump_stack_lvl+0x82/0xc0 [ 284.363617][ T1643] print_address_description.constprop.0+0x2c/0x3a0 [ 284.363628][ T1643] ? kobject_put+0xbb/0xd0 [ 284.363633][ T1643] print_report+0xb4/0x270 [ 284.363638][ T1643] ? kobject_put+0xbb/0xd0 [ 284.363642][ T1643] ? kasan_addr_to_slab+0x21/0x70 [ 284.363647][ T1643] ? kobject_put+0xbb/0xd0 [ 284.363650][ T1643] kasan_report+0xca/0x100 [ 284.363654][ T1643] ? kobject_put+0xbb/0xd0 [ 284.363660][ T1643] kobject_put+0xbb/0xd0 [ 284.363664][ T1643] netdev_run_todo+0x5f0/0xc60 [ 284.363669][ T1643] ? dev_ingress_queue_create+0x190/0x190 [ 284.363673][ T1643] ? generic_xdp_install+0x410/0x410 [ 284.363675][ T1643] ? kernfs_put.part.0+0x12d/0x480 [ 284.363683][ T1643] ? unregister_netdevice_many+0x20/0x20 [ 284.363689][ T1643] ? br_dev_delete+0x115/0x1a0 [bridge] [ 284.363725][ T1643] rtnl_dellink+0x350/0xa30 [ 284.363731][ T1643] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 284.363750][ T1643] ? find_held_lock+0x2b/0x80 [ 284.363757][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.363763][ T1643] ? find_held_lock+0x2b/0x80 [ 284.363767][ T1643] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 284.363769][ T1643] ? __lock_release+0x5d/0x170 [ 284.363775][ T1643] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 284.363781][ T1643] rtnetlink_rcv_msg+0x709/0xc00 [ 284.363786][ T1643] ? rtnl_port_fill+0x850/0x850 [ 284.363790][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.363801][ T1643] netlink_rcv_skb+0x121/0x340 [ 284.363807][ T1643] ? rtnl_port_fill+0x850/0x850 [ 284.363810][ T1643] ? netlink_ack+0xdd0/0xdd0 [ 284.363817][ T1643] ? netlink_deliver_tap+0x13e/0x340 [ 284.363820][ T1643] ? netlink_deliver_tap+0xc3/0x340 [ 284.363824][ T1643] netlink_unicast+0x4aa/0x780 [ 284.363829][ T1643] ? netlink_attachskb+0x810/0x810 [ 284.363833][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.363838][ T1643] netlink_sendmsg+0x714/0xbd0 [ 284.363843][ T1643] ? netlink_unicast+0x780/0x780 [ 284.363847][ T1643] ? __import_iovec+0x230/0x3b0 [ 284.363854][ T1643] ? netlink_unicast+0x780/0x780 [ 284.363857][ T1643] ____sys_sendmsg+0x3dd/0x890 [ 284.363865][ T1643] ? get_timestamp.constprop.0+0x380/0x380 [ 284.363868][ T1643] ? __copy_msghdr+0x3c0/0x3c0 [ 284.363876][ T1643] ___sys_sendmsg+0xed/0x170 [ 284.363879][ T1643] ? kasan_record_aux_stack+0x8c/0xa0 [ 284.363883][ T1643] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 284.363891][ T1643] ? copy_msghdr_from_user+0x110/0x110 [ 284.363896][ T1643] ? find_held_lock+0x2b/0x80 [ 284.363900][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.363906][ T1643] ? find_held_lock+0x2b/0x80 [ 284.363910][ T1643] ? __virt_addr_valid+0x22a/0x450 [ 284.363917][ T1643] ? __lock_release+0x5d/0x170 [ 284.363923][ T1643] __sys_sendmsg+0x10b/0x1a0 [ 284.363926][ T1643] ? __call_rcu_common.constprop.0+0x318/0x630 [ 284.363930][ T1643] ? __sys_sendmsg_sock+0x20/0x20 [ 284.363937][ T1643] ? rcu_is_watching+0x12/0xb0 [ 284.363941][ T1643] do_syscall_64+0xc1/0xfd0 [ 284.363948][ T1643] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 284.363953][ T1643] RIP: 0033:0x7f815cb531d7 [ 284.363959][ T1643] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 284.363962][ T1643] RSP: 002b:00007ffe3c61fd38 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.363966][ T1643] RAX: ffffffffffffffda RBX: 00007ffe3c620460 RCX: 00007f815cb531d7 [ 284.363969][ T1643] RDX: 0000000000000000 RSI: 00007ffe3c61fda0 RDI: 0000000000000005 [ 284.363971][ T1643] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 284.363973][ T1643] R10: 00007f815ca4ff60 R11: 0000000000000246 R12: 0000000000000002 [ 284.363975][ T1643] R13: 00000000690de8ae R14: 0000000000499600 R15: 0000000000000000 [ 284.363981][ T1643] [ 284.363983][ T1643] [ 284.380762][ T1643] Allocated by task 297: [ 284.380928][ T1643] kasan_save_stack+0x24/0x40 [ 284.381347][ T1643] kasan_save_track+0x14/0x30 [ 284.381535][ T1643] __kasan_kmalloc+0x7b/0x90 [ 284.381718][ T1643] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 284.381948][ T1643] alloc_netdev_mqs+0x7d/0x1370 [ 284.382283][ T1643] rtnl_create_link+0xa9e/0xe20 [ 284.382470][ T1643] rtnl_newlink_create+0x203/0x770 [ 284.382654][ T1643] __rtnl_newlink+0x231/0xa30 [ 284.382851][ T1643] rtnl_newlink+0x693/0xa60 [ 284.383047][ T1643] rtnetlink_rcv_msg+0x709/0xc00 [ 284.383253][ T1643] netlink_rcv_skb+0x121/0x340 [ 284.383448][ T1643] netlink_unicast+0x4aa/0x780 [ 284.383632][ T1643] netlink_sendmsg+0x714/0xbd0 [ 284.383951][ T1643] ____sys_sendmsg+0x3dd/0x890 [ 284.384170][ T1643] ___sys_sendmsg+0xed/0x170 [ 284.384361][ T1643] __sys_sendmsg+0x10b/0x1a0 [ 284.384544][ T1643] do_syscall_64+0xc1/0xfd0 [ 284.384842][ T1643] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 284.385080][ T1643] [ 284.385194][ T1643] Freed by task 1643: [ 284.385349][ T1643] kasan_save_stack+0x24/0x40 [ 284.385650][ T1643] kasan_save_track+0x14/0x30 [ 284.385849][ T1643] __kasan_save_free_info+0x3b/0x60 [ 284.386041][ T1643] __kasan_slab_free+0x3f/0x60 [ 284.386240][ T1643] kfree+0x21d/0x540 [ 284.386485][ T1643] device_release+0x9c/0x210 [ 284.386681][ T1643] kobject_cleanup+0xfe/0x360 [ 284.386879][ T1643] netdev_run_todo+0x81f/0xc60 [ 284.387071][ T1643] rtnl_dellink+0x350/0xa30 [ 284.387368][ T1643] rtnetlink_rcv_msg+0x709/0xc00 [ 284.387571][ T1643] netlink_rcv_skb+0x121/0x340 [ 284.387801][ T1643] netlink_unicast+0x4aa/0x780 [ 284.388056][ T1643] netlink_sendmsg+0x714/0xbd0 [ 284.388374][ T1643] ____sys_sendmsg+0x3dd/0x890 [ 284.388582][ T1643] ___sys_sendmsg+0xed/0x170 [ 284.388780][ T1643] __sys_sendmsg+0x10b/0x1a0 [ 284.388994][ T1643] do_syscall_64+0xc1/0xfd0 [ 284.389326][ T1643] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 284.389580][ T1643] [ 284.389677][ T1643] Last potentially related work creation: [ 284.389865][ T1643] kasan_save_stack+0x24/0x40 [ 284.390105][ T1643] kasan_record_aux_stack+0x8c/0xa0 [ 284.390421][ T1643] insert_work+0x34/0x230 [ 284.390572][ T1643] __queue_work+0x5fd/0xab0 [ 284.390755][ T1643] queue_work_on+0x84/0x90 [ 284.390945][ T1643] br_multicast_del_mdb_entry+0x95d/0xfe0 [bridge] [ 284.391377][ T1643] br_multicast_dev_del+0xeb/0x240 [bridge] [ 284.391640][ T1643] br_dev_uninit+0x19/0x40 [bridge] [ 284.391850][ T1643] unregister_netdevice_many_notify+0xa80/0x1b30 [ 284.392223][ T1643] rtnl_dellink+0x344/0xa30 [ 284.392416][ T1643] rtnetlink_rcv_msg+0x709/0xc00 [ 284.392611][ T1643] netlink_rcv_skb+0x121/0x340 [ 284.392799][ T1643] netlink_unicast+0x4aa/0x780 [ 284.393014][ T1643] netlink_sendmsg+0x714/0xbd0 [ 284.393216][ T1643] ____sys_sendmsg+0x3dd/0x890 [ 284.393416][ T1643] ___sys_sendmsg+0xed/0x170 [ 284.393611][ T1643] __sys_sendmsg+0x10b/0x1a0 [ 284.393959][ T1643] do_syscall_64+0xc1/0xfd0 [ 284.394163][ T1643] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 284.394401][ T1643] [ 284.394498][ T1643] Second to last potentially related work creation: [ 284.394890][ T1643] kasan_save_stack+0x24/0x40 [ 284.395101][ T1643] kasan_record_aux_stack+0x8c/0xa0 [ 284.395346][ T1643] insert_work+0x34/0x230 [ 284.395493][ T1643] __queue_work+0x5fd/0xab0 [ 284.395793][ T1643] queue_work_on+0x84/0x90 [ 284.395997][ T1643] br_multicast_dev_del+0xeb/0x240 [bridge] [ 284.396285][ T1643] br_dev_uninit+0x19/0x40 [bridge] [ 284.396497][ T1643] unregister_netdevice_many_notify+0xa80/0x1b30 [ 284.396849][ T1643] rtnl_dellink+0x344/0xa30 [ 284.397044][ T1643] rtnetlink_rcv_msg+0x709/0xc00 [ 284.397244][ T1643] netlink_rcv_skb+0x121/0x340 [ 284.397443][ T1643] netlink_unicast+0x4aa/0x780 [ 284.397748][ T1643] netlink_sendmsg+0x714/0xbd0 [ 284.397951][ T1643] ____sys_sendmsg+0x3dd/0x890 [ 284.398161][ T1643] ___sys_sendmsg+0xed/0x170 [ 284.398392][ T1643] __sys_sendmsg+0x10b/0x1a0 [ 284.398704][ T1643] do_syscall_64+0xc1/0xfd0 [ 284.398918][ T1643] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 284.399162][ T1643] [ 284.399299][ T1643] The buggy address belongs to the object at ffff88800bbf2000 [ 284.399299][ T1643] which belongs to the cache kmalloc-8k of size 8192 [ 284.399769][ T1643] The buggy address is located 1708 bytes inside of [ 284.399769][ T1643] freed 8192-byte region [ffff88800bbf2000, ffff88800bbf4000) [ 284.400376][ T1643] [ 284.400473][ T1643] The buggy address belongs to the physical page: [ 284.400720][ T1643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xbbf0 [ 284.401083][ T1643] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 284.401381][ T1643] flags: 0x80000000000040(head|node=0|zone=1) [ 284.401669][ T1643] page_type: f5(slab) [ 284.401823][ T1643] raw: 0080000000000040 ffff8880010438c0 ffffea000015cc10 ffff888001041228 [ 284.402180][ T1643] raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000 [ 284.402543][ T1643] head: 0080000000000040 ffff8880010438c0 ffffea000015cc10 ffff888001041228 [ 284.402910][ T1643] head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000 [ 284.403273][ T1643] head: 0080000000000003 ffffea00002efc01 00000000ffffffff 00000000ffffffff [ 284.403727][ T1643] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 284.404086][ T1643] page dumped because: kasan: bad access detected [ 284.404334][ T1643] [ 284.404427][ T1643] Memory state around the buggy address: [ 284.404749][ T1643] ffff88800bbf2580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 284.405023][ T1643] ffff88800bbf2600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 284.405357][ T1643] >ffff88800bbf2680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 284.405633][ T1643] ^ [ 284.405824][ T1643] ffff88800bbf2700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 284.406151][ T1643] ffff88800bbf2780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 284.406541][ T1643] ================================================================== [ 284.406863][ T1643] Disabling lock debugging due to kernel taint [ 284.407203][ T1643] ------------[ cut here ]------------ [ 284.407482][ T1643] refcount_t: underflow; use-after-free. [ 284.407710][ T1643] WARNING: CPU: 0 PID: 1643 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 284.408061][ T1643] Modules linked in: act_gact cls_flower sch_ingress bridge stp llc vrf veth [ 284.408545][ T1643] CPU: 0 UID: 0 PID: 1643 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 284.408958][ T1643] Tainted: [B]=BAD_PAGE [ 284.409206][ T1643] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 284.409436][ T1643] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 284.409684][ T1643] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d 85 87 e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff [ 284.410469][ T1643] RSP: 0018:ffffc90003b471f0 EFLAGS: 00010286 [ 284.410719][ T1643] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 284.411034][ T1643] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 284.411327][ T1643] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff103e134 [ 284.411604][ T1643] R10: 0000000000000003 R11: ffffc90003b46d80 R12: 0000000000000001 [ 284.412013][ T1643] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 284.412317][ T1643] FS: 00007f815c985800(0000) GS:ffff8880a6ff2000(0000) knlGS:0000000000000000 [ 284.412739][ T1643] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 284.412995][ T1643] CR2: 00007feee6b0b000 CR3: 0000000008fc7003 CR4: 0000000000772ef0 [ 284.413302][ T1643] PKRU: 55555554 [ 284.413539][ T1643] Call Trace: [ 284.413691][ T1643] [ 284.413801][ T1643] netdev_run_todo+0x5f0/0xc60 [ 284.414009][ T1643] ? dev_ingress_queue_create+0x190/0x190 [ 284.414203][ T1643] ? generic_xdp_install+0x410/0x410 [ 284.414510][ T1643] ? kernfs_put.part.0+0x12d/0x480 [ 284.414707][ T1643] ? unregister_netdevice_many+0x20/0x20 [ 284.414915][ T1643] ? br_dev_delete+0x115/0x1a0 [bridge] [ 284.415170][ T1643] rtnl_dellink+0x350/0xa30 [ 284.415502][ T1643] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 284.415753][ T1643] ? find_held_lock+0x2b/0x80 [ 284.415989][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.416187][ T1643] ? find_held_lock+0x2b/0x80 [ 284.416474][ T1643] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 284.416683][ T1643] ? __lock_release+0x5d/0x170 [ 284.416884][ T1643] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 284.417134][ T1643] rtnetlink_rcv_msg+0x709/0xc00 [ 284.417414][ T1643] ? rtnl_port_fill+0x850/0x850 [ 284.417624][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.417816][ T1643] netlink_rcv_skb+0x121/0x340 [ 284.418142][ T1643] ? rtnl_port_fill+0x850/0x850 [ 284.418375][ T1643] ? netlink_ack+0xdd0/0xdd0 [ 284.418560][ T1643] ? netlink_deliver_tap+0x13e/0x340 [ 284.418775][ T1643] ? netlink_deliver_tap+0xc3/0x340 [ 284.419088][ T1643] netlink_unicast+0x4aa/0x780 [ 284.419299][ T1643] ? netlink_attachskb+0x810/0x810 [ 284.419485][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.419675][ T1643] netlink_sendmsg+0x714/0xbd0 [ 284.420001][ T1643] ? netlink_unicast+0x780/0x780 [ 284.420193][ T1643] ? __import_iovec+0x230/0x3b0 [ 284.420408][ T1643] ? netlink_unicast+0x780/0x780 [ 284.420600][ T1643] ____sys_sendmsg+0x3dd/0x890 [ 284.420821][ T1643] ? get_timestamp.constprop.0+0x380/0x380 [ 284.421145][ T1643] ? __copy_msghdr+0x3c0/0x3c0 [ 284.421411][ T1643] ___sys_sendmsg+0xed/0x170 [ 284.421632][ T1643] ? kasan_record_aux_stack+0x8c/0xa0 [ 284.421950][ T1643] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 284.422245][ T1643] ? copy_msghdr_from_user+0x110/0x110 [ 284.422445][ T1643] ? find_held_lock+0x2b/0x80 [ 284.422643][ T1643] ? __lock_acquire+0x449/0x7e0 [ 284.422951][ T1643] ? find_held_lock+0x2b/0x80 [ 284.423131][ T1643] ? __virt_addr_valid+0x22a/0x450 [ 284.423352][ T1643] ? __lock_release+0x5d/0x170 [ 284.423570][ T1643] __sys_sendmsg+0x10b/0x1a0 [ 284.423912][ T1643] ? __call_rcu_common.constprop.0+0x318/0x630 [ 284.424168][ T1643] ? __sys_sendmsg_sock+0x20/0x20 [ 284.424349][ T1643] ? rcu_is_watching+0x12/0xb0 [ 284.424567][ T1643] do_syscall_64+0xc1/0xfd0 [ 284.424875][ T1643] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 284.425097][ T1643] RIP: 0033:0x7f815cb531d7 [ 284.425295][ T1643] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 284.426090][ T1643] RSP: 002b:00007ffe3c61fd38 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 284.426370][ T1643] RAX: ffffffffffffffda RBX: 00007ffe3c620460 RCX: 00007f815cb531d7 [ 284.426819][ T1643] RDX: 0000000000000000 RSI: 00007ffe3c61fda0 RDI: 0000000000000005 [ 284.427111][ T1643] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 284.427445][ T1643] R10: 00007f815ca4ff60 R11: 0000000000000246 R12: 0000000000000002 [ 284.427745][ T1643] R13: 00000000690de8ae R14: 0000000000499600 R15: 0000000000000000 [ 284.428057][ T1643] [ 284.428314][ T1643] irq event stamp: 50943 [ 284.428459][ T1643] hardirqs last enabled at (50943): [] irqentry_exit+0x3b/0x80 [ 284.428807][ T1643] hardirqs last disabled at (50942): [] handle_softirqs+0x47f/0x610 [ 284.429135][ T1643] softirqs last enabled at (50846): [] handle_softirqs+0x352/0x610 [ 284.429464][ T1643] softirqs last disabled at (50841): [] irq_exit_rcu+0xab/0x100 [ 284.429785][ T1643] ---[ end trace 0000000000000000 ]---