[ 16.156282][ T280] ip (280) used greatest stack depth: 24400 bytes left
[ 21.354840][ T328] gre: GRE over IPv4 demultiplexer driver
[ 21.438606][ T328] ip6_gre: GRE over IPv6 tunneling driver
[ 21.649376][ T70] ip6_tunnel: g1 xmit: Local address not yet configured!
[ 21.776814][ T70] ip6_tunnel: g1 xmit: Local address not yet configured!
[ 23.735059][ T350] 8021q: 802.1Q VLAN Support v1.8
[ 27.946046][ T389] GACT probability NOT on
[ 29.663303][ T70] ip6_tunnel: g2 xmit: Local address not yet configured!
[ 29.785713][ T70] ip6_tunnel: g2 xmit: Local address not yet configured!
[ 59.681695][ C0] clocksource: Long readout interval, skipping watchdog check: cs_nsec: 1189734984 wd_nsec: 1189734684
[ 2034.920844][T17287] ==================================================================
[ 2034.921205][T17287] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0
[ 2034.921557][T17287] Read of size 1 at addr ffff8880076496ac by task ip/17287
[ 2034.921868][T17287]
[ 2034.921984][T17287] CPU: 3 UID: 0 PID: 17287 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 2034.921991][T17287] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 2034.921997][T17287] Call Trace:
[ 2034.922002][T17287]
[ 2034.922004][T17287] dump_stack_lvl+0x82/0xc0
[ 2034.922015][T17287] print_address_description.constprop.0+0x2c/0x3a0
[ 2034.922027][T17287] ? kobject_put+0xbb/0xd0
[ 2034.922031][T17287] print_report+0xb4/0x270
[ 2034.922034][T17287] ? kobject_put+0xbb/0xd0
[ 2034.922037][T17287] ? kasan_addr_to_slab+0x21/0x70
[ 2034.922040][T17287] ? kobject_put+0xbb/0xd0
[ 2034.922044][T17287] kasan_report+0xca/0x100
[ 2034.922049][T17287] ? kobject_put+0xbb/0xd0
[ 2034.922057][T17287] kobject_put+0xbb/0xd0
[ 2034.922061][T17287] netdev_run_todo+0x5f0/0xc60
[ 2034.922071][T17287] ? dev_ingress_queue_create+0x190/0x190
[ 2034.922074][T17287] ? generic_xdp_install+0x410/0x410
[ 2034.922080][T17287] ? vrf_dellink+0xff/0x150 [vrf]
[ 2034.922090][T17287] ? vrf_map_unregister_dev+0x480/0x480 [vrf]
[ 2034.922094][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.922106][T17287] rtnl_dellink+0x350/0xa30
[ 2034.922113][T17287] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 2034.922132][T17287] ? find_held_lock+0x2b/0x80
[ 2034.922137][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.922142][T17287] ? find_held_lock+0x2b/0x80
[ 2034.922146][T17287] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 2034.922149][T17287] ? __lock_release+0x5d/0x170
[ 2034.922153][T17287] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 2034.922157][T17287] rtnetlink_rcv_msg+0x709/0xc00
[ 2034.922160][T17287] ? rtnl_port_fill+0x850/0x850
[ 2034.922163][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.922170][T17287] netlink_rcv_skb+0x121/0x340
[ 2034.922177][T17287] ? rtnl_port_fill+0x850/0x850
[ 2034.922180][T17287] ? netlink_ack+0xdd0/0xdd0
[ 2034.922187][T17287] ? netlink_deliver_tap+0x13e/0x340
[ 2034.922190][T17287] ? netlink_deliver_tap+0xc3/0x340
[ 2034.922194][T17287] netlink_unicast+0x4aa/0x780
[ 2034.922198][T17287] ? netlink_attachskb+0x810/0x810
[ 2034.922202][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.922207][T17287] netlink_sendmsg+0x714/0xbd0
[ 2034.922214][T17287] ? netlink_unicast+0x780/0x780
[ 2034.922220][T17287] ? __import_iovec+0x230/0x3b0
[ 2034.922232][T17287] ? netlink_unicast+0x780/0x780
[ 2034.922237][T17287] ____sys_sendmsg+0x3dd/0x890
[ 2034.922250][T17287] ? get_timestamp.constprop.0+0x380/0x380
[ 2034.922255][T17287] ? __copy_msghdr+0x3c0/0x3c0
[ 2034.922268][T17287] ___sys_sendmsg+0xed/0x170
[ 2034.922272][T17287] ? kasan_record_aux_stack+0x8c/0xa0
[ 2034.922276][T17287] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 2034.922289][T17287] ? copy_msghdr_from_user+0x110/0x110
[ 2034.922294][T17287] ? find_held_lock+0x2b/0x80
[ 2034.922299][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.922305][T17287] ? find_held_lock+0x2b/0x80
[ 2034.922308][T17287] ? __virt_addr_valid+0x22a/0x450
[ 2034.922320][T17287] ? __lock_release+0x5d/0x170
[ 2034.922331][T17287] __sys_sendmsg+0x10b/0x1a0
[ 2034.922336][T17287] ? __call_rcu_common.constprop.0+0x318/0x630
[ 2034.922342][T17287] ? __sys_sendmsg_sock+0x20/0x20
[ 2034.922353][T17287] ? rcu_is_watching+0x12/0xb0
[ 2034.922357][T17287] do_syscall_64+0xc1/0xfd0
[ 2034.922365][T17287] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 2034.922371][T17287] RIP: 0033:0x7fde3f66a1d7
[ 2034.922376][T17287] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 2034.922381][T17287] RSP: 002b:00007ffe3486a488 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 2034.922388][T17287] RAX: ffffffffffffffda RBX: 00007ffe3486abb0 RCX: 00007fde3f66a1d7
[ 2034.922390][T17287] RDX: 0000000000000000 RSI: 00007ffe3486a4f0 RDI: 0000000000000005
[ 2034.922392][T17287] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078
[ 2034.922394][T17287] R10: 00007fde3f566f60 R11: 0000000000000246 R12: 0000000000000002
[ 2034.922395][T17287] R13: 00000000690de9f2 R14: 0000000000499600 R15: 0000000000000000
[ 2034.922402][T17287]
[ 2034.922403][T17287]
[ 2034.937008][T17287] Allocated by task 412:
[ 2034.937249][T17287] kasan_save_stack+0x24/0x40
[ 2034.937561][T17287] kasan_save_track+0x14/0x30
[ 2034.937763][T17287] __kasan_kmalloc+0x7b/0x90
[ 2034.937961][T17287] __kvmalloc_node_noprof+0x2e5/0x8e0
[ 2034.938134][T17287] alloc_netdev_mqs+0x7d/0x1370
[ 2034.938435][T17287] rtnl_create_link+0xa9e/0xe20
[ 2034.938603][T17287] rtnl_newlink_create+0x203/0x770
[ 2034.938809][T17287] __rtnl_newlink+0x231/0xa30
[ 2034.939002][T17287] rtnl_newlink+0x693/0xa60
[ 2034.939290][T17287] rtnetlink_rcv_msg+0x709/0xc00
[ 2034.939469][T17287] netlink_rcv_skb+0x121/0x340
[ 2034.939666][T17287] netlink_unicast+0x4aa/0x780
[ 2034.939948][T17287] netlink_sendmsg+0x714/0xbd0
[ 2034.940114][T17287] ____sys_sendmsg+0x3dd/0x890
[ 2034.940348][T17287] ___sys_sendmsg+0xed/0x170
[ 2034.940639][T17287] __sys_sendmsg+0x10b/0x1a0
[ 2034.940825][T17287] do_syscall_64+0xc1/0xfd0
[ 2034.941021][T17287] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 2034.941285][T17287]
[ 2034.941398][T17287] Freed by task 17287:
[ 2034.941621][T17287] kasan_save_stack+0x24/0x40
[ 2034.941799][T17287] kasan_save_track+0x14/0x30
[ 2034.942062][T17287] __kasan_save_free_info+0x3b/0x60
[ 2034.942268][T17287] __kasan_slab_free+0x3f/0x60
[ 2034.942460][T17287] kfree+0x21d/0x540
[ 2034.942592][T17287] device_release+0x9c/0x210
[ 2034.942872][T17287] kobject_cleanup+0xfe/0x360
[ 2034.943048][T17287] netdev_run_todo+0x81f/0xc60
[ 2034.943345][T17287] rtnl_dellink+0x350/0xa30
[ 2034.943532][T17287] rtnetlink_rcv_msg+0x709/0xc00
[ 2034.943801][T17287] netlink_rcv_skb+0x121/0x340
[ 2034.943979][T17287] netlink_unicast+0x4aa/0x780
[ 2034.944158][T17287] netlink_sendmsg+0x714/0xbd0
[ 2034.944373][T17287] ____sys_sendmsg+0x3dd/0x890
[ 2034.944743][T17287] ___sys_sendmsg+0xed/0x170
[ 2034.944928][T17287] __sys_sendmsg+0x10b/0x1a0
[ 2034.945101][T17287] do_syscall_64+0xc1/0xfd0
[ 2034.945402][T17287] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 2034.945616][T17287]
[ 2034.945708][T17287] The buggy address belongs to the object at ffff888007649000
[ 2034.945708][T17287] which belongs to the cache kmalloc-4k of size 4096
[ 2034.946119][T17287] The buggy address is located 1708 bytes inside of
[ 2034.946119][T17287] freed 4096-byte region [ffff888007649000, ffff88800764a000)
[ 2034.946570][T17287]
[ 2034.946757][T17287] The buggy address belongs to the physical page:
[ 2034.946985][T17287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7648
[ 2034.947434][T17287] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 2034.947700][T17287] flags: 0x80000000000040(head|node=0|zone=1)
[ 2034.948031][T17287] page_type: f5(slab)
[ 2034.948307][T17287] raw: 0080000000000040 ffff888001043700 ffffea00002aec10 ffffea00001dc010
[ 2034.948629][T17287] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 2034.949048][T17287] head: 0080000000000040 ffff888001043700 ffffea00002aec10 ffffea00001dc010
[ 2034.949393][T17287] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 2034.949695][T17287] head: 0080000000000003 ffffea00001d9201 00000000ffffffff 00000000ffffffff
[ 2034.950011][T17287] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 2034.950333][T17287] page dumped because: kasan: bad access detected
[ 2034.950655][T17287]
[ 2034.950833][T17287] Memory state around the buggy address:
[ 2034.951007][T17287] ffff888007649580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2034.951375][T17287] ffff888007649600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2034.951630][T17287] >ffff888007649680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2034.951909][T17287] ^
[ 2034.952173][T17287] ffff888007649700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2034.952478][T17287] ffff888007649780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 2034.952781][T17287] ==================================================================
[ 2034.953223][T17287] Disabling lock debugging due to kernel taint
[ 2034.953534][T17287] ------------[ cut here ]------------
[ 2034.953846][T17287] refcount_t: underflow; use-after-free.
[ 2034.954215][T17287] WARNING: CPU: 1 PID: 17287 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0
[ 2034.954607][T17287] Modules linked in: act_gact cls_flower sch_ingress 8021q ip6_gre ip6_tunnel tunnel6 gre vrf veth
[ 2034.955106][T17287] CPU: 1 UID: 0 PID: 17287 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 2034.955570][T17287] Tainted: [B]=BAD_PAGE
[ 2034.955834][T17287] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 2034.956114][T17287] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0
[ 2034.956424][T17287] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d 05 97 e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff
[ 2034.957269][T17287] RSP: 0018:ffffc9000710f1f0 EFLAGS: 00010286
[ 2034.957527][T17287] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 2034.957979][T17287] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001
[ 2034.958263][T17287] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff2f3e134
[ 2034.958688][T17287] R10: 0000000000000003 R11: ffffc9000710ed80 R12: 0000000000000001
[ 2034.959019][T17287] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100
[ 2034.959355][T17287] FS: 00007fde3f49c800(0000) GS:ffff88809d472000(0000) knlGS:0000000000000000
[ 2034.959794][T17287] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 2034.960041][T17287] CR2: 00007f3c640e9000 CR3: 0000000012197001 CR4: 0000000000772ef0
[ 2034.960373][T17287] PKRU: 55555554
[ 2034.960542][T17287] Call Trace:
[ 2034.960689][T17287]
[ 2034.960791][T17287] netdev_run_todo+0x5f0/0xc60
[ 2034.960989][T17287] ? dev_ingress_queue_create+0x190/0x190
[ 2034.961195][T17287] ? generic_xdp_install+0x410/0x410
[ 2034.961519][T17287] ? vrf_dellink+0xff/0x150 [vrf]
[ 2034.961745][T17287] ? vrf_map_unregister_dev+0x480/0x480 [vrf]
[ 2034.962014][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.962225][T17287] rtnl_dellink+0x350/0xa30
[ 2034.962535][T17287] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 2034.962794][T17287] ? find_held_lock+0x2b/0x80
[ 2034.963034][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.963433][T17287] ? find_held_lock+0x2b/0x80
[ 2034.963649][T17287] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 2034.963838][T17287] ? __lock_release+0x5d/0x170
[ 2034.964039][T17287] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 2034.964416][T17287] rtnetlink_rcv_msg+0x709/0xc00
[ 2034.964602][T17287] ? rtnl_port_fill+0x850/0x850
[ 2034.964794][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.965044][T17287] netlink_rcv_skb+0x121/0x340
[ 2034.965383][T17287] ? rtnl_port_fill+0x850/0x850
[ 2034.965600][T17287] ? netlink_ack+0xdd0/0xdd0
[ 2034.965810][T17287] ? netlink_deliver_tap+0x13e/0x340
[ 2034.966022][T17287] ? netlink_deliver_tap+0xc3/0x340
[ 2034.966397][T17287] netlink_unicast+0x4aa/0x780
[ 2034.966617][T17287] ? netlink_attachskb+0x810/0x810
[ 2034.966821][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.967083][T17287] netlink_sendmsg+0x714/0xbd0
[ 2034.967480][T17287] ? netlink_unicast+0x780/0x780
[ 2034.967661][T17287] ? __import_iovec+0x230/0x3b0
[ 2034.967866][T17287] ? netlink_unicast+0x780/0x780
[ 2034.968072][T17287] ____sys_sendmsg+0x3dd/0x890
[ 2034.968468][T17287] ? get_timestamp.constprop.0+0x380/0x380
[ 2034.968732][T17287] ? __copy_msghdr+0x3c0/0x3c0
[ 2034.968971][T17287] ___sys_sendmsg+0xed/0x170
[ 2034.969152][T17287] ? kasan_record_aux_stack+0x8c/0xa0
[ 2034.969429][T17287] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 2034.969654][T17287] ? copy_msghdr_from_user+0x110/0x110
[ 2034.969834][T17287] ? find_held_lock+0x2b/0x80
[ 2034.970159][T17287] ? __lock_acquire+0x449/0x7e0
[ 2034.970388][T17287] ? find_held_lock+0x2b/0x80
[ 2034.970571][T17287] ? __virt_addr_valid+0x22a/0x450
[ 2034.970750][T17287] ? __lock_release+0x5d/0x170
[ 2034.971066][T17287] __sys_sendmsg+0x10b/0x1a0
[ 2034.971275][T17287] ? __call_rcu_common.constprop.0+0x318/0x630
[ 2034.971507][T17287] ? __sys_sendmsg_sock+0x20/0x20
[ 2034.971693][T17287] ? rcu_is_watching+0x12/0xb0
[ 2034.971988][T17287] do_syscall_64+0xc1/0xfd0
[ 2034.972185][T17287] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 2034.972415][T17287] RIP: 0033:0x7fde3f66a1d7
[ 2034.972606][T17287] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 2034.973371][T17287] RSP: 002b:00007ffe3486a488 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 2034.973748][T17287] RAX: ffffffffffffffda RBX: 00007ffe3486abb0 RCX: 00007fde3f66a1d7
[ 2034.974065][T17287] RDX: 0000000000000000 RSI: 00007ffe3486a4f0 RDI: 0000000000000005
[ 2034.974366][T17287] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078
[ 2034.974727][T17287] R10: 00007fde3f566f60 R11: 0000000000000246 R12: 0000000000000002
[ 2034.975036][T17287] R13: 00000000690de9f2 R14: 0000000000499600 R15: 0000000000000000
[ 2034.975321][T17287]
[ 2034.975562][T17287] irq event stamp: 43031
[ 2034.975699][T17287] hardirqs last enabled at (43031): [] finish_task_switch.isra.0+0x245/0x960
[ 2034.976116][T17287] hardirqs last disabled at (43030): [] __schedule+0x94a/0x1b10
[ 2034.976647][T17287] softirqs last enabled at (42618): [] handle_softirqs+0x352/0x610
[ 2034.977027][T17287] softirqs last disabled at (42611): [] irq_exit_rcu+0xab/0x100
[ 2034.977350][T17287] ---[ end trace 0000000000000000 ]---
[ 2034.983777][T17287] ip (17287) used greatest stack depth: 24232 bytes left