[ 19.477698][ T302] br0: port 1(veth1) entered blocking state [ 19.478431][ T302] br0: port 1(veth1) entered disabled state [ 19.479267][ T302] veth1: entered allmulticast mode [ 19.484005][ T302] veth1: entered promiscuous mode [ 19.629190][ T304] br0: port 2(veth2) entered blocking state [ 19.629649][ T304] br0: port 2(veth2) entered disabled state [ 19.630308][ T304] veth2: entered allmulticast mode [ 19.634157][ T304] veth2: entered promiscuous mode [ 19.862934][ T37] br0: port 1(veth1) entered blocking state [ 19.863446][ T37] br0: port 1(veth1) entered forwarding state [ 19.971490][ T36] br0: port 2(veth2) entered blocking state [ 19.971928][ T36] br0: port 2(veth2) entered forwarding state [ 29.222990][ T352] veth0: entered promiscuous mode [ 29.888408][ T358] GACT probability NOT on [ 56.574904][ T386] veth0: left promiscuous mode [ 57.106994][ T398] veth3: entered promiscuous mode [ 59.297361][ T407] veth3: left promiscuous mode [ 59.504504][ T409] veth3: entered promiscuous mode [ 61.761089][ T418] veth3: left promiscuous mode [ 61.990894][ T421] veth3: entered promiscuous mode [ 64.308407][ T430] veth3: left promiscuous mode [ 64.528362][ T432] veth3: entered promiscuous mode [ 66.767565][ T441] veth3: left promiscuous mode [ 91.651275][ T497] veth3: entered promiscuous mode [ 95.212944][ T517] veth3: left promiscuous mode [ 95.770597][ T528] veth3: entered promiscuous mode [ 99.521484][ T543] veth3: left promiscuous mode [ 100.076214][ T554] veth3: entered promiscuous mode [ 115.189898][ T581] br0: port 1(veth1) entered disabled state [ 115.326285][ T46] br0: port 1(veth1) entered blocking state [ 115.326778][ T46] br0: port 1(veth1) entered forwarding state [ 126.560560][ T606] veth1: left allmulticast mode [ 126.561002][ T606] veth1: left promiscuous mode [ 126.561627][ T606] br0: port 1(veth1) entered disabled state [ 126.573346][ T606] ip (606) used greatest stack depth: 24560 bytes left [ 126.682750][ T607] br0: port 1(veth1) entered blocking state [ 126.683211][ T607] br0: port 1(veth1) entered disabled state [ 126.683665][ T607] veth1: entered allmulticast mode [ 126.687180][ T607] veth1: entered promiscuous mode [ 126.688013][ T607] br0: port 1(veth1) entered blocking state [ 126.688449][ T607] br0: port 1(veth1) entered forwarding state [ 132.295677][ T620] veth3: left promiscuous mode [ 132.765777][ T628] br0: port 2(veth2) entered disabled state [ 132.920600][ T629] br0: port 1(veth1) entered disabled state [ 132.933341][ T629] ip (629) used greatest stack depth: 24448 bytes left [ 133.037149][ T630] veth1: left allmulticast mode [ 133.037511][ T630] veth1: left promiscuous mode [ 133.038005][ T630] br0: port 1(veth1) entered disabled state [ 133.041257][ T630] veth2: left allmulticast mode [ 133.041594][ T630] veth2: left promiscuous mode [ 133.042105][ T630] br0: port 2(veth2) entered disabled state [ 133.080468][ T630] ================================================================== [ 133.080794][ T630] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 133.081124][ T630] Read of size 1 at addr ffff88800587a6ac by task ip/630 [ 133.081349][ T630] [ 133.081446][ T630] CPU: 1 UID: 0 PID: 630 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 133.081452][ T630] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 133.081454][ T630] Call Trace: [ 133.081457][ T630] [ 133.081459][ T630] dump_stack_lvl+0x82/0xc0 [ 133.081465][ T630] print_address_description.constprop.0+0x2c/0x3a0 [ 133.081480][ T630] ? kobject_put+0xbb/0xd0 [ 133.081484][ T630] print_report+0xb4/0x270 [ 133.081487][ T630] ? kobject_put+0xbb/0xd0 [ 133.081490][ T630] ? kasan_addr_to_slab+0x21/0x70 [ 133.081493][ T630] ? kobject_put+0xbb/0xd0 [ 133.081496][ T630] kasan_report+0xca/0x100 [ 133.081500][ T630] ? kobject_put+0xbb/0xd0 [ 133.081505][ T630] kobject_put+0xbb/0xd0 [ 133.081509][ T630] netdev_run_todo+0x5f0/0xc60 [ 133.081515][ T630] ? dev_ingress_queue_create+0x190/0x190 [ 133.081518][ T630] ? generic_xdp_install+0x410/0x410 [ 133.081520][ T630] ? kernfs_put.part.0+0x12d/0x480 [ 133.081531][ T630] ? unregister_netdevice_many+0x20/0x20 [ 133.081537][ T630] ? br_dev_delete+0x115/0x1a0 [bridge] [ 133.081594][ T630] rtnl_dellink+0x350/0xa30 [ 133.081599][ T630] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 133.081617][ T630] ? find_held_lock+0x2b/0x80 [ 133.081626][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.081632][ T630] ? find_held_lock+0x2b/0x80 [ 133.081635][ T630] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 133.081638][ T630] ? __lock_release+0x5d/0x170 [ 133.081642][ T630] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 133.081646][ T630] rtnetlink_rcv_msg+0x709/0xc00 [ 133.081649][ T630] ? rtnl_port_fill+0x850/0x850 [ 133.081652][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.081659][ T630] netlink_rcv_skb+0x121/0x340 [ 133.081663][ T630] ? rtnl_port_fill+0x850/0x850 [ 133.081667][ T630] ? netlink_ack+0xdd0/0xdd0 [ 133.081673][ T630] ? netlink_deliver_tap+0x13e/0x340 [ 133.081676][ T630] ? netlink_deliver_tap+0xc3/0x340 [ 133.081680][ T630] netlink_unicast+0x4aa/0x780 [ 133.081684][ T630] ? netlink_attachskb+0x810/0x810 [ 133.081687][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.081693][ T630] netlink_sendmsg+0x714/0xbd0 [ 133.081697][ T630] ? netlink_unicast+0x780/0x780 [ 133.081701][ T630] ? __import_iovec+0x230/0x3b0 [ 133.081708][ T630] ? netlink_unicast+0x780/0x780 [ 133.081711][ T630] ____sys_sendmsg+0x3dd/0x890 [ 133.081718][ T630] ? get_timestamp.constprop.0+0x380/0x380 [ 133.081721][ T630] ? __copy_msghdr+0x3c0/0x3c0 [ 133.081728][ T630] ___sys_sendmsg+0xed/0x170 [ 133.081731][ T630] ? kasan_record_aux_stack+0x8c/0xa0 [ 133.081734][ T630] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 133.081742][ T630] ? copy_msghdr_from_user+0x110/0x110 [ 133.081747][ T630] ? find_held_lock+0x2b/0x80 [ 133.081751][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.081757][ T630] ? find_held_lock+0x2b/0x80 [ 133.081760][ T630] ? __virt_addr_valid+0x22a/0x450 [ 133.081770][ T630] ? __lock_release+0x5d/0x170 [ 133.081777][ T630] __sys_sendmsg+0x10b/0x1a0 [ 133.081780][ T630] ? __call_rcu_common.constprop.0+0x318/0x630 [ 133.081783][ T630] ? __sys_sendmsg_sock+0x20/0x20 [ 133.081791][ T630] ? rcu_is_watching+0x12/0xb0 [ 133.081795][ T630] do_syscall_64+0xc1/0xfd0 [ 133.081801][ T630] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 133.081809][ T630] RIP: 0033:0x7fcd717f21d7 [ 133.081814][ T630] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 133.081817][ T630] RSP: 002b:00007ffef87563f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.081823][ T630] RAX: ffffffffffffffda RBX: 00007ffef8756b20 RCX: 00007fcd717f21d7 [ 133.081825][ T630] RDX: 0000000000000000 RSI: 00007ffef8756460 RDI: 0000000000000005 [ 133.081827][ T630] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 133.081828][ T630] R10: 00007fcd716eef60 R11: 0000000000000246 R12: 0000000000000002 [ 133.081830][ T630] R13: 00000000690df577 R14: 0000000000499600 R15: 0000000000000000 [ 133.081836][ T630] [ 133.081837][ T630] [ 133.094729][ T630] Allocated by task 299: [ 133.094991][ T630] kasan_save_stack+0x24/0x40 [ 133.095170][ T630] kasan_save_track+0x14/0x30 [ 133.095335][ T630] __kasan_kmalloc+0x7b/0x90 [ 133.095497][ T630] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 133.095776][ T630] alloc_netdev_mqs+0x7d/0x1370 [ 133.095947][ T630] rtnl_create_link+0xa9e/0xe20 [ 133.096115][ T630] rtnl_newlink_create+0x203/0x770 [ 133.096276][ T630] __rtnl_newlink+0x231/0xa30 [ 133.096545][ T630] rtnl_newlink+0x693/0xa60 [ 133.096711][ T630] rtnetlink_rcv_msg+0x709/0xc00 [ 133.096904][ T630] netlink_rcv_skb+0x121/0x340 [ 133.097069][ T630] netlink_unicast+0x4aa/0x780 [ 133.097328][ T630] netlink_sendmsg+0x714/0xbd0 [ 133.097509][ T630] ____sys_sendmsg+0x3dd/0x890 [ 133.097678][ T630] ___sys_sendmsg+0xed/0x170 [ 133.097848][ T630] __sys_sendmsg+0x10b/0x1a0 [ 133.098140][ T630] do_syscall_64+0xc1/0xfd0 [ 133.098305][ T630] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 133.098514][ T630] [ 133.098597][ T630] Freed by task 630: [ 133.098820][ T630] kasan_save_stack+0x24/0x40 [ 133.098993][ T630] kasan_save_track+0x14/0x30 [ 133.099174][ T630] __kasan_save_free_info+0x3b/0x60 [ 133.099338][ T630] __kasan_slab_free+0x3f/0x60 [ 133.099605][ T630] kfree+0x21d/0x540 [ 133.099730][ T630] device_release+0x9c/0x210 [ 133.099901][ T630] kobject_cleanup+0xfe/0x360 [ 133.100069][ T630] netdev_run_todo+0x81f/0xc60 [ 133.100232][ T630] rtnl_dellink+0x350/0xa30 [ 133.100506][ T630] rtnetlink_rcv_msg+0x709/0xc00 [ 133.100712][ T630] netlink_rcv_skb+0x121/0x340 [ 133.100886][ T630] netlink_unicast+0x4aa/0x780 [ 133.101055][ T630] netlink_sendmsg+0x714/0xbd0 [ 133.101330][ T630] ____sys_sendmsg+0x3dd/0x890 [ 133.101514][ T630] ___sys_sendmsg+0xed/0x170 [ 133.101682][ T630] __sys_sendmsg+0x10b/0x1a0 [ 133.101847][ T630] do_syscall_64+0xc1/0xfd0 [ 133.102143][ T630] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 133.102348][ T630] [ 133.102430][ T630] Last potentially related work creation: [ 133.102628][ T630] kasan_save_stack+0x24/0x40 [ 133.102908][ T630] kasan_record_aux_stack+0x8c/0xa0 [ 133.103096][ T630] insert_work+0x34/0x230 [ 133.103226][ T630] __queue_work+0x5fd/0xab0 [ 133.103392][ T630] queue_work_on+0x84/0x90 [ 133.103654][ T630] fdb_delete+0x7bf/0xd50 [bridge] [ 133.103856][ T630] br_fdb_delete_by_port+0x1ce/0x260 [bridge] [ 133.104087][ T630] del_nbp+0x374/0xbe0 [bridge] [ 133.104288][ T630] br_dev_delete+0x91/0x1a0 [bridge] [ 133.104494][ T630] rtnl_dellink+0x334/0xa30 [ 133.104676][ T630] rtnetlink_rcv_msg+0x709/0xc00 [ 133.104847][ T630] netlink_rcv_skb+0x121/0x340 [ 133.105015][ T630] netlink_unicast+0x4aa/0x780 [ 133.105290][ T630] netlink_sendmsg+0x714/0xbd0 [ 133.105460][ T630] ____sys_sendmsg+0x3dd/0x890 [ 133.105626][ T630] ___sys_sendmsg+0xed/0x170 [ 133.105809][ T630] __sys_sendmsg+0x10b/0x1a0 [ 133.106084][ T630] do_syscall_64+0xc1/0xfd0 [ 133.106259][ T630] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 133.106466][ T630] [ 133.106559][ T630] Second to last potentially related work creation: [ 133.106875][ T630] kasan_save_stack+0x24/0x40 [ 133.107053][ T630] kasan_record_aux_stack+0x8c/0xa0 [ 133.107227][ T630] insert_work+0x34/0x230 [ 133.107357][ T630] __queue_work+0x5fd/0xab0 [ 133.107620][ T630] queue_work_on+0x84/0x90 [ 133.107794][ T630] fdb_create+0x1097/0x13f0 [bridge] [ 133.107984][ T630] br_fdb_update+0x30d/0x640 [bridge] [ 133.108184][ T630] br_handle_frame_finish+0xad5/0x1db0 [bridge] [ 133.108422][ T630] br_handle_frame+0x5fa/0xe70 [bridge] [ 133.108633][ T630] __netif_receive_skb_core.constprop.0+0x527/0x27f0 [ 133.108850][ T630] __netif_receive_skb_one_core+0xae/0x180 [ 133.109157][ T630] process_backlog+0x3b8/0x13d0 [ 133.109327][ T630] __napi_poll.constprop.0+0x9b/0x460 [ 133.109495][ T630] net_rx_action+0x49c/0xd30 [ 133.109661][ T630] handle_softirqs+0x215/0x610 [ 133.109936][ T630] irq_exit_rcu+0xab/0x100 [ 133.110110][ T630] sysvec_apic_timer_interrupt+0xa8/0xc0 [ 133.110291][ T630] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 133.110506][ T630] [ 133.110592][ T630] The buggy address belongs to the object at ffff88800587a000 [ 133.110592][ T630] which belongs to the cache kmalloc-8k of size 8192 [ 133.111090][ T630] The buggy address is located 1708 bytes inside of [ 133.111090][ T630] freed 8192-byte region [ffff88800587a000, ffff88800587c000) [ 133.111599][ T630] [ 133.111685][ T630] The buggy address belongs to the physical page: [ 133.111890][ T630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5878 [ 133.112281][ T630] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 133.112545][ T630] flags: 0x80000000000040(head|node=0|zone=1) [ 133.112767][ T630] page_type: f5(slab) [ 133.112907][ T630] raw: 0080000000000040 ffff8880010438c0 ffffea0000130210 ffff888001041228 [ 133.113319][ T630] raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000 [ 133.113623][ T630] head: 0080000000000040 ffff8880010438c0 ffffea0000130210 ffff888001041228 [ 133.114043][ T630] head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000 [ 133.114338][ T630] head: 0080000000000003 ffffea0000161e01 00000000ffffffff 00000000ffffffff [ 133.114743][ T630] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 133.115037][ T630] page dumped because: kasan: bad access detected [ 133.115244][ T630] [ 133.115331][ T630] Memory state around the buggy address: [ 133.115511][ T630] ffff88800587a580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 133.115762][ T630] ffff88800587a600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 133.116099][ T630] >ffff88800587a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 133.116341][ T630] ^ [ 133.116568][ T630] ffff88800587a700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 133.116913][ T630] ffff88800587a780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 133.117148][ T630] ================================================================== [ 133.118463][ T630] Disabling lock debugging due to kernel taint [ 133.118872][ T630] ------------[ cut here ]------------ [ 133.119154][ T630] refcount_t: underflow; use-after-free. [ 133.119482][ T630] WARNING: CPU: 0 PID: 630 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 133.119986][ T630] Modules linked in: act_gact cls_flower sch_ingress bridge stp llc vrf veth [ 133.120540][ T630] CPU: 0 UID: 0 PID: 630 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 133.121112][ T630] Tainted: [B]=BAD_PAGE [ 133.121343][ T630] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 133.121699][ T630] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 133.122075][ T630] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d c5 a8 e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff [ 133.123087][ T630] RSP: 0000:ffffc900013af1f0 EFLAGS: 00010286 [ 133.123455][ T630] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 133.123870][ T630] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 133.124273][ T630] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff52be134 [ 133.124709][ T630] R10: 0000000000000003 R11: ffffc900013aed80 R12: 0000000000000001 [ 133.125325][ T630] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 133.125927][ T630] FS: 00007fcd71624800(0000) GS:ffff88808b7f2000(0000) knlGS:0000000000000000 [ 133.126478][ T630] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 133.126825][ T630] CR2: 00007f1160b80d00 CR3: 000000001091d005 CR4: 0000000000772ef0 [ 133.127271][ T630] PKRU: 55555554 [ 133.127648][ T630] Call Trace: [ 133.127868][ T630] [ 133.128012][ T630] netdev_run_todo+0x5f0/0xc60 [ 133.128307][ T630] ? dev_ingress_queue_create+0x190/0x190 [ 133.128583][ T630] ? generic_xdp_install+0x410/0x410 [ 133.128852][ T630] ? kernfs_put.part.0+0x12d/0x480 [ 133.129120][ T630] ? unregister_netdevice_many+0x20/0x20 [ 133.129413][ T630] ? br_dev_delete+0x115/0x1a0 [bridge] [ 133.129753][ T630] rtnl_dellink+0x350/0xa30 [ 133.130018][ T630] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 133.130422][ T630] ? find_held_lock+0x2b/0x80 [ 133.130703][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.130974][ T630] ? find_held_lock+0x2b/0x80 [ 133.131240][ T630] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 133.131704][ T630] ? __lock_release+0x5d/0x170 [ 133.132149][ T630] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 133.132505][ T630] rtnetlink_rcv_msg+0x709/0xc00 [ 133.132783][ T630] ? rtnl_port_fill+0x850/0x850 [ 133.133048][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.133331][ T630] netlink_rcv_skb+0x121/0x340 [ 133.133600][ T630] ? rtnl_port_fill+0x850/0x850 [ 133.133879][ T630] ? netlink_ack+0xdd0/0xdd0 [ 133.134155][ T630] ? netlink_deliver_tap+0x13e/0x340 [ 133.134436][ T630] ? netlink_deliver_tap+0xc3/0x340 [ 133.134707][ T630] netlink_unicast+0x4aa/0x780 [ 133.135148][ T630] ? netlink_attachskb+0x810/0x810 [ 133.135432][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.135699][ T630] netlink_sendmsg+0x714/0xbd0 [ 133.135966][ T630] ? netlink_unicast+0x780/0x780 [ 133.136238][ T630] ? __import_iovec+0x230/0x3b0 [ 133.136519][ T630] ? netlink_unicast+0x780/0x780 [ 133.136790][ T630] ____sys_sendmsg+0x3dd/0x890 [ 133.137063][ T630] ? get_timestamp.constprop.0+0x380/0x380 [ 133.137407][ T630] ? __copy_msghdr+0x3c0/0x3c0 [ 133.137679][ T630] ___sys_sendmsg+0xed/0x170 [ 133.137943][ T630] ? kasan_record_aux_stack+0x8c/0xa0 [ 133.138223][ T630] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 133.138743][ T630] ? copy_msghdr_from_user+0x110/0x110 [ 133.139015][ T630] ? find_held_lock+0x2b/0x80 [ 133.139280][ T630] ? __lock_acquire+0x449/0x7e0 [ 133.139560][ T630] ? find_held_lock+0x2b/0x80 [ 133.139996][ T630] ? __virt_addr_valid+0x22a/0x450 [ 133.140273][ T630] ? __lock_release+0x5d/0x170 [ 133.140555][ T630] __sys_sendmsg+0x10b/0x1a0 [ 133.140831][ T630] ? __call_rcu_common.constprop.0+0x318/0x630 [ 133.141164][ T630] ? __sys_sendmsg_sock+0x20/0x20 [ 133.141618][ T630] ? rcu_is_watching+0x12/0xb0 [ 133.141890][ T630] do_syscall_64+0xc1/0xfd0 [ 133.142158][ T630] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 133.142507][ T630] RIP: 0033:0x7fcd717f21d7 [ 133.142972][ T630] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 133.144136][ T630] RSP: 002b:00007ffef87563f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.144573][ T630] RAX: ffffffffffffffda RBX: 00007ffef8756b20 RCX: 00007fcd717f21d7 [ 133.144979][ T630] RDX: 0000000000000000 RSI: 00007ffef8756460 RDI: 0000000000000005 [ 133.145403][ T630] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 133.145821][ T630] R10: 00007fcd716eef60 R11: 0000000000000246 R12: 0000000000000002 [ 133.146235][ T630] R13: 00000000690df577 R14: 0000000000499600 R15: 0000000000000000 [ 133.146838][ T630] [ 133.147049][ T630] irq event stamp: 46497 [ 133.147255][ T630] hardirqs last enabled at (46497): [] kasan_quarantine_put+0xf9/0x210 [ 133.147911][ T630] hardirqs last disabled at (46496): [] kasan_quarantine_put+0xac/0x210 [ 133.148393][ T630] softirqs last enabled at (45676): [] handle_softirqs+0x352/0x610 [ 133.148868][ T630] softirqs last disabled at (45669): [] irq_exit_rcu+0xab/0x100 [ 133.149538][ T630] ---[ end trace 0000000000000000 ]--- [ 133.158272][ T630] ip (630) used greatest stack depth: 24232 bytes left