[ 18.897659][ T299] br1: port 1(veth1) entered blocking state [ 18.898389][ T299] br1: port 1(veth1) entered disabled state [ 18.899251][ T299] veth1: entered allmulticast mode [ 18.904743][ T299] veth1: entered promiscuous mode [ 19.005300][ T134] br1: port 1(veth1) entered blocking state [ 19.005857][ T134] br1: port 1(veth1) entered forwarding state [ 19.115737][ T302] br1: port 2(veth2) entered blocking state [ 19.116207][ T302] br1: port 2(veth2) entered disabled state [ 19.116692][ T302] veth2: entered allmulticast mode [ 19.120523][ T302] veth2: entered promiscuous mode [ 19.243703][ T46] br1: port 2(veth2) entered blocking state [ 19.244201][ T46] br1: port 2(veth2) entered forwarding state [ 25.816825][ T323] GACT probability NOT on [ 49.344381][ T518] br1: port 2(veth2) entered disabled state [ 49.476455][ T519] veth2: left allmulticast mode [ 49.476837][ T519] veth2: left promiscuous mode [ 49.477335][ T519] br1: port 2(veth2) entered disabled state [ 49.597062][ T520] br1: port 1(veth1) entered disabled state [ 49.701740][ T521] veth1: left allmulticast mode [ 49.702088][ T521] veth1: left promiscuous mode [ 49.702570][ T521] br1: port 1(veth1) entered disabled state [ 49.854633][ T522] ================================================================== [ 49.854934][ T522] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 49.855193][ T522] Read of size 1 at addr ffff888008eca6ac by task ip/522 [ 49.855394][ T522] [ 49.855488][ T522] CPU: 3 UID: 0 PID: 522 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 49.855494][ T522] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 49.855497][ T522] Call Trace: [ 49.855502][ T522] [ 49.855503][ T522] dump_stack_lvl+0x82/0xc0 [ 49.855510][ T522] print_address_description.constprop.0+0x2c/0x3a0 [ 49.855520][ T522] ? kobject_put+0xbb/0xd0 [ 49.855524][ T522] print_report+0xb4/0x270 [ 49.855527][ T522] ? kobject_put+0xbb/0xd0 [ 49.855530][ T522] ? kasan_addr_to_slab+0x21/0x70 [ 49.855533][ T522] ? kobject_put+0xbb/0xd0 [ 49.855537][ T522] kasan_report+0xca/0x100 [ 49.855540][ T522] ? kobject_put+0xbb/0xd0 [ 49.855546][ T522] kobject_put+0xbb/0xd0 [ 49.855549][ T522] netdev_run_todo+0x5f0/0xc60 [ 49.855555][ T522] ? dev_ingress_queue_create+0x190/0x190 [ 49.855558][ T522] ? generic_xdp_install+0x410/0x410 [ 49.855560][ T522] ? kernfs_put.part.0+0x12d/0x480 [ 49.855569][ T522] ? unregister_netdevice_many+0x20/0x20 [ 49.855574][ T522] ? br_dev_delete+0x115/0x1a0 [bridge] [ 49.855614][ T522] rtnl_dellink+0x350/0xa30 [ 49.855619][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 49.855638][ T522] ? find_held_lock+0x2b/0x80 [ 49.855645][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.855651][ T522] ? find_held_lock+0x2b/0x80 [ 49.855654][ T522] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 49.855657][ T522] ? __lock_release+0x5d/0x170 [ 49.855661][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 49.855664][ T522] rtnetlink_rcv_msg+0x709/0xc00 [ 49.855668][ T522] ? rtnl_port_fill+0x850/0x850 [ 49.855670][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.855677][ T522] netlink_rcv_skb+0x121/0x340 [ 49.855681][ T522] ? rtnl_port_fill+0x850/0x850 [ 49.855685][ T522] ? netlink_ack+0xdd0/0xdd0 [ 49.855691][ T522] ? netlink_deliver_tap+0x13e/0x340 [ 49.855694][ T522] ? netlink_deliver_tap+0xc3/0x340 [ 49.855698][ T522] netlink_unicast+0x4aa/0x780 [ 49.855702][ T522] ? netlink_attachskb+0x810/0x810 [ 49.855705][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.855711][ T522] netlink_sendmsg+0x714/0xbd0 [ 49.855715][ T522] ? netlink_unicast+0x780/0x780 [ 49.855718][ T522] ? __import_iovec+0x230/0x3b0 [ 49.855726][ T522] ? netlink_unicast+0x780/0x780 [ 49.855729][ T522] ____sys_sendmsg+0x3dd/0x890 [ 49.855735][ T522] ? get_timestamp.constprop.0+0x380/0x380 [ 49.855738][ T522] ? __copy_msghdr+0x3c0/0x3c0 [ 49.855745][ T522] ___sys_sendmsg+0xed/0x170 [ 49.855748][ T522] ? kasan_record_aux_stack+0x8c/0xa0 [ 49.855750][ T522] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 49.855758][ T522] ? copy_msghdr_from_user+0x110/0x110 [ 49.855763][ T522] ? find_held_lock+0x2b/0x80 [ 49.855767][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.855773][ T522] ? find_held_lock+0x2b/0x80 [ 49.855776][ T522] ? __virt_addr_valid+0x22a/0x450 [ 49.855784][ T522] ? __lock_release+0x5d/0x170 [ 49.855790][ T522] __sys_sendmsg+0x10b/0x1a0 [ 49.855793][ T522] ? __call_rcu_common.constprop.0+0x318/0x630 [ 49.855797][ T522] ? __sys_sendmsg_sock+0x20/0x20 [ 49.855804][ T522] ? rcu_is_watching+0x12/0xb0 [ 49.855808][ T522] do_syscall_64+0xc1/0xfd0 [ 49.855814][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 49.855819][ T522] RIP: 0033:0x7f3dd96151d7 [ 49.855823][ T522] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 49.855826][ T522] RSP: 002b:00007ffce09defd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 49.855832][ T522] RAX: ffffffffffffffda RBX: 00007ffce09df700 RCX: 00007f3dd96151d7 [ 49.855835][ T522] RDX: 0000000000000000 RSI: 00007ffce09df040 RDI: 0000000000000005 [ 49.855836][ T522] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 49.855838][ T522] R10: 00007f3dd9511f60 R11: 0000000000000246 R12: 0000000000000002 [ 49.855840][ T522] R13: 00000000690df97f R14: 0000000000499600 R15: 0000000000000000 [ 49.855846][ T522] [ 49.855847][ T522] [ 49.868999][ T522] Allocated by task 297: [ 49.869140][ T522] kasan_save_stack+0x24/0x40 [ 49.869328][ T522] kasan_save_track+0x14/0x30 [ 49.869496][ T522] __kasan_kmalloc+0x7b/0x90 [ 49.869757][ T522] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 49.869921][ T522] alloc_netdev_mqs+0x7d/0x1370 [ 49.870086][ T522] rtnl_create_link+0xa9e/0xe20 [ 49.870253][ T522] rtnl_newlink_create+0x203/0x770 [ 49.870414][ T522] __rtnl_newlink+0x231/0xa30 [ 49.870575][ T522] rtnl_newlink+0x693/0xa60 [ 49.870750][ T522] rtnetlink_rcv_msg+0x709/0xc00 [ 49.870926][ T522] netlink_rcv_skb+0x121/0x340 [ 49.871097][ T522] netlink_unicast+0x4aa/0x780 [ 49.871274][ T522] netlink_sendmsg+0x714/0xbd0 [ 49.871435][ T522] ____sys_sendmsg+0x3dd/0x890 [ 49.871599][ T522] ___sys_sendmsg+0xed/0x170 [ 49.871888][ T522] __sys_sendmsg+0x10b/0x1a0 [ 49.872051][ T522] do_syscall_64+0xc1/0xfd0 [ 49.872225][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 49.872551][ T522] [ 49.872645][ T522] Freed by task 522: [ 49.872778][ T522] kasan_save_stack+0x24/0x40 [ 49.872950][ T522] kasan_save_track+0x14/0x30 [ 49.873120][ T522] __kasan_save_free_info+0x3b/0x60 [ 49.873384][ T522] __kasan_slab_free+0x3f/0x60 [ 49.873556][ T522] kfree+0x21d/0x540 [ 49.873677][ T522] device_release+0x9c/0x210 [ 49.873858][ T522] kobject_cleanup+0xfe/0x360 [ 49.874022][ T522] netdev_run_todo+0x81f/0xc60 [ 49.874185][ T522] rtnl_dellink+0x350/0xa30 [ 49.874345][ T522] rtnetlink_rcv_msg+0x709/0xc00 [ 49.874507][ T522] netlink_rcv_skb+0x121/0x340 [ 49.874689][ T522] netlink_unicast+0x4aa/0x780 [ 49.874851][ T522] netlink_sendmsg+0x714/0xbd0 [ 49.875011][ T522] ____sys_sendmsg+0x3dd/0x890 [ 49.875190][ T522] ___sys_sendmsg+0xed/0x170 [ 49.875466][ T522] __sys_sendmsg+0x10b/0x1a0 [ 49.875645][ T522] do_syscall_64+0xc1/0xfd0 [ 49.875820][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 49.876025][ T522] [ 49.876112][ T522] Last potentially related work creation: [ 49.876377][ T522] kasan_save_stack+0x24/0x40 [ 49.876559][ T522] kasan_record_aux_stack+0x8c/0xa0 [ 49.876750][ T522] insert_work+0x34/0x230 [ 49.876892][ T522] __queue_work+0x5fd/0xab0 [ 49.877070][ T522] queue_work_on+0x84/0x90 [ 49.877253][ T522] br_multicast_dev_del+0xeb/0x240 [bridge] [ 49.877516][ T522] br_dev_uninit+0x19/0x40 [bridge] [ 49.877721][ T522] unregister_netdevice_many_notify+0xa80/0x1b30 [ 49.877943][ T522] rtnl_dellink+0x344/0xa30 [ 49.878128][ T522] rtnetlink_rcv_msg+0x709/0xc00 [ 49.878309][ T522] netlink_rcv_skb+0x121/0x340 [ 49.878491][ T522] netlink_unicast+0x4aa/0x780 [ 49.878664][ T522] netlink_sendmsg+0x714/0xbd0 [ 49.878840][ T522] ____sys_sendmsg+0x3dd/0x890 [ 49.879022][ T522] ___sys_sendmsg+0xed/0x170 [ 49.879309][ T522] __sys_sendmsg+0x10b/0x1a0 [ 49.879488][ T522] do_syscall_64+0xc1/0xfd0 [ 49.879673][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 49.879891][ T522] [ 49.879980][ T522] Second to last potentially related work creation: [ 49.880187][ T522] kasan_save_stack+0x24/0x40 [ 49.880370][ T522] kasan_record_aux_stack+0x8c/0xa0 [ 49.880548][ T522] insert_work+0x34/0x230 [ 49.880682][ T522] __queue_work+0x5fd/0xab0 [ 49.880868][ T522] queue_work_on+0x84/0x90 [ 49.881056][ T522] fdb_delete+0x7bf/0xd50 [bridge] [ 49.881364][ T522] br_fdb_delete_by_port+0x1ce/0x260 [bridge] [ 49.881614][ T522] del_nbp+0x374/0xbe0 [bridge] [ 49.881817][ T522] br_del_if+0xa3/0x1e0 [bridge] [ 49.882023][ T522] do_set_master+0x144/0x4f0 [ 49.882202][ T522] do_setlink.constprop.0+0x9ee/0x2460 [ 49.882372][ T522] rtnl_newlink+0x693/0xa60 [ 49.882541][ T522] rtnetlink_rcv_msg+0x709/0xc00 [ 49.882709][ T522] netlink_rcv_skb+0x121/0x340 [ 49.882972][ T522] netlink_unicast+0x4aa/0x780 [ 49.883248][ T522] netlink_sendmsg+0x714/0xbd0 [ 49.883419][ T522] ____sys_sendmsg+0x3dd/0x890 [ 49.883598][ T522] ___sys_sendmsg+0xed/0x170 [ 49.883779][ T522] __sys_sendmsg+0x10b/0x1a0 [ 49.884060][ T522] do_syscall_64+0xc1/0xfd0 [ 49.884271][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 49.884497][ T522] [ 49.884596][ T522] The buggy address belongs to the object at ffff888008eca000 [ 49.884596][ T522] which belongs to the cache kmalloc-8k of size 8192 [ 49.885034][ T522] The buggy address is located 1708 bytes inside of [ 49.885034][ T522] freed 8192-byte region [ffff888008eca000, ffff888008ecc000) [ 49.885564][ T522] [ 49.885752][ T522] The buggy address belongs to the physical page: [ 49.885974][ T522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8ec8 [ 49.886290][ T522] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.886561][ T522] flags: 0x80000000000040(head|node=0|zone=1) [ 49.886888][ T522] page_type: f5(slab) [ 49.887032][ T522] raw: 0080000000000040 ffff8880010438c0 ffffea00002dfa10 ffff888001041228 [ 49.887454][ T522] raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000 [ 49.887869][ T522] head: 0080000000000040 ffff8880010438c0 ffffea00002dfa10 ffff888001041228 [ 49.888288][ T522] head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000 [ 49.888610][ T522] head: 0080000000000003 ffffea000023b201 00000000ffffffff 00000000ffffffff [ 49.888924][ T522] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 49.889234][ T522] page dumped because: kasan: bad access detected [ 49.889454][ T522] [ 49.889544][ T522] Memory state around the buggy address: [ 49.889719][ T522] ffff888008eca580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.889987][ T522] ffff888008eca600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.890328][ T522] >ffff888008eca680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.890683][ T522] ^ [ 49.890857][ T522] ffff888008eca700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.891094][ T522] ffff888008eca780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.891333][ T522] ================================================================== [ 49.891638][ T522] Disabling lock debugging due to kernel taint [ 49.891934][ T522] ------------[ cut here ]------------ [ 49.892086][ T522] refcount_t: underflow; use-after-free. [ 49.892274][ T522] WARNING: CPU: 3 PID: 522 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 49.892652][ T522] Modules linked in: act_gact cls_flower sch_ingress bridge stp llc vrf veth [ 49.892962][ T522] CPU: 3 UID: 0 PID: 522 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 49.893288][ T522] Tainted: [B]=BAD_PAGE [ 49.893508][ T522] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 49.893717][ T522] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 49.894023][ T522] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d 45 b5 e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff [ 49.894614][ T522] RSP: 0018:ffffc90000d3f1f0 EFLAGS: 00010286 [ 49.894833][ T522] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 49.895070][ T522] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 49.895313][ T522] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff6bbe134 [ 49.895550][ T522] R10: 0000000000000003 R11: ffffc90000d3ed80 R12: 0000000000000001 [ 49.895795][ T522] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 49.896038][ T522] FS: 00007f3dd9447800(0000) GS:ffff88807f172000(0000) knlGS:0000000000000000 [ 49.896317][ T522] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 49.896519][ T522] CR2: 00000000004e68d0 CR3: 0000000001df5002 CR4: 0000000000772ef0 [ 49.896958][ T522] PKRU: 55555554 [ 49.897080][ T522] Call Trace: [ 49.897209][ T522] [ 49.897294][ T522] netdev_run_todo+0x5f0/0xc60 [ 49.897645][ T522] ? dev_ingress_queue_create+0x190/0x190 [ 49.897816][ T522] ? generic_xdp_install+0x410/0x410 [ 49.897978][ T522] ? kernfs_put.part.0+0x12d/0x480 [ 49.898143][ T522] ? unregister_netdevice_many+0x20/0x20 [ 49.898400][ T522] ? br_dev_delete+0x115/0x1a0 [bridge] [ 49.898601][ T522] rtnl_dellink+0x350/0xa30 [ 49.898769][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 49.898992][ T522] ? find_held_lock+0x2b/0x80 [ 49.899156][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.899322][ T522] ? find_held_lock+0x2b/0x80 [ 49.899486][ T522] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 49.899644][ T522] ? __lock_release+0x5d/0x170 [ 49.899910][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 49.900114][ T522] rtnetlink_rcv_msg+0x709/0xc00 [ 49.900273][ T522] ? rtnl_port_fill+0x850/0x850 [ 49.900435][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.900700][ T522] netlink_rcv_skb+0x121/0x340 [ 49.900862][ T522] ? rtnl_port_fill+0x850/0x850 [ 49.901027][ T522] ? netlink_ack+0xdd0/0xdd0 [ 49.901190][ T522] ? netlink_deliver_tap+0x13e/0x340 [ 49.901448][ T522] ? netlink_deliver_tap+0xc3/0x340 [ 49.901610][ T522] netlink_unicast+0x4aa/0x780 [ 49.901790][ T522] ? netlink_attachskb+0x810/0x810 [ 49.901961][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.902221][ T522] netlink_sendmsg+0x714/0xbd0 [ 49.902386][ T522] ? netlink_unicast+0x780/0x780 [ 49.902546][ T522] ? __import_iovec+0x230/0x3b0 [ 49.902723][ T522] ? netlink_unicast+0x780/0x780 [ 49.902978][ T522] ____sys_sendmsg+0x3dd/0x890 [ 49.903146][ T522] ? get_timestamp.constprop.0+0x380/0x380 [ 49.903347][ T522] ? __copy_msghdr+0x3c0/0x3c0 [ 49.903516][ T522] ___sys_sendmsg+0xed/0x170 [ 49.903778][ T522] ? kasan_record_aux_stack+0x8c/0xa0 [ 49.903944][ T522] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 49.904153][ T522] ? copy_msghdr_from_user+0x110/0x110 [ 49.904405][ T522] ? find_held_lock+0x2b/0x80 [ 49.904577][ T522] ? __lock_acquire+0x449/0x7e0 [ 49.904753][ T522] ? find_held_lock+0x2b/0x80 [ 49.904914][ T522] ? __virt_addr_valid+0x22a/0x450 [ 49.905170][ T522] ? __lock_release+0x5d/0x170 [ 49.905342][ T522] __sys_sendmsg+0x10b/0x1a0 [ 49.905505][ T522] ? __call_rcu_common.constprop.0+0x318/0x630 [ 49.905721][ T522] ? __sys_sendmsg_sock+0x20/0x20 [ 49.905983][ T522] ? rcu_is_watching+0x12/0xb0 [ 49.906143][ T522] do_syscall_64+0xc1/0xfd0 [ 49.906312][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 49.906508][ T522] RIP: 0033:0x7f3dd96151d7 [ 49.906788][ T522] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 49.907468][ T522] RSP: 002b:00007ffce09defd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 49.907722][ T522] RAX: ffffffffffffffda RBX: 00007ffce09df700 RCX: 00007f3dd96151d7 [ 49.907968][ T522] RDX: 0000000000000000 RSI: 00007ffce09df040 RDI: 0000000000000005 [ 49.908319][ T522] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 49.908564][ T522] R10: 00007f3dd9511f60 R11: 0000000000000246 R12: 0000000000000002 [ 49.908815][ T522] R13: 00000000690df97f R14: 0000000000499600 R15: 0000000000000000 [ 49.909172][ T522] [ 49.909297][ T522] irq event stamp: 46767 [ 49.909423][ T522] hardirqs last enabled at (46767): [] irqentry_exit+0x3b/0x80 [ 49.909736][ T522] hardirqs last disabled at (46766): [] handle_softirqs+0x47f/0x610 [ 49.910025][ T522] softirqs last enabled at (46606): [] handle_softirqs+0x352/0x610 [ 49.910309][ T522] softirqs last disabled at (46599): [] irq_exit_rcu+0xab/0x100 [ 49.910688][ T522] ---[ end trace 0000000000000000 ]---