[ 23.324460][ T299] br1: port 1(veth1) entered blocking state
[ 23.325567][ T299] br1: port 1(veth1) entered disabled state
[ 23.326517][ T299] veth1: entered allmulticast mode
[ 23.333676][ T299] veth1: entered promiscuous mode
[ 23.506683][ T36] br1: port 1(veth1) entered blocking state
[ 23.507529][ T36] br1: port 1(veth1) entered forwarding state
[ 23.721214][ T302] br1: port 2(veth2) entered blocking state
[ 23.721963][ T302] br1: port 2(veth2) entered disabled state
[ 23.722700][ T302] veth2: entered allmulticast mode
[ 23.728524][ T302] veth2: entered promiscuous mode
[ 23.915020][ T38] br1: port 2(veth2) entered blocking state
[ 23.915787][ T38] br1: port 2(veth2) entered forwarding state
[ 30.940489][ T323] GACT probability NOT on
[ 58.461642][ T518] br1: port 2(veth2) entered disabled state
[ 58.592489][ T519] veth2: left allmulticast mode
[ 58.593083][ T519] veth2: left promiscuous mode
[ 58.593885][ T519] br1: port 2(veth2) entered disabled state
[ 58.750796][ T520] br1: port 1(veth1) entered disabled state
[ 58.865987][ T521] veth1: left allmulticast mode
[ 58.866409][ T521] veth1: left promiscuous mode
[ 58.867366][ T521] br1: port 1(veth1) entered disabled state
[ 59.100556][ T522] ==================================================================
[ 59.101098][ T522] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0
[ 59.101546][ T522] Read of size 1 at addr ffff88800c0026ac by task ip/522
[ 59.101937][ T522]
[ 59.102079][ T522] CPU: 1 UID: 0 PID: 522 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 59.102086][ T522] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 59.102090][ T522] Call Trace:
[ 59.102093][ T522]
[ 59.102096][ T522] dump_stack_lvl+0x82/0xc0
[ 59.102105][ T522] print_address_description.constprop.0+0x2c/0x3a0
[ 59.102115][ T522] ? kobject_put+0xbb/0xd0
[ 59.102121][ T522] print_report+0xb4/0x270
[ 59.102126][ T522] ? kobject_put+0xbb/0xd0
[ 59.102130][ T522] ? kasan_addr_to_slab+0x21/0x70
[ 59.102135][ T522] ? kobject_put+0xbb/0xd0
[ 59.102139][ T522] kasan_report+0xca/0x100
[ 59.102145][ T522] ? kobject_put+0xbb/0xd0
[ 59.102154][ T522] kobject_put+0xbb/0xd0
[ 59.102160][ T522] netdev_run_todo+0x5f0/0xc60
[ 59.102168][ T522] ? dev_ingress_queue_create+0x190/0x190
[ 59.102173][ T522] ? generic_xdp_install+0x410/0x410
[ 59.102176][ T522] ? kernfs_put.part.0+0x12d/0x480
[ 59.102185][ T522] ? unregister_netdevice_many+0x20/0x20
[ 59.102195][ T522] ? br_dev_delete+0x115/0x1a0 [bridge]
[ 59.102250][ T522] rtnl_dellink+0x350/0xa30
[ 59.102256][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 59.102289][ T522] ? find_held_lock+0x2b/0x80
[ 59.102299][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.102308][ T522] ? find_held_lock+0x2b/0x80
[ 59.102313][ T522] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 59.102317][ T522] ? __lock_release+0x5d/0x170
[ 59.102325][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 59.102330][ T522] rtnetlink_rcv_msg+0x709/0xc00
[ 59.102335][ T522] ? rtnl_port_fill+0x850/0x850
[ 59.102340][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.102353][ T522] netlink_rcv_skb+0x121/0x340
[ 59.102358][ T522] ? rtnl_port_fill+0x850/0x850
[ 59.102363][ T522] ? netlink_ack+0xdd0/0xdd0
[ 59.102373][ T522] ? netlink_deliver_tap+0x13e/0x340
[ 59.102377][ T522] ? netlink_deliver_tap+0xc3/0x340
[ 59.102383][ T522] netlink_unicast+0x4aa/0x780
[ 59.102390][ T522] ? netlink_attachskb+0x810/0x810
[ 59.102396][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.102404][ T522] netlink_sendmsg+0x714/0xbd0
[ 59.102412][ T522] ? netlink_unicast+0x780/0x780
[ 59.102419][ T522] ? __import_iovec+0x230/0x3b0
[ 59.102426][ T522] ? netlink_unicast+0x780/0x780
[ 59.102431][ T522] ____sys_sendmsg+0x3dd/0x890
[ 59.102441][ T522] ? get_timestamp.constprop.0+0x380/0x380
[ 59.102446][ T522] ? __copy_msghdr+0x3c0/0x3c0
[ 59.102457][ T522] ___sys_sendmsg+0xed/0x170
[ 59.102463][ T522] ? kasan_record_aux_stack+0x8c/0xa0
[ 59.102468][ T522] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 59.102478][ T522] ? copy_msghdr_from_user+0x110/0x110
[ 59.102487][ T522] ? find_held_lock+0x2b/0x80
[ 59.102495][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.102503][ T522] ? find_held_lock+0x2b/0x80
[ 59.102508][ T522] ? __virt_addr_valid+0x22a/0x450
[ 59.102516][ T522] ? __lock_release+0x5d/0x170
[ 59.102526][ T522] __sys_sendmsg+0x10b/0x1a0
[ 59.102530][ T522] ? __call_rcu_common.constprop.0+0x318/0x630
[ 59.102535][ T522] ? __sys_sendmsg_sock+0x20/0x20
[ 59.102549][ T522] ? rcu_is_watching+0x12/0xb0
[ 59.102555][ T522] do_syscall_64+0xc1/0xfd0
[ 59.102564][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 59.102571][ T522] RIP: 0033:0x7feb4dec11d7
[ 59.102577][ T522] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 59.102581][ T522] RSP: 002b:00007fff1be4f168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 59.102588][ T522] RAX: ffffffffffffffda RBX: 00007fff1be4f890 RCX: 00007feb4dec11d7
[ 59.102591][ T522] RDX: 0000000000000000 RSI: 00007fff1be4f1d0 RDI: 0000000000000005
[ 59.102594][ T522] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078
[ 59.102597][ T522] R10: 00007feb4ddbdf60 R11: 0000000000000246 R12: 0000000000000002
[ 59.102599][ T522] R13: 00000000690dee14 R14: 0000000000499600 R15: 0000000000000000
[ 59.102609][ T522]
[ 59.102611][ T522]
[ 59.123332][ T522] Allocated by task 296:
[ 59.123548][ T522] kasan_save_stack+0x24/0x40
[ 59.123846][ T522] kasan_save_track+0x14/0x30
[ 59.124139][ T522] __kasan_kmalloc+0x7b/0x90
[ 59.124424][ T522] __kvmalloc_node_noprof+0x2e5/0x8e0
[ 59.124750][ T522] alloc_netdev_mqs+0x7d/0x1370
[ 59.125052][ T522] rtnl_create_link+0xa9e/0xe20
[ 59.125491][ T522] rtnl_newlink_create+0x203/0x770
[ 59.125716][ T522] __rtnl_newlink+0x231/0xa30
[ 59.125985][ T522] rtnl_newlink+0x693/0xa60
[ 59.126191][ T522] rtnetlink_rcv_msg+0x709/0xc00
[ 59.126629][ T522] netlink_rcv_skb+0x121/0x340
[ 59.126914][ T522] netlink_unicast+0x4aa/0x780
[ 59.127157][ T522] netlink_sendmsg+0x714/0xbd0
[ 59.127431][ T522] ____sys_sendmsg+0x3dd/0x890
[ 59.127923][ T522] ___sys_sendmsg+0xed/0x170
[ 59.128188][ T522] __sys_sendmsg+0x10b/0x1a0
[ 59.128457][ T522] do_syscall_64+0xc1/0xfd0
[ 59.128738][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 59.129251][ T522]
[ 59.129393][ T522] Freed by task 522:
[ 59.129594][ T522] kasan_save_stack+0x24/0x40
[ 59.129861][ T522] kasan_save_track+0x14/0x30
[ 59.130307][ T522] __kasan_save_free_info+0x3b/0x60
[ 59.130580][ T522] __kasan_slab_free+0x3f/0x60
[ 59.130853][ T522] kfree+0x21d/0x540
[ 59.131074][ T522] device_release+0x9c/0x210
[ 59.131357][ T522] kobject_cleanup+0xfe/0x360
[ 59.131782][ T522] netdev_run_todo+0x81f/0xc60
[ 59.132076][ T522] rtnl_dellink+0x350/0xa30
[ 59.132361][ T522] rtnetlink_rcv_msg+0x709/0xc00
[ 59.132663][ T522] netlink_rcv_skb+0x121/0x340
[ 59.133141][ T522] netlink_unicast+0x4aa/0x780
[ 59.133421][ T522] netlink_sendmsg+0x714/0xbd0
[ 59.133670][ T522] ____sys_sendmsg+0x3dd/0x890
[ 59.133954][ T522] ___sys_sendmsg+0xed/0x170
[ 59.134243][ T522] __sys_sendmsg+0x10b/0x1a0
[ 59.134544][ T522] do_syscall_64+0xc1/0xfd0
[ 59.134822][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 59.135387][ T522]
[ 59.135551][ T522] Last potentially related work creation:
[ 59.135824][ T522] kasan_save_stack+0x24/0x40
[ 59.136113][ T522] kasan_record_aux_stack+0x8c/0xa0
[ 59.136378][ T522] insert_work+0x34/0x230
[ 59.136750][ T522] __queue_work+0x5fd/0xab0
[ 59.137046][ T522] queue_work_on+0x84/0x90
[ 59.137322][ T522] br_multicast_dev_del+0xeb/0x240 [bridge]
[ 59.137724][ T522] br_dev_uninit+0x19/0x40 [bridge]
[ 59.138249][ T522] unregister_netdevice_many_notify+0xa80/0x1b30
[ 59.138614][ T522] rtnl_dellink+0x344/0xa30
[ 59.138877][ T522] rtnetlink_rcv_msg+0x709/0xc00
[ 59.139157][ T522] netlink_rcv_skb+0x121/0x340
[ 59.139621][ T522] netlink_unicast+0x4aa/0x780
[ 59.139902][ T522] netlink_sendmsg+0x714/0xbd0
[ 59.140182][ T522] ____sys_sendmsg+0x3dd/0x890
[ 59.140448][ T522] ___sys_sendmsg+0xed/0x170
[ 59.140914][ T522] __sys_sendmsg+0x10b/0x1a0
[ 59.141207][ T522] do_syscall_64+0xc1/0xfd0
[ 59.141463][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 59.141975][ T522]
[ 59.142122][ T522] Second to last potentially related work creation:
[ 59.142452][ T522] kasan_save_stack+0x24/0x40
[ 59.142747][ T522] kasan_record_aux_stack+0x8c/0xa0
[ 59.143027][ T522] insert_work+0x34/0x230
[ 59.143454][ T522] __queue_work+0x5fd/0xab0
[ 59.143744][ T522] queue_work_on+0x84/0x90
[ 59.144017][ T522] fdb_delete+0x7bf/0xd50 [bridge]
[ 59.144360][ T522] br_fdb_delete_by_port+0x1ce/0x260 [bridge]
[ 59.144966][ T522] del_nbp+0x374/0xbe0 [bridge]
[ 59.145310][ T522] br_del_if+0xa3/0x1e0 [bridge]
[ 59.145639][ T522] do_set_master+0x144/0x4f0
[ 59.145949][ T522] do_setlink.constprop.0+0x9ee/0x2460
[ 59.146233][ T522] rtnl_newlink+0x693/0xa60
[ 59.146513][ T522] rtnetlink_rcv_msg+0x709/0xc00
[ 59.146791][ T522] netlink_rcv_skb+0x121/0x340
[ 59.147087][ T522] netlink_unicast+0x4aa/0x780
[ 59.147545][ T522] netlink_sendmsg+0x714/0xbd0
[ 59.147819][ T522] ____sys_sendmsg+0x3dd/0x890
[ 59.148111][ T522] ___sys_sendmsg+0xed/0x170
[ 59.148387][ T522] __sys_sendmsg+0x10b/0x1a0
[ 59.148842][ T522] do_syscall_64+0xc1/0xfd0
[ 59.149117][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 59.149454][ T522]
[ 59.149587][ T522] The buggy address belongs to the object at ffff88800c002000
[ 59.149587][ T522] which belongs to the cache kmalloc-8k of size 8192
[ 59.150380][ T522] The buggy address is located 1708 bytes inside of
[ 59.150380][ T522] freed 8192-byte region [ffff88800c002000, ffff88800c004000)
[ 59.151194][ T522]
[ 59.151334][ T522] The buggy address belongs to the physical page:
[ 59.151681][ T522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xc000
[ 59.152322][ T522] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 59.152756][ T522] flags: 0x80000000000040(head|node=0|zone=1)
[ 59.153097][ T522] page_type: f5(slab)
[ 59.153312][ T522] raw: 0080000000000040 ffff8880010438c0 ffffea00002e8410 ffff888001041228
[ 59.153976][ T522] raw: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000
[ 59.154593][ T522] head: 0080000000000040 ffff8880010438c0 ffffea00002e8410 ffff888001041228
[ 59.155199][ T522] head: 0000000000000000 0000000000010001 00000000f5000000 0000000000000000
[ 59.155729][ T522] head: 0080000000000003 ffffea0000300001 00000000ffffffff 00000000ffffffff
[ 59.156303][ T522] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 59.156755][ T522] page dumped because: kasan: bad access detected
[ 59.157059][ T522]
[ 59.157195][ T522] Memory state around the buggy address:
[ 59.157625][ T522] ffff88800c002580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.157988][ T522] ffff88800c002600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.158405][ T522] >ffff88800c002680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.158927][ T522] ^
[ 59.159193][ T522] ffff88800c002700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.159590][ T522] ffff88800c002780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 59.160186][ T522] ==================================================================
[ 59.161666][ T522] Disabling lock debugging due to kernel taint
[ 59.162062][ T522] ------------[ cut here ]------------
[ 59.162392][ T522] refcount_t: underflow; use-after-free.
[ 59.162739][ T522] WARNING: CPU: 1 PID: 522 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0
[ 59.163271][ T522] Modules linked in: act_gact cls_flower sch_ingress bridge stp llc vrf veth
[ 59.163775][ T522] CPU: 1 UID: 0 PID: 522 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 59.164450][ T522] Tainted: [B]=BAD_PAGE
[ 59.164670][ T522] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 59.165131][ T522] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0
[ 59.165495][ T522] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d 45 96 e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff
[ 59.166584][ T522] RSP: 0018:ffffc90000c171f0 EFLAGS: 00010286
[ 59.167054][ T522] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 59.167454][ T522] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001
[ 59.167862][ T522] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff2dbe134
[ 59.168397][ T522] R10: 0000000000000003 R11: ffffc90000c16d80 R12: 0000000000000001
[ 59.168810][ T522] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100
[ 59.169364][ T522] FS: 00007feb4dcf3800(0000) GS:ffff88809e072000(0000) knlGS:0000000000000000
[ 59.169854][ T522] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 59.170420][ T522] CR2: 000055e41a2b7990 CR3: 000000000c3a7004 CR4: 0000000000772ef0
[ 59.170814][ T522] PKRU: 55555554
[ 59.171153][ T522] Call Trace:
[ 59.171340][ T522]
[ 59.171471][ T522] netdev_run_todo+0x5f0/0xc60
[ 59.171770][ T522] ? dev_ingress_queue_create+0x190/0x190
[ 59.172231][ T522] ? generic_xdp_install+0x410/0x410
[ 59.172508][ T522] ? kernfs_put.part.0+0x12d/0x480
[ 59.172850][ T522] ? unregister_netdevice_many+0x20/0x20
[ 59.173240][ T522] ? br_dev_delete+0x115/0x1a0 [bridge]
[ 59.173563][ T522] rtnl_dellink+0x350/0xa30
[ 59.174038][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 59.174463][ T522] ? find_held_lock+0x2b/0x80
[ 59.174824][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.175389][ T522] ? find_held_lock+0x2b/0x80
[ 59.175685][ T522] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 59.176059][ T522] ? __lock_release+0x5d/0x170
[ 59.176364][ T522] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 59.176771][ T522] rtnetlink_rcv_msg+0x709/0xc00
[ 59.177160][ T522] ? rtnl_port_fill+0x850/0x850
[ 59.177486][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.177780][ T522] netlink_rcv_skb+0x121/0x340
[ 59.178169][ T522] ? rtnl_port_fill+0x850/0x850
[ 59.178458][ T522] ? netlink_ack+0xdd0/0xdd0
[ 59.178774][ T522] ? netlink_deliver_tap+0x13e/0x340
[ 59.179277][ T522] ? netlink_deliver_tap+0xc3/0x340
[ 59.179629][ T522] netlink_unicast+0x4aa/0x780
[ 59.180064][ T522] ? netlink_attachskb+0x810/0x810
[ 59.180473][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.180788][ T522] netlink_sendmsg+0x714/0xbd0
[ 59.181299][ T522] ? netlink_unicast+0x780/0x780
[ 59.181588][ T522] ? __import_iovec+0x230/0x3b0
[ 59.182054][ T522] ? netlink_unicast+0x780/0x780
[ 59.182383][ T522] ____sys_sendmsg+0x3dd/0x890
[ 59.182713][ T522] ? get_timestamp.constprop.0+0x380/0x380
[ 59.183242][ T522] ? __copy_msghdr+0x3c0/0x3c0
[ 59.183597][ T522] ___sys_sendmsg+0xed/0x170
[ 59.184051][ T522] ? kasan_record_aux_stack+0x8c/0xa0
[ 59.184337][ T522] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 59.184726][ T522] ? copy_msghdr_from_user+0x110/0x110
[ 59.185171][ T522] ? find_held_lock+0x2b/0x80
[ 59.185474][ T522] ? __lock_acquire+0x449/0x7e0
[ 59.185766][ T522] ? find_held_lock+0x2b/0x80
[ 59.186227][ T522] ? __virt_addr_valid+0x22a/0x450
[ 59.186540][ T522] ? __lock_release+0x5d/0x170
[ 59.187036][ T522] __sys_sendmsg+0x10b/0x1a0
[ 59.187329][ T522] ? __call_rcu_common.constprop.0+0x318/0x630
[ 59.187729][ T522] ? __sys_sendmsg_sock+0x20/0x20
[ 59.188190][ T522] ? rcu_is_watching+0x12/0xb0
[ 59.188520][ T522] do_syscall_64+0xc1/0xfd0
[ 59.188837][ T522] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 59.189355][ T522] RIP: 0033:0x7feb4dec11d7
[ 59.189697][ T522] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 59.190875][ T522] RSP: 002b:00007fff1be4f168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 59.191528][ T522] RAX: ffffffffffffffda RBX: 00007fff1be4f890 RCX: 00007feb4dec11d7
[ 59.192176][ T522] RDX: 0000000000000000 RSI: 00007fff1be4f1d0 RDI: 0000000000000005
[ 59.192617][ T522] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078
[ 59.193191][ T522] R10: 00007feb4ddbdf60 R11: 0000000000000246 R12: 0000000000000002
[ 59.193697][ T522] R13: 00000000690dee14 R14: 0000000000499600 R15: 0000000000000000
[ 59.194310][ T522]
[ 59.194615][ T522] irq event stamp: 49615
[ 59.195044][ T522] hardirqs last enabled at (49615): [] finish_task_switch.isra.0+0x245/0x960
[ 59.195653][ T522] hardirqs last disabled at (49614): [] __schedule+0x94a/0x1b10
[ 59.196330][ T522] softirqs last enabled at (49328): [] handle_softirqs+0x352/0x610
[ 59.197075][ T522] softirqs last disabled at (49215): [] irq_exit_rcu+0xab/0x100
[ 59.197661][ T522] ---[ end trace 0000000000000000 ]---