[ 21.749014][ T306] ip (306) used greatest stack depth: 24736 bytes left [ 22.006991][ T308] eth1: renamed from tmp [ 71.650080][ T724] ip (724) used greatest stack depth: 24320 bytes left [ 76.801368][ T758] eth1: renamed from tmp [ 127.249515][ T1176] ip (1176) used greatest stack depth: 24056 bytes left [ 132.673104][ T1210] eth1: renamed from tmp [ 190.139518][ T1674] eth1: renamed from tmp [ 247.687265][ T2140] eth1: renamed from tmp [ 422.783184][ T3370] eth1: renamed from tmp [ 452.395580][ T3635] eth2: renamed from tmp [ 592.220377][ T4548] eth1: renamed from tmp [ 772.854256][ T6243] eth1: renamed from tmp [ 862.856104][ T7094] eth1: renamed from tmp [ 885.186594][ T7279] eth1: renamed from tmp [ 914.276260][ T7523] eth1: renamed from tmp [ 933.708366][ T7651] eth1: renamed from tmp [ 951.211576][ T7779] eth1: renamed from tmp [ 970.779863][ T7914] eth1: renamed from tmp [ 992.983018][ T8049] eth1: renamed from tmp [ 1012.927701][ T8184] eth1: renamed from tmp [ 1033.753896][ T8320] eth1: renamed from tmp [ 1054.108062][ T8455] eth1: renamed from tmp [ 1074.020103][ T8590] eth1: renamed from tmp [ 1093.571022][ T8724] eth1: renamed from tmp [ 1113.178677][ T8858] eth1: renamed from tmp [ 1132.511098][ T8993] eth1: renamed from tmp [ 1152.302541][ T9128] eth1: renamed from tmp [ 1162.397642][ T9169] nettest (9169) used greatest stack depth: 23168 bytes left [ 1172.295270][ T9263] eth1: renamed from tmp [ 1192.231478][ T9398] eth1: renamed from tmp [ 1212.192223][ T9533] eth1: renamed from tmp [ 1231.786090][ T9668] eth1: renamed from tmp [ 1250.979708][ T9804] eth1: renamed from tmp [ 1270.808205][ T9939] eth1: renamed from tmp [ 1290.190300][T10074] eth1: renamed from tmp [ 1309.436354][T10209] eth1: renamed from tmp [ 1328.834939][T10345] eth1: renamed from tmp [ 1348.240193][T10480] eth1: renamed from tmp [ 1368.135132][T10616] eth1: renamed from tmp [ 1387.691026][T10750] eth1: renamed from tmp [ 1407.317696][T10884] eth1: renamed from tmp [ 1426.490138][T11019] eth1: renamed from tmp [ 1445.482285][T11154] eth1: renamed from tmp [ 1464.896347][T11289] eth1: renamed from tmp [ 1484.120212][T11424] eth1: renamed from tmp [ 1503.085216][T11559] eth1: renamed from tmp [ 1522.281114][T11695] eth1: renamed from tmp [ 1541.769063][T11830] eth1: renamed from tmp [ 1564.746716][T11993] eth1: renamed from tmp [ 1587.757135][T12156] eth1: renamed from tmp [ 1610.895002][T12319] eth1: renamed from tmp [ 1634.075228][T12482] eth1: renamed from tmp [ 1657.268155][T12646] eth1: renamed from tmp [ 1680.457326][T12809] eth1: renamed from tmp [ 1703.465665][T12971] eth1: renamed from tmp [ 1714.503209][ C2] ================================================================== [ 1714.503765][ C2] BUG: KASAN: slab-use-after-free in __udp_enqueue_schedule_skb+0x179/0xe60 [ 1714.504180][ C2] Read of size 4 at addr ffff888014506348 by task nettest/13047 [ 1714.504478][ C2] [ 1714.504581][ C2] CPU: 2 UID: 0 PID: 13047 Comm: nettest Not tainted 6.17.0-rc6-virtme #1 PREEMPT(full) [ 1714.504586][ C2] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 1714.504588][ C2] Call Trace: [ 1714.504590][ C2] [ 1714.504592][ C2] dump_stack_lvl+0x82/0xc0 [ 1714.504600][ C2] print_address_description.constprop.0+0x2c/0x3a0 [ 1714.504609][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60 [ 1714.504614][ C2] print_report+0xb4/0x270 [ 1714.504617][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60 [ 1714.504621][ C2] ? kasan_addr_to_slab+0x21/0x70 [ 1714.504624][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60 [ 1714.504627][ C2] kasan_report+0xca/0x100 [ 1714.504631][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60 [ 1714.504636][ C2] kasan_check_range+0x39/0x1b0 [ 1714.504640][ C2] __udp_enqueue_schedule_skb+0x179/0xe60 [ 1714.504644][ C2] ? sk_filter_trim_cap+0x2c0/0xa40 [ 1714.504651][ C2] ? fib_lookup.constprop.0+0x370/0x370 [ 1714.504654][ C2] ? udp_sendmsg+0x21f0/0x21f0 [ 1714.504658][ C2] ? udp6_lib_lookup2+0x457/0x4d0 [ 1714.504664][ C2] ? __xfrm_policy_check2.constprop.0+0x3d/0x680 [ 1714.504669][ C2] udpv6_queue_rcv_one_skb+0xa35/0x14f0 [ 1714.504672][ C2] ? __udp6_lib_lookup+0x64e/0xa40 [ 1714.504675][ C2] ? __xfrm_policy_check2.constprop.0+0x680/0x680 [ 1714.504681][ C2] udp6_unicast_rcv_skb+0x10b/0x2c0 [ 1714.504685][ C2] __udp6_lib_rcv+0xa85/0x1650 [ 1714.504691][ C2] ? udpv6_err+0xe0/0xe0 [ 1714.504693][ C2] ? is_bpf_text_address+0x67/0x120 [ 1714.504702][ C2] ip6_protocol_deliver_rcu+0x113/0x1340 [ 1714.504711][ C2] ? rcu_is_watching+0x12/0xb0 [ 1714.504720][ C2] ip6_input_finish+0x175/0x410 [ 1714.504724][ C2] ip6_input+0x111/0x4f0 [ 1714.504727][ C2] ? ip6_input_finish+0x410/0x410 [ 1714.504732][ C2] ? ip6_rcv_core+0x9e8/0x1930 [ 1714.504738][ C2] ipv6_rcv+0x3e1/0x5d0 [ 1714.504741][ C2] ? __xfrm_policy_check2.constprop.0+0x540/0x540 [ 1714.504745][ C2] ? rcu_read_lock_any_held+0x3f/0xa0 [ 1714.504748][ C2] ? validate_chain+0x15e/0x4d0 [ 1714.504756][ C2] ? __lock_acquire+0x449/0x7e0 [ 1714.504760][ C2] ? __xfrm_policy_check2.constprop.0+0x540/0x540 [ 1714.504763][ C2] ? process_backlog+0x381/0x13e0 [ 1714.504770][ C2] __netif_receive_skb_one_core+0x108/0x180 [ 1714.504774][ C2] ? __netif_receive_skb_list_core+0x980/0x980 [ 1714.504778][ C2] ? rcu_is_watching+0x12/0xb0 [ 1714.504781][ C2] ? lock_acquire+0x104/0x160 [ 1714.504784][ C2] ? process_backlog+0x381/0x13e0 [ 1714.504788][ C2] process_backlog+0x3c1/0x13e0 [ 1714.504794][ C2] __napi_poll.constprop.0+0x9f/0x460 [ 1714.504799][ C2] net_rx_action+0x54f/0xda0 [ 1714.504805][ C2] ? __napi_poll.constprop.0+0x460/0x460 [ 1714.504809][ C2] ? sched_ttwu_pending+0x290/0x530 [ 1714.504814][ C2] ? __lock_release+0x5d/0x170 [ 1714.504818][ C2] ? do_raw_spin_unlock+0x58/0x220 [ 1714.504822][ C2] ? _raw_spin_unlock+0x2d/0x50 [ 1714.504830][ C2] ? ttwu_do_activate+0x8c0/0x8c0 [ 1714.504835][ C2] handle_softirqs+0x215/0x610 [ 1714.504841][ C2] ? __dev_queue_xmit+0x97e/0x18e0 [ 1714.504845][ C2] do_softirq+0xad/0xe0 [ 1714.504848][ C2] [ 1714.504849][ C2] [ 1714.504850][ C2] __local_bh_enable_ip+0x101/0x120 [ 1714.504853][ C2] ? __dev_queue_xmit+0x97e/0x18e0 [ 1714.504856][ C2] __dev_queue_xmit+0x993/0x18e0 [ 1714.504860][ C2] ? __lock_acquire+0x449/0x7e0 [ 1714.504865][ C2] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 1714.504868][ C2] ? ip6_finish_output+0x5b8/0xc70 [ 1714.504872][ C2] ? neigh_hh_output+0x33a/0x520 [ 1714.504876][ C2] ? lockdep_hardirqs_on+0x7c/0x110 [ 1714.504880][ C2] ? neigh_hh_output+0x33a/0x520 [ 1714.504887][ C2] ip6_finish_output+0x5b8/0xc70 [ 1714.504891][ C2] ip6_output+0x242/0x810 [ 1714.504895][ C2] ? ip6_finish_output+0xc70/0xc70 [ 1714.504899][ C2] ? __ip6_local_out+0x314/0x5a0 [ 1714.504906][ C2] ip6_send_skb+0xef/0x350 [ 1714.504910][ C2] udp_v6_send_skb+0x85a/0x1dc0 [ 1714.504913][ C2] ? jhash.constprop.0+0x101/0x150 [ 1714.504918][ C2] udpv6_sendmsg+0x1b04/0x24a0 [ 1714.504921][ C2] ? find_held_lock+0x2b/0x80 [ 1714.504924][ C2] ? ip_select_ident_segs+0x400/0x400 [ 1714.504931][ C2] ? udpv6_splice_eof+0x170/0x170 [ 1714.504937][ C2] ? rcu_read_lock_any_held+0x3f/0xa0 [ 1714.504940][ C2] ? validate_chain+0x15e/0x4d0 [ 1714.504949][ C2] ? __might_fault+0x117/0x170 [ 1714.504956][ C2] ? __lock_release+0x5d/0x170 [ 1714.504961][ C2] ? __sys_sendto+0x24b/0x380 [ 1714.504967][ C2] __sys_sendto+0x24b/0x380 [ 1714.504970][ C2] ? __ia32_sys_getpeername+0xb0/0xb0 [ 1714.504979][ C2] ? __sys_recvmsg_sock+0x20/0x20 [ 1714.504986][ C2] __x64_sys_sendto+0xe0/0x1b0 [ 1714.504990][ C2] ? do_syscall_64+0x85/0x300 [ 1714.504993][ C2] ? lockdep_hardirqs_on+0x7c/0x110 [ 1714.504996][ C2] do_syscall_64+0xc1/0x300 [ 1714.504999][ C2] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 1714.505004][ C2] RIP: 0033:0x7f872e7db28a [ 1714.505008][ C2] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89 [ 1714.505010][ C2] RSP: 002b:00007ffdeb5fc558 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1714.505015][ C2] RAX: ffffffffffffffda RBX: 000000000000001c RCX: 00007f872e7db28a [ 1714.505017][ C2] RDX: 000000000000000c RSI: 0000000000406752 RDI: 0000000000000005 [ 1714.505019][ C2] RBP: 0000000000000005 R08: 00007ffdeb5fcae0 R09: 000000000000001c [ 1714.505020][ C2] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdeb5fcae0 [ 1714.505022][ C2] R13: 000000000000001c R14: 0000000000000002 R15: 0000000000000002 [ 1714.505028][ C2] [ 1714.505029][ C2] [ 1714.525708][ C2] Allocated by task 13012: [ 1714.526016][ C2] kasan_save_stack+0x24/0x40 [ 1714.526361][ C2] kasan_save_track+0x14/0x30 [ 1714.526686][ C2] __kasan_kmalloc+0x7b/0x90 [ 1714.527012][ C2] __kmalloc_noprof+0x1d4/0x460 [ 1714.527341][ C2] udpv6_init_sock+0x237/0x410 [ 1714.527642][ C2] inet6_create.part.0+0x989/0x10b0 [ 1714.527850][ C2] __sock_create+0x235/0x690 [ 1714.528075][ C2] __sys_socket+0x116/0x1d0 [ 1714.528275][ C2] __x64_sys_socket+0x72/0xb0 [ 1714.528470][ C2] do_syscall_64+0xc1/0x300 [ 1714.528683][ C2] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 1714.528929][ C2] [ 1714.529029][ C2] Freed by task 13012: [ 1714.529178][ C2] kasan_save_stack+0x24/0x40 [ 1714.529382][ C2] kasan_save_track+0x14/0x30 [ 1714.529590][ C2] kasan_save_free_info+0x3b/0x60 [ 1714.529798][ C2] __kasan_slab_free+0x3b/0x50 [ 1714.529993][ C2] kfree+0x144/0x320 [ 1714.530140][ C2] sk_common_release+0x60/0x300 [ 1714.530335][ C2] inet_release+0x100/0x220 [ 1714.530531][ C2] __sock_release+0xa0/0x250 [ 1714.530788][ C2] sock_close+0x18/0x20 [ 1714.531019][ C2] __fput+0x35c/0xa70 [ 1714.531245][ C2] fput_close_sync+0xdd/0x1b0 [ 1714.531550][ C2] __x64_sys_close+0x7d/0xd0 [ 1714.531855][ C2] do_syscall_64+0xc1/0x300 [ 1714.532173][ C2] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 1714.532572][ C2] [ 1714.532724][ C2] The buggy address belongs to the object at ffff888014506340 [ 1714.532724][ C2] which belongs to the cache kmalloc-64 of size 64 [ 1714.533451][ C2] The buggy address is located 8 bytes inside of [ 1714.533451][ C2] freed 64-byte region [ffff888014506340, ffff888014506380) [ 1714.534420][ C2] [ 1714.534563][ C2] The buggy address belongs to the physical page: [ 1714.534927][ C2] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14506 [ 1714.535682][ C2] flags: 0x80000000000000(node=0|zone=1) [ 1714.535992][ C2] page_type: f5(slab) [ 1714.536225][ C2] raw: 0080000000000000 ffff888001042ac0 ffffea0000422550 ffffea0000333c10 [ 1714.536999][ C2] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 1714.537538][ C2] page dumped because: kasan: bad access detected [ 1714.537895][ C2] [ 1714.538044][ C2] Memory state around the buggy address: [ 1714.538559][ C2] ffff888014506200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 1714.539017][ C2] ffff888014506280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1714.539479][ C2] >ffff888014506300: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 1714.540097][ C2] ^ [ 1714.540337][ C2] ffff888014506380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1714.540635][ C2] ffff888014506400: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 1714.541054][ C2] ================================================================== [ 1714.541443][ C2] Disabling lock debugging due to kernel taint [ 1722.232784][T13133] eth1: renamed from tmp [ 1738.778694][T13296] eth1: renamed from tmp [ 1755.638148][T13459] eth1: renamed from tmp [ 1772.391855][T13622] eth1: renamed from tmp [ 1789.026055][T13785] eth1: renamed from tmp [ 1805.684928][T13948] eth1: renamed from tmp [ 1822.308580][T14111] eth1: renamed from tmp [ 1838.960755][T14274] eth1: renamed from tmp