[ 21.749014][ T306] ip (306) used greatest stack depth: 24736 bytes left
[ 22.006991][ T308] eth1: renamed from tmp
[ 71.650080][ T724] ip (724) used greatest stack depth: 24320 bytes left
[ 76.801368][ T758] eth1: renamed from tmp
[ 127.249515][ T1176] ip (1176) used greatest stack depth: 24056 bytes left
[ 132.673104][ T1210] eth1: renamed from tmp
[ 190.139518][ T1674] eth1: renamed from tmp
[ 247.687265][ T2140] eth1: renamed from tmp
[ 422.783184][ T3370] eth1: renamed from tmp
[ 452.395580][ T3635] eth2: renamed from tmp
[ 592.220377][ T4548] eth1: renamed from tmp
[ 772.854256][ T6243] eth1: renamed from tmp
[ 862.856104][ T7094] eth1: renamed from tmp
[ 885.186594][ T7279] eth1: renamed from tmp
[ 914.276260][ T7523] eth1: renamed from tmp
[ 933.708366][ T7651] eth1: renamed from tmp
[ 951.211576][ T7779] eth1: renamed from tmp
[ 970.779863][ T7914] eth1: renamed from tmp
[ 992.983018][ T8049] eth1: renamed from tmp
[ 1012.927701][ T8184] eth1: renamed from tmp
[ 1033.753896][ T8320] eth1: renamed from tmp
[ 1054.108062][ T8455] eth1: renamed from tmp
[ 1074.020103][ T8590] eth1: renamed from tmp
[ 1093.571022][ T8724] eth1: renamed from tmp
[ 1113.178677][ T8858] eth1: renamed from tmp
[ 1132.511098][ T8993] eth1: renamed from tmp
[ 1152.302541][ T9128] eth1: renamed from tmp
[ 1162.397642][ T9169] nettest (9169) used greatest stack depth: 23168 bytes left
[ 1172.295270][ T9263] eth1: renamed from tmp
[ 1192.231478][ T9398] eth1: renamed from tmp
[ 1212.192223][ T9533] eth1: renamed from tmp
[ 1231.786090][ T9668] eth1: renamed from tmp
[ 1250.979708][ T9804] eth1: renamed from tmp
[ 1270.808205][ T9939] eth1: renamed from tmp
[ 1290.190300][T10074] eth1: renamed from tmp
[ 1309.436354][T10209] eth1: renamed from tmp
[ 1328.834939][T10345] eth1: renamed from tmp
[ 1348.240193][T10480] eth1: renamed from tmp
[ 1368.135132][T10616] eth1: renamed from tmp
[ 1387.691026][T10750] eth1: renamed from tmp
[ 1407.317696][T10884] eth1: renamed from tmp
[ 1426.490138][T11019] eth1: renamed from tmp
[ 1445.482285][T11154] eth1: renamed from tmp
[ 1464.896347][T11289] eth1: renamed from tmp
[ 1484.120212][T11424] eth1: renamed from tmp
[ 1503.085216][T11559] eth1: renamed from tmp
[ 1522.281114][T11695] eth1: renamed from tmp
[ 1541.769063][T11830] eth1: renamed from tmp
[ 1564.746716][T11993] eth1: renamed from tmp
[ 1587.757135][T12156] eth1: renamed from tmp
[ 1610.895002][T12319] eth1: renamed from tmp
[ 1634.075228][T12482] eth1: renamed from tmp
[ 1657.268155][T12646] eth1: renamed from tmp
[ 1680.457326][T12809] eth1: renamed from tmp
[ 1703.465665][T12971] eth1: renamed from tmp
[ 1714.503209][ C2] ==================================================================
[ 1714.503765][ C2] BUG: KASAN: slab-use-after-free in __udp_enqueue_schedule_skb+0x179/0xe60
[ 1714.504180][ C2] Read of size 4 at addr ffff888014506348 by task nettest/13047
[ 1714.504478][ C2]
[ 1714.504581][ C2] CPU: 2 UID: 0 PID: 13047 Comm: nettest Not tainted 6.17.0-rc6-virtme #1 PREEMPT(full)
[ 1714.504586][ C2] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 1714.504588][ C2] Call Trace:
[ 1714.504590][ C2]
[ 1714.504592][ C2] dump_stack_lvl+0x82/0xc0
[ 1714.504600][ C2] print_address_description.constprop.0+0x2c/0x3a0
[ 1714.504609][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60
[ 1714.504614][ C2] print_report+0xb4/0x270
[ 1714.504617][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60
[ 1714.504621][ C2] ? kasan_addr_to_slab+0x21/0x70
[ 1714.504624][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60
[ 1714.504627][ C2] kasan_report+0xca/0x100
[ 1714.504631][ C2] ? __udp_enqueue_schedule_skb+0x179/0xe60
[ 1714.504636][ C2] kasan_check_range+0x39/0x1b0
[ 1714.504640][ C2] __udp_enqueue_schedule_skb+0x179/0xe60
[ 1714.504644][ C2] ? sk_filter_trim_cap+0x2c0/0xa40
[ 1714.504651][ C2] ? fib_lookup.constprop.0+0x370/0x370
[ 1714.504654][ C2] ? udp_sendmsg+0x21f0/0x21f0
[ 1714.504658][ C2] ? udp6_lib_lookup2+0x457/0x4d0
[ 1714.504664][ C2] ? __xfrm_policy_check2.constprop.0+0x3d/0x680
[ 1714.504669][ C2] udpv6_queue_rcv_one_skb+0xa35/0x14f0
[ 1714.504672][ C2] ? __udp6_lib_lookup+0x64e/0xa40
[ 1714.504675][ C2] ? __xfrm_policy_check2.constprop.0+0x680/0x680
[ 1714.504681][ C2] udp6_unicast_rcv_skb+0x10b/0x2c0
[ 1714.504685][ C2] __udp6_lib_rcv+0xa85/0x1650
[ 1714.504691][ C2] ? udpv6_err+0xe0/0xe0
[ 1714.504693][ C2] ? is_bpf_text_address+0x67/0x120
[ 1714.504702][ C2] ip6_protocol_deliver_rcu+0x113/0x1340
[ 1714.504711][ C2] ? rcu_is_watching+0x12/0xb0
[ 1714.504720][ C2] ip6_input_finish+0x175/0x410
[ 1714.504724][ C2] ip6_input+0x111/0x4f0
[ 1714.504727][ C2] ? ip6_input_finish+0x410/0x410
[ 1714.504732][ C2] ? ip6_rcv_core+0x9e8/0x1930
[ 1714.504738][ C2] ipv6_rcv+0x3e1/0x5d0
[ 1714.504741][ C2] ? __xfrm_policy_check2.constprop.0+0x540/0x540
[ 1714.504745][ C2] ? rcu_read_lock_any_held+0x3f/0xa0
[ 1714.504748][ C2] ? validate_chain+0x15e/0x4d0
[ 1714.504756][ C2] ? __lock_acquire+0x449/0x7e0
[ 1714.504760][ C2] ? __xfrm_policy_check2.constprop.0+0x540/0x540
[ 1714.504763][ C2] ? process_backlog+0x381/0x13e0
[ 1714.504770][ C2] __netif_receive_skb_one_core+0x108/0x180
[ 1714.504774][ C2] ? __netif_receive_skb_list_core+0x980/0x980
[ 1714.504778][ C2] ? rcu_is_watching+0x12/0xb0
[ 1714.504781][ C2] ? lock_acquire+0x104/0x160
[ 1714.504784][ C2] ? process_backlog+0x381/0x13e0
[ 1714.504788][ C2] process_backlog+0x3c1/0x13e0
[ 1714.504794][ C2] __napi_poll.constprop.0+0x9f/0x460
[ 1714.504799][ C2] net_rx_action+0x54f/0xda0
[ 1714.504805][ C2] ? __napi_poll.constprop.0+0x460/0x460
[ 1714.504809][ C2] ? sched_ttwu_pending+0x290/0x530
[ 1714.504814][ C2] ? __lock_release+0x5d/0x170
[ 1714.504818][ C2] ? do_raw_spin_unlock+0x58/0x220
[ 1714.504822][ C2] ? _raw_spin_unlock+0x2d/0x50
[ 1714.504830][ C2] ? ttwu_do_activate+0x8c0/0x8c0
[ 1714.504835][ C2] handle_softirqs+0x215/0x610
[ 1714.504841][ C2] ? __dev_queue_xmit+0x97e/0x18e0
[ 1714.504845][ C2] do_softirq+0xad/0xe0
[ 1714.504848][ C2]
[ 1714.504849][ C2]
[ 1714.504850][ C2] __local_bh_enable_ip+0x101/0x120
[ 1714.504853][ C2] ? __dev_queue_xmit+0x97e/0x18e0
[ 1714.504856][ C2] __dev_queue_xmit+0x993/0x18e0
[ 1714.504860][ C2] ? __lock_acquire+0x449/0x7e0
[ 1714.504865][ C2] ? netdev_core_pick_tx+0x2f0/0x2f0
[ 1714.504868][ C2] ? ip6_finish_output+0x5b8/0xc70
[ 1714.504872][ C2] ? neigh_hh_output+0x33a/0x520
[ 1714.504876][ C2] ? lockdep_hardirqs_on+0x7c/0x110
[ 1714.504880][ C2] ? neigh_hh_output+0x33a/0x520
[ 1714.504887][ C2] ip6_finish_output+0x5b8/0xc70
[ 1714.504891][ C2] ip6_output+0x242/0x810
[ 1714.504895][ C2] ? ip6_finish_output+0xc70/0xc70
[ 1714.504899][ C2] ? __ip6_local_out+0x314/0x5a0
[ 1714.504906][ C2] ip6_send_skb+0xef/0x350
[ 1714.504910][ C2] udp_v6_send_skb+0x85a/0x1dc0
[ 1714.504913][ C2] ? jhash.constprop.0+0x101/0x150
[ 1714.504918][ C2] udpv6_sendmsg+0x1b04/0x24a0
[ 1714.504921][ C2] ? find_held_lock+0x2b/0x80
[ 1714.504924][ C2] ? ip_select_ident_segs+0x400/0x400
[ 1714.504931][ C2] ? udpv6_splice_eof+0x170/0x170
[ 1714.504937][ C2] ? rcu_read_lock_any_held+0x3f/0xa0
[ 1714.504940][ C2] ? validate_chain+0x15e/0x4d0
[ 1714.504949][ C2] ? __might_fault+0x117/0x170
[ 1714.504956][ C2] ? __lock_release+0x5d/0x170
[ 1714.504961][ C2] ? __sys_sendto+0x24b/0x380
[ 1714.504967][ C2] __sys_sendto+0x24b/0x380
[ 1714.504970][ C2] ? __ia32_sys_getpeername+0xb0/0xb0
[ 1714.504979][ C2] ? __sys_recvmsg_sock+0x20/0x20
[ 1714.504986][ C2] __x64_sys_sendto+0xe0/0x1b0
[ 1714.504990][ C2] ? do_syscall_64+0x85/0x300
[ 1714.504993][ C2] ? lockdep_hardirqs_on+0x7c/0x110
[ 1714.504996][ C2] do_syscall_64+0xc1/0x300
[ 1714.504999][ C2] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 1714.505004][ C2] RIP: 0033:0x7f872e7db28a
[ 1714.505008][ C2] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
[ 1714.505010][ C2] RSP: 002b:00007ffdeb5fc558 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 1714.505015][ C2] RAX: ffffffffffffffda RBX: 000000000000001c RCX: 00007f872e7db28a
[ 1714.505017][ C2] RDX: 000000000000000c RSI: 0000000000406752 RDI: 0000000000000005
[ 1714.505019][ C2] RBP: 0000000000000005 R08: 00007ffdeb5fcae0 R09: 000000000000001c
[ 1714.505020][ C2] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffdeb5fcae0
[ 1714.505022][ C2] R13: 000000000000001c R14: 0000000000000002 R15: 0000000000000002
[ 1714.505028][ C2]
[ 1714.505029][ C2]
[ 1714.525708][ C2] Allocated by task 13012:
[ 1714.526016][ C2] kasan_save_stack+0x24/0x40
[ 1714.526361][ C2] kasan_save_track+0x14/0x30
[ 1714.526686][ C2] __kasan_kmalloc+0x7b/0x90
[ 1714.527012][ C2] __kmalloc_noprof+0x1d4/0x460
[ 1714.527341][ C2] udpv6_init_sock+0x237/0x410
[ 1714.527642][ C2] inet6_create.part.0+0x989/0x10b0
[ 1714.527850][ C2] __sock_create+0x235/0x690
[ 1714.528075][ C2] __sys_socket+0x116/0x1d0
[ 1714.528275][ C2] __x64_sys_socket+0x72/0xb0
[ 1714.528470][ C2] do_syscall_64+0xc1/0x300
[ 1714.528683][ C2] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 1714.528929][ C2]
[ 1714.529029][ C2] Freed by task 13012:
[ 1714.529178][ C2] kasan_save_stack+0x24/0x40
[ 1714.529382][ C2] kasan_save_track+0x14/0x30
[ 1714.529590][ C2] kasan_save_free_info+0x3b/0x60
[ 1714.529798][ C2] __kasan_slab_free+0x3b/0x50
[ 1714.529993][ C2] kfree+0x144/0x320
[ 1714.530140][ C2] sk_common_release+0x60/0x300
[ 1714.530335][ C2] inet_release+0x100/0x220
[ 1714.530531][ C2] __sock_release+0xa0/0x250
[ 1714.530788][ C2] sock_close+0x18/0x20
[ 1714.531019][ C2] __fput+0x35c/0xa70
[ 1714.531245][ C2] fput_close_sync+0xdd/0x1b0
[ 1714.531550][ C2] __x64_sys_close+0x7d/0xd0
[ 1714.531855][ C2] do_syscall_64+0xc1/0x300
[ 1714.532173][ C2] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 1714.532572][ C2]
[ 1714.532724][ C2] The buggy address belongs to the object at ffff888014506340
[ 1714.532724][ C2] which belongs to the cache kmalloc-64 of size 64
[ 1714.533451][ C2] The buggy address is located 8 bytes inside of
[ 1714.533451][ C2] freed 64-byte region [ffff888014506340, ffff888014506380)
[ 1714.534420][ C2]
[ 1714.534563][ C2] The buggy address belongs to the physical page:
[ 1714.534927][ C2] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14506
[ 1714.535682][ C2] flags: 0x80000000000000(node=0|zone=1)
[ 1714.535992][ C2] page_type: f5(slab)
[ 1714.536225][ C2] raw: 0080000000000000 ffff888001042ac0 ffffea0000422550 ffffea0000333c10
[ 1714.536999][ C2] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[ 1714.537538][ C2] page dumped because: kasan: bad access detected
[ 1714.537895][ C2]
[ 1714.538044][ C2] Memory state around the buggy address:
[ 1714.538559][ C2] ffff888014506200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 1714.539017][ C2] ffff888014506280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1714.539479][ C2] >ffff888014506300: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 1714.540097][ C2] ^
[ 1714.540337][ C2] ffff888014506380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 1714.540635][ C2] ffff888014506400: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[ 1714.541054][ C2] ==================================================================
[ 1714.541443][ C2] Disabling lock debugging due to kernel taint
[ 1722.232784][T13133] eth1: renamed from tmp
[ 1738.778694][T13296] eth1: renamed from tmp
[ 1755.638148][T13459] eth1: renamed from tmp
[ 1772.391855][T13622] eth1: renamed from tmp
[ 1789.026055][T13785] eth1: renamed from tmp
[ 1805.684928][T13948] eth1: renamed from tmp
[ 1822.308580][T14111] eth1: renamed from tmp
[ 1838.960755][T14274] eth1: renamed from tmp