[ 21.013229][ T282] ================================================================== [ 21.013651][ T282] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 21.013933][ T282] Read of size 1 at addr ffff88800b3696c4 by task ip/282 [ 21.014228][ T282] [ 21.014374][ T282] CPU: 2 UID: 0 PID: 282 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 21.014380][ T282] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 21.014383][ T282] Call Trace: [ 21.014385][ T282] [ 21.014387][ T282] dump_stack_lvl+0x82/0xc0 [ 21.014393][ T282] print_address_description.constprop.0+0x2c/0x3a0 [ 21.014405][ T282] ? kobject_put+0xbb/0xd0 [ 21.014409][ T282] print_report+0xb4/0x270 [ 21.014412][ T282] ? kobject_put+0xbb/0xd0 [ 21.014416][ T282] ? kasan_addr_to_slab+0x21/0x70 [ 21.014419][ T282] ? kobject_put+0xbb/0xd0 [ 21.014422][ T282] kasan_report+0xca/0x100 [ 21.014426][ T282] ? kobject_put+0xbb/0xd0 [ 21.014432][ T282] kobject_put+0xbb/0xd0 [ 21.014435][ T282] netdev_run_todo+0x5f0/0xc60 [ 21.014443][ T282] ? dev_ingress_queue_create+0x190/0x190 [ 21.014447][ T282] ? generic_xdp_install+0x410/0x410 [ 21.014450][ T282] ? unregister_netdevice_many+0x20/0x20 [ 21.014455][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.014462][ T282] rtnl_dellink+0x350/0xa30 [ 21.014468][ T282] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 21.014488][ T282] ? find_held_lock+0x2b/0x80 [ 21.014495][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.014500][ T282] ? find_held_lock+0x2b/0x80 [ 21.014504][ T282] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 21.014507][ T282] ? __lock_release+0x5d/0x170 [ 21.014511][ T282] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 21.014514][ T282] rtnetlink_rcv_msg+0x709/0xc00 [ 21.014518][ T282] ? rtnl_port_fill+0x890/0x890 [ 21.014522][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.014528][ T282] netlink_rcv_skb+0x121/0x340 [ 21.014534][ T282] ? rtnl_port_fill+0x890/0x890 [ 21.014537][ T282] ? netlink_ack+0xdf0/0xdf0 [ 21.014544][ T282] ? netlink_deliver_tap+0x13e/0x340 [ 21.014546][ T282] ? netlink_deliver_tap+0xc3/0x340 [ 21.014550][ T282] netlink_unicast+0x4aa/0x780 [ 21.014554][ T282] ? netlink_attachskb+0x810/0x810 [ 21.014558][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.014562][ T282] netlink_sendmsg+0x714/0xbd0 [ 21.014566][ T282] ? netlink_unicast+0x780/0x780 [ 21.014570][ T282] ? __import_iovec+0x230/0x3b0 [ 21.014580][ T282] ? netlink_unicast+0x780/0x780 [ 21.014583][ T282] ____sys_sendmsg+0x3dd/0x890 [ 21.014587][ T282] ? get_timestamp.constprop.0+0x370/0x370 [ 21.014590][ T282] ? __copy_msghdr+0x3c0/0x3c0 [ 21.014597][ T282] ___sys_sendmsg+0xed/0x170 [ 21.014599][ T282] ? kasan_record_aux_stack+0x8c/0xa0 [ 21.014603][ T282] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 21.014608][ T282] ? copy_msghdr_from_user+0x110/0x110 [ 21.014612][ T282] ? find_held_lock+0x2b/0x80 [ 21.014616][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.014621][ T282] ? find_held_lock+0x2b/0x80 [ 21.014625][ T282] ? __virt_addr_valid+0x22a/0x450 [ 21.014632][ T282] ? __lock_release+0x5d/0x170 [ 21.014638][ T282] __sys_sendmsg+0x10b/0x1a0 [ 21.014641][ T282] ? __call_rcu_common.constprop.0+0x318/0x630 [ 21.014643][ T282] ? __sys_sendmsg_sock+0x20/0x20 [ 21.014651][ T282] ? rcu_is_watching+0x12/0xb0 [ 21.014657][ T282] do_syscall_64+0xc1/0xfd0 [ 21.014663][ T282] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 21.014667][ T282] RIP: 0033:0x7f9b7d3cd1d7 [ 21.014673][ T282] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 21.014677][ T282] RSP: 002b:00007ffdfe2e59a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.014681][ T282] RAX: ffffffffffffffda RBX: 00007ffdfe2e60e0 RCX: 00007f9b7d3cd1d7 [ 21.014684][ T282] RDX: 0000000000000000 RSI: 00007ffdfe2e5a10 RDI: 0000000000000005 [ 21.014686][ T282] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 21.014688][ T282] R10: 00007f9b7d2c9510 R11: 0000000000000246 R12: 0000000000000002 [ 21.014690][ T282] R13: 00000000690deb48 R14: 0000000000499600 R15: 0000000000000000 [ 21.014697][ T282] [ 21.014698][ T282] [ 21.030070][ T282] Allocated by task 276: [ 21.030286][ T282] kasan_save_stack+0x24/0x40 [ 21.030509][ T282] kasan_save_track+0x14/0x30 [ 21.030684][ T282] __kasan_kmalloc+0x7b/0x90 [ 21.030894][ T282] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 21.031140][ T282] alloc_netdev_mqs+0x7d/0x1370 [ 21.031382][ T282] rtnl_create_link+0xa9e/0xe20 [ 21.031588][ T282] rtnl_newlink_create+0x203/0x8f0 [ 21.031777][ T282] __rtnl_newlink+0x231/0xa30 [ 21.032023][ T282] rtnl_newlink+0x693/0xa60 [ 21.032247][ T282] rtnetlink_rcv_msg+0x709/0xc00 [ 21.032535][ T282] netlink_rcv_skb+0x121/0x340 [ 21.032715][ T282] netlink_unicast+0x4aa/0x780 [ 21.032963][ T282] netlink_sendmsg+0x714/0xbd0 [ 21.033173][ T282] ____sys_sendmsg+0x3dd/0x890 [ 21.033386][ T282] ___sys_sendmsg+0xed/0x170 [ 21.033580][ T282] __sys_sendmsg+0x10b/0x1a0 [ 21.033768][ T282] do_syscall_64+0xc1/0xfd0 [ 21.034031][ T282] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 21.034302][ T282] [ 21.034409][ T282] Freed by task 282: [ 21.034580][ T282] kasan_save_stack+0x24/0x40 [ 21.034822][ T282] kasan_save_track+0x14/0x30 [ 21.035042][ T282] __kasan_save_free_info+0x3b/0x60 [ 21.035327][ T282] __kasan_slab_free+0x3f/0x60 [ 21.035595][ T282] kfree+0x21d/0x540 [ 21.035764][ T282] device_release+0x9c/0x210 [ 21.036040][ T282] kobject_cleanup+0xfe/0x360 [ 21.036264][ T282] netdev_run_todo+0x81f/0xc60 [ 21.036547][ T282] rtnl_dellink+0x350/0xa30 [ 21.036731][ T282] rtnetlink_rcv_msg+0x709/0xc00 [ 21.036945][ T282] netlink_rcv_skb+0x121/0x340 [ 21.037129][ T282] netlink_unicast+0x4aa/0x780 [ 21.037361][ T282] netlink_sendmsg+0x714/0xbd0 [ 21.037545][ T282] ____sys_sendmsg+0x3dd/0x890 [ 21.037786][ T282] ___sys_sendmsg+0xed/0x170 [ 21.038052][ T282] __sys_sendmsg+0x10b/0x1a0 [ 21.038283][ T282] do_syscall_64+0xc1/0xfd0 [ 21.038470][ T282] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 21.038801][ T282] [ 21.038892][ T282] The buggy address belongs to the object at ffff88800b369000 [ 21.038892][ T282] which belongs to the cache kmalloc-4k of size 4096 [ 21.039448][ T282] The buggy address is located 1732 bytes inside of [ 21.039448][ T282] freed 4096-byte region [ffff88800b369000, ffff88800b36a000) [ 21.040006][ T282] [ 21.040155][ T282] The buggy address belongs to the physical page: [ 21.040516][ T282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb368 [ 21.040982][ T282] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 21.041291][ T282] flags: 0x80000000000040(head|node=0|zone=1) [ 21.041567][ T282] page_type: f5(slab) [ 21.041722][ T282] raw: 0080000000000040 ffff888001043700 ffffea0000244a10 ffffea0000219c10 [ 21.042085][ T282] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 21.042494][ T282] head: 0080000000000040 ffff888001043700 ffffea0000244a10 ffffea0000219c10 [ 21.042833][ T282] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 21.043220][ T282] head: 0080000000000003 ffffea00002cda01 00000000ffffffff 00000000ffffffff [ 21.043523][ T282] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 21.043948][ T282] page dumped because: kasan: bad access detected [ 21.044269][ T282] [ 21.044375][ T282] Memory state around the buggy address: [ 21.044544][ T282] ffff88800b369580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.044843][ T282] ffff88800b369600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.045165][ T282] >ffff88800b369680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.045579][ T282] ^ [ 21.045905][ T282] ffff88800b369700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.046291][ T282] ffff88800b369780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.046573][ T282] ================================================================== [ 21.047002][ T282] Disabling lock debugging due to kernel taint [ 21.047301][ T282] ------------[ cut here ]------------ [ 21.047690][ T282] refcount_t: underflow; use-after-free. [ 21.047957][ T282] WARNING: CPU: 2 PID: 282 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 21.048344][ T282] Modules linked in: [ 21.048557][ T282] CPU: 2 UID: 0 PID: 282 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 21.049000][ T282] Tainted: [B]=BAD_PAGE [ 21.049224][ T282] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 21.049508][ T282] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 21.049767][ T282] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba 25 a7 e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff [ 21.050675][ T282] RSP: 0018:ffffc90000bc71f0 EFLAGS: 00010286 [ 21.050965][ T282] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 21.051330][ T282] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 21.051671][ T282] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff5040934 [ 21.052011][ T282] R10: 0000000000000003 R11: ffffc90000bc6d80 R12: 0000000000000001 [ 21.052352][ T282] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 21.052702][ T282] FS: 00007f9b7d1ff800(0000) GS:ffff8880c3a08000(0000) knlGS:0000000000000000 [ 21.053058][ T282] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.053318][ T282] CR2: 00000000004e6e88 CR3: 0000000004ff6001 CR4: 0000000000772ef0 [ 21.053625][ T282] PKRU: 55555554 [ 21.053825][ T282] Call Trace: [ 21.054045][ T282] [ 21.054169][ T282] netdev_run_todo+0x5f0/0xc60 [ 21.054386][ T282] ? dev_ingress_queue_create+0x190/0x190 [ 21.054669][ T282] ? generic_xdp_install+0x410/0x410 [ 21.054886][ T282] ? unregister_netdevice_many+0x20/0x20 [ 21.055178][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.055499][ T282] rtnl_dellink+0x350/0xa30 [ 21.055711][ T282] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 21.056149][ T282] ? find_held_lock+0x2b/0x80 [ 21.056364][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.056658][ T282] ? find_held_lock+0x2b/0x80 [ 21.057058][ T282] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 21.057290][ T282] ? __lock_release+0x5d/0x170 [ 21.057517][ T282] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 21.057764][ T282] rtnetlink_rcv_msg+0x709/0xc00 [ 21.058139][ T282] ? rtnl_port_fill+0x890/0x890 [ 21.058322][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.058526][ T282] netlink_rcv_skb+0x121/0x340 [ 21.058741][ T282] ? rtnl_port_fill+0x890/0x890 [ 21.059071][ T282] ? netlink_ack+0xdf0/0xdf0 [ 21.059281][ T282] ? netlink_deliver_tap+0x13e/0x340 [ 21.059489][ T282] ? netlink_deliver_tap+0xc3/0x340 [ 21.059689][ T282] netlink_unicast+0x4aa/0x780 [ 21.060003][ T282] ? netlink_attachskb+0x810/0x810 [ 21.060277][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.060498][ T282] netlink_sendmsg+0x714/0xbd0 [ 21.060706][ T282] ? netlink_unicast+0x780/0x780 [ 21.061004][ T282] ? __import_iovec+0x230/0x3b0 [ 21.061204][ T282] ? netlink_unicast+0x780/0x780 [ 21.061402][ T282] ____sys_sendmsg+0x3dd/0x890 [ 21.061610][ T282] ? get_timestamp.constprop.0+0x370/0x370 [ 21.061944][ T282] ? __copy_msghdr+0x3c0/0x3c0 [ 21.062164][ T282] ___sys_sendmsg+0xed/0x170 [ 21.062362][ T282] ? kasan_record_aux_stack+0x8c/0xa0 [ 21.062582][ T282] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 21.062919][ T282] ? copy_msghdr_from_user+0x110/0x110 [ 21.063133][ T282] ? find_held_lock+0x2b/0x80 [ 21.063334][ T282] ? __lock_acquire+0x449/0x7e0 [ 21.063646][ T282] ? find_held_lock+0x2b/0x80 [ 21.063927][ T282] ? __virt_addr_valid+0x22a/0x450 [ 21.064233][ T282] ? __lock_release+0x5d/0x170 [ 21.064556][ T282] __sys_sendmsg+0x10b/0x1a0 [ 21.064830][ T282] ? __call_rcu_common.constprop.0+0x318/0x630 [ 21.065390][ T282] ? __sys_sendmsg_sock+0x20/0x20 [ 21.065716][ T282] ? rcu_is_watching+0x12/0xb0 [ 21.066032][ T282] do_syscall_64+0xc1/0xfd0 [ 21.066371][ T282] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 21.066624][ T282] RIP: 0033:0x7f9b7d3cd1d7 [ 21.066839][ T282] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 21.067639][ T282] RSP: 002b:00007ffdfe2e59a8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.067938][ T282] RAX: ffffffffffffffda RBX: 00007ffdfe2e60e0 RCX: 00007f9b7d3cd1d7 [ 21.068360][ T282] RDX: 0000000000000000 RSI: 00007ffdfe2e5a10 RDI: 0000000000000005 [ 21.068656][ T282] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 21.068931][ T282] R10: 00007f9b7d2c9510 R11: 0000000000000246 R12: 0000000000000002 [ 21.069325][ T282] R13: 00000000690deb48 R14: 0000000000499600 R15: 0000000000000000 [ 21.069614][ T282] [ 21.069779][ T282] irq event stamp: 42407 [ 21.070040][ T282] hardirqs last enabled at (42407): [] irqentry_exit+0x3b/0x80 [ 21.070426][ T282] hardirqs last disabled at (42406): [] handle_softirqs+0x47f/0x610 [ 21.071150][ T282] softirqs last enabled at (42314): [] handle_softirqs+0x352/0x610 [ 21.071685][ T282] softirqs last disabled at (42309): [] irq_exit_rcu+0xab/0x100 [ 21.072198][ T282] ---[ end trace 0000000000000000 ]--- [ 75.116147][ T898] IPv6: Can't replace route, no match found [ 78.632747][ T968] IPv6: Can't replace route, no match found [ 145.662900][ T1907] Mirror/redirect action on [ 252.901324][ T2550] veth2: entered promiscuous mode [ 252.930498][ T2550] veth2: left promiscuous mode