[ 145.322485][ T66] ==================================================================
[ 145.322939][ T66] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0
[ 145.323389][ T66] Read of size 1 at addr ffff8880090196c4 by task kworker/u16:1/66
[ 145.323651][ T66]
[ 145.323746][ T66] CPU: 3 UID: 0 PID: 66 Comm: kworker/u16:1 Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 145.323751][ T66] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 145.323755][ T66] Workqueue: netns cleanup_net
[ 145.323769][ T66] Call Trace:
[ 145.323771][ T66]
[ 145.323776][ T66] dump_stack_lvl+0x82/0xc0
[ 145.323784][ T66] print_address_description.constprop.0+0x2c/0x3a0
[ 145.323795][ T66] ? kobject_put+0xbb/0xd0
[ 145.323799][ T66] print_report+0xb4/0x270
[ 145.323802][ T66] ? kobject_put+0xbb/0xd0
[ 145.323805][ T66] ? kasan_addr_to_slab+0x21/0x70
[ 145.323809][ T66] ? kobject_put+0xbb/0xd0
[ 145.323812][ T66] kasan_report+0xca/0x100
[ 145.323816][ T66] ? kobject_put+0xbb/0xd0
[ 145.323822][ T66] kobject_put+0xbb/0xd0
[ 145.323825][ T66] netdev_run_todo+0x5f0/0xc60
[ 145.323832][ T66] ? dev_ingress_queue_create+0x190/0x190
[ 145.323836][ T66] ? generic_xdp_install+0x410/0x410
[ 145.323839][ T66] ? net_generic+0xb1/0x1f0
[ 145.323848][ T66] ops_undo_list+0x714/0x890
[ 145.323853][ T66] ? rtnl_net_dumpid_one+0x270/0x270
[ 145.323857][ T66] ? cleanup_net+0x2d6/0x8b0
[ 145.323863][ T66] cleanup_net+0x3b2/0x8b0
[ 145.323867][ T66] ? net_passive_dec+0x190/0x190
[ 145.323872][ T66] ? rcu_is_watching+0x12/0xb0
[ 145.323880][ T66] process_one_work+0xe35/0x1650
[ 145.323891][ T66] ? pwq_dec_nr_in_flight+0x550/0x550
[ 145.323896][ T66] ? assign_work+0x168/0x240
[ 145.323901][ T66] worker_thread+0x591/0xcf0
[ 145.323906][ T66] ? rescuer_thread+0xd10/0xd10
[ 145.323910][ T66] kthread+0x37b/0x5f0
[ 145.323915][ T66] ? kthread_is_per_cpu+0xc0/0xc0
[ 145.323917][ T66] ? ret_from_fork+0x1b/0x270
[ 145.323924][ T66] ? __lock_release+0x5d/0x170
[ 145.323929][ T66] ? rcu_is_watching+0x12/0xb0
[ 145.323933][ T66] ? kthread_is_per_cpu+0xc0/0xc0
[ 145.323936][ T66] ret_from_fork+0x1db/0x270
[ 145.323939][ T66] ? kthread_is_per_cpu+0xc0/0xc0
[ 145.323942][ T66] ret_from_fork_asm+0x11/0x20
[ 145.323951][ T66]
[ 145.323953][ T66]
[ 145.333996][ T66] Allocated by task 263:
[ 145.334208][ T66] kasan_save_stack+0x24/0x40
[ 145.334496][ T66] kasan_save_track+0x14/0x30
[ 145.334736][ T66] __kasan_kmalloc+0x7b/0x90
[ 145.335016][ T66] __kvmalloc_node_noprof+0x2e5/0x8e0
[ 145.335274][ T66] alloc_netdev_mqs+0x7d/0x1370
[ 145.335542][ T66] ip6_tnl_init_net+0x102/0x3f0
[ 145.335783][ T66] ops_init+0x189/0x550
[ 145.335917][ T66] setup_net+0xf1/0x380
[ 145.336054][ T66] copy_net_ns+0x253/0x510
[ 145.336233][ T66] create_new_namespaces+0x35f/0x900
[ 145.336410][ T66] unshare_nsproxy_namespaces+0x8a/0x1a0
[ 145.336588][ T66] ksys_unshare+0x2be/0x6e0
[ 145.336761][ T66] __x64_sys_unshare+0x31/0x40
[ 145.336980][ T66] do_syscall_64+0xc1/0xfd0
[ 145.337225][ T66] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 145.337543][ T66]
[ 145.337677][ T66] Freed by task 66:
[ 145.337884][ T66] kasan_save_stack+0x24/0x40
[ 145.338158][ T66] kasan_save_track+0x14/0x30
[ 145.338425][ T66] __kasan_save_free_info+0x3b/0x60
[ 145.338700][ T66] __kasan_slab_free+0x3f/0x60
[ 145.338973][ T66] kfree+0x21d/0x540
[ 145.339180][ T66] device_release+0x9c/0x210
[ 145.339464][ T66] kobject_cleanup+0xfe/0x360
[ 145.339737][ T66] netdev_run_todo+0x81f/0xc60
[ 145.340032][ T66] ops_undo_list+0x714/0x890
[ 145.340306][ T66] cleanup_net+0x3b2/0x8b0
[ 145.340571][ T66] process_one_work+0xe35/0x1650
[ 145.340845][ T66] worker_thread+0x591/0xcf0
[ 145.341110][ T66] kthread+0x37b/0x5f0
[ 145.341316][ T66] ret_from_fork+0x1db/0x270
[ 145.341588][ T66] ret_from_fork_asm+0x11/0x20
[ 145.341861][ T66]
[ 145.341998][ T66] The buggy address belongs to the object at ffff888009019000
[ 145.341998][ T66] which belongs to the cache kmalloc-4k of size 4096
[ 145.342695][ T66] The buggy address is located 1732 bytes inside of
[ 145.342695][ T66] freed 4096-byte region [ffff888009019000, ffff88800901a000)
[ 145.343279][ T66]
[ 145.343418][ T66] The buggy address belongs to the physical page:
[ 145.343744][ T66] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x9018
[ 145.344205][ T66] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 145.344582][ T66] flags: 0x80000000000040(head|node=0|zone=1)
[ 145.344936][ T66] page_type: f5(slab)
[ 145.345132][ T66] raw: 0080000000000040 ffff888001043700 ffffea0000202210 ffffea0000212a10
[ 145.345597][ T66] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 145.346211][ T66] head: 0080000000000040 ffff888001043700 ffffea0000202210 ffffea0000212a10
[ 145.346840][ T66] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 145.347490][ T66] head: 0080000000000003 ffffea0000240601 00000000ffffffff 00000000ffffffff
[ 145.348027][ T66] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 145.348721][ T66] page dumped because: kasan: bad access detected
[ 145.348943][ T66]
[ 145.349027][ T66] Memory state around the buggy address:
[ 145.349286][ T66] ffff888009019580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 145.349555][ T66] ffff888009019600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 145.349814][ T66] >ffff888009019680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 145.350051][ T66] ^
[ 145.350256][ T66] ffff888009019700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 145.350505][ T66] ffff888009019780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 145.350822][ T66] ==================================================================
[ 145.351227][ T66] Disabling lock debugging due to kernel taint
[ 145.351482][ T66] ------------[ cut here ]------------
[ 145.351645][ T66] refcount_t: underflow; use-after-free.
[ 145.351849][ T66] WARNING: CPU: 0 PID: 66 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0
[ 145.352262][ T66] Modules linked in:
[ 145.352422][ T66] CPU: 0 UID: 0 PID: 66 Comm: kworker/u16:1 Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 145.352865][ T66] Tainted: [B]=BAD_PAGE
[ 145.353000][ T66] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 145.353257][ T66] Workqueue: netns cleanup_net
[ 145.353478][ T66] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0
[ 145.353714][ T66] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba 25 93 e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff
[ 145.354335][ T66] RSP: 0018:ffffc90000477a08 EFLAGS: 00010282
[ 145.354561][ T66] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 145.354814][ T66] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001
[ 145.355088][ T66] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff2840934
[ 145.355372][ T66] R10: 0000000000000003 R11: ffffc90000477580 R12: 0000000000000001
[ 145.355701][ T66] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100
[ 145.356005][ T66] FS: 0000000000000000(0000) GS:ffff8880d1508000(0000) knlGS:0000000000000000
[ 145.356365][ T66] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 145.356616][ T66] CR2: 000056298e340dec CR3: 0000000009197005 CR4: 0000000000772ef0
[ 145.356945][ T66] PKRU: 55555554
[ 145.357105][ T66] Call Trace:
[ 145.357244][ T66]
[ 145.357332][ T66] netdev_run_todo+0x5f0/0xc60
[ 145.357548][ T66] ? dev_ingress_queue_create+0x190/0x190
[ 145.357721][ T66] ? generic_xdp_install+0x410/0x410
[ 145.357895][ T66] ? net_generic+0xb1/0x1f0
[ 145.358093][ T66] ops_undo_list+0x714/0x890
[ 145.358291][ T66] ? rtnl_net_dumpid_one+0x270/0x270
[ 145.358472][ T66] ? cleanup_net+0x2d6/0x8b0
[ 145.358652][ T66] cleanup_net+0x3b2/0x8b0
[ 145.358827][ T66] ? net_passive_dec+0x190/0x190
[ 145.359026][ T66] ? rcu_is_watching+0x12/0xb0
[ 145.359205][ T66] process_one_work+0xe35/0x1650
[ 145.359406][ T66] ? pwq_dec_nr_in_flight+0x550/0x550
[ 145.359606][ T66] ? assign_work+0x168/0x240
[ 145.359826][ T66] worker_thread+0x591/0xcf0
[ 145.360059][ T66] ? rescuer_thread+0xd10/0xd10
[ 145.360269][ T66] kthread+0x37b/0x5f0
[ 145.360435][ T66] ? kthread_is_per_cpu+0xc0/0xc0
[ 145.360630][ T66] ? ret_from_fork+0x1b/0x270
[ 145.360840][ T66] ? __lock_release+0x5d/0x170
[ 145.361032][ T66] ? rcu_is_watching+0x12/0xb0
[ 145.361197][ T66] ? kthread_is_per_cpu+0xc0/0xc0
[ 145.361361][ T66] ret_from_fork+0x1db/0x270
[ 145.361512][ T66] ? kthread_is_per_cpu+0xc0/0xc0
[ 145.361663][ T66] ret_from_fork_asm+0x11/0x20
[ 145.361821][ T66]
[ 145.361949][ T66] irq event stamp: 9019
[ 145.362065][ T66] hardirqs last enabled at (9019): [] finish_task_switch.isra.0+0x245/0x960
[ 145.362420][ T66] hardirqs last disabled at (9018): [] __schedule+0x94a/0x1b10
[ 145.362739][ T66] softirqs last enabled at (8824): [] handle_softirqs+0x352/0x610
[ 145.363049][ T66] softirqs last disabled at (8817): [] irq_exit_rcu+0xab/0x100
[ 145.363345][ T66] ---[ end trace 0000000000000000 ]---