[ 17.595785][ T267] ip (267) used greatest stack depth: 23472 bytes left [ 63.060166][ T812] ================================================================== [ 63.060552][ T812] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 63.060860][ T812] Read of size 1 at addr ffff88800cf296c4 by task ip/812 [ 63.061082][ T812] [ 63.061180][ T812] CPU: 2 UID: 0 PID: 812 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 63.061185][ T812] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 63.061191][ T812] Call Trace: [ 63.061194][ T812] [ 63.061196][ T812] dump_stack_lvl+0x82/0xc0 [ 63.061205][ T812] print_address_description.constprop.0+0x2c/0x3a0 [ 63.061215][ T812] ? kobject_put+0xbb/0xd0 [ 63.061219][ T812] print_report+0xb4/0x270 [ 63.061222][ T812] ? kobject_put+0xbb/0xd0 [ 63.061225][ T812] ? kasan_addr_to_slab+0x21/0x70 [ 63.061229][ T812] ? kobject_put+0xbb/0xd0 [ 63.061234][ T812] kasan_report+0xca/0x100 [ 63.061238][ T812] ? kobject_put+0xbb/0xd0 [ 63.061243][ T812] kobject_put+0xbb/0xd0 [ 63.061247][ T812] netdev_run_todo+0x5f0/0xc60 [ 63.061254][ T812] ? dev_ingress_queue_create+0x190/0x190 [ 63.061258][ T812] ? generic_xdp_install+0x410/0x410 [ 63.061261][ T812] ? unregister_netdevice_many+0x20/0x20 [ 63.061267][ T812] rtnl_dellink+0x350/0xa30 [ 63.061272][ T812] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 63.061292][ T812] ? find_held_lock+0x2b/0x80 [ 63.061300][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.061305][ T812] ? find_held_lock+0x2b/0x80 [ 63.061309][ T812] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 63.061312][ T812] ? __lock_release+0x5d/0x170 [ 63.061316][ T812] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 63.061320][ T812] rtnetlink_rcv_msg+0x709/0xc00 [ 63.061324][ T812] ? rtnl_port_fill+0x890/0x890 [ 63.061327][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.061333][ T812] netlink_rcv_skb+0x121/0x340 [ 63.061339][ T812] ? rtnl_port_fill+0x890/0x890 [ 63.061343][ T812] ? netlink_ack+0xdf0/0xdf0 [ 63.061349][ T812] ? netlink_deliver_tap+0x13e/0x340 [ 63.061352][ T812] ? netlink_deliver_tap+0xc3/0x340 [ 63.061355][ T812] netlink_unicast+0x4aa/0x780 [ 63.061359][ T812] ? netlink_attachskb+0x810/0x810 [ 63.061363][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.061367][ T812] netlink_sendmsg+0x714/0xbd0 [ 63.061371][ T812] ? netlink_unicast+0x780/0x780 [ 63.061374][ T812] ? __import_iovec+0x230/0x3b0 [ 63.061382][ T812] ? netlink_unicast+0x780/0x780 [ 63.061385][ T812] ____sys_sendmsg+0x3dd/0x890 [ 63.061389][ T812] ? get_timestamp.constprop.0+0x370/0x370 [ 63.061392][ T812] ? __copy_msghdr+0x3c0/0x3c0 [ 63.061399][ T812] ___sys_sendmsg+0xed/0x170 [ 63.061401][ T812] ? kasan_record_aux_stack+0x8c/0xa0 [ 63.061404][ T812] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 63.061410][ T812] ? copy_msghdr_from_user+0x110/0x110 [ 63.061414][ T812] ? find_held_lock+0x2b/0x80 [ 63.061419][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.061423][ T812] ? find_held_lock+0x2b/0x80 [ 63.061427][ T812] ? __virt_addr_valid+0x22a/0x450 [ 63.061435][ T812] ? __lock_release+0x5d/0x170 [ 63.061441][ T812] __sys_sendmsg+0x10b/0x1a0 [ 63.061443][ T812] ? __call_rcu_common.constprop.0+0x318/0x630 [ 63.061446][ T812] ? __sys_sendmsg_sock+0x20/0x20 [ 63.061453][ T812] ? rcu_is_watching+0x12/0xb0 [ 63.061458][ T812] do_syscall_64+0xc1/0xfd0 [ 63.061463][ T812] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 63.061466][ T812] RIP: 0033:0x7f627308a1d7 [ 63.061475][ T812] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 63.061477][ T812] RSP: 002b:00007ffd03374fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.061485][ T812] RAX: ffffffffffffffda RBX: 00007ffd03375710 RCX: 00007f627308a1d7 [ 63.061488][ T812] RDX: 0000000000000000 RSI: 00007ffd03375040 RDI: 0000000000000005 [ 63.061490][ T812] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 63.061491][ T812] R10: 00007f6272f86510 R11: 0000000000000246 R12: 0000000000000002 [ 63.061493][ T812] R13: 00000000690df171 R14: 0000000000499600 R15: 0000000000000000 [ 63.061499][ T812] [ 63.061501][ T812] [ 63.079044][ T812] Allocated by task 767: [ 63.079268][ T812] kasan_save_stack+0x24/0x40 [ 63.079574][ T812] kasan_save_track+0x14/0x30 [ 63.079861][ T812] __kasan_kmalloc+0x7b/0x90 [ 63.080145][ T812] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 63.080428][ T812] alloc_netdev_mqs+0x7d/0x1370 [ 63.080718][ T812] rtnl_create_link+0xa9e/0xe20 [ 63.080913][ T812] rtnl_newlink_create+0x203/0x8f0 [ 63.081080][ T812] __rtnl_newlink+0x231/0xa30 [ 63.081244][ T812] rtnl_newlink+0x693/0xa60 [ 63.081412][ T812] rtnetlink_rcv_msg+0x709/0xc00 [ 63.081577][ T812] netlink_rcv_skb+0x121/0x340 [ 63.081774][ T812] netlink_unicast+0x4aa/0x780 [ 63.081938][ T812] netlink_sendmsg+0x714/0xbd0 [ 63.082111][ T812] ____sys_sendmsg+0x3dd/0x890 [ 63.082276][ T812] ___sys_sendmsg+0xed/0x170 [ 63.082446][ T812] __sys_sendmsg+0x10b/0x1a0 [ 63.082613][ T812] do_syscall_64+0xc1/0xfd0 [ 63.082811][ T812] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 63.083029][ T812] [ 63.083147][ T812] Freed by task 812: [ 63.083280][ T812] kasan_save_stack+0x24/0x40 [ 63.083462][ T812] kasan_save_track+0x14/0x30 [ 63.083630][ T812] __kasan_save_free_info+0x3b/0x60 [ 63.083886][ T812] __kasan_slab_free+0x3f/0x60 [ 63.084165][ T812] kfree+0x21d/0x540 [ 63.084341][ T812] device_release+0x9c/0x210 [ 63.084519][ T812] kobject_cleanup+0xfe/0x360 [ 63.084706][ T812] netdev_run_todo+0x81f/0xc60 [ 63.084881][ T812] rtnl_dellink+0x350/0xa30 [ 63.085059][ T812] rtnetlink_rcv_msg+0x709/0xc00 [ 63.085226][ T812] netlink_rcv_skb+0x121/0x340 [ 63.085397][ T812] netlink_unicast+0x4aa/0x780 [ 63.085566][ T812] netlink_sendmsg+0x714/0xbd0 [ 63.085742][ T812] ____sys_sendmsg+0x3dd/0x890 [ 63.085906][ T812] ___sys_sendmsg+0xed/0x170 [ 63.086073][ T812] __sys_sendmsg+0x10b/0x1a0 [ 63.086241][ T812] do_syscall_64+0xc1/0xfd0 [ 63.086445][ T812] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 63.086650][ T812] [ 63.086848][ T812] The buggy address belongs to the object at ffff88800cf29000 [ 63.086848][ T812] which belongs to the cache kmalloc-4k of size 4096 [ 63.087252][ T812] The buggy address is located 1732 bytes inside of [ 63.087252][ T812] freed 4096-byte region [ffff88800cf29000, ffff88800cf2a000) [ 63.087766][ T812] [ 63.087854][ T812] The buggy address belongs to the physical page: [ 63.088059][ T812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xcf28 [ 63.088450][ T812] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 63.088741][ T812] flags: 0x80000000000040(head|node=0|zone=1) [ 63.089103][ T812] page_type: f5(slab) [ 63.089367][ T812] raw: 0080000000000040 ffff888001043700 ffffea0000264a10 ffffea00003ce210 [ 63.089667][ T812] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 63.089974][ T812] head: 0080000000000040 ffff888001043700 ffffea0000264a10 ffffea00003ce210 [ 63.090376][ T812] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 63.090666][ T812] head: 0080000000000003 ffffea000033ca01 00000000ffffffff 00000000ffffffff [ 63.091069][ T812] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 63.091360][ T812] page dumped because: kasan: bad access detected [ 63.091561][ T812] [ 63.091747][ T812] Memory state around the buggy address: [ 63.091905][ T812] ffff88800cf29580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.092154][ T812] ffff88800cf29600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.092389][ T812] >ffff88800cf29680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.092628][ T812] ^ [ 63.092851][ T812] ffff88800cf29700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.093195][ T812] ffff88800cf29780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.093431][ T812] ================================================================== [ 63.094369][ T812] Disabling lock debugging due to kernel taint [ 63.094611][ T812] ------------[ cut here ]------------ [ 63.094779][ T812] refcount_t: underflow; use-after-free. [ 63.095035][ T812] WARNING: CPU: 1 PID: 812 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 63.095372][ T812] Modules linked in: [ 63.095504][ T812] CPU: 1 UID: 0 PID: 812 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 63.095833][ T812] Tainted: [B]=BAD_PAGE [ 63.095957][ T812] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 63.096168][ T812] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 63.096389][ T812] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba 05 95 e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff [ 63.096961][ T812] RSP: 0018:ffffc90001cc71f0 EFLAGS: 00010286 [ 63.097168][ T812] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 63.097426][ T812] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 63.097667][ T812] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff2c00934 [ 63.097911][ T812] R10: 0000000000000003 R11: ffffc90001cc6d80 R12: 0000000000000001 [ 63.098153][ T812] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 63.098411][ T812] FS: 00007f6272ebc800(0000) GS:ffff8880d5b88000(0000) knlGS:0000000000000000 [ 63.098745][ T812] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 63.099001][ T812] CR2: 00007f39fe81f5f0 CR3: 0000000002548004 CR4: 0000000000772ef0 [ 63.099256][ T812] PKRU: 55555554 [ 63.099386][ T812] Call Trace: [ 63.099550][ T812] [ 63.099655][ T812] netdev_run_todo+0x5f0/0xc60 [ 63.099824][ T812] ? dev_ingress_queue_create+0x190/0x190 [ 63.099990][ T812] ? generic_xdp_install+0x410/0x410 [ 63.100175][ T812] ? unregister_netdevice_many+0x20/0x20 [ 63.100346][ T812] rtnl_dellink+0x350/0xa30 [ 63.100507][ T812] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 63.100740][ T812] ? find_held_lock+0x2b/0x80 [ 63.100914][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.101076][ T812] ? find_held_lock+0x2b/0x80 [ 63.101242][ T812] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 63.101405][ T812] ? __lock_release+0x5d/0x170 [ 63.101571][ T812] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 63.101772][ T812] rtnetlink_rcv_msg+0x709/0xc00 [ 63.101937][ T812] ? rtnl_port_fill+0x890/0x890 [ 63.102105][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.102273][ T812] netlink_rcv_skb+0x121/0x340 [ 63.102440][ T812] ? rtnl_port_fill+0x890/0x890 [ 63.102598][ T812] ? netlink_ack+0xdf0/0xdf0 [ 63.102787][ T812] ? netlink_deliver_tap+0x13e/0x340 [ 63.102946][ T812] ? netlink_deliver_tap+0xc3/0x340 [ 63.103104][ T812] netlink_unicast+0x4aa/0x780 [ 63.103269][ T812] ? netlink_attachskb+0x810/0x810 [ 63.103442][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.103604][ T812] netlink_sendmsg+0x714/0xbd0 [ 63.103795][ T812] ? netlink_unicast+0x780/0x780 [ 63.103951][ T812] ? __import_iovec+0x230/0x3b0 [ 63.104119][ T812] ? netlink_unicast+0x780/0x780 [ 63.104292][ T812] ____sys_sendmsg+0x3dd/0x890 [ 63.104462][ T812] ? get_timestamp.constprop.0+0x370/0x370 [ 63.104683][ T812] ? __copy_msghdr+0x3c0/0x3c0 [ 63.104858][ T812] ___sys_sendmsg+0xed/0x170 [ 63.105017][ T812] ? kasan_record_aux_stack+0x8c/0xa0 [ 63.105176][ T812] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 63.105487][ T812] ? copy_msghdr_from_user+0x110/0x110 [ 63.105658][ T812] ? find_held_lock+0x2b/0x80 [ 63.105832][ T812] ? __lock_acquire+0x449/0x7e0 [ 63.105994][ T812] ? find_held_lock+0x2b/0x80 [ 63.106157][ T812] ? __virt_addr_valid+0x22a/0x450 [ 63.106334][ T812] ? __lock_release+0x5d/0x170 [ 63.106493][ T812] __sys_sendmsg+0x10b/0x1a0 [ 63.106691][ T812] ? __call_rcu_common.constprop.0+0x318/0x630 [ 63.106891][ T812] ? __sys_sendmsg_sock+0x20/0x20 [ 63.107056][ T812] ? rcu_is_watching+0x12/0xb0 [ 63.107221][ T812] do_syscall_64+0xc1/0xfd0 [ 63.107454][ T812] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 63.107687][ T812] RIP: 0033:0x7f627308a1d7 [ 63.107895][ T812] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 63.108595][ T812] RSP: 002b:00007ffd03374fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.108887][ T812] RAX: ffffffffffffffda RBX: 00007ffd03375710 RCX: 00007f627308a1d7 [ 63.109162][ T812] RDX: 0000000000000000 RSI: 00007ffd03375040 RDI: 0000000000000005 [ 63.109411][ T812] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 63.109702][ T812] R10: 00007f6272f86510 R11: 0000000000000246 R12: 0000000000000002 [ 63.109975][ T812] R13: 00000000690df171 R14: 0000000000499600 R15: 0000000000000000 [ 63.110269][ T812] [ 63.110479][ T812] irq event stamp: 49683 [ 63.110678][ T812] hardirqs last enabled at (49683): [] finish_task_switch.isra.0+0x245/0x960 [ 63.111270][ T812] hardirqs last disabled at (49682): [] __schedule+0x94a/0x1b10 [ 63.111773][ T812] softirqs last enabled at (49498): [] handle_softirqs+0x352/0x610 [ 63.112266][ T812] softirqs last disabled at (49491): [] irq_exit_rcu+0xab/0x100 [ 63.112755][ T812] ---[ end trace 0000000000000000 ]---