[ 19.604673][ T283] ip (283) used greatest stack depth: 23624 bytes left
[ 24.250915][ T308] eth1: renamed from tmp
[ 30.805871][ T355] br0: port 1(eth1) entered blocking state
[ 30.806294][ T355] br0: port 1(eth1) entered disabled state
[ 30.806750][ T355] eth1: entered allmulticast mode
[ 30.809673][ T355] eth1: entered promiscuous mode
[ 31.325198][ T359] br0: port 1(eth1) entered blocking state
[ 31.325905][ T359] br0: port 1(eth1) entered forwarding state
[ 31.637697][ T361] br0: port 1(eth1) entered disabled state
[ 31.640464][ T361] br0: port 1(eth1) entered blocking state
[ 31.641137][ T361] br0: port 1(eth1) entered forwarding state
[ 41.506671][ T398] br0: port 1(eth1) entered disabled state
[ 41.508761][ T398] br0: port 1(eth1) entered blocking state
[ 41.509186][ T398] br0: port 1(eth1) entered forwarding state
[ 49.539053][ T451] eth1: left allmulticast mode
[ 49.539455][ T451] eth1: left promiscuous mode
[ 49.539948][ T451] br0: port 1(eth1) entered disabled state
[ 49.614169][ T451] ==================================================================
[ 49.614656][ T451] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0
[ 49.615079][ T451] Read of size 1 at addr ffff88800a8396c4 by task ip/451
[ 49.615416][ T451]
[ 49.615557][ T451] CPU: 0 UID: 0 PID: 451 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 49.615564][ T451] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 49.615567][ T451] Call Trace:
[ 49.615570][ T451]
[ 49.615573][ T451] dump_stack_lvl+0x82/0xc0
[ 49.615582][ T451] print_address_description.constprop.0+0x2c/0x3a0
[ 49.615593][ T451] ? kobject_put+0xbb/0xd0
[ 49.615599][ T451] print_report+0xb4/0x270
[ 49.615604][ T451] ? kobject_put+0xbb/0xd0
[ 49.615609][ T451] ? kasan_addr_to_slab+0x21/0x70
[ 49.615615][ T451] ? kobject_put+0xbb/0xd0
[ 49.615619][ T451] kasan_report+0xca/0x100
[ 49.615626][ T451] ? kobject_put+0xbb/0xd0
[ 49.615635][ T451] kobject_put+0xbb/0xd0
[ 49.615640][ T451] netdev_run_todo+0x5f0/0xc60
[ 49.615651][ T451] ? dev_ingress_queue_create+0x190/0x190
[ 49.615657][ T451] ? generic_xdp_install+0x410/0x410
[ 49.615662][ T451] ? kernfs_put.part.0+0x12d/0x480
[ 49.615673][ T451] ? unregister_netdevice_many+0x20/0x20
[ 49.615681][ T451] ? br_dev_delete+0x115/0x1a0
[ 49.615689][ T451] rtnl_dellink+0x350/0xa30
[ 49.615700][ T451] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 49.615736][ T451] ? find_held_lock+0x2b/0x80
[ 49.615749][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.615759][ T451] ? find_held_lock+0x2b/0x80
[ 49.615766][ T451] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 49.615771][ T451] ? __lock_release+0x5d/0x170
[ 49.615778][ T451] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 49.615784][ T451] rtnetlink_rcv_msg+0x709/0xc00
[ 49.615791][ T451] ? rtnl_port_fill+0x890/0x890
[ 49.615797][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.615809][ T451] netlink_rcv_skb+0x121/0x340
[ 49.615815][ T451] ? rtnl_port_fill+0x890/0x890
[ 49.615822][ T451] ? netlink_ack+0xdf0/0xdf0
[ 49.615834][ T451] ? netlink_deliver_tap+0x13e/0x340
[ 49.615838][ T451] ? netlink_deliver_tap+0xc3/0x340
[ 49.615844][ T451] netlink_unicast+0x4aa/0x780
[ 49.615852][ T451] ? netlink_attachskb+0x810/0x810
[ 49.615857][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.615864][ T451] netlink_sendmsg+0x714/0xbd0
[ 49.615870][ T451] ? netlink_unicast+0x780/0x780
[ 49.615876][ T451] ? __import_iovec+0x230/0x3b0
[ 49.615885][ T451] ? netlink_unicast+0x780/0x780
[ 49.615891][ T451] ____sys_sendmsg+0x3dd/0x890
[ 49.615899][ T451] ? get_timestamp.constprop.0+0x370/0x370
[ 49.615903][ T451] ? __copy_msghdr+0x3c0/0x3c0
[ 49.615917][ T451] ___sys_sendmsg+0xed/0x170
[ 49.615922][ T451] ? kasan_record_aux_stack+0x8c/0xa0
[ 49.615928][ T451] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 49.615937][ T451] ? copy_msghdr_from_user+0x110/0x110
[ 49.615945][ T451] ? find_held_lock+0x2b/0x80
[ 49.615953][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.615962][ T451] ? find_held_lock+0x2b/0x80
[ 49.615969][ T451] ? __virt_addr_valid+0x22a/0x450
[ 49.615979][ T451] ? __lock_release+0x5d/0x170
[ 49.615990][ T451] __sys_sendmsg+0x10b/0x1a0
[ 49.615995][ T451] ? __call_rcu_common.constprop.0+0x318/0x630
[ 49.616000][ T451] ? __sys_sendmsg_sock+0x20/0x20
[ 49.616014][ T451] ? rcu_is_watching+0x12/0xb0
[ 49.616025][ T451] do_syscall_64+0xc1/0xfd0
[ 49.616034][ T451] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 49.616041][ T451] RIP: 0033:0x7f8b5c0e71d7
[ 49.616048][ T451] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 49.616053][ T451] RSP: 002b:00007ffe2972bee8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 49.616060][ T451] RAX: ffffffffffffffda RBX: 00007ffe2972c610 RCX: 00007f8b5c0e71d7
[ 49.616063][ T451] RDX: 0000000000000000 RSI: 00007ffe2972bf50 RDI: 0000000000000005
[ 49.616066][ T451] RBP: 0000000000000001 R08: 0000000000000003 R09: 0000000000000078
[ 49.616069][ T451] R10: 00007f8b5bfe3f60 R11: 0000000000000246 R12: 0000000000000001
[ 49.616072][ T451] R13: 00000000690df195 R14: 0000000000499600 R15: 0000000000000000
[ 49.616085][ T451]
[ 49.616087][ T451]
[ 49.629670][ T451] Allocated by task 400:
[ 49.629816][ T451] kasan_save_stack+0x24/0x40
[ 49.630004][ T451] kasan_save_track+0x14/0x30
[ 49.630182][ T451] __kasan_kmalloc+0x7b/0x90
[ 49.630362][ T451] __kvmalloc_node_noprof+0x2e5/0x8e0
[ 49.630545][ T451] alloc_netdev_mqs+0x7d/0x1370
[ 49.630725][ T451] rtnl_create_link+0xa9e/0xe20
[ 49.630903][ T451] rtnl_newlink_create+0x203/0x8f0
[ 49.631081][ T451] __rtnl_newlink+0x231/0xa30
[ 49.631262][ T451] rtnl_newlink+0x693/0xa60
[ 49.631438][ T451] rtnetlink_rcv_msg+0x709/0xc00
[ 49.631615][ T451] netlink_rcv_skb+0x121/0x340
[ 49.631787][ T451] netlink_unicast+0x4aa/0x780
[ 49.631965][ T451] netlink_sendmsg+0x714/0xbd0
[ 49.632141][ T451] ____sys_sendmsg+0x3dd/0x890
[ 49.632318][ T451] ___sys_sendmsg+0xed/0x170
[ 49.632491][ T451] __sys_sendmsg+0x10b/0x1a0
[ 49.632667][ T451] do_syscall_64+0xc1/0xfd0
[ 49.632841][ T451] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 49.633058][ T451]
[ 49.633154][ T451] Freed by task 451:
[ 49.633289][ T451] kasan_save_stack+0x24/0x40
[ 49.633472][ T451] kasan_save_track+0x14/0x30
[ 49.633646][ T451] __kasan_save_free_info+0x3b/0x60
[ 49.633825][ T451] __kasan_slab_free+0x3f/0x60
[ 49.634001][ T451] kfree+0x21d/0x540
[ 49.634132][ T451] device_release+0x9c/0x210
[ 49.634307][ T451] kobject_cleanup+0xfe/0x360
[ 49.634486][ T451] netdev_run_todo+0x81f/0xc60
[ 49.634660][ T451] rtnl_dellink+0x350/0xa30
[ 49.634837][ T451] rtnetlink_rcv_msg+0x709/0xc00
[ 49.635014][ T451] netlink_rcv_skb+0x121/0x340
[ 49.635188][ T451] netlink_unicast+0x4aa/0x780
[ 49.635362][ T451] netlink_sendmsg+0x714/0xbd0
[ 49.635543][ T451] ____sys_sendmsg+0x3dd/0x890
[ 49.635714][ T451] ___sys_sendmsg+0xed/0x170
[ 49.635885][ T451] __sys_sendmsg+0x10b/0x1a0
[ 49.636062][ T451] do_syscall_64+0xc1/0xfd0
[ 49.636239][ T451] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 49.636455][ T451]
[ 49.636546][ T451] The buggy address belongs to the object at ffff88800a839000
[ 49.636546][ T451] which belongs to the cache kmalloc-4k of size 4096
[ 49.636983][ T451] The buggy address is located 1732 bytes inside of
[ 49.636983][ T451] freed 4096-byte region [ffff88800a839000, ffff88800a83a000)
[ 49.637403][ T451]
[ 49.637490][ T451] The buggy address belongs to the physical page:
[ 49.637701][ T451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa838
[ 49.638012][ T451] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 49.638275][ T451] flags: 0x80000000000040(head|node=0|zone=1)
[ 49.638494][ T451] page_type: f5(slab)
[ 49.638637][ T451] raw: 0080000000000040 ffff888001043700 ffffea00002b6410 ffffea0000402410
[ 49.638961][ T451] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 49.639278][ T451] head: 0080000000000040 ffff888001043700 ffffea00002b6410 ffffea0000402410
[ 49.639595][ T451] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 49.639907][ T451] head: 0080000000000003 ffffea00002a0e01 00000000ffffffff 00000000ffffffff
[ 49.640222][ T451] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 49.640538][ T451] page dumped because: kasan: bad access detected
[ 49.640757][ T451]
[ 49.640847][ T451] Memory state around the buggy address:
[ 49.641017][ T451] ffff88800a839580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.641276][ T451] ffff88800a839600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.641623][ T451] >ffff88800a839680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.641885][ T451] ^
[ 49.642098][ T451] ffff88800a839700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.642442][ T451] ffff88800a839780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 49.642694][ T451] ==================================================================
[ 49.643473][ T451] Disabling lock debugging due to kernel taint
[ 49.643760][ T451] ------------[ cut here ]------------
[ 49.643973][ T451] refcount_t: underflow; use-after-free.
[ 49.644252][ T451] WARNING: CPU: 1 PID: 451 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0
[ 49.644729][ T451] Modules linked in:
[ 49.644941][ T451] CPU: 1 UID: 0 PID: 451 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 49.645510][ T451] Tainted: [B]=BAD_PAGE
[ 49.645725][ T451] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 49.646080][ T451] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0
[ 49.646460][ T451] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba e5 92 e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff
[ 49.647479][ T451] RSP: 0018:ffffc900010271f0 EFLAGS: 00010286
[ 49.647838][ T451] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 49.648255][ T451] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001
[ 49.648682][ T451] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff27c0934
[ 49.649026][ T451] R10: 0000000000000003 R11: ffffc90001026d80 R12: 0000000000000001
[ 49.649302][ T451] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100
[ 49.649574][ T451] FS: 00007f8b5bf19800(0000) GS:ffff8880d7d88000(0000) knlGS:0000000000000000
[ 49.649878][ T451] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 49.650139][ T451] CR2: 00007fc754e71980 CR3: 000000000a02d004 CR4: 0000000000772ef0
[ 49.650407][ T451] PKRU: 55555554
[ 49.650552][ T451] Call Trace:
[ 49.650684][ T451]
[ 49.650774][ T451] netdev_run_todo+0x5f0/0xc60
[ 49.650951][ T451] ? dev_ingress_queue_create+0x190/0x190
[ 49.651134][ T451] ? generic_xdp_install+0x410/0x410
[ 49.651314][ T451] ? kernfs_put.part.0+0x12d/0x480
[ 49.651499][ T451] ? unregister_netdevice_many+0x20/0x20
[ 49.651674][ T451] ? br_dev_delete+0x115/0x1a0
[ 49.651870][ T451] rtnl_dellink+0x350/0xa30
[ 49.652059][ T451] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 49.652288][ T451] ? find_held_lock+0x2b/0x80
[ 49.652573][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.652759][ T451] ? find_held_lock+0x2b/0x80
[ 49.652945][ T451] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 49.653210][ T451] ? __lock_release+0x5d/0x170
[ 49.653683][ T451] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 49.654027][ T451] rtnetlink_rcv_msg+0x709/0xc00
[ 49.654310][ T451] ? rtnl_port_fill+0x890/0x890
[ 49.654772][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.655058][ T451] netlink_rcv_skb+0x121/0x340
[ 49.655348][ T451] ? rtnl_port_fill+0x890/0x890
[ 49.655635][ T451] ? netlink_ack+0xdf0/0xdf0
[ 49.655953][ T451] ? netlink_deliver_tap+0x13e/0x340
[ 49.656133][ T451] ? netlink_deliver_tap+0xc3/0x340
[ 49.656306][ T451] netlink_unicast+0x4aa/0x780
[ 49.656485][ T451] ? netlink_attachskb+0x810/0x810
[ 49.656760][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.656945][ T451] netlink_sendmsg+0x714/0xbd0
[ 49.657184][ T451] ? netlink_unicast+0x780/0x780
[ 49.657458][ T451] ? __import_iovec+0x230/0x3b0
[ 49.657878][ T451] ? netlink_unicast+0x780/0x780
[ 49.658147][ T451] ____sys_sendmsg+0x3dd/0x890
[ 49.658419][ T451] ? get_timestamp.constprop.0+0x370/0x370
[ 49.658777][ T451] ? __copy_msghdr+0x3c0/0x3c0
[ 49.659238][ T451] ___sys_sendmsg+0xed/0x170
[ 49.659538][ T451] ? kasan_record_aux_stack+0x8c/0xa0
[ 49.659821][ T451] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 49.660165][ T451] ? copy_msghdr_from_user+0x110/0x110
[ 49.660636][ T451] ? find_held_lock+0x2b/0x80
[ 49.660916][ T451] ? __lock_acquire+0x449/0x7e0
[ 49.661198][ T451] ? find_held_lock+0x2b/0x80
[ 49.661489][ T451] ? __virt_addr_valid+0x22a/0x450
[ 49.661954][ T451] ? __lock_release+0x5d/0x170
[ 49.662253][ T451] __sys_sendmsg+0x10b/0x1a0
[ 49.662485][ T451] ? __call_rcu_common.constprop.0+0x318/0x630
[ 49.662753][ T451] ? __sys_sendmsg_sock+0x20/0x20
[ 49.663021][ T451] ? rcu_is_watching+0x12/0xb0
[ 49.663213][ T451] do_syscall_64+0xc1/0xfd0
[ 49.663374][ T451] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 49.663676][ T451] RIP: 0033:0x7f8b5c0e71d7
[ 49.663856][ T451] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 49.664595][ T451] RSP: 002b:00007ffe2972bee8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 49.664858][ T451] RAX: ffffffffffffffda RBX: 00007ffe2972c610 RCX: 00007f8b5c0e71d7
[ 49.665133][ T451] RDX: 0000000000000000 RSI: 00007ffe2972bf50 RDI: 0000000000000005
[ 49.665474][ T451] RBP: 0000000000000001 R08: 0000000000000003 R09: 0000000000000078
[ 49.665710][ T451] R10: 00007f8b5bfe3f60 R11: 0000000000000246 R12: 0000000000000001
[ 49.666054][ T451] R13: 00000000690df195 R14: 0000000000499600 R15: 0000000000000000
[ 49.666300][ T451]
[ 49.666420][ T451] irq event stamp: 102245
[ 49.666580][ T451] hardirqs last enabled at (102245): [] finish_task_switch.isra.0+0x245/0x960
[ 49.667042][ T451] hardirqs last disabled at (102244): [] __schedule+0x94a/0x1b10
[ 49.667344][ T451] softirqs last enabled at (102154): [] handle_softirqs+0x352/0x610
[ 49.667747][ T451] softirqs last disabled at (102143): [] irq_exit_rcu+0xab/0x100
[ 49.668045][ T451] ---[ end trace 0000000000000000 ]---
[ 56.517880][ T536] eth1: renamed from tmp
[ 56.895515][ T540] eth2: renamed from tmp
[ 72.417670][ T711] eth1: renamed from tmp