[ 18.882249][ T272] u32 classifier [ 18.882571][ T272] input device check on [ 18.882877][ T272] Actions configured [ 19.008638][ T273] Mirror/redirect action on [ 85.998952][ T70] ================================================================== [ 85.999417][ T70] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 85.999828][ T70] Read of size 1 at addr ffff88800f3896c4 by task kworker/u16:1/70 [ 86.000249][ T70] [ 86.000394][ T70] CPU: 0 UID: 0 PID: 70 Comm: kworker/u16:1 Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 86.000402][ T70] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 86.000407][ T70] Workqueue: netns cleanup_net [ 86.000421][ T70] Call Trace: [ 86.000424][ T70] [ 86.000428][ T70] dump_stack_lvl+0x82/0xc0 [ 86.000439][ T70] print_address_description.constprop.0+0x2c/0x3a0 [ 86.000451][ T70] ? kobject_put+0xbb/0xd0 [ 86.000458][ T70] print_report+0xb4/0x270 [ 86.000463][ T70] ? kobject_put+0xbb/0xd0 [ 86.000468][ T70] ? kasan_addr_to_slab+0x21/0x70 [ 86.000474][ T70] ? kobject_put+0xbb/0xd0 [ 86.000478][ T70] kasan_report+0xca/0x100 [ 86.000486][ T70] ? kobject_put+0xbb/0xd0 [ 86.000496][ T70] kobject_put+0xbb/0xd0 [ 86.000502][ T70] netdev_run_todo+0x5f0/0xc60 [ 86.000509][ T70] ? dev_ingress_queue_create+0x190/0x190 [ 86.000515][ T70] ? generic_xdp_install+0x410/0x410 [ 86.000520][ T70] ? net_generic+0xb1/0x1f0 [ 86.000534][ T70] ops_undo_list+0x714/0x890 [ 86.000543][ T70] ? rtnl_net_dumpid_one+0x270/0x270 [ 86.000548][ T70] ? cleanup_net+0x2d6/0x8b0 [ 86.000559][ T70] cleanup_net+0x3b2/0x8b0 [ 86.000566][ T70] ? net_passive_dec+0x190/0x190 [ 86.000574][ T70] ? rcu_is_watching+0x12/0xb0 [ 86.000583][ T70] process_one_work+0xe35/0x1650 [ 86.000596][ T70] ? pwq_dec_nr_in_flight+0x550/0x550 [ 86.000606][ T70] ? assign_work+0x168/0x240 [ 86.000613][ T70] worker_thread+0x591/0xcf0 [ 86.000624][ T70] ? rescuer_thread+0xd10/0xd10 [ 86.000631][ T70] kthread+0x37b/0x5f0 [ 86.000637][ T70] ? kthread_is_per_cpu+0xc0/0xc0 [ 86.000642][ T70] ? ret_from_fork+0x1b/0x270 [ 86.000648][ T70] ? __lock_release+0x5d/0x170 [ 86.000655][ T70] ? rcu_is_watching+0x12/0xb0 [ 86.000660][ T70] ? kthread_is_per_cpu+0xc0/0xc0 [ 86.000666][ T70] ret_from_fork+0x1db/0x270 [ 86.000671][ T70] ? kthread_is_per_cpu+0xc0/0xc0 [ 86.000676][ T70] ret_from_fork_asm+0x11/0x20 [ 86.000692][ T70] [ 86.000694][ T70] [ 86.013441][ T70] Allocated by task 258: [ 86.013659][ T70] kasan_save_stack+0x24/0x40 [ 86.013946][ T70] kasan_save_track+0x14/0x30 [ 86.014221][ T70] __kasan_kmalloc+0x7b/0x90 [ 86.014501][ T70] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 86.014959][ T70] alloc_netdev_mqs+0x7d/0x1370 [ 86.015237][ T70] ip6_tnl_init_net+0x102/0x3f0 [ 86.015515][ T70] ops_init+0x189/0x550 [ 86.015722][ T70] setup_net+0xf1/0x380 [ 86.015926][ T70] copy_net_ns+0x253/0x510 [ 86.016366][ T70] create_new_namespaces+0x35f/0x900 [ 86.016639][ T70] unshare_nsproxy_namespaces+0x8a/0x1a0 [ 86.016912][ T70] ksys_unshare+0x2be/0x6e0 [ 86.017208][ T70] __x64_sys_unshare+0x31/0x40 [ 86.017658][ T70] do_syscall_64+0xc1/0xfd0 [ 86.017938][ T70] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 86.018290][ T70] [ 86.018428][ T70] Freed by task 70: [ 86.018630][ T70] kasan_save_stack+0x24/0x40 [ 86.018910][ T70] kasan_save_track+0x14/0x30 [ 86.019188][ T70] __kasan_save_free_info+0x3b/0x60 [ 86.019466][ T70] __kasan_slab_free+0x3f/0x60 [ 86.019917][ T70] kfree+0x21d/0x540 [ 86.020124][ T70] device_release+0x9c/0x210 [ 86.020405][ T70] kobject_cleanup+0xfe/0x360 [ 86.020681][ T70] netdev_run_todo+0x81f/0xc60 [ 86.021122][ T70] ops_undo_list+0x714/0x890 [ 86.021390][ T70] cleanup_net+0x3b2/0x8b0 [ 86.021655][ T70] process_one_work+0xe35/0x1650 [ 86.021928][ T70] worker_thread+0x591/0xcf0 [ 86.022355][ T70] kthread+0x37b/0x5f0 [ 86.022569][ T70] ret_from_fork+0x1db/0x270 [ 86.022845][ T70] ret_from_fork_asm+0x11/0x20 [ 86.023119][ T70] [ 86.023257][ T70] The buggy address belongs to the object at ffff88800f389000 [ 86.023257][ T70] which belongs to the cache kmalloc-4k of size 4096 [ 86.024073][ T70] The buggy address is located 1732 bytes inside of [ 86.024073][ T70] freed 4096-byte region [ffff88800f389000, ffff88800f38a000) [ 86.024882][ T70] [ 86.025015][ T70] The buggy address belongs to the physical page: [ 86.025338][ T70] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xf388 [ 86.025822][ T70] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 86.026434][ T70] flags: 0x80000000000040(head|node=0|zone=1) [ 86.026796][ T70] page_type: f5(slab) [ 86.027025][ T70] raw: 0080000000000040 ffff888001043700 ffffea00003d4610 ffffea00003df010 [ 86.027706][ T70] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 86.028199][ T70] head: 0080000000000040 ffff888001043700 ffffea00003d4610 ffffea00003df010 [ 86.028695][ T70] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 86.029182][ T70] head: 0080000000000003 ffffea00003ce201 00000000ffffffff 00000000ffffffff [ 86.029839][ T70] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 86.030337][ T70] page dumped because: kasan: bad access detected [ 86.030679][ T70] [ 86.030820][ T70] Memory state around the buggy address: [ 86.031246][ T70] ffff88800f389580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.031660][ T70] ffff88800f389600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.032054][ T70] >ffff88800f389680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.032604][ T70] ^ [ 86.032944][ T70] ffff88800f389700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.033339][ T70] ffff88800f389780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 86.033894][ T70] ================================================================== [ 86.034537][ T70] Disabling lock debugging due to kernel taint [ 86.034799][ T70] ------------[ cut here ]------------ [ 86.034956][ T70] refcount_t: underflow; use-after-free. [ 86.035143][ T70] WARNING: CPU: 1 PID: 70 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 86.035430][ T70] Modules linked in: act_mirred cls_u32 sch_ingress ifb [ 86.035930][ T70] CPU: 1 UID: 0 PID: 70 Comm: kworker/u16:1 Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 86.036296][ T70] Tainted: [B]=BAD_PAGE [ 86.036419][ T70] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 86.036644][ T70] Workqueue: netns cleanup_net [ 86.036891][ T70] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 86.037122][ T70] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba e5 ba e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff [ 86.037770][ T70] RSP: 0018:ffffc900004b7a08 EFLAGS: 00010282 [ 86.037997][ T70] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 86.038374][ T70] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 86.038652][ T70] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff77c0934 [ 86.038906][ T70] R10: 0000000000000003 R11: ffffc900004b7580 R12: 0000000000000001 [ 86.039151][ T70] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 86.039527][ T70] FS: 0000000000000000(0000) GS:ffff8880afd88000(0000) knlGS:0000000000000000 [ 86.039834][ T70] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 86.040062][ T70] CR2: 00005646c342c880 CR3: 0000000015d8d002 CR4: 0000000000772ef0 [ 86.040324][ T70] PKRU: 55555554 [ 86.040448][ T70] Call Trace: [ 86.040601][ T70] [ 86.040692][ T70] netdev_run_todo+0x5f0/0xc60 [ 86.040882][ T70] ? dev_ingress_queue_create+0x190/0x190 [ 86.041055][ T70] ? generic_xdp_install+0x410/0x410 [ 86.041230][ T70] ? net_generic+0xb1/0x1f0 [ 86.041403][ T70] ops_undo_list+0x714/0x890 [ 86.041600][ T70] ? rtnl_net_dumpid_one+0x270/0x270 [ 86.041768][ T70] ? cleanup_net+0x2d6/0x8b0 [ 86.041949][ T70] cleanup_net+0x3b2/0x8b0 [ 86.042130][ T70] ? net_passive_dec+0x190/0x190 [ 86.042306][ T70] ? rcu_is_watching+0x12/0xb0 [ 86.042475][ T70] process_one_work+0xe35/0x1650 [ 86.042656][ T70] ? pwq_dec_nr_in_flight+0x550/0x550 [ 86.042810][ T70] ? assign_work+0x168/0x240 [ 86.042971][ T70] worker_thread+0x591/0xcf0 [ 86.043140][ T70] ? rescuer_thread+0xd10/0xd10 [ 86.043306][ T70] kthread+0x37b/0x5f0 [ 86.043432][ T70] ? kthread_is_per_cpu+0xc0/0xc0 [ 86.043607][ T70] ? ret_from_fork+0x1b/0x270 [ 86.043760][ T70] ? __lock_release+0x5d/0x170 [ 86.043916][ T70] ? rcu_is_watching+0x12/0xb0 [ 86.044077][ T70] ? kthread_is_per_cpu+0xc0/0xc0 [ 86.044242][ T70] ret_from_fork+0x1db/0x270 [ 86.044391][ T70] ? kthread_is_per_cpu+0xc0/0xc0 [ 86.044557][ T70] ret_from_fork_asm+0x11/0x20 [ 86.044725][ T70] [ 86.044843][ T70] irq event stamp: 13963 [ 86.044969][ T70] hardirqs last enabled at (13963): [] finish_task_switch.isra.0+0x245/0x960 [ 86.045299][ T70] hardirqs last disabled at (13962): [] __schedule+0x94a/0x1b10 [ 86.045608][ T70] softirqs last enabled at (13792): [] handle_softirqs+0x352/0x610 [ 86.045898][ T70] softirqs last disabled at (13775): [] irq_exit_rcu+0xab/0x100 [ 86.046174][ T70] ---[ end trace 0000000000000000 ]---