[ 22.107987][ T287] tc (287) used greatest stack depth: 24448 bytes left
[ 64.524934][ T493] ==================================================================
[ 64.525270][ T493] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0
[ 64.525576][ T493] Read of size 1 at addr ffff88800b4446c4 by task ip/493
[ 64.525798][ T493]
[ 64.525915][ T493] CPU: 0 UID: 0 PID: 493 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 64.525923][ T493] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 64.525929][ T493] Call Trace:
[ 64.525933][ T493]
[ 64.525935][ T493] dump_stack_lvl+0x82/0xc0
[ 64.525941][ T493] print_address_description.constprop.0+0x2c/0x3a0
[ 64.525959][ T493] ? kobject_put+0xbb/0xd0
[ 64.525963][ T493] print_report+0xb4/0x270
[ 64.525967][ T493] ? kobject_put+0xbb/0xd0
[ 64.525972][ T493] ? kasan_addr_to_slab+0x21/0x70
[ 64.525976][ T493] ? kobject_put+0xbb/0xd0
[ 64.525979][ T493] kasan_report+0xca/0x100
[ 64.525983][ T493] ? kobject_put+0xbb/0xd0
[ 64.525988][ T493] kobject_put+0xbb/0xd0
[ 64.525992][ T493] netdev_run_todo+0x5f0/0xc60
[ 64.526004][ T493] ? dev_ingress_queue_create+0x190/0x190
[ 64.526008][ T493] ? generic_xdp_install+0x410/0x410
[ 64.526013][ T493] ? unregister_netdevice_many+0x20/0x20
[ 64.526020][ T493] rtnl_dellink+0x350/0xa30
[ 64.526028][ T493] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 64.526047][ T493] ? find_held_lock+0x2b/0x80
[ 64.526066][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.526071][ T493] ? find_held_lock+0x2b/0x80
[ 64.526075][ T493] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 64.526078][ T493] ? __lock_release+0x5d/0x170
[ 64.526082][ T493] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 64.526086][ T493] rtnetlink_rcv_msg+0x709/0xc00
[ 64.526090][ T493] ? rtnl_port_fill+0x890/0x890
[ 64.526094][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.526100][ T493] netlink_rcv_skb+0x121/0x340
[ 64.526106][ T493] ? rtnl_port_fill+0x890/0x890
[ 64.526110][ T493] ? netlink_ack+0xdf0/0xdf0
[ 64.526116][ T493] ? netlink_deliver_tap+0x13e/0x340
[ 64.526118][ T493] ? netlink_deliver_tap+0xc3/0x340
[ 64.526123][ T493] netlink_unicast+0x4aa/0x780
[ 64.526127][ T493] ? netlink_attachskb+0x810/0x810
[ 64.526131][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.526135][ T493] netlink_sendmsg+0x714/0xbd0
[ 64.526139][ T493] ? netlink_unicast+0x780/0x780
[ 64.526142][ T493] ? __import_iovec+0x230/0x3b0
[ 64.526158][ T493] ? netlink_unicast+0x780/0x780
[ 64.526162][ T493] ____sys_sendmsg+0x3dd/0x890
[ 64.526168][ T493] ? get_timestamp.constprop.0+0x370/0x370
[ 64.526170][ T493] ? __copy_msghdr+0x3c0/0x3c0
[ 64.526178][ T493] ___sys_sendmsg+0xed/0x170
[ 64.526180][ T493] ? kasan_record_aux_stack+0x8c/0xa0
[ 64.526184][ T493] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 64.526192][ T493] ? copy_msghdr_from_user+0x110/0x110
[ 64.526197][ T493] ? find_held_lock+0x2b/0x80
[ 64.526201][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.526206][ T493] ? find_held_lock+0x2b/0x80
[ 64.526210][ T493] ? __virt_addr_valid+0x22a/0x450
[ 64.526228][ T493] ? __lock_release+0x5d/0x170
[ 64.526234][ T493] __sys_sendmsg+0x10b/0x1a0
[ 64.526236][ T493] ? __call_rcu_common.constprop.0+0x318/0x630
[ 64.526239][ T493] ? __sys_sendmsg_sock+0x20/0x20
[ 64.526246][ T493] ? rcu_is_watching+0x12/0xb0
[ 64.526255][ T493] do_syscall_64+0xc1/0xfd0
[ 64.526263][ T493] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 64.526274][ T493] RIP: 0033:0x7fd753ab41d7
[ 64.526281][ T493] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 64.526285][ T493] RSP: 002b:00007ffd74556d88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 64.526294][ T493] RAX: ffffffffffffffda RBX: 00007ffd745574c0 RCX: 00007fd753ab41d7
[ 64.526297][ T493] RDX: 0000000000000000 RSI: 00007ffd74556df0 RDI: 0000000000000005
[ 64.526299][ T493] RBP: 0000000000000001 R08: 0000000000000003 R09: 0000000000000078
[ 64.526301][ T493] R10: 00007fd7539b0510 R11: 0000000000000246 R12: 0000000000000001
[ 64.526303][ T493] R13: 00000000690df37e R14: 0000000000499600 R15: 0000000000000000
[ 64.526309][ T493]
[ 64.526310][ T493]
[ 64.540053][ T493] Allocated by task 264:
[ 64.540284][ T493] kasan_save_stack+0x24/0x40
[ 64.540475][ T493] kasan_save_track+0x14/0x30
[ 64.540648][ T493] __kasan_kmalloc+0x7b/0x90
[ 64.540818][ T493] __kvmalloc_node_noprof+0x2e5/0x8e0
[ 64.541098][ T493] alloc_netdev_mqs+0x7d/0x1370
[ 64.541270][ T493] rtnl_create_link+0xa9e/0xe20
[ 64.541441][ T493] rtnl_newlink_create+0x203/0x8f0
[ 64.541606][ T493] __rtnl_newlink+0x231/0xa30
[ 64.541880][ T493] rtnl_newlink+0x693/0xa60
[ 64.542043][ T493] rtnetlink_rcv_msg+0x709/0xc00
[ 64.542210][ T493] netlink_rcv_skb+0x121/0x340
[ 64.542384][ T493] netlink_unicast+0x4aa/0x780
[ 64.542639][ T493] netlink_sendmsg+0x714/0xbd0
[ 64.542804][ T493] ____sys_sendmsg+0x3dd/0x890
[ 64.542975][ T493] ___sys_sendmsg+0xed/0x170
[ 64.543140][ T493] __sys_sendmsg+0x10b/0x1a0
[ 64.543402][ T493] do_syscall_64+0xc1/0xfd0
[ 64.543574][ T493] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 64.543782][ T493]
[ 64.543875][ T493] Freed by task 493:
[ 64.544003][ T493] kasan_save_stack+0x24/0x40
[ 64.544313][ T493] kasan_save_track+0x14/0x30
[ 64.544478][ T493] __kasan_save_free_info+0x3b/0x60
[ 64.544667][ T493] __kasan_slab_free+0x3f/0x60
[ 64.544842][ T493] kfree+0x21d/0x540
[ 64.545070][ T493] device_release+0x9c/0x210
[ 64.545267][ T493] kobject_cleanup+0xfe/0x360
[ 64.545441][ T493] netdev_run_todo+0x81f/0xc60
[ 64.545642][ T493] rtnl_dellink+0x350/0xa30
[ 64.545919][ T493] rtnetlink_rcv_msg+0x709/0xc00
[ 64.546105][ T493] netlink_rcv_skb+0x121/0x340
[ 64.546267][ T493] netlink_unicast+0x4aa/0x780
[ 64.546430][ T493] netlink_sendmsg+0x714/0xbd0
[ 64.546622][ T493] ____sys_sendmsg+0x3dd/0x890
[ 64.546785][ T493] ___sys_sendmsg+0xed/0x170
[ 64.546974][ T493] __sys_sendmsg+0x10b/0x1a0
[ 64.547144][ T493] do_syscall_64+0xc1/0xfd0
[ 64.547408][ T493] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 64.547609][ T493]
[ 64.547700][ T493] The buggy address belongs to the object at ffff88800b444000
[ 64.547700][ T493] which belongs to the cache kmalloc-4k of size 4096
[ 64.548218][ T493] The buggy address is located 1732 bytes inside of
[ 64.548218][ T493] freed 4096-byte region [ffff88800b444000, ffff88800b445000)
[ 64.548624][ T493]
[ 64.548713][ T493] The buggy address belongs to the physical page:
[ 64.549027][ T493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb440
[ 64.549329][ T493] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 64.549589][ T493] flags: 0x80000000000040(head|node=0|zone=1)
[ 64.549815][ T493] page_type: f5(slab)
[ 64.549967][ T493] raw: 0080000000000040 ffff888001043700 ffffea000036d610 ffffea000037e810
[ 64.550271][ T493] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 64.550671][ T493] head: 0080000000000040 ffff888001043700 ffffea000036d610 ffffea000037e810
[ 64.550990][ T493] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 64.551386][ T493] head: 0080000000000003 ffffea00002d1001 00000000ffffffff 00000000ffffffff
[ 64.551671][ T493] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 64.552081][ T493] page dumped because: kasan: bad access detected
[ 64.552286][ T493]
[ 64.552375][ T493] Memory state around the buggy address:
[ 64.552535][ T493] ffff88800b444580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.552893][ T493] ffff88800b444600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.553138][ T493] >ffff88800b444680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.553383][ T493] ^
[ 64.553681][ T493] ffff88800b444700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.553934][ T493] ffff88800b444780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 64.554298][ T493] ==================================================================
[ 64.555173][ T493] Disabling lock debugging due to kernel taint
[ 64.555483][ T493] ------------[ cut here ]------------
[ 64.555698][ T493] refcount_t: underflow; use-after-free.
[ 64.556024][ T493] WARNING: CPU: 2 PID: 493 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0
[ 64.556395][ T493] Modules linked in: xt_length nft_compat nf_tables act_ct nf_flow_table nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 cls_flower sch_ingress
[ 64.556928][ T493] CPU: 2 UID: 0 PID: 493 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 64.557331][ T493] Tainted: [B]=BAD_PAGE
[ 64.557476][ T493] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 64.557737][ T493] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0
[ 64.558054][ T493] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba 45 9c e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff
[ 64.558712][ T493] RSP: 0018:ffffc90000cb71f0 EFLAGS: 00010286
[ 64.558959][ T493] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 64.559266][ T493] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001
[ 64.559535][ T493] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff3a80934
[ 64.559829][ T493] R10: 0000000000000003 R11: ffffc90000cb6d80 R12: 0000000000000001
[ 64.560129][ T493] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100
[ 64.560413][ T493] FS: 00007fd7538e6800(0000) GS:ffff8880c8408000(0000) knlGS:0000000000000000
[ 64.560725][ T493] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 64.560978][ T493] CR2: 0000564c93371d18 CR3: 000000000aa3a003 CR4: 0000000000772ef0
[ 64.561376][ T493] PKRU: 55555554
[ 64.561524][ T493] Call Trace:
[ 64.561700][ T493]
[ 64.561807][ T493] netdev_run_todo+0x5f0/0xc60
[ 64.562016][ T493] ? dev_ingress_queue_create+0x190/0x190
[ 64.562334][ T493] ? generic_xdp_install+0x410/0x410
[ 64.562530][ T493] ? unregister_netdevice_many+0x20/0x20
[ 64.562744][ T493] rtnl_dellink+0x350/0xa30
[ 64.562950][ T493] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 64.563311][ T493] ? find_held_lock+0x2b/0x80
[ 64.563499][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.563694][ T493] ? find_held_lock+0x2b/0x80
[ 64.564008][ T493] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 64.564202][ T493] ? __lock_release+0x5d/0x170
[ 64.564423][ T493] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 64.564660][ T493] rtnetlink_rcv_msg+0x709/0xc00
[ 64.564975][ T493] ? rtnl_port_fill+0x890/0x890
[ 64.565176][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.565382][ T493] netlink_rcv_skb+0x121/0x340
[ 64.565577][ T493] ? rtnl_port_fill+0x890/0x890
[ 64.565761][ T493] ? netlink_ack+0xdf0/0xdf0
[ 64.565965][ T493] ? netlink_deliver_tap+0x13e/0x340
[ 64.566167][ T493] ? netlink_deliver_tap+0xc3/0x340
[ 64.566367][ T493] netlink_unicast+0x4aa/0x780
[ 64.566560][ T493] ? netlink_attachskb+0x810/0x810
[ 64.566738][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.566941][ T493] netlink_sendmsg+0x714/0xbd0
[ 64.567142][ T493] ? netlink_unicast+0x780/0x780
[ 64.567345][ T493] ? __import_iovec+0x230/0x3b0
[ 64.567529][ T493] ? netlink_unicast+0x780/0x780
[ 64.567721][ T493] ____sys_sendmsg+0x3dd/0x890
[ 64.567935][ T493] ? get_timestamp.constprop.0+0x370/0x370
[ 64.568172][ T493] ? __copy_msghdr+0x3c0/0x3c0
[ 64.568417][ T493] ___sys_sendmsg+0xed/0x170
[ 64.568606][ T493] ? kasan_record_aux_stack+0x8c/0xa0
[ 64.568789][ T493] ? __call_rcu_common.constprop.0+0xa8/0x630
[ 64.569033][ T493] ? copy_msghdr_from_user+0x110/0x110
[ 64.569232][ T493] ? find_held_lock+0x2b/0x80
[ 64.569437][ T493] ? __lock_acquire+0x449/0x7e0
[ 64.569632][ T493] ? find_held_lock+0x2b/0x80
[ 64.569811][ T493] ? __virt_addr_valid+0x22a/0x450
[ 64.570010][ T493] ? __lock_release+0x5d/0x170
[ 64.570212][ T493] __sys_sendmsg+0x10b/0x1a0
[ 64.570422][ T493] ? __call_rcu_common.constprop.0+0x318/0x630
[ 64.570654][ T493] ? __sys_sendmsg_sock+0x20/0x20
[ 64.570843][ T493] ? rcu_is_watching+0x12/0xb0
[ 64.571033][ T493] do_syscall_64+0xc1/0xfd0
[ 64.571233][ T493] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 64.571465][ T493] RIP: 0033:0x7fd753ab41d7
[ 64.571672][ T493] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 64.572314][ T493] RSP: 002b:00007ffd74556d88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 64.572601][ T493] RAX: ffffffffffffffda RBX: 00007ffd745574c0 RCX: 00007fd753ab41d7
[ 64.572880][ T493] RDX: 0000000000000000 RSI: 00007ffd74556df0 RDI: 0000000000000005
[ 64.573175][ T493] RBP: 0000000000000001 R08: 0000000000000003 R09: 0000000000000078
[ 64.573453][ T493] R10: 00007fd7539b0510 R11: 0000000000000246 R12: 0000000000000001
[ 64.573726][ T493] R13: 00000000690df37e R14: 0000000000499600 R15: 0000000000000000
[ 64.574013][ T493]
[ 64.574176][ T493] irq event stamp: 50399
[ 64.574351][ T493] hardirqs last enabled at (50399): [] finish_task_switch.isra.0+0x245/0x960
[ 64.574714][ T493] hardirqs last disabled at (50398): [] __schedule+0x94a/0x1b10
[ 64.575052][ T493] softirqs last enabled at (49192): [] unregister_netdevice_many_notify+0x714/0x1c90
[ 64.575421][ T493] softirqs last disabled at (49190): [] dev_mc_flush+0x54/0x90
[ 64.575755][ T493] ---[ end trace 0000000000000000 ]---
[ 64.584662][ T493] ip (493) used greatest stack depth: 24232 bytes left