[ 15.056438][ T254] ip (254) used greatest stack depth: 24688 bytes left [ 15.226395][ T256] ip (256) used greatest stack depth: 24392 bytes left [ 17.025668][ T285] gre: GRE over IPv4 demultiplexer driver [ 17.048338][ T285] ip6_gre: GRE over IPv6 tunneling driver [ 17.259728][ T72] ip6_tunnel: er6 xmit: Local address not yet configured! [ 17.568515][ T72] ip6_tunnel: gt6 xmit: Local address not yet configured! [ 17.658440][ T72] ip6_tunnel: er6 xmit: Local address not yet configured! [ 17.681545][ T72] ip6_tunnel: gt6 xmit: Local address not yet configured! [ 17.697657][ T12] ip6_tunnel: gt6 xmit: Local address not yet configured! [ 17.953719][ T12] ip6_tunnel: er6 xmit: Local address not yet configured! [ 18.995854][ T295] Mirror/redirect action on [ 19.020428][ T293] tc (293) used greatest stack depth: 24176 bytes left [ 23.837030][ T302] ================================================================== [ 23.837338][ T302] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 23.837596][ T302] Read of size 1 at addr ffff8880087c46c4 by task ip/302 [ 23.837835][ T302] [ 23.837929][ T302] CPU: 3 UID: 0 PID: 302 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 23.837934][ T302] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 23.837936][ T302] Call Trace: [ 23.837938][ T302] [ 23.837940][ T302] dump_stack_lvl+0x82/0xc0 [ 23.837947][ T302] print_address_description.constprop.0+0x2c/0x3a0 [ 23.837954][ T302] ? kobject_put+0xbb/0xd0 [ 23.837958][ T302] print_report+0xb4/0x270 [ 23.837961][ T302] ? kobject_put+0xbb/0xd0 [ 23.837964][ T302] ? kasan_addr_to_slab+0x21/0x70 [ 23.837968][ T302] ? kobject_put+0xbb/0xd0 [ 23.837971][ T302] kasan_report+0xca/0x100 [ 23.837975][ T302] ? kobject_put+0xbb/0xd0 [ 23.837980][ T302] kobject_put+0xbb/0xd0 [ 23.837984][ T302] netdev_run_todo+0x5f0/0xc60 [ 23.837990][ T302] ? dev_ingress_queue_create+0x190/0x190 [ 23.837994][ T302] ? generic_xdp_install+0x410/0x410 [ 23.837997][ T302] ? unregister_netdevice_many+0x20/0x20 [ 23.838001][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.838007][ T302] rtnl_dellink+0x350/0xa30 [ 23.838012][ T302] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 23.838032][ T302] ? find_held_lock+0x2b/0x80 [ 23.838039][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.838043][ T302] ? find_held_lock+0x2b/0x80 [ 23.838047][ T302] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 23.838050][ T302] ? __lock_release+0x5d/0x170 [ 23.838054][ T302] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 23.838058][ T302] rtnetlink_rcv_msg+0x709/0xc00 [ 23.838062][ T302] ? rtnl_port_fill+0x890/0x890 [ 23.838065][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.838071][ T302] netlink_rcv_skb+0x121/0x340 [ 23.838075][ T302] ? rtnl_port_fill+0x890/0x890 [ 23.838079][ T302] ? netlink_ack+0xdf0/0xdf0 [ 23.838085][ T302] ? netlink_deliver_tap+0x13e/0x340 [ 23.838088][ T302] ? netlink_deliver_tap+0xc3/0x340 [ 23.838091][ T302] netlink_unicast+0x4aa/0x780 [ 23.838095][ T302] ? netlink_attachskb+0x810/0x810 [ 23.838098][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.838103][ T302] netlink_sendmsg+0x714/0xbd0 [ 23.838107][ T302] ? netlink_unicast+0x780/0x780 [ 23.838110][ T302] ? __import_iovec+0x230/0x3b0 [ 23.838116][ T302] ? netlink_unicast+0x780/0x780 [ 23.838119][ T302] ____sys_sendmsg+0x3dd/0x890 [ 23.838122][ T302] ? get_timestamp.constprop.0+0x370/0x370 [ 23.838125][ T302] ? __copy_msghdr+0x3c0/0x3c0 [ 23.838133][ T302] ___sys_sendmsg+0xed/0x170 [ 23.838135][ T302] ? kasan_record_aux_stack+0x8c/0xa0 [ 23.838139][ T302] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 23.838142][ T302] ? copy_msghdr_from_user+0x110/0x110 [ 23.838147][ T302] ? find_held_lock+0x2b/0x80 [ 23.838151][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.838156][ T302] ? find_held_lock+0x2b/0x80 [ 23.838159][ T302] ? __virt_addr_valid+0x22a/0x450 [ 23.838165][ T302] ? __lock_release+0x5d/0x170 [ 23.838171][ T302] __sys_sendmsg+0x10b/0x1a0 [ 23.838173][ T302] ? __call_rcu_common.constprop.0+0x318/0x630 [ 23.838176][ T302] ? __sys_sendmsg_sock+0x20/0x20 [ 23.838183][ T302] ? rcu_is_watching+0x12/0xb0 [ 23.838188][ T302] do_syscall_64+0xc1/0xfd0 [ 23.838193][ T302] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 23.838197][ T302] RIP: 0033:0x7fb5251231d7 [ 23.838201][ T302] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 23.838204][ T302] RSP: 002b:00007fffaf942e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 23.838208][ T302] RAX: ffffffffffffffda RBX: 00007fffaf943590 RCX: 00007fb5251231d7 [ 23.838210][ T302] RDX: 0000000000000000 RSI: 00007fffaf942ed0 RDI: 0000000000000005 [ 23.838212][ T302] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 23.838214][ T302] R10: 00007fb52501ff60 R11: 0000000000000246 R12: 0000000000000002 [ 23.838215][ T302] R13: 00000000690df6e5 R14: 0000000000499600 R15: 0000000000000000 [ 23.838222][ T302] [ 23.838223][ T302] [ 23.851259][ T302] Allocated by task 289: [ 23.851390][ T302] kasan_save_stack+0x24/0x40 [ 23.851581][ T302] kasan_save_track+0x14/0x30 [ 23.851772][ T302] __kasan_kmalloc+0x7b/0x90 [ 23.851941][ T302] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 23.852110][ T302] alloc_netdev_mqs+0x7d/0x1370 [ 23.852290][ T302] rtnl_create_link+0xa9e/0xe20 [ 23.852464][ T302] rtnl_newlink_create+0x203/0x8f0 [ 23.852650][ T302] __rtnl_newlink+0x231/0xa30 [ 23.852830][ T302] rtnl_newlink+0x693/0xa60 [ 23.853001][ T302] rtnetlink_rcv_msg+0x709/0xc00 [ 23.853172][ T302] netlink_rcv_skb+0x121/0x340 [ 23.853389][ T302] netlink_unicast+0x4aa/0x780 [ 23.853569][ T302] netlink_sendmsg+0x714/0xbd0 [ 23.853762][ T302] ____sys_sendmsg+0x3dd/0x890 [ 23.853963][ T302] ___sys_sendmsg+0xed/0x170 [ 23.854137][ T302] __sys_sendmsg+0x10b/0x1a0 [ 23.854347][ T302] do_syscall_64+0xc1/0xfd0 [ 23.854528][ T302] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 23.854784][ T302] [ 23.854872][ T302] Freed by task 302: [ 23.854999][ T302] kasan_save_stack+0x24/0x40 [ 23.855177][ T302] kasan_save_track+0x14/0x30 [ 23.855359][ T302] __kasan_save_free_info+0x3b/0x60 [ 23.855541][ T302] __kasan_slab_free+0x3f/0x60 [ 23.855732][ T302] kfree+0x21d/0x540 [ 23.855864][ T302] device_release+0x9c/0x210 [ 23.856032][ T302] kobject_cleanup+0xfe/0x360 [ 23.856200][ T302] netdev_run_todo+0x81f/0xc60 [ 23.856382][ T302] rtnl_dellink+0x350/0xa30 [ 23.856564][ T302] rtnetlink_rcv_msg+0x709/0xc00 [ 23.856757][ T302] netlink_rcv_skb+0x121/0x340 [ 23.856931][ T302] netlink_unicast+0x4aa/0x780 [ 23.857098][ T302] netlink_sendmsg+0x714/0xbd0 [ 23.857270][ T302] ____sys_sendmsg+0x3dd/0x890 [ 23.857444][ T302] ___sys_sendmsg+0xed/0x170 [ 23.857625][ T302] __sys_sendmsg+0x10b/0x1a0 [ 23.857813][ T302] do_syscall_64+0xc1/0xfd0 [ 23.857978][ T302] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 23.858186][ T302] [ 23.858270][ T302] The buggy address belongs to the object at ffff8880087c4000 [ 23.858270][ T302] which belongs to the cache kmalloc-4k of size 4096 [ 23.858725][ T302] The buggy address is located 1732 bytes inside of [ 23.858725][ T302] freed 4096-byte region [ffff8880087c4000, ffff8880087c5000) [ 23.859330][ T302] [ 23.859415][ T302] The buggy address belongs to the physical page: [ 23.859744][ T302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87c0 [ 23.860042][ T302] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.860402][ T302] flags: 0x80000000000040(head|node=0|zone=1) [ 23.860635][ T302] page_type: f5(slab) [ 23.860779][ T302] raw: 0080000000000040 ffff888001043700 ffffea0000219c10 ffffea000021e210 [ 23.861075][ T302] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 23.861471][ T302] head: 0080000000000040 ffff888001043700 ffffea0000219c10 ffffea000021e210 [ 23.861907][ T302] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 23.862195][ T302] head: 0080000000000003 ffffea000021f001 00000000ffffffff 00000000ffffffff [ 23.862513][ T302] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 23.862947][ T302] page dumped because: kasan: bad access detected [ 23.863372][ T302] [ 23.863456][ T302] Memory state around the buggy address: [ 23.863642][ T302] ffff8880087c4580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.864014][ T302] ffff8880087c4600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.864258][ T302] >ffff8880087c4680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.864625][ T302] ^ [ 23.864856][ T302] ffff8880087c4700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.865188][ T302] ffff8880087c4780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.865437][ T302] ================================================================== [ 23.865813][ T302] Disabling lock debugging due to kernel taint [ 23.866402][ T302] ------------[ cut here ]------------ [ 23.866654][ T302] refcount_t: underflow; use-after-free. [ 23.866947][ T302] WARNING: CPU: 1 PID: 302 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 23.867424][ T302] Modules linked in: act_mirred cls_matchall ip6_gre gre sch_ingress [ 23.867904][ T302] CPU: 1 UID: 0 PID: 302 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 23.868468][ T302] Tainted: [B]=BAD_PAGE [ 23.868679][ T302] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 23.869018][ T302] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 23.869392][ T302] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba 25 8a e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff [ 23.870613][ T302] RSP: 0018:ffffc90000d371f0 EFLAGS: 00010286 [ 23.870981][ T302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 23.871612][ T302] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 23.872053][ T302] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff1640934 [ 23.872813][ T302] R10: 0000000000000003 R11: ffffc90000d36d80 R12: 0000000000000001 [ 23.873380][ T302] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 23.873816][ T302] FS: 00007fb524f55800(0000) GS:ffff8880e0988000(0000) knlGS:0000000000000000 [ 23.874446][ T302] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 23.874830][ T302] CR2: 00007f8f4588f658 CR3: 0000000004bcc001 CR4: 0000000000772ef0 [ 23.875392][ T302] PKRU: 55555554 [ 23.875586][ T302] Call Trace: [ 23.875808][ T302] [ 23.875958][ T302] netdev_run_todo+0x5f0/0xc60 [ 23.876369][ T302] ? dev_ingress_queue_create+0x190/0x190 [ 23.876654][ T302] ? generic_xdp_install+0x410/0x410 [ 23.876944][ T302] ? unregister_netdevice_many+0x20/0x20 [ 23.877350][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.877648][ T302] rtnl_dellink+0x350/0xa30 [ 23.877941][ T302] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 23.878447][ T302] ? find_held_lock+0x2b/0x80 [ 23.878741][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.879035][ T302] ? find_held_lock+0x2b/0x80 [ 23.879342][ T302] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 23.879630][ T302] ? __lock_release+0x5d/0x170 [ 23.879914][ T302] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 23.880276][ T302] rtnetlink_rcv_msg+0x709/0xc00 [ 23.880564][ T302] ? rtnl_port_fill+0x890/0x890 [ 23.880855][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.881148][ T302] netlink_rcv_skb+0x121/0x340 [ 23.881447][ T302] ? rtnl_port_fill+0x890/0x890 [ 23.881741][ T302] ? netlink_ack+0xdf0/0xdf0 [ 23.882027][ T302] ? netlink_deliver_tap+0x13e/0x340 [ 23.882314][ T302] ? netlink_deliver_tap+0xc3/0x340 [ 23.882596][ T302] netlink_unicast+0x4aa/0x780 [ 23.882876][ T302] ? netlink_attachskb+0x810/0x810 [ 23.883169][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.883457][ T302] netlink_sendmsg+0x714/0xbd0 [ 23.883750][ T302] ? netlink_unicast+0x780/0x780 [ 23.884035][ T302] ? __import_iovec+0x230/0x3b0 [ 23.884325][ T302] ? netlink_unicast+0x780/0x780 [ 23.884616][ T302] ____sys_sendmsg+0x3dd/0x890 [ 23.884915][ T302] ? get_timestamp.constprop.0+0x370/0x370 [ 23.885285][ T302] ? __copy_msghdr+0x3c0/0x3c0 [ 23.885582][ T302] ___sys_sendmsg+0xed/0x170 [ 23.885867][ T302] ? kasan_record_aux_stack+0x8c/0xa0 [ 23.886170][ T302] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 23.886527][ T302] ? copy_msghdr_from_user+0x110/0x110 [ 23.886817][ T302] ? find_held_lock+0x2b/0x80 [ 23.887105][ T302] ? __lock_acquire+0x449/0x7e0 [ 23.887404][ T302] ? find_held_lock+0x2b/0x80 [ 23.887697][ T302] ? __virt_addr_valid+0x22a/0x450 [ 23.887987][ T302] ? __lock_release+0x5d/0x170 [ 23.888298][ T302] __sys_sendmsg+0x10b/0x1a0 [ 23.888590][ T302] ? __call_rcu_common.constprop.0+0x318/0x630 [ 23.888952][ T302] ? __sys_sendmsg_sock+0x20/0x20 [ 23.889257][ T302] ? rcu_is_watching+0x12/0xb0 [ 23.889547][ T302] do_syscall_64+0xc1/0xfd0 [ 23.889839][ T302] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 23.890202][ T302] RIP: 0033:0x7fb5251231d7 [ 23.890506][ T302] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 23.891537][ T302] RSP: 002b:00007fffaf942e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 23.891969][ T302] RAX: ffffffffffffffda RBX: 00007fffaf943590 RCX: 00007fb5251231d7 [ 23.892423][ T302] RDX: 0000000000000000 RSI: 00007fffaf942ed0 RDI: 0000000000000005 [ 23.892865][ T302] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 23.893307][ T302] R10: 00007fb52501ff60 R11: 0000000000000246 R12: 0000000000000002 [ 23.893744][ T302] R13: 00000000690df6e5 R14: 0000000000499600 R15: 0000000000000000 [ 23.894191][ T302] [ 23.894417][ T302] irq event stamp: 39179 [ 23.894634][ T302] hardirqs last enabled at (39179): [] finish_task_switch.isra.0+0x245/0x960 [ 23.895232][ T302] hardirqs last disabled at (39178): [] __schedule+0x94a/0x1b10 [ 23.895727][ T302] softirqs last enabled at (38062): [] unregister_netdevice_many_notify+0x714/0x1c90 [ 23.896324][ T302] softirqs last disabled at (38060): [] dev_mc_flush+0x54/0x90 [ 23.896821][ T302] ---[ end trace 0000000000000000 ]---