[ 17.966110][ T258] ip (258) used greatest stack depth: 23552 bytes left
[ 54.753487][ T590] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
[ 55.179521][ T595] br0: port 1(veth0) entered blocking state
[ 55.180410][ T595] br0: port 1(veth0) entered disabled state
[ 55.181006][ T595] veth0: entered allmulticast mode
[ 55.184487][ T595] veth0: entered promiscuous mode
[ 55.598907][ T598] br0: port 1(veth0) entered blocking state
[ 55.599490][ T598] br0: port 1(veth0) entered forwarding state
[ 60.100242][ T643] veth0: left allmulticast mode
[ 60.100723][ T643] veth0: left promiscuous mode
[ 60.101238][ T643] br0: port 1(veth0) entered disabled state
[ 60.495110][ T646] 8021q: 802.1Q VLAN Support v1.8
[ 60.936379][ T650] br0: port 1(veth0.10) entered blocking state
[ 60.936883][ T650] br0: port 1(veth0.10) entered disabled state
[ 60.937342][ T650] veth0.10: entered allmulticast mode
[ 60.937822][ T650] veth0: entered allmulticast mode
[ 60.941520][ T650] veth0.10: entered promiscuous mode
[ 60.942855][ T650] veth0: entered promiscuous mode
[ 60.944425][ T650] br0: port 1(veth0.10) entered blocking state
[ 60.944869][ T650] br0: port 1(veth0.10) entered forwarding state
[ 65.815255][ T701] br0: port 1(veth0.10) entered disabled state
[ 66.091320][ T703] veth0.10 (unregistering): left allmulticast mode
[ 66.091783][ T703] veth0: left allmulticast mode
[ 66.092107][ T703] veth0.10 (unregistering): left promiscuous mode
[ 66.092479][ T703] veth0: left promiscuous mode
[ 66.093660][ T703] br0: port 1(veth0.10) entered disabled state
[ 66.113069][ T703] ==================================================================
[ 66.113359][ T703] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0
[ 66.113622][ T703] Read of size 1 at addr ffff888011ffc6ac by task ip/703
[ 66.113830][ T703]
[ 66.113919][ T703] CPU: 0 UID: 0 PID: 703 Comm: ip Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 66.113924][ T703] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 66.113927][ T703] Call Trace:
[ 66.113929][ T703]
[ 66.113931][ T703] dump_stack_lvl+0x82/0xc0
[ 66.113937][ T703] print_address_description.constprop.0+0x2c/0x3a0
[ 66.113946][ T703] ? kobject_put+0xbb/0xd0
[ 66.113951][ T703] print_report+0xb4/0x270
[ 66.113954][ T703] ? kobject_put+0xbb/0xd0
[ 66.113957][ T703] ? kasan_addr_to_slab+0x21/0x70
[ 66.113961][ T703] ? kobject_put+0xbb/0xd0
[ 66.113965][ T703] kasan_report+0xca/0x100
[ 66.113969][ T703] ? kobject_put+0xbb/0xd0
[ 66.113975][ T703] kobject_put+0xbb/0xd0
[ 66.113978][ T703] netdev_run_todo+0x5f0/0xc60
[ 66.113985][ T703] ? dev_ingress_queue_create+0x190/0x190
[ 66.113989][ T703] ? generic_xdp_install+0x410/0x410
[ 66.113994][ T703] ? lockdep_hardirqs_on+0x7c/0x110
[ 66.114001][ T703] rtnl_dellink+0x350/0xa30
[ 66.114007][ T703] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 66.114029][ T703] ? find_held_lock+0x2b/0x80
[ 66.114036][ T703] ? __lock_acquire+0x449/0x7e0
[ 66.114043][ T703] ? find_held_lock+0x2b/0x80
[ 66.114047][ T703] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 66.114050][ T703] ? __lock_release+0x5d/0x170
[ 66.114055][ T703] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 66.114059][ T703] rtnetlink_rcv_msg+0x709/0xc00
[ 66.114063][ T703] ? rtnl_port_fill+0x890/0x890
[ 66.114067][ T703] ? __lock_acquire+0x449/0x7e0
[ 66.114074][ T703] netlink_rcv_skb+0x121/0x340
[ 66.114080][ T703] ? rtnl_port_fill+0x890/0x890
[ 66.114084][ T703] ? netlink_ack+0xdf0/0xdf0
[ 66.114092][ T703] ? netlink_deliver_tap+0x13e/0x340
[ 66.114095][ T703] ? netlink_deliver_tap+0xc3/0x340
[ 66.114100][ T703] netlink_unicast+0x4aa/0x780
[ 66.114104][ T703] ? netlink_attachskb+0x810/0x810
[ 66.114108][ T703] ? __lock_acquire+0x440/0x7e0
[ 66.114114][ T703] netlink_sendmsg+0x714/0xbd0
[ 66.114119][ T703] ? netlink_unicast+0x780/0x780
[ 66.114123][ T703] ? __import_iovec+0x230/0x3b0
[ 66.114128][ T703] ? _copy_from_user+0x53/0x90
[ 66.114132][ T703] ? netlink_unicast+0x780/0x780
[ 66.114136][ T703] ____sys_sendmsg+0x3dd/0x890
[ 66.114141][ T703] ? get_timestamp.constprop.0+0x370/0x370
[ 66.114143][ T703] ? __copy_msghdr+0x3d0/0x3d0
[ 66.114148][ T703] ? do_wp_page+0xa70/0x1760
[ 66.114153][ T703] ___sys_sendmsg+0xed/0x170
[ 66.114157][ T703] ? copy_msghdr_from_user+0x110/0x110
[ 66.114160][ T703] ? do_pte_missing+0xec0/0xec0
[ 66.114162][ T703] ? __lock_acquire+0x449/0x7e0
[ 66.114168][ T703] ? __handle_mm_fault+0x3fc/0x5d0
[ 66.114171][ T703] ? __pmd_alloc+0x700/0x700
[ 66.114178][ T703] ? lock_vma_under_rcu+0x2d/0x3d0
[ 66.114181][ T703] ? lock_vma_under_rcu+0x138/0x3d0
[ 66.114186][ T703] __sys_sendmsg+0x10b/0x1a0
[ 66.114189][ T703] ? __sys_sendmsg_sock+0x20/0x20
[ 66.114192][ T703] ? exc_page_fault+0x65/0xd0
[ 66.114197][ T703] ? do_user_addr_fault+0x955/0xe00
[ 66.114203][ T703] ? rcu_is_watching+0x12/0xb0
[ 66.114208][ T703] do_syscall_64+0xc1/0xfd0
[ 66.114213][ T703] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 66.114217][ T703] RIP: 0033:0x7ff8d82a51d7
[ 66.114222][ T703] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 66.114225][ T703] RSP: 002b:00007fff2c672808 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 66.114229][ T703] RAX: ffffffffffffffda RBX: 00007fff2c672f40 RCX: 00007ff8d82a51d7
[ 66.114231][ T703] RDX: 0000000000000000 RSI: 00007fff2c672870 RDI: 0000000000000005
[ 66.114233][ T703] RBP: 0000000000000000 R08: 000000000000002c R09: 0000000000404178
[ 66.114235][ T703] R10: 0000000000404178 R11: 0000000000000246 R12: 00007fff2c672f58
[ 66.114237][ T703] R13: 00000000690dfdfa R14: 0000000000499600 R15: 0000000000000000
[ 66.114244][ T703]
[ 66.114245][ T703]
[ 66.126470][ T703] Allocated by task 645:
[ 66.126598][ T703] kasan_save_stack+0x24/0x40
[ 66.126775][ T703] kasan_save_track+0x14/0x30
[ 66.126943][ T703] __kasan_kmalloc+0x7b/0x90
[ 66.127107][ T703] __kvmalloc_node_noprof+0x2e5/0x8e0
[ 66.127273][ T703] alloc_netdev_mqs+0x7d/0x1370
[ 66.127443][ T703] rtnl_create_link+0xa9e/0xe20
[ 66.127607][ T703] rtnl_newlink_create+0x203/0x770
[ 66.127773][ T703] __rtnl_newlink+0x231/0xa30
[ 66.127939][ T703] rtnl_newlink+0x693/0xa60
[ 66.128108][ T703] rtnetlink_rcv_msg+0x709/0xc00
[ 66.128272][ T703] netlink_rcv_skb+0x121/0x340
[ 66.128436][ T703] netlink_unicast+0x4aa/0x780
[ 66.128597][ T703] netlink_sendmsg+0x714/0xbd0
[ 66.128762][ T703] ____sys_sendmsg+0x3dd/0x890
[ 66.128925][ T703] ___sys_sendmsg+0xed/0x170
[ 66.129089][ T703] __sys_sendmsg+0x10b/0x1a0
[ 66.129252][ T703] do_syscall_64+0xc1/0xfd0
[ 66.129418][ T703] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 66.129634][ T703]
[ 66.129719][ T703] Freed by task 703:
[ 66.129842][ T703] kasan_save_stack+0x24/0x40
[ 66.130011][ T703] kasan_save_track+0x14/0x30
[ 66.130174][ T703] __kasan_save_free_info+0x3b/0x60
[ 66.130337][ T703] __kasan_slab_free+0x3f/0x60
[ 66.130518][ T703] kfree+0x21d/0x540
[ 66.130643][ T703] device_release+0x9c/0x210
[ 66.130815][ T703] kobject_cleanup+0xfe/0x360
[ 66.130982][ T703] netdev_run_todo+0x81f/0xc60
[ 66.131144][ T703] rtnl_dellink+0x350/0xa30
[ 66.131310][ T703] rtnetlink_rcv_msg+0x709/0xc00
[ 66.131474][ T703] netlink_rcv_skb+0x121/0x340
[ 66.131638][ T703] netlink_unicast+0x4aa/0x780
[ 66.131803][ T703] netlink_sendmsg+0x714/0xbd0
[ 66.131987][ T703] ____sys_sendmsg+0x3dd/0x890
[ 66.132156][ T703] ___sys_sendmsg+0xed/0x170
[ 66.132319][ T703] __sys_sendmsg+0x10b/0x1a0
[ 66.132480][ T703] do_syscall_64+0xc1/0xfd0
[ 66.132645][ T703] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 66.132849][ T703]
[ 66.132933][ T703] The buggy address belongs to the object at ffff888011ffc000
[ 66.132933][ T703] which belongs to the cache kmalloc-4k of size 4096
[ 66.133333][ T703] The buggy address is located 1708 bytes inside of
[ 66.133333][ T703] freed 4096-byte region [ffff888011ffc000, ffff888011ffd000)
[ 66.133729][ T703]
[ 66.133812][ T703] The buggy address belongs to the physical page:
[ 66.134014][ T703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11ff8
[ 66.134307][ T703] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 66.134564][ T703] flags: 0x80000000000040(head|node=0|zone=1)
[ 66.134784][ T703] page_type: f5(slab)
[ 66.134916][ T703] raw: 0080000000000040 ffff888001043700 ffffea000039d010 ffffea0000134010
[ 66.135211][ T703] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 66.135500][ T703] head: 0080000000000040 ffff888001043700 ffffea000039d010 ffffea0000134010
[ 66.135802][ T703] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000
[ 66.136090][ T703] head: 0080000000000003 ffffea000047fe01 00000000ffffffff 00000000ffffffff
[ 66.136381][ T703] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 66.136673][ T703] page dumped because: kasan: bad access detected
[ 66.136877][ T703]
[ 66.136961][ T703] Memory state around the buggy address:
[ 66.137119][ T703] ffff888011ffc580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.137358][ T703] ffff888011ffc600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.137593][ T703] >ffff888011ffc680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.137838][ T703] ^
[ 66.137998][ T703] ffff888011ffc700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.138234][ T703] ffff888011ffc780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 66.138469][ T703] ==================================================================
[ 66.139233][ T703] Disabling lock debugging due to kernel taint
[ 66.139438][ T703] ------------[ cut here ]------------
[ 66.139591][ T703] refcount_t: underflow; use-after-free.
[ 66.139796][ T703] WARNING: CPU: 0 PID: 703 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0
[ 66.140079][ T703] Modules linked in: 8021q bridge stp llc nft_masq nft_nat nft_chain_nat nf_nat tcp_diag inet_diag nft_flow_offload nft_ct nf_flow_table_inet nf_flow_table nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables veth
[ 66.140730][ T703] CPU: 0 UID: 0 PID: 703 Comm: ip Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full)
[ 66.141055][ T703] Tainted: [B]=BAD_PAGE
[ 66.141191][ T703] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[ 66.141390][ T703] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0
[ 66.141614][ T703] Code: 83 90 02 80 fb 01 0f 87 95 6b d6 fe 83 e3 01 0f 85 51 ff ff ff c6 05 b1 83 90 02 01 90 48 c7 c7 a0 de a5 93 e8 c2 8b 15 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 f0 34 a1 ff e9 ba fe ff ff
[ 66.142194][ T703] RSP: 0018:ffffc900005171f0 EFLAGS: 00010286
[ 66.142411][ T703] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[ 66.142678][ T703] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001
[ 66.142927][ T703] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff287e220
[ 66.143169][ T703] R10: 0000000000000003 R11: ffffc90000516d80 R12: 0000000000000001
[ 66.143421][ T703] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100
[ 66.143685][ T703] FS: 00007ff8d80d7800(0000) GS:ffff8880a09ec000(0000) knlGS:0000000000000000
[ 66.143982][ T703] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 66.144194][ T703] CR2: 00000000004a1778 CR3: 000000000f5a6001 CR4: 0000000000772ef0
[ 66.144434][ T703] PKRU: 55555554
[ 66.144558][ T703] Call Trace:
[ 66.144687][ T703]
[ 66.144773][ T703] netdev_run_todo+0x5f0/0xc60
[ 66.144957][ T703] ? dev_ingress_queue_create+0x190/0x190
[ 66.145130][ T703] ? generic_xdp_install+0x410/0x410
[ 66.145289][ T703] ? lockdep_hardirqs_on+0x7c/0x110
[ 66.145463][ T703] rtnl_dellink+0x350/0xa30
[ 66.145642][ T703] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 66.145871][ T703] ? find_held_lock+0x2b/0x80
[ 66.146037][ T703] ? __lock_acquire+0x449/0x7e0
[ 66.146215][ T703] ? find_held_lock+0x2b/0x80
[ 66.146375][ T703] ? rtnetlink_rcv_msg+0x6e6/0xc00
[ 66.146544][ T703] ? __lock_release+0x5d/0x170
[ 66.146723][ T703] ? valid_bridge_getlink_req.constprop.0+0x640/0x640
[ 66.146923][ T703] rtnetlink_rcv_msg+0x709/0xc00
[ 66.147096][ T703] ? rtnl_port_fill+0x890/0x890
[ 66.147269][ T703] ? __lock_acquire+0x449/0x7e0
[ 66.147440][ T703] netlink_rcv_skb+0x121/0x340
[ 66.147600][ T703] ? rtnl_port_fill+0x890/0x890
[ 66.147769][ T703] ? netlink_ack+0xdf0/0xdf0
[ 66.147934][ T703] ? netlink_deliver_tap+0x13e/0x340
[ 66.148094][ T703] ? netlink_deliver_tap+0xc3/0x340
[ 66.148255][ T703] netlink_unicast+0x4aa/0x780
[ 66.148416][ T703] ? netlink_attachskb+0x810/0x810
[ 66.148575][ T703] ? __lock_acquire+0x440/0x7e0
[ 66.148853][ T703] netlink_sendmsg+0x714/0xbd0
[ 66.149026][ T703] ? netlink_unicast+0x780/0x780
[ 66.149185][ T703] ? __import_iovec+0x230/0x3b0
[ 66.149344][ T703] ? _copy_from_user+0x53/0x90
[ 66.149596][ T703] ? netlink_unicast+0x780/0x780
[ 66.149762][ T703] ____sys_sendmsg+0x3dd/0x890
[ 66.149922][ T703] ? get_timestamp.constprop.0+0x370/0x370
[ 66.150116][ T703] ? __copy_msghdr+0x3d0/0x3d0
[ 66.150375][ T703] ? do_wp_page+0xa70/0x1760
[ 66.150568][ T703] ___sys_sendmsg+0xed/0x170
[ 66.150739][ T703] ? copy_msghdr_from_user+0x110/0x110
[ 66.150900][ T703] ? do_pte_missing+0xec0/0xec0
[ 66.151154][ T703] ? __lock_acquire+0x449/0x7e0
[ 66.151316][ T703] ? __handle_mm_fault+0x3fc/0x5d0
[ 66.151475][ T703] ? __pmd_alloc+0x700/0x700
[ 66.151762][ T703] ? lock_vma_under_rcu+0x2d/0x3d0
[ 66.151927][ T703] ? lock_vma_under_rcu+0x138/0x3d0
[ 66.152089][ T703] __sys_sendmsg+0x10b/0x1a0
[ 66.152248][ T703] ? __sys_sendmsg_sock+0x20/0x20
[ 66.152407][ T703] ? exc_page_fault+0x65/0xd0
[ 66.152674][ T703] ? do_user_addr_fault+0x955/0xe00
[ 66.152839][ T703] ? rcu_is_watching+0x12/0xb0
[ 66.153001][ T703] do_syscall_64+0xc1/0xfd0
[ 66.153183][ T703] entry_SYSCALL_64_after_hwframe+0x4b/0x53
[ 66.153490][ T703] RIP: 0033:0x7ff8d82a51d7
[ 66.153683][ T703] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 66.154379][ T703] RSP: 002b:00007fff2c672808 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 66.154649][ T703] RAX: ffffffffffffffda RBX: 00007fff2c672f40 RCX: 00007ff8d82a51d7
[ 66.155007][ T703] RDX: 0000000000000000 RSI: 00007fff2c672870 RDI: 0000000000000005
[ 66.155262][ T703] RBP: 0000000000000000 R08: 000000000000002c R09: 0000000000404178
[ 66.155516][ T703] R10: 0000000000404178 R11: 0000000000000246 R12: 00007fff2c672f58
[ 66.155878][ T703] R13: 00000000690dfdfa R14: 0000000000499600 R15: 0000000000000000
[ 66.156123][ T703]
[ 66.156249][ T703] irq event stamp: 57923
[ 66.156465][ T703] hardirqs last enabled at (57923): [] irqentry_exit+0x3b/0x80
[ 66.156752][ T703] hardirqs last disabled at (57922): [] handle_softirqs+0x47f/0x610
[ 66.157050][ T703] softirqs last enabled at (56978): [] handle_softirqs+0x352/0x610
[ 66.157433][ T703] softirqs last disabled at (56971): [] irq_exit_rcu+0xab/0x100
[ 66.157718][ T703] ---[ end trace 0000000000000000 ]---
[ 67.779069][ T726] Initializing XFRM netlink socket
[ 102.726167][ T1095] br0: port 1(veth0) entered blocking state
[ 102.726442][ T1095] br0: port 1(veth0) entered disabled state
[ 102.726889][ T1095] veth0: entered allmulticast mode
[ 102.729429][ T1095] veth0: entered promiscuous mode
[ 102.974184][ T1098] br0: port 1(veth0) entered blocking state
[ 102.974483][ T1098] br0: port 1(veth0) entered forwarding state
[ 109.038513][ T1143] veth0: left allmulticast mode
[ 109.038745][ T1143] veth0: left promiscuous mode
[ 109.039044][ T1143] br0: port 1(veth0) entered disabled state
[ 109.462734][ T1148] br0: port 1(veth0.10) entered blocking state
[ 109.462996][ T1148] br0: port 1(veth0.10) entered disabled state
[ 109.463250][ T1148] veth0.10: entered allmulticast mode
[ 109.463414][ T1148] veth0: entered allmulticast mode
[ 109.465440][ T1148] veth0.10: entered promiscuous mode
[ 109.465625][ T1148] veth0: entered promiscuous mode
[ 109.466503][ T1148] br0: port 1(veth0.10) entered blocking state
[ 109.466732][ T1148] br0: port 1(veth0.10) entered forwarding state
[ 115.813173][ T1199] br0: port 1(veth0.10) entered disabled state
[ 115.984433][ T1201] veth0.10 (unregistering): left allmulticast mode
[ 115.984846][ T1201] veth0: left allmulticast mode
[ 115.985145][ T1201] veth0.10 (unregistering): left promiscuous mode
[ 115.985440][ T1201] veth0: left promiscuous mode
[ 115.986240][ T1201] br0: port 1(veth0.10) entered disabled state