[ 57.114397][ T12] ================================================================== [ 57.114564][ T12] BUG: KASAN: slab-use-after-free in idr_for_each+0x1c1/0x1f0 [ 57.114693][ T12] Read of size 8 at addr ff1100000cb93878 by task kworker/u16:0/12 [ 57.114812][ T12] [ 57.114856][ T12] CPU: 2 UID: 0 PID: 12 Comm: kworker/u16:0 Not tainted 6.19.0-rc7-virtme #1 PREEMPT(full) [ 57.114860][ T12] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 57.114861][ T12] Workqueue: netns cleanup_net [ 57.114867][ T12] Call Trace: [ 57.114869][ T12] [ 57.114871][ T12] dump_stack_lvl+0x6f/0xa0 [ 57.114877][ T12] print_address_description.constprop.0+0x6e/0x300 [ 57.114881][ T12] print_report+0xfc/0x1fb [ 57.114883][ T12] ? idr_for_each+0x1c1/0x1f0 [ 57.114884][ T12] ? __virt_addr_valid+0x1da/0x430 [ 57.114889][ T12] ? idr_for_each+0x1c1/0x1f0 [ 57.114890][ T12] kasan_report+0xe8/0x120 [ 57.114894][ T12] ? idr_for_each+0x1c1/0x1f0 [ 57.114896][ T12] ? rtnl_net_notifyid+0x1a0/0x1a0 [ 57.114898][ T12] idr_for_each+0x1c1/0x1f0 [ 57.114900][ T12] ? idr_find+0x70/0x70 [ 57.114901][ T12] ? __lock_release.isra.0+0x59/0x170 [ 57.114905][ T12] ? __up_write+0x283/0x4f0 [ 57.114906][ T12] ? cleanup_net+0x1f2/0x810 [ 57.114908][ T12] cleanup_net+0x260/0x810 [ 57.114909][ T12] ? lock_acquire.part.0+0xbc/0x260 [ 57.114911][ T12] ? process_one_work+0xd16/0x1390 [ 57.114913][ T12] ? net_passive_dec+0x190/0x190 [ 57.114915][ T12] ? rcu_is_watching+0x15/0xd0 [ 57.114917][ T12] ? process_one_work+0xd16/0x1390 [ 57.114918][ T12] ? lock_acquire+0x10a/0x150 [ 57.114919][ T12] ? rcu_is_watching+0x15/0xd0 [ 57.114921][ T12] process_one_work+0xd57/0x1390 [ 57.114923][ T12] ? pwq_dec_nr_in_flight+0x700/0x700 [ 57.114925][ T12] ? lock_acquire.part.0+0xbc/0x260 [ 57.114927][ T12] ? assign_work+0x152/0x380 [ 57.114929][ T12] worker_thread+0x4d6/0xd40 [ 57.114932][ T12] ? process_one_work+0x1390/0x1390 [ 57.114933][ T12] kthread+0x355/0x5b0 [ 57.114935][ T12] ? kthread_is_per_cpu+0xe0/0xe0 [ 57.114936][ T12] ? __lock_release.isra.0+0x59/0x170 [ 57.114938][ T12] ? rcu_is_watching+0x15/0xd0 [ 57.114939][ T12] ? kthread_is_per_cpu+0xe0/0xe0 [ 57.114941][ T12] ret_from_fork+0x3fb/0x510 [ 57.114944][ T12] ? arch_exit_to_user_mode_prepare.isra.0+0x140/0x140 [ 57.114946][ T12] ? __switch_to+0x53c/0xd00 [ 57.114949][ T12] ? kthread_is_per_cpu+0xe0/0xe0 [ 57.114950][ T12] ret_from_fork_asm+0x11/0x20 [ 57.114954][ T12] [ 57.114955][ T12] [ 57.118477][ T12] Allocated by task 414: [ 57.118543][ T12] kasan_save_stack+0x30/0x50 [ 57.118628][ T12] kasan_save_track+0x14/0x30 [ 57.118711][ T12] __kasan_slab_alloc+0x5f/0x70 [ 57.118791][ T12] kmem_cache_alloc_noprof+0x226/0x6e0 [ 57.118872][ T12] radix_tree_node_alloc.constprop.0+0x176/0x340 [ 57.118973][ T12] idr_get_free+0x326/0x840 [ 57.119056][ T12] idr_alloc_u32+0x14a/0x2e0 [ 57.119136][ T12] idr_alloc+0x7d/0xc0 [ 57.119198][ T12] peernet2id_alloc+0x22c/0x340 [ 57.119281][ T12] __dev_change_net_namespace+0x8e5/0x1980 [ 57.119383][ T12] do_setlink.isra.0+0x211/0x25d0 [ 57.119468][ T12] rtnl_newlink+0x75c/0xe90 [ 57.119549][ T12] rtnetlink_rcv_msg+0x6fe/0xb90 [ 57.119632][ T12] netlink_rcv_skb+0x123/0x380 [ 57.119716][ T12] netlink_unicast+0x4a3/0x770 [ 57.119798][ T12] netlink_sendmsg+0x735/0xc60 [ 57.119879][ T12] ____sys_sendmsg+0x419/0x850 [ 57.119962][ T12] ___sys_sendmsg+0xfd/0x180 [ 57.120041][ T12] __sys_sendmsg+0x124/0x1c0 [ 57.120124][ T12] do_syscall_64+0xbd/0xfc0 [ 57.120208][ T12] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 57.120309][ T12] [ 57.120352][ T12] Freed by task 14: [ 57.120421][ T12] kasan_save_stack+0x30/0x50 [ 57.120502][ T12] kasan_save_track+0x14/0x30 [ 57.120582][ T12] kasan_save_free_info+0x3b/0x60 [ 57.120658][ T12] __kasan_slab_free+0x43/0x70 [ 57.120738][ T12] kmem_cache_free+0xfe/0x5e0 [ 57.120818][ T12] rcu_do_batch+0x28b/0xfe0 [ 57.120899][ T12] rcu_core+0x2b4/0x5f0 [ 57.120959][ T12] handle_softirqs+0x1d7/0x840 [ 57.121040][ T12] run_ksoftirqd+0x39/0x60 [ 57.121119][ T12] smpboot_thread_fn+0x2fb/0x9b0 [ 57.121199][ T12] kthread+0x355/0x5b0 [ 57.121259][ T12] ret_from_fork+0x3fb/0x510 [ 57.121341][ T12] ret_from_fork_asm+0x11/0x20 [ 57.121425][ T12] [ 57.121468][ T12] Last potentially related work creation: [ 57.121550][ T12] kasan_save_stack+0x30/0x50 [ 57.121632][ T12] kasan_record_aux_stack+0x8c/0xa0 [ 57.121712][ T12] __call_rcu_common.constprop.0+0xa6/0xa00 [ 57.121813][ T12] delete_node+0x198/0x810 [ 57.121894][ T12] radix_tree_delete_item+0xc5/0x1b0 [ 57.121973][ T12] unhash_nsid_callback+0xb4/0x100 [ 57.122056][ T12] idr_for_each+0x108/0x1f0 [ 57.122133][ T12] cleanup_net+0x260/0x810 [ 57.122214][ T12] process_one_work+0xd57/0x1390 [ 57.122295][ T12] worker_thread+0x4d6/0xd40 [ 57.122375][ T12] kthread+0x355/0x5b0 [ 57.122440][ T12] ret_from_fork+0x3fb/0x510 [ 57.122521][ T12] ret_from_fork_asm+0x11/0x20 [ 57.122600][ T12] [ 57.122645][ T12] The buggy address belongs to the object at ff1100000cb93848 [ 57.122645][ T12] which belongs to the cache radix_tree_node of size 576 [ 57.122891][ T12] The buggy address is located 48 bytes inside of [ 57.122891][ T12] freed 576-byte region [ff1100000cb93848, ff1100000cb93a88) [ 57.123085][ T12] [ 57.123126][ T12] The buggy address belongs to the physical page: [ 57.123226][ T12] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xff1100000cb90b48 pfn:0xcb90 [ 57.123430][ T12] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 57.123552][ T12] flags: 0x80000000000240(workingset|head|node=0|zone=1) [ 57.123657][ T12] page_type: f5(slab) [ 57.123722][ T12] raw: 0080000000000240 ff11000001043700 ff11000001041e88 ffd4000000327e10 [ 57.123869][ T12] raw: ff1100000cb90b48 0000000000160011 00000000f5000000 0000000000000000 [ 57.124046][ T12] head: 0080000000000240 ff11000001043700 ff11000001041e88 ffd4000000327e10 [ 57.124226][ T12] head: ff1100000cb90b48 0000000000160011 00000000f5000000 0000000000000000 [ 57.124367][ T12] head: 0080000000000002 ffd400000032e401 00000000ffffffff 00000000ffffffff [ 57.124511][ T12] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 57.124651][ T12] page dumped because: kasan: bad access detected [ 57.124816][ T12] [ 57.124858][ T12] Memory state around the buggy address: [ 57.124938][ T12] ff1100000cb93700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.125062][ T12] ff1100000cb93780: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 57.125212][ T12] >ff1100000cb93800: fc fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 57.125329][ T12] ^ [ 57.125482][ T12] ff1100000cb93880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.125598][ T12] ff1100000cb93900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.125714][ T12] ================================================================== [ 57.125909][ T12] Disabling lock debugging due to kernel taint [ 156.619717][ T8303] nft (8303) used greatest stack depth: 24280 bytes left