================================================================== BUG: KASAN: use-after-free in atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] BUG: KASAN: use-after-free in refcount_read include/linux/refcount.h:43 [inline] BUG: KASAN: use-after-free in check_net include/net/net_namespace.h:254 [inline] BUG: KASAN: use-after-free in rds_destroy_pending net/rds/rds.h:951 [inline] BUG: KASAN: use-after-free in rds_cong_queue_updates+0x209/0x4d0 net/rds/cong.c:229 Read of size 4 at addr ffff88809f9bc3c4 by task kworker/u4:4/2521 CPU: 0 PID: 2521 Comm: kworker/u4:4 Not tainted 5.0.0-rc7+ #93 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: krdsd rds_send_worker Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 print_address_description.cold+0x7c/0x20d mm/kasan/report.c:187 kasan_report.cold+0x1b/0x40 mm/kasan/report.c:317 check_memory_region_inline mm/kasan/generic.c:185 [inline] check_memory_region+0x123/0x190 mm/kasan/generic.c:191 kasan_check_read+0x11/0x20 mm/kasan/common.c:100 atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] refcount_read include/linux/refcount.h:43 [inline] check_net include/net/net_namespace.h:254 [inline] rds_destroy_pending net/rds/rds.h:951 [inline] rds_cong_queue_updates+0x209/0x4d0 net/rds/cong.c:229 rds_recv_rcvbuf_delta.part.0+0x34f/0x3f0 net/rds/recv.c:118 rds_recv_rcvbuf_delta net/rds/recv.c:379 [inline] rds_recv_incoming+0x789/0x11f0 net/rds/recv.c:379 rds_loop_xmit+0xf3/0x2a0 net/rds/loop.c:96 rds_send_xmit+0x1113/0x2560 net/rds/send.c:355 rds_send_worker+0x90/0x290 net/rds/threads.c:200 process_one_work+0x98e/0x1790 kernel/workqueue.c:2173 worker_thread+0x98/0xe40 kernel/workqueue.c:2319 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Allocated by task 9: save_stack+0x45/0xd0 mm/kasan/common.c:73 set_track mm/kasan/common.c:85 [inline] __kasan_kmalloc mm/kasan/common.c:495 [inline] __kasan_kmalloc.constprop.0+0xcf/0xe0 mm/kasan/common.c:468 kasan_kmalloc+0x9/0x10 mm/kasan/common.c:509 __do_kmalloc_node mm/slab.c:3678 [inline] __kmalloc_node_track_caller+0x4e/0x70 mm/slab.c:3692 __kmalloc_reserve.isra.0+0x40/0xf0 net/core/skbuff.c:140 __alloc_skb+0x10b/0x5e0 net/core/skbuff.c:208 alloc_skb include/linux/skbuff.h:1011 [inline] nlmsg_new include/net/netlink.h:658 [inline] fdb_notify+0x9f/0x190 net/bridge/br_fdb.c:706 br_fdb_update net/bridge/br_fdb.c:601 [inline] br_fdb_update+0x2fd/0xa70 net/bridge/br_fdb.c:562 br_handle_frame_finish+0x84f/0x14c0 net/bridge/br_input.c:97 br_nf_hook_thresh+0x2ec/0x380 net/bridge/br_netfilter_hooks.c:1005 br_nf_pre_routing_finish_ipv6+0x700/0xdc0 net/bridge/br_netfilter_ipv6.c:210 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3c4/0x740 net/bridge/br_netfilter_ipv6.c:238 br_nf_pre_routing+0xe80/0x13a0 net/bridge/br_netfilter_hooks.c:482 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xbf/0x1f0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0x95b/0x1450 net/bridge/br_input.c:305 __netif_receive_skb_core+0xa96/0x3010 net/core/dev.c:4902 __netif_receive_skb_one_core+0xa8/0x1a0 net/core/dev.c:4971 __netif_receive_skb+0x2c/0x1c0 net/core/dev.c:5083 process_backlog+0x206/0x750 net/core/dev.c:5923 napi_poll net/core/dev.c:6346 [inline] net_rx_action+0x4fa/0x1070 net/core/dev.c:6412 __do_softirq+0x266/0x95a kernel/softirq.c:292 Freed by task 9: save_stack+0x45/0xd0 mm/kasan/common.c:73 set_track mm/kasan/common.c:85 [inline] __kasan_slab_free+0x102/0x150 mm/kasan/common.c:457 kasan_slab_free+0xe/0x10 mm/kasan/common.c:465 __cache_free mm/slab.c:3494 [inline] kfree+0xcf/0x230 mm/slab.c:3811 skb_free_head+0x93/0xb0 net/core/skbuff.c:557 skb_release_data+0x57e/0x7b0 net/core/skbuff.c:577 skb_release_all+0x4d/0x60 net/core/skbuff.c:631 __kfree_skb net/core/skbuff.c:645 [inline] consume_skb net/core/skbuff.c:705 [inline] consume_skb+0xe2/0x380 net/core/skbuff.c:699 netlink_broadcast_filtered+0x316/0xb20 net/netlink/af_netlink.c:1520 netlink_broadcast net/netlink/af_netlink.c:1542 [inline] nlmsg_multicast include/net/netlink.h:738 [inline] nlmsg_notify+0x93/0x1c0 net/netlink/af_netlink.c:2528 rtnl_notify+0xc5/0xf0 net/core/rtnetlink.c:741 fdb_notify+0xfa/0x190 net/bridge/br_fdb.c:717 br_fdb_update net/bridge/br_fdb.c:601 [inline] br_fdb_update+0x2fd/0xa70 net/bridge/br_fdb.c:562 br_handle_frame_finish+0x84f/0x14c0 net/bridge/br_input.c:97 br_nf_hook_thresh+0x2ec/0x380 net/bridge/br_netfilter_hooks.c:1005 br_nf_pre_routing_finish_ipv6+0x700/0xdc0 net/bridge/br_netfilter_ipv6.c:210 NF_HOOK include/linux/netfilter.h:289 [inline] br_nf_pre_routing_ipv6+0x3c4/0x740 net/bridge/br_netfilter_ipv6.c:238 br_nf_pre_routing+0xe80/0x13a0 net/bridge/br_netfilter_hooks.c:482 nf_hook_entry_hookfn include/linux/netfilter.h:119 [inline] nf_hook_slow+0xbf/0x1f0 net/netfilter/core.c:511 nf_hook include/linux/netfilter.h:244 [inline] NF_HOOK include/linux/netfilter.h:287 [inline] br_handle_frame+0x95b/0x1450 net/bridge/br_input.c:305 __netif_receive_skb_core+0xa96/0x3010 net/core/dev.c:4902 __netif_receive_skb_one_core+0xa8/0x1a0 net/core/dev.c:4971 __netif_receive_skb+0x2c/0x1c0 net/core/dev.c:5083 process_backlog+0x206/0x750 net/core/dev.c:5923 napi_poll net/core/dev.c:6346 [inline] net_rx_action+0x4fa/0x1070 net/core/dev.c:6412 __do_softirq+0x266/0x95a kernel/softirq.c:292 The buggy address belongs to the object at ffff88809f9bc300 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 196 bytes inside of 512-byte region [ffff88809f9bc300, ffff88809f9bc500) The buggy address belongs to the page: page:ffffea00027e6f00 count:1 mapcount:0 mapping:ffff88812c3f0940 index:0x0 flags: 0x1fffc0000000200(slab) raw: 01fffc0000000200 ffffea0000c305c8 ffffea000106f388 ffff88812c3f0940 raw: 0000000000000000 ffff88809f9bc080 0000000100000006 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88809f9bc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88809f9bc300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb >ffff88809f9bc380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88809f9bc400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88809f9bc480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================