bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:49:01:6d:05:0d, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:49:01:6d:05:0d, vlan:0) bridge0: received packet on veth0_to_bridge with own address as source address (addr:5e:49:01:6d:05:0d, vlan:0) ================================================================== BUG: KASAN: use-after-free in tcp_orphan_retries net/ipv4/tcp_timer.c:127 [inline] BUG: KASAN: use-after-free in tcp_probe_timer net/ipv4/tcp_timer.c:362 [inline] BUG: KASAN: use-after-free in tcp_write_timer_handler+0x889/0x8a0 net/ipv4/tcp_timer.c:591 Read of size 4 at addr ffff88806aa2c8e8 by task ksoftirqd/1/16 CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0+ #98 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 print_address_description.cold+0x7c/0x20d mm/kasan/report.c:187 kasan_report.cold+0x1b/0x40 mm/kasan/report.c:317 __asan_report_load4_noabort+0x14/0x20 mm/kasan/generic_report.c:131 tcp_orphan_retries net/ipv4/tcp_timer.c:127 [inline] tcp_probe_timer net/ipv4/tcp_timer.c:362 [inline] tcp_write_timer_handler+0x889/0x8a0 net/ipv4/tcp_timer.c:591 tcp_write_timer+0x10e/0x1d0 net/ipv4/tcp_timer.c:607 call_timer_fn+0x190/0x720 kernel/time/timer.c:1325 expire_timers kernel/time/timer.c:1362 [inline] __run_timers kernel/time/timer.c:1681 [inline] __run_timers kernel/time/timer.c:1649 [inline] run_timer_softirq+0x652/0x1700 kernel/time/timer.c:1694 __do_softirq+0x266/0x95a kernel/softirq.c:293 run_ksoftirqd kernel/softirq.c:655 [inline] run_ksoftirqd+0x8e/0x110 kernel/softirq.c:647 smpboot_thread_fn+0x6ab/0xa10 kernel/smpboot.c:164 kthread+0x357/0x430 kernel/kthread.c:253 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 The buggy address belongs to the page: page:ffffea0001aa8b00 count:0 mapcount:-128 mapping:0000000000000000 index:0xffff88806aa2c180 flags: 0x1fffc0000000000() raw: 01fffc0000000000 ffffea0002155b08 ffffea0001ac8408 0000000000000000 raw: ffff88806aa2c180 0000000000000002 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff88806aa2c780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88806aa2c800: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88806aa2c880: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88806aa2c900: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88806aa2c980: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================