[ 16.502779][ T230] ip (230) used greatest stack depth: 23792 bytes left [ 17.763486][ T245] team0: Port device dummy0 added [ 18.145789][ T248] team0: Port device dummy0 removed [ 18.372106][ T251] team0: Mode changed to "activebackup" [ 18.795206][ T253] team0: Mode changed to "loadbalance" [ 19.143444][ T255] team0: Mode changed to "activebackup" [ 23.426121][ T290] team0: Port device dummy0 added [ 24.454442][ T298] team0: Port device dummy0 removed [ 24.604677][ T300] team0: Port device dummy0 added [ 25.679547][ T308] team0: Port device dummy0 removed [ 25.841900][ T310] team0: Port device dummy0 added [ 26.946745][ T318] team0: Port device dummy0 removed [ 27.148125][ T320] team0: Port device dummy0 added [ 28.275802][ T328] team0: Port device dummy0 removed [ 28.477237][ T330] team0: Port device dummy0 added [ 29.792560][ T338] team0: Port device dummy0 removed [ 30.132550][ T72] ================================================================== [ 30.132936][ T72] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 30.133263][ T72] Read of size 1 at addr ffff888008d5169c by task kworker/u16:1/72 [ 30.133553][ T72] [ 30.133654][ T72] CPU: 0 UID: 0 PID: 72 Comm: kworker/u16:1 Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 30.133659][ T72] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 30.133662][ T72] Workqueue: netns cleanup_net [ 30.133672][ T72] Call Trace: [ 30.133674][ T72] [ 30.133678][ T72] dump_stack_lvl+0x82/0xc0 [ 30.133684][ T72] print_address_description.constprop.0+0x2c/0x3a0 [ 30.133693][ T72] ? kobject_put+0xbb/0xd0 [ 30.133697][ T72] print_report+0xb4/0x270 [ 30.133703][ T72] ? kobject_put+0xbb/0xd0 [ 30.133706][ T72] ? kasan_addr_to_slab+0x21/0x70 [ 30.133711][ T72] ? kobject_put+0xbb/0xd0 [ 30.133714][ T72] kasan_report+0xca/0x100 [ 30.133719][ T72] ? kobject_put+0xbb/0xd0 [ 30.133726][ T72] kobject_put+0xbb/0xd0 [ 30.133729][ T72] netdev_run_todo+0x5f0/0xc60 [ 30.133735][ T72] ? dev_ingress_queue_create+0x190/0x190 [ 30.133739][ T72] ? generic_xdp_install+0x410/0x410 [ 30.133741][ T72] ? __lock_release+0x5d/0x170 [ 30.133749][ T72] ? bond_net_exit_rtnl+0xcf/0x2f0 [ 30.133758][ T72] ops_undo_list+0x714/0x890 [ 30.133763][ T72] ? netns_get+0x110/0x110 [ 30.133766][ T72] ? cleanup_net+0x2d6/0x830 [ 30.133771][ T72] cleanup_net+0x3b2/0x830 [ 30.133775][ T72] ? net_passive_dec+0x190/0x190 [ 30.133780][ T72] ? rcu_is_watching+0x12/0xb0 [ 30.133787][ T72] process_one_work+0xe35/0x1650 [ 30.133795][ T72] ? pwq_dec_nr_in_flight+0x550/0x550 [ 30.133801][ T72] ? assign_work+0x168/0x240 [ 30.133805][ T72] worker_thread+0x591/0xcf0 [ 30.133811][ T72] ? rescuer_thread+0xd10/0xd10 [ 30.133814][ T72] kthread+0x37b/0x5f0 [ 30.133819][ T72] ? kthread_is_per_cpu+0xc0/0xc0 [ 30.133822][ T72] ? ret_from_fork+0x1b/0x270 [ 30.133830][ T72] ? __lock_release+0x5d/0x170 [ 30.133834][ T72] ? rcu_is_watching+0x12/0xb0 [ 30.133837][ T72] ? kthread_is_per_cpu+0xc0/0xc0 [ 30.133840][ T72] ret_from_fork+0x1db/0x270 [ 30.133843][ T72] ? kthread_is_per_cpu+0xc0/0xc0 [ 30.133846][ T72] ret_from_fork_asm+0x11/0x20 [ 30.133856][ T72] [ 30.133857][ T72] [ 30.141782][ T72] Allocated by task 229: [ 30.141928][ T72] kasan_save_stack+0x24/0x40 [ 30.142150][ T72] kasan_save_track+0x14/0x30 [ 30.142349][ T72] __kasan_kmalloc+0x7b/0x90 [ 30.142546][ T72] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 30.142745][ T72] alloc_netdev_mqs+0x7d/0x1310 [ 30.142950][ T72] sit_init_net+0x169/0x550 [ 30.143181][ T72] ops_init+0x189/0x550 [ 30.143332][ T72] setup_net+0xf1/0x380 [ 30.143481][ T72] copy_net_ns+0x21a/0x380 [ 30.143672][ T72] create_new_namespaces+0x35f/0x900 [ 30.143875][ T72] unshare_nsproxy_namespaces+0x89/0x120 [ 30.144059][ T72] ksys_unshare+0x2a3/0x660 [ 30.144262][ T72] __x64_sys_unshare+0x31/0x40 [ 30.144472][ T72] do_syscall_64+0xc1/0xfd0 [ 30.144666][ T72] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 30.144903][ T72] [ 30.144997][ T72] Freed by task 72: [ 30.145143][ T72] kasan_save_stack+0x24/0x40 [ 30.145346][ T72] kasan_save_track+0x14/0x30 [ 30.145543][ T72] __kasan_save_free_info+0x3b/0x60 [ 30.145747][ T72] __kasan_slab_free+0x3f/0x60 [ 30.145936][ T72] kfree+0x21d/0x540 [ 30.146074][ T72] device_release+0x9c/0x210 [ 30.146275][ T72] kobject_cleanup+0xfe/0x360 [ 30.146466][ T72] netdev_run_todo+0x81f/0xc60 [ 30.146655][ T72] ops_undo_list+0x714/0x890 [ 30.146850][ T72] cleanup_net+0x3b2/0x830 [ 30.147038][ T72] process_one_work+0xe35/0x1650 [ 30.147233][ T72] worker_thread+0x591/0xcf0 [ 30.147421][ T72] kthread+0x37b/0x5f0 [ 30.147651][ T72] ret_from_fork+0x1db/0x270 [ 30.147849][ T72] ret_from_fork_asm+0x11/0x20 [ 30.148041][ T72] [ 30.148139][ T72] The buggy address belongs to the object at ffff888008d51000 [ 30.148139][ T72] which belongs to the cache kmalloc-4k of size 4096 [ 30.148700][ T72] The buggy address is located 1692 bytes inside of [ 30.148700][ T72] freed 4096-byte region [ffff888008d51000, ffff888008d52000) [ 30.149255][ T72] [ 30.149349][ T72] The buggy address belongs to the physical page: [ 30.149582][ T72] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8d50 [ 30.149923][ T72] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.150312][ T72] flags: 0x80000000000040(head|node=0|zone=1) [ 30.150557][ T72] page_type: f5(slab) [ 30.150720][ T72] raw: 0080000000000040 ffff888001043700 ffffea0000149c10 ffffea00001d7a10 [ 30.151150][ T72] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 30.151514][ T72] head: 0080000000000040 ffff888001043700 ffffea0000149c10 ffffea00001d7a10 [ 30.151951][ T72] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 30.152288][ T72] head: 0080000000000003 ffffea0000235401 00000000ffffffff 00000000ffffffff [ 30.152652][ T72] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.153094][ T72] page dumped because: kasan: bad access detected [ 30.153344][ T72] [ 30.153452][ T72] Memory state around the buggy address: [ 30.153732][ T72] ffff888008d51580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.154013][ T72] ffff888008d51600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.154326][ T72] >ffff888008d51680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.154734][ T72] ^ [ 30.154928][ T72] ffff888008d51700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.155197][ T72] ffff888008d51780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.155565][ T72] ================================================================== [ 30.155949][ T72] Disabling lock debugging due to kernel taint [ 30.156234][ T72] ------------[ cut here ]------------ [ 30.156506][ T72] refcount_t: underflow; use-after-free. [ 30.156738][ T72] WARNING: CPU: 2 PID: 72 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 30.157149][ T72] Modules linked in: [ 30.157316][ T72] CPU: 2 UID: 0 PID: 72 Comm: kworker/u16:1 Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 30.158760][ T72] Tainted: [B]=BAD_PAGE [ 30.159727][ T72] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 30.160023][ T72] Workqueue: netns cleanup_net [ 30.160270][ T72] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 30.160564][ T72] Code: a2 b5 02 80 fb 01 0f 87 db 6e d8 fe 83 e3 01 0f 85 51 ff ff ff c6 05 c2 a2 b5 02 01 90 48 c7 c7 60 a8 a5 91 e8 72 c3 17 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 20 69 a0 ff e9 ba fe ff ff [ 30.161168][ T72] RSP: 0000:ffffc900004d7a08 EFLAGS: 00010282 [ 30.161395][ T72] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 30.161662][ T72] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 30.161958][ T72] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff247e134 [ 30.162225][ T72] R10: 0000000000000003 R11: ffffc900004d7580 R12: 0000000000000001 [ 30.162531][ T72] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 30.162797][ T72] FS: 0000000000000000(0000) GS:ffff8880a2a81000(0000) knlGS:0000000000000000 [ 30.163107][ T72] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.163332][ T72] CR2: 00007f789bd71b30 CR3: 0000000011f35005 CR4: 0000000000772ef0 [ 30.163604][ T72] PKRU: 55555554 [ 30.163842][ T72] Call Trace: [ 30.163996][ T72] [ 30.164154][ T72] netdev_run_todo+0x5f0/0xc60 [ 30.164402][ T72] ? dev_ingress_queue_create+0x190/0x190 [ 30.164628][ T72] ? generic_xdp_install+0x410/0x410 [ 30.164958][ T72] ? __lock_release+0x5d/0x170 [ 30.165180][ T72] ? bond_net_exit_rtnl+0xcf/0x2f0 [ 30.165463][ T72] ops_undo_list+0x714/0x890 [ 30.165739][ T72] ? netns_get+0x110/0x110 [ 30.165990][ T72] ? cleanup_net+0x2d6/0x830 [ 30.166211][ T72] cleanup_net+0x3b2/0x830 [ 30.166442][ T72] ? net_passive_dec+0x190/0x190 [ 30.166639][ T72] ? rcu_is_watching+0x12/0xb0 [ 30.166933][ T72] process_one_work+0xe35/0x1650 [ 30.167140][ T72] ? pwq_dec_nr_in_flight+0x550/0x550 [ 30.167338][ T72] ? assign_work+0x168/0x240 [ 30.167533][ T72] worker_thread+0x591/0xcf0 [ 30.167753][ T72] ? rescuer_thread+0xd10/0xd10 [ 30.167949][ T72] kthread+0x37b/0x5f0 [ 30.168132][ T72] ? kthread_is_per_cpu+0xc0/0xc0 [ 30.168337][ T72] ? ret_from_fork+0x1b/0x270 [ 30.168579][ T72] ? __lock_release+0x5d/0x170 [ 30.168790][ T72] ? rcu_is_watching+0x12/0xb0 [ 30.168997][ T72] ? kthread_is_per_cpu+0xc0/0xc0 [ 30.169214][ T72] ret_from_fork+0x1db/0x270 [ 30.169490][ T72] ? kthread_is_per_cpu+0xc0/0xc0 [ 30.169711][ T72] ret_from_fork_asm+0x11/0x20 [ 30.169917][ T72] [ 30.170086][ T72] irq event stamp: 3619 [ 30.170252][ T72] hardirqs last enabled at (3619): [] finish_task_switch.isra.0+0x245/0x960 [ 30.170751][ T72] hardirqs last disabled at (3618): [] __schedule+0x94a/0x1b10 [ 30.171125][ T72] softirqs last enabled at (2734): [] unregister_netdevice_many_notify+0x714/0x1c90 [ 30.171510][ T72] softirqs last disabled at (2732): [] dev_mc_flush+0x54/0x90 [ 30.171856][ T72] ---[ end trace 0000000000000000 ]---