[ 19.029879][ T297] 8021q: 802.1Q VLAN Support v1.8 [ 24.274141][ T344] gre: GRE over IPv4 demultiplexer driver [ 24.292470][ T344] ip_gre: GRE over IPv4 tunneling driver [ 25.775189][ T362] lag: Mode changed to "loadbalance" [ 26.028211][ T365] lag: Port device veth2 added [ 26.418772][ T368] lag: Port device veth4 added [ 26.673186][ T370] 8021q: adding VLAN 0 to HW filter on device lag [ 26.808988][ T371] br1: port 1(lag) entered blocking state [ 26.809482][ T371] br1: port 1(lag) entered disabled state [ 26.810037][ T371] lag: entered allmulticast mode [ 26.810439][ T371] veth2: entered allmulticast mode [ 26.810787][ T371] veth4: entered allmulticast mode [ 26.815209][ T371] veth2: entered promiscuous mode [ 26.815810][ T371] veth4: entered promiscuous mode [ 26.942534][ T372] br1: port 1(lag) entered blocking state [ 26.943111][ T372] br1: port 1(lag) entered forwarding state [ 27.895554][ T381] GACT probability NOT on [ 35.209245][ T409] Mirror/redirect action on [ 50.343169][ T46] br1: port 1(lag) entered disabled state [ 56.968905][ T138] br1: port 1(lag) entered blocking state [ 56.969299][ T138] br1: port 1(lag) entered forwarding state [ 73.038955][ T37] br1: port 1(lag) entered disabled state [ 79.507504][ T46] br1: port 1(lag) entered blocking state [ 79.507907][ T46] br1: port 1(lag) entered forwarding state [ 80.632948][ T513] lag: left allmulticast mode [ 80.633324][ T513] veth2: left allmulticast mode [ 80.633651][ T513] veth4: left allmulticast mode [ 80.634138][ T513] veth2: left promiscuous mode [ 80.634510][ T513] veth4: left promiscuous mode [ 80.634833][ T513] br1: port 1(lag) entered disabled state [ 80.783397][ T362] lag: Port device veth4 removed [ 80.793229][ T362] lag: Port device veth2 removed [ 80.892707][ T362] ================================================================== [ 80.893030][ T362] BUG: KASAN: slab-use-after-free in kobject_put+0xbb/0xd0 [ 80.893294][ T362] Read of size 1 at addr ffff88800bdb46ac by task teamd/362 [ 80.893537][ T362] [ 80.893638][ T362] CPU: 1 UID: 0 PID: 362 Comm: teamd Not tainted 6.18.0-rc4-virtme #1 PREEMPT(full) [ 80.893646][ T362] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 80.893650][ T362] Call Trace: [ 80.893653][ T362] [ 80.893655][ T362] dump_stack_lvl+0x82/0xc0 [ 80.893661][ T362] print_address_description.constprop.0+0x2c/0x3a0 [ 80.893672][ T362] ? kobject_put+0xbb/0xd0 [ 80.893676][ T362] print_report+0xb4/0x270 [ 80.893679][ T362] ? kobject_put+0xbb/0xd0 [ 80.893683][ T362] ? kasan_addr_to_slab+0x21/0x70 [ 80.893686][ T362] ? kobject_put+0xbb/0xd0 [ 80.893689][ T362] kasan_report+0xca/0x100 [ 80.893693][ T362] ? kobject_put+0xbb/0xd0 [ 80.893698][ T362] kobject_put+0xbb/0xd0 [ 80.893702][ T362] netdev_run_todo+0x5f0/0xc60 [ 80.893713][ T362] ? dev_ingress_queue_create+0x190/0x190 [ 80.893716][ T362] ? generic_xdp_install+0x410/0x410 [ 80.893719][ T362] ? unregister_netdevice_many+0x20/0x20 [ 80.893722][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.893735][ T362] rtnl_dellink+0x350/0xa30 [ 80.893742][ T362] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 80.893761][ T362] ? find_held_lock+0x2b/0x80 [ 80.893766][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.893772][ T362] ? find_held_lock+0x2b/0x80 [ 80.893776][ T362] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 80.893778][ T362] ? __lock_release+0x5d/0x170 [ 80.893783][ T362] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 80.893786][ T362] rtnetlink_rcv_msg+0x709/0xc00 [ 80.893790][ T362] ? rtnl_port_fill+0x850/0x850 [ 80.893793][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.893800][ T362] netlink_rcv_skb+0x121/0x340 [ 80.893805][ T362] ? rtnl_port_fill+0x850/0x850 [ 80.893809][ T362] ? netlink_ack+0xdd0/0xdd0 [ 80.893815][ T362] ? netlink_deliver_tap+0x13e/0x340 [ 80.893818][ T362] ? netlink_deliver_tap+0xc3/0x340 [ 80.893822][ T362] netlink_unicast+0x4aa/0x780 [ 80.893826][ T362] ? netlink_attachskb+0x810/0x810 [ 80.893830][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.893835][ T362] netlink_sendmsg+0x714/0xbd0 [ 80.893840][ T362] ? netlink_unicast+0x780/0x780 [ 80.893843][ T362] ? __import_iovec+0x230/0x3b0 [ 80.893852][ T362] ? netlink_unicast+0x780/0x780 [ 80.893855][ T362] ____sys_sendmsg+0x3dd/0x890 [ 80.893862][ T362] ? get_timestamp.constprop.0+0x380/0x380 [ 80.893865][ T362] ? __copy_msghdr+0x3c0/0x3c0 [ 80.893875][ T362] ___sys_sendmsg+0xed/0x170 [ 80.893878][ T362] ? kasan_record_aux_stack+0x8c/0xa0 [ 80.893881][ T362] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 80.893890][ T362] ? copy_msghdr_from_user+0x110/0x110 [ 80.893895][ T362] ? find_held_lock+0x2b/0x80 [ 80.893899][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.893904][ T362] ? find_held_lock+0x2b/0x80 [ 80.893908][ T362] ? __virt_addr_valid+0x22a/0x450 [ 80.893915][ T362] ? __lock_release+0x5d/0x170 [ 80.893922][ T362] __sys_sendmsg+0x10b/0x1a0 [ 80.893925][ T362] ? __call_rcu_common.constprop.0+0x318/0x630 [ 80.893929][ T362] ? __sys_sendmsg_sock+0x20/0x20 [ 80.893936][ T362] ? rcu_is_watching+0x12/0xb0 [ 80.893940][ T362] do_syscall_64+0xc1/0xfd0 [ 80.893946][ T362] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 80.893955][ T362] RIP: 0033:0x7f26448361d7 [ 80.893960][ T362] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 80.893963][ T362] RSP: 002b:00007fff345f7d08 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.893968][ T362] RAX: ffffffffffffffda RBX: 0000000018102320 RCX: 00007f26448361d7 [ 80.893970][ T362] RDX: 0000000000000000 RSI: 00007fff345f7d40 RDI: 0000000000000005 [ 80.893972][ T362] RBP: 0000000018102230 R08: 0000000000000003 R09: 0000000000000000 [ 80.893974][ T362] R10: 0000000000020000 R11: 0000000000000246 R12: 000000001812a3c0 [ 80.893976][ T362] R13: 00007fff345f7d40 R14: 0000000000000000 R15: 00007fff345f7ea0 [ 80.893983][ T362] [ 80.893984][ T362] [ 80.908765][ T362] Allocated by task 362: [ 80.908994][ T362] kasan_save_stack+0x24/0x40 [ 80.909334][ T362] kasan_save_track+0x14/0x30 [ 80.909626][ T362] __kasan_kmalloc+0x7b/0x90 [ 80.910124][ T362] __kvmalloc_node_noprof+0x2e5/0x8e0 [ 80.910438][ T362] alloc_netdev_mqs+0x7d/0x1370 [ 80.910737][ T362] rtnl_create_link+0xa9e/0xe20 [ 80.911044][ T362] rtnl_newlink_create+0x203/0x770 [ 80.911549][ T362] __rtnl_newlink+0x231/0xa30 [ 80.911839][ T362] rtnl_newlink+0x693/0xa60 [ 80.912122][ T362] rtnetlink_rcv_msg+0x709/0xc00 [ 80.912385][ T362] netlink_rcv_skb+0x121/0x340 [ 80.912826][ T362] netlink_unicast+0x4aa/0x780 [ 80.913009][ T362] netlink_sendmsg+0x714/0xbd0 [ 80.913184][ T362] ____sys_sendmsg+0x3dd/0x890 [ 80.913370][ T362] ___sys_sendmsg+0xed/0x170 [ 80.913652][ T362] __sys_sendmsg+0x10b/0x1a0 [ 80.913837][ T362] do_syscall_64+0xc1/0xfd0 [ 80.914044][ T362] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 80.914265][ T362] [ 80.914447][ T362] Freed by task 362: [ 80.914582][ T362] kasan_save_stack+0x24/0x40 [ 80.914792][ T362] kasan_save_track+0x14/0x30 [ 80.914969][ T362] __kasan_save_free_info+0x3b/0x60 [ 80.915246][ T362] __kasan_slab_free+0x3f/0x60 [ 80.915432][ T362] kfree+0x21d/0x540 [ 80.915567][ T362] device_release+0x9c/0x210 [ 80.915755][ T362] kobject_cleanup+0xfe/0x360 [ 80.915938][ T362] netdev_run_todo+0x81f/0xc60 [ 80.916217][ T362] rtnl_dellink+0x350/0xa30 [ 80.916397][ T362] rtnetlink_rcv_msg+0x709/0xc00 [ 80.916575][ T362] netlink_rcv_skb+0x121/0x340 [ 80.916754][ T362] netlink_unicast+0x4aa/0x780 [ 80.917040][ T362] netlink_sendmsg+0x714/0xbd0 [ 80.917218][ T362] ____sys_sendmsg+0x3dd/0x890 [ 80.917397][ T362] ___sys_sendmsg+0xed/0x170 [ 80.917575][ T362] __sys_sendmsg+0x10b/0x1a0 [ 80.917857][ T362] do_syscall_64+0xc1/0xfd0 [ 80.918038][ T362] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 80.918262][ T362] [ 80.918358][ T362] The buggy address belongs to the object at ffff88800bdb4000 [ 80.918358][ T362] which belongs to the cache kmalloc-4k of size 4096 [ 80.918949][ T362] The buggy address is located 1708 bytes inside of [ 80.918949][ T362] freed 4096-byte region [ffff88800bdb4000, ffff88800bdb5000) [ 80.919468][ T362] [ 80.919559][ T362] The buggy address belongs to the physical page: [ 80.919787][ T362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xbdb0 [ 80.920225][ T362] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 80.920501][ T362] flags: 0x80000000000040(head|node=0|zone=1) [ 80.920751][ T362] page_type: f5(slab) [ 80.920894][ T362] raw: 0080000000000040 ffff888001043700 ffffea000031a010 ffffea00002eb610 [ 80.921315][ T362] raw: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 80.921644][ T362] head: 0080000000000040 ffff888001043700 ffffea000031a010 ffffea00002eb610 [ 80.922062][ T362] head: 0000000000000000 0000000000020002 00000000f5000000 0000000000000000 [ 80.922381][ T362] head: 0080000000000003 ffffea00002f6c01 00000000ffffffff 00000000ffffffff [ 80.922808][ T362] head: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 80.923131][ T362] page dumped because: kasan: bad access detected [ 80.923357][ T362] [ 80.923446][ T362] Memory state around the buggy address: [ 80.923713][ T362] ffff88800bdb4580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.923974][ T362] ffff88800bdb4600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.924243][ T362] >ffff88800bdb4680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.924606][ T362] ^ [ 80.924783][ T362] ffff88800bdb4700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.925040][ T362] ffff88800bdb4780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.925393][ T362] ================================================================== [ 80.925887][ T362] Disabling lock debugging due to kernel taint [ 80.926116][ T362] ------------[ cut here ]------------ [ 80.926288][ T362] refcount_t: underflow; use-after-free. [ 80.927064][ T362] WARNING: CPU: 1 PID: 362 at lib/refcount.c:28 refcount_warn_saturate+0x16f/0x1b0 [ 80.927685][ T362] Modules linked in: act_mirred act_gact cls_flower bridge stp llc ip_gre gre sch_ingress 8021q vrf veth [ 80.928068][ T362] CPU: 1 UID: 0 PID: 362 Comm: teamd Tainted: G B 6.18.0-rc4-virtme #1 PREEMPT(full) [ 80.928424][ T362] Tainted: [B]=BAD_PAGE [ 80.928559][ T362] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 80.928787][ T362] RIP: 0010:refcount_warn_saturate+0x16f/0x1b0 [ 80.929027][ T362] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d 25 9a e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff [ 80.929665][ T362] RSP: 0018:ffffc90000b371f0 EFLAGS: 00010286 [ 80.929889][ T362] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 80.930165][ T362] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 80.930442][ T362] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff357e134 [ 80.930714][ T362] R10: 0000000000000003 R11: ffffc90000b36d80 R12: 0000000000000001 [ 80.930976][ T362] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 80.931235][ T362] FS: 00007f26446f5b80(0000) GS:ffff88809a272000(0000) knlGS:0000000000000000 [ 80.931553][ T362] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 80.931798][ T362] CR2: 000055bc686d6dec CR3: 0000000004b77006 CR4: 0000000000772ef0 [ 80.932052][ T362] PKRU: 55555554 [ 80.932179][ T362] Call Trace: [ 80.932314][ T362] [ 80.932483][ T362] netdev_run_todo+0x5f0/0xc60 [ 80.932701][ T362] ? dev_ingress_queue_create+0x190/0x190 [ 80.932881][ T362] ? generic_xdp_install+0x410/0x410 [ 80.933052][ T362] ? unregister_netdevice_many+0x20/0x20 [ 80.933228][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.933471][ T362] rtnl_dellink+0x350/0xa30 [ 80.933658][ T362] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 80.933878][ T362] ? find_held_lock+0x2b/0x80 [ 80.934050][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.934223][ T362] ? find_held_lock+0x2b/0x80 [ 80.934475][ T362] ? rtnetlink_rcv_msg+0x6e6/0xc00 [ 80.934647][ T362] ? __lock_release+0x5d/0x170 [ 80.934825][ T362] ? valid_bridge_getlink_req.constprop.0+0x640/0x640 [ 80.935040][ T362] rtnetlink_rcv_msg+0x709/0xc00 [ 80.935212][ T362] ? rtnl_port_fill+0x850/0x850 [ 80.935461][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.935646][ T362] netlink_rcv_skb+0x121/0x340 [ 80.935821][ T362] ? rtnl_port_fill+0x850/0x850 [ 80.935991][ T362] ? netlink_ack+0xdd0/0xdd0 [ 80.936167][ T362] ? netlink_deliver_tap+0x13e/0x340 [ 80.936339][ T362] ? netlink_deliver_tap+0xc3/0x340 [ 80.936577][ T362] netlink_unicast+0x4aa/0x780 [ 80.936823][ T362] ? netlink_attachskb+0x810/0x810 [ 80.937093][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.937486][ T362] netlink_sendmsg+0x714/0xbd0 [ 80.937735][ T362] ? netlink_unicast+0x780/0x780 [ 80.938012][ T362] ? __import_iovec+0x230/0x3b0 [ 80.938290][ T362] ? netlink_unicast+0x780/0x780 [ 80.938648][ T362] ____sys_sendmsg+0x3dd/0x890 [ 80.938932][ T362] ? get_timestamp.constprop.0+0x380/0x380 [ 80.939262][ T362] ? __copy_msghdr+0x3c0/0x3c0 [ 80.939610][ T362] ___sys_sendmsg+0xed/0x170 [ 80.939863][ T362] ? kasan_record_aux_stack+0x8c/0xa0 [ 80.940145][ T362] ? __call_rcu_common.constprop.0+0xa8/0x630 [ 80.940609][ T362] ? copy_msghdr_from_user+0x110/0x110 [ 80.940894][ T362] ? find_held_lock+0x2b/0x80 [ 80.941158][ T362] ? __lock_acquire+0x449/0x7e0 [ 80.941579][ T362] ? find_held_lock+0x2b/0x80 [ 80.941846][ T362] ? __virt_addr_valid+0x22a/0x450 [ 80.942118][ T362] ? __lock_release+0x5d/0x170 [ 80.942620][ T362] __sys_sendmsg+0x10b/0x1a0 [ 80.942908][ T362] ? __call_rcu_common.constprop.0+0x318/0x630 [ 80.943243][ T362] ? __sys_sendmsg_sock+0x20/0x20 [ 80.943635][ T362] ? rcu_is_watching+0x12/0xb0 [ 80.943913][ T362] do_syscall_64+0xc1/0xfd0 [ 80.944198][ T362] entry_SYSCALL_64_after_hwframe+0x4b/0x53 [ 80.944650][ T362] RIP: 0033:0x7f26448361d7 [ 80.944941][ T362] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 80.946064][ T362] RSP: 002b:00007fff345f7d08 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.946618][ T362] RAX: ffffffffffffffda RBX: 0000000018102320 RCX: 00007f26448361d7 [ 80.947042][ T362] RDX: 0000000000000000 RSI: 00007fff345f7d40 RDI: 0000000000000005 [ 80.947589][ T362] RBP: 0000000018102230 R08: 0000000000000003 R09: 0000000000000000 [ 80.948004][ T362] R10: 0000000000020000 R11: 0000000000000246 R12: 000000001812a3c0 [ 80.948542][ T362] R13: 00007fff345f7d40 R14: 0000000000000000 R15: 00007fff345f7ea0 [ 80.948970][ T362] [ 80.949195][ T362] irq event stamp: 125951 [ 80.949532][ T362] hardirqs last enabled at (125951): [] finish_task_switch.isra.0+0x245/0x960 [ 80.950090][ T362] hardirqs last disabled at (125950): [] __schedule+0x94a/0x1b10 [ 80.950746][ T362] softirqs last enabled at (125864): [] handle_softirqs+0x352/0x610 [ 80.951226][ T362] softirqs last disabled at (125859): [] irq_exit_rcu+0xab/0x100 [ 80.951817][ T362] ---[ end trace 0000000000000000 ]--- [ 80.962004][ T362] teamd (362) used greatest stack depth: 24232 bytes left