====================================== | [ 60.785770][ T663] ================================================================== | [ 60.786093][ T663] BUG: KASAN: slab-use-after-free in kobject_put (lib/kobject.c:733) | [ 60.786394][ T663] Read of size 1 at addr ffff88800ec346ac by task ip/663 | [ 60.786618][ T663] [ 60.786728][ T663] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 60.786737][ T663] Call Trace: [ 60.786740][ T663] [ 60.786742][ T663] dump_stack_lvl (lib/dump_stack.c:123) [ 60.786750][ T663] print_address_description.constprop.0 (mm/kasan/report.c:379) [ 60.786764][ T663] ? kobject_put (lib/kobject.c:733) [ 60.786768][ T663] print_report (mm/kasan/report.c:483) [ 60.786771][ T663] ? kobject_put (lib/kobject.c:733) [ 60.786774][ T663] ? kasan_addr_to_slab (./include/linux/mm.h:1245 mm/kasan/../slab.h:191 mm/kasan/common.c:47) [ 60.786777][ T663] ? kobject_put (lib/kobject.c:733) [ 60.786780][ T663] kasan_report (mm/kasan/report.c:597) [ 60.786784][ T663] ? kobject_put (lib/kobject.c:733) [ 60.786789][ T663] kobject_put (lib/kobject.c:733) [ 60.786793][ T663] netdev_run_todo (./include/linux/list.h:381 net/core/dev.c:11670) [ 60.786802][ T663] ? dev_ingress_queue_create (net/core/dev.c:12299) [ 60.786805][ T663] ? generic_xdp_install (net/core/dev.c:11630) [ 60.786808][ T663] ? unregister_netdevice_many (net/core/dev.c:12241) [ 60.786813][ T663] ? net_generic (./include/net/netns/generic.h:51) ip6_gre [ 60.786822][ T663] rtnl_dellink (net/core/rtnetlink.c:3580) [ 60.786829][ T663] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 60.786848][ T663] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 60.786858][ T663] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 60.786869][ T663] ? irqentry_exit (kernel/entry/common.c:215) [ 60.786877][ T663] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4472) [ 60.786881][ T663] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 60.786886][ T663] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 60.786889][ T663] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958) [ 60.786893][ T663] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 60.786896][ T663] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 60.786904][ T663] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [ 60.786910][ T663] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 60.786913][ T663] ? netlink_ack (net/netlink/af_netlink.c:2527) [ 60.786920][ T663] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 net/netlink/af_netlink.c:340) [ 60.786923][ T663] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 60.786927][ T663] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) [ 60.786931][ T663] ? netlink_attachskb (net/netlink/af_netlink.c:1329) [ 60.786935][ T663] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 60.786940][ T663] netlink_sendmsg (net/netlink/af_netlink.c:1894) [ 60.786945][ T663] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 60.786948][ T663] ? __import_iovec (lib/iov_iter.c:1346 lib/iov_iter.c:1361) [ 60.786963][ T663] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 60.786966][ T663] ____sys_sendmsg (net/socket.c:727 net/socket.c:742 net/socket.c:2630) [ 60.786977][ T663] ? get_timestamp.constprop.0 (net/socket.c:2576) [ 60.786980][ T663] ? __copy_msghdr (net/socket.c:2556) [ 60.786989][ T663] ___sys_sendmsg (net/socket.c:2686) [ 60.786992][ T663] ? kasan_record_aux_stack (mm/kasan/generic.c:559) [ 60.786995][ T663] ? __call_rcu_common.constprop.0 (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:109 ./arch/x86/include/asm/irqflags.h:127 kernel/rcu/tree.c:3125) [ 60.786999][ T663] ? copy_msghdr_from_user (net/socket.c:2673) [ 60.787004][ T663] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 60.787008][ T663] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 60.787014][ T663] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 60.787017][ T663] ? __virt_addr_valid (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:979 ./include/linux/mmzone.h:2197 arch/x86/mm/physaddr.c:65) [ 60.787030][ T663] ? __lock_release (kernel/locking/lockdep.c:5536) [ 60.787037][ T663] __sys_sendmsg (net/socket.c:2716) [ 60.787040][ T663] ? __call_rcu_common.constprop.0 (kernel/rcu/tree.c:3148) [ 60.787044][ T663] ? __sys_sendmsg_sock (net/socket.c:2701) [ 60.787051][ T663] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 60.787055][ T663] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 60.787060][ T663] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 60.787068][ T663] RIP: 0033:0x7f2b1b0d11d7 [ 60.787072][ T663] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0e (bad) 1: 00 f7 add %dh,%bh 3: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 60.787075][ T663] RSP: 002b:00007ffdeec202f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.787081][ T663] RAX: ffffffffffffffda RBX: 00007ffdeec20a20 RCX: 00007f2b1b0d11d7 [ 60.787083][ T663] RDX: 0000000000000000 RSI: 00007ffdeec20360 RDI: 0000000000000005 [ 60.787085][ T663] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 60.787087][ T663] R10: 00007f2b1afcdf60 R11: 0000000000000246 R12: 0000000000000002 [ 60.787088][ T663] R13: 00000000690df829 R14: 0000000000499600 R15: 0000000000000000 | [ 60.815333][ T663] refcount_t: underflow; use-after-free. | [ 60.815713][ T663] WARNING: CPU: 0 PID: 663 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28 (discriminator 3)) | [ 60.816241][ T663] Modules linked in: act_gact cls_flower sch_ingress ip6_gre ip6_tunnel tunnel6 gre 8021q dummy vrf veth | [ 60.817647][ T663] Tainted: [B]=BAD_PAGE [ 60.817889][ T663] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 60.818264][ T663] RIP: 0010:refcount_warn_saturate (lib/refcount.c:28 (discriminator 3)) [ 60.818648][ T663] Code: 7d 93 02 80 fb 01 0f 87 bb 99 d9 fe 83 e3 01 0f 85 51 ff ff ff c6 05 a8 7d 93 02 01 90 48 c7 c7 60 8d a5 bc e8 32 bf 18 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 b0 63 a1 ff e9 ba fe ff ff All code ======== 0: 7d 93 jge 0xffffffffffffff95 2: 02 80 fb 01 0f 87 add -0x78f0fe05(%rax),%al 8: bb 99 d9 fe 83 mov $0x83fed999,%ebx d: e3 01 jrcxz 0x10 f: 0f 85 51 ff ff ff jne 0xffffffffffffff66 15: c6 05 a8 7d 93 02 01 movb $0x1,0x2937da8(%rip) # 0x2937dc4 1c: 90 nop 1d: 48 c7 c7 60 8d a5 bc mov $0xffffffffbca58d60,%rdi 24: e8 32 bf 18 ff call 0xffffffffff18bf5b 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 33 ff ff ff jmp 0xffffffffffffff66 33: 48 89 df mov %rbx,%rdi 36: e8 b0 63 a1 ff call 0xffffffffffa163eb 3b: e9 ba fe ff ff jmp 0xfffffffffffffefa Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 33 ff ff ff jmp 0xffffffffffffff3c 9: 48 89 df mov %rbx,%rdi c: e8 b0 63 a1 ff call 0xffffffffffa163c1 11: e9 ba fe ff ff jmp 0xfffffffffffffed0 [ 60.819712][ T663] RSP: 0018:ffffc9000103f1f0 EFLAGS: 00010286 [ 60.820100][ T663] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 60.820524][ T663] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 60.820946][ T663] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff7a7e134 [ 60.821383][ T663] R10: 0000000000000003 R11: ffffc9000103ed80 R12: 0000000000000001 [ 60.821999][ T663] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 60.822415][ T663] FS: 00007f2b1af03800(0000) GS:ffff8880779f2000(0000) knlGS:0000000000000000 [ 60.822925][ T663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 60.823467][ T663] CR2: 000055c0b7f61dec CR3: 000000000df78004 CR4: 0000000000772ef0 [ 60.823888][ T663] PKRU: 55555554 [ 60.824103][ T663] Call Trace: [ 60.824312][ T663] [ 60.824459][ T663] netdev_run_todo (./include/linux/list.h:381 net/core/dev.c:11670) [ 60.824743][ T663] ? dev_ingress_queue_create (net/core/dev.c:12299) [ 60.825024][ T663] ? generic_xdp_install (net/core/dev.c:11630) [ 60.825288][ T663] ? unregister_netdevice_many (net/core/dev.c:12241) [ 60.825561][ T663] ? net_generic (./include/net/netns/generic.h:51) ip6_gre [ 60.825844][ T663] rtnl_dellink (net/core/rtnetlink.c:3580) [ 60.826116][ T663] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 60.826482][ T663] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 60.826954][ T663] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 60.827234][ T663] ? irqentry_exit (kernel/entry/common.c:215) [ 60.827535][ T663] ? lockdep_hardirqs_on (kernel/locking/lockdep.c:4472) [ 60.827817][ T663] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 60.828330][ T663] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 60.828666][ T663] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958) [ 60.828949][ T663] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 60.829250][ T663] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 60.829723][ T663] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [ 60.830016][ T663] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 60.830299][ T663] ? netlink_ack (net/netlink/af_netlink.c:2527) [ 60.830584][ T663] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 net/netlink/af_netlink.c:340) [ 60.831066][ T663] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 60.831351][ T663] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) [ 60.831641][ T663] ? netlink_attachskb (net/netlink/af_netlink.c:1329) [ 60.831943][ T663] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 60.832407][ T663] netlink_sendmsg (net/netlink/af_netlink.c:1894) [ 60.832682][ T663] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 60.832958][ T663] ? __import_iovec (lib/iov_iter.c:1346 lib/iov_iter.c:1361) [ 60.833228][ T663] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 60.833672][ T663] ____sys_sendmsg (net/socket.c:727 net/socket.c:742 net/socket.c:2630) [ 60.833951][ T663] ? get_timestamp.constprop.0 (net/socket.c:2576) [ 60.834283][ T663] ? __copy_msghdr (net/socket.c:2556) [ 60.834562][ T663] ___sys_sendmsg (net/socket.c:2686) [ 60.835027][ T663] ? kasan_record_aux_stack (mm/kasan/generic.c:559) [ 60.835290][ T663] ? __call_rcu_common.constprop.0 (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:109 ./arch/x86/include/asm/irqflags.h:127 kernel/rcu/tree.c:3125) [ 60.835621][ T663] ? copy_msghdr_from_user (net/socket.c:2673) [ 60.836071][ T663] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 60.836346][ T663] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 60.836614][ T663] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 60.836886][ T663] ? __virt_addr_valid (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:979 ./include/linux/mmzone.h:2197 arch/x86/mm/physaddr.c:65) [ 60.837346][ T663] ? __lock_release (kernel/locking/lockdep.c:5536) [ 60.837624][ T663] __sys_sendmsg (net/socket.c:2716) [ 60.837905][ T663] ? __call_rcu_common.constprop.0 (kernel/rcu/tree.c:3148) [ 60.838257][ T663] ? __sys_sendmsg_sock (net/socket.c:2701) [ 60.838741][ T663] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 60.839013][ T663] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 60.839284][ T663] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 60.839629][ T663] RIP: 0033:0x7f2b1b0d11d7 [ 60.839934][ T663] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0e (bad) 1: 00 f7 add %dh,%bh 3: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 60.841105][ T663] RSP: 002b:00007ffdeec202f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 60.841532][ T663] RAX: ffffffffffffffda RBX: 00007ffdeec20a20 RCX: 00007f2b1b0d11d7 [ 60.841950][ T663] RDX: 0000000000000000 RSI: 00007ffdeec20360 RDI: 0000000000000005 [ 60.842524][ T663] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 60.842930][ T663] R10: 00007f2b1afcdf60 R11: 0000000000000246 R12: 0000000000000002 Finger prints: print_report:kasan_report:kobject_put:netdev_run_todo:rtnl_dellink refcount_warn_saturate:netdev_run_todo:rtnl_dellink:rtnetlink_rcv_msg:netlink_rcv_skb