====================================== | [ 63.060166][ T812] ================================================================== | [ 63.060552][ T812] BUG: KASAN: slab-use-after-free in kobject_put (lib/kobject.c:733) | [ 63.060860][ T812] Read of size 1 at addr ffff88800cf296c4 by task ip/812 | [ 63.061082][ T812] [ 63.061185][ T812] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 63.061191][ T812] Call Trace: [ 63.061194][ T812] [ 63.061196][ T812] dump_stack_lvl (lib/dump_stack.c:123) [ 63.061205][ T812] print_address_description.constprop.0 (mm/kasan/report.c:379) [ 63.061215][ T812] ? kobject_put (lib/kobject.c:733) [ 63.061219][ T812] print_report (mm/kasan/report.c:483) [ 63.061222][ T812] ? kobject_put (lib/kobject.c:733) [ 63.061225][ T812] ? kasan_addr_to_slab (./include/linux/mm.h:1245 mm/kasan/../slab.h:191 mm/kasan/common.c:47) [ 63.061229][ T812] ? kobject_put (lib/kobject.c:733) [ 63.061234][ T812] kasan_report (mm/kasan/report.c:597) [ 63.061238][ T812] ? kobject_put (lib/kobject.c:733) [ 63.061243][ T812] kobject_put (lib/kobject.c:733) [ 63.061247][ T812] netdev_run_todo (./include/linux/list.h:381 net/core/dev.c:11670) [ 63.061254][ T812] ? dev_ingress_queue_create (net/core/dev.c:12299) [ 63.061258][ T812] ? generic_xdp_install (net/core/dev.c:11630) [ 63.061261][ T812] ? unregister_netdevice_many (net/core/dev.c:12241) [ 63.061267][ T812] rtnl_dellink (net/core/rtnetlink.c:3580) [ 63.061272][ T812] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 63.061292][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.061300][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.061305][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.061309][ T812] ? rtnetlink_rcv_msg (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 net/core/rtnetlink.c:6956) [ 63.061312][ T812] ? __lock_release (kernel/locking/lockdep.c:5536) [ 63.061316][ T812] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 63.061320][ T812] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958) [ 63.061324][ T812] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 63.061327][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.061333][ T812] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [ 63.061339][ T812] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 63.061343][ T812] ? netlink_ack (net/netlink/af_netlink.c:2527) [ 63.061349][ T812] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 net/netlink/af_netlink.c:340) [ 63.061352][ T812] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 63.061355][ T812] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) [ 63.061359][ T812] ? netlink_attachskb (net/netlink/af_netlink.c:1329) [ 63.061363][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.061367][ T812] netlink_sendmsg (net/netlink/af_netlink.c:1894) [ 63.061371][ T812] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 63.061374][ T812] ? __import_iovec (lib/iov_iter.c:1346 lib/iov_iter.c:1361) [ 63.061382][ T812] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 63.061385][ T812] ____sys_sendmsg (net/socket.c:727 net/socket.c:742 net/socket.c:2630) [ 63.061389][ T812] ? get_timestamp.constprop.0 (net/socket.c:2576) [ 63.061392][ T812] ? __copy_msghdr (net/socket.c:2556) [ 63.061399][ T812] ___sys_sendmsg (net/socket.c:2686) [ 63.061401][ T812] ? kasan_record_aux_stack (mm/kasan/generic.c:559) [ 63.061404][ T812] ? __call_rcu_common.constprop.0 (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:109 ./arch/x86/include/asm/irqflags.h:127 kernel/rcu/tree.c:3125) [ 63.061410][ T812] ? copy_msghdr_from_user (net/socket.c:2673) [ 63.061414][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.061419][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.061423][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.061427][ T812] ? __virt_addr_valid (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:979 ./include/linux/mmzone.h:2197 arch/x86/mm/physaddr.c:65) [ 63.061435][ T812] ? __lock_release (kernel/locking/lockdep.c:5536) [ 63.061441][ T812] __sys_sendmsg (net/socket.c:2716) [ 63.061443][ T812] ? __call_rcu_common.constprop.0 (kernel/rcu/tree.c:3148) [ 63.061446][ T812] ? __sys_sendmsg_sock (net/socket.c:2701) [ 63.061453][ T812] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 63.061458][ T812] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 63.061463][ T812] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 63.061466][ T812] RIP: 0033:0x7f627308a1d7 [ 63.061475][ T812] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0e (bad) 1: 00 f7 add %dh,%bh 3: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 63.061477][ T812] RSP: 002b:00007ffd03374fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.061485][ T812] RAX: ffffffffffffffda RBX: 00007ffd03375710 RCX: 00007f627308a1d7 [ 63.061488][ T812] RDX: 0000000000000000 RSI: 00007ffd03375040 RDI: 0000000000000005 [ 63.061490][ T812] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 63.061491][ T812] R10: 00007f6272f86510 R11: 0000000000000246 R12: 0000000000000002 [ 63.061493][ T812] R13: 00000000690df171 R14: 0000000000499600 R15: 0000000000000000 | [ 63.094779][ T812] refcount_t: underflow; use-after-free. | [ 63.095035][ T812] WARNING: CPU: 1 PID: 812 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28 (discriminator 3)) | [ 63.095372][ T812] Modules linked in: | [ 63.095833][ T812] Tainted: [B]=BAD_PAGE [ 63.095957][ T812] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 63.096168][ T812] RIP: 0010:refcount_warn_saturate (lib/refcount.c:28 (discriminator 3)) [ 63.096389][ T812] Code: cc 38 03 80 fb 01 0f 87 29 33 d7 fe 83 e3 01 0f 85 51 ff ff ff c6 05 17 cc 38 03 01 90 48 c7 c7 40 ba 05 95 e8 62 d6 16 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 c0 9d a0 ff e9 ba fe ff ff All code ======== 0: cc int3 1: 38 03 cmp %al,(%rbx) 3: 80 fb 01 cmp $0x1,%bl 6: 0f 87 29 33 d7 fe ja 0xfffffffffed73335 c: 83 e3 01 and $0x1,%ebx f: 0f 85 51 ff ff ff jne 0xffffffffffffff66 15: c6 05 17 cc 38 03 01 movb $0x1,0x338cc17(%rip) # 0x338cc33 1c: 90 nop 1d: 48 c7 c7 40 ba 05 95 mov $0xffffffff9505ba40,%rdi 24: e8 62 d6 16 ff call 0xffffffffff16d68b 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 33 ff ff ff jmp 0xffffffffffffff66 33: 48 89 df mov %rbx,%rdi 36: e8 c0 9d a0 ff call 0xffffffffffa09dfb 3b: e9 ba fe ff ff jmp 0xfffffffffffffefa Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 33 ff ff ff jmp 0xffffffffffffff3c 9: 48 89 df mov %rbx,%rdi c: e8 c0 9d a0 ff call 0xffffffffffa09dd1 11: e9 ba fe ff ff jmp 0xfffffffffffffed0 [ 63.096961][ T812] RSP: 0018:ffffc90001cc71f0 EFLAGS: 00010286 [ 63.097168][ T812] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 63.097426][ T812] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 63.097667][ T812] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff2c00934 [ 63.097911][ T812] R10: 0000000000000003 R11: ffffc90001cc6d80 R12: 0000000000000001 [ 63.098153][ T812] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 63.098411][ T812] FS: 00007f6272ebc800(0000) GS:ffff8880d5b88000(0000) knlGS:0000000000000000 [ 63.098745][ T812] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 63.099001][ T812] CR2: 00007f39fe81f5f0 CR3: 0000000002548004 CR4: 0000000000772ef0 [ 63.099256][ T812] PKRU: 55555554 [ 63.099386][ T812] Call Trace: [ 63.099550][ T812] [ 63.099655][ T812] netdev_run_todo (./include/linux/list.h:381 net/core/dev.c:11670) [ 63.099824][ T812] ? dev_ingress_queue_create (net/core/dev.c:12299) [ 63.099990][ T812] ? generic_xdp_install (net/core/dev.c:11630) [ 63.100175][ T812] ? unregister_netdevice_many (net/core/dev.c:12241) [ 63.100346][ T812] rtnl_dellink (net/core/rtnetlink.c:3580) [ 63.100507][ T812] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 63.100740][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.100914][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.101076][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.101242][ T812] ? rtnetlink_rcv_msg (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 net/core/rtnetlink.c:6956) [ 63.101405][ T812] ? __lock_release (kernel/locking/lockdep.c:5536) [ 63.101571][ T812] ? valid_bridge_getlink_req.constprop.0 (net/core/rtnetlink.c:3536) [ 63.101772][ T812] rtnetlink_rcv_msg (net/core/rtnetlink.c:6958) [ 63.101937][ T812] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 63.102105][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.102273][ T812] netlink_rcv_skb (net/netlink/af_netlink.c:2550) [ 63.102440][ T812] ? rtnl_port_fill (net/core/rtnetlink.c:6861) [ 63.102598][ T812] ? netlink_ack (net/netlink/af_netlink.c:2527) [ 63.102787][ T812] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 net/netlink/af_netlink.c:340) [ 63.102946][ T812] ? netlink_deliver_tap (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:897 ./include/net/netns/generic.h:48 net/netlink/af_netlink.c:333) [ 63.103104][ T812] netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344) [ 63.103269][ T812] ? netlink_attachskb (net/netlink/af_netlink.c:1329) [ 63.103442][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.103604][ T812] netlink_sendmsg (net/netlink/af_netlink.c:1894) [ 63.103795][ T812] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 63.103951][ T812] ? __import_iovec (lib/iov_iter.c:1346 lib/iov_iter.c:1361) [ 63.104119][ T812] ? netlink_unicast (net/netlink/af_netlink.c:1813) [ 63.104292][ T812] ____sys_sendmsg (net/socket.c:727 net/socket.c:742 net/socket.c:2630) [ 63.104462][ T812] ? get_timestamp.constprop.0 (net/socket.c:2576) [ 63.104683][ T812] ? __copy_msghdr (net/socket.c:2556) [ 63.104858][ T812] ___sys_sendmsg (net/socket.c:2686) [ 63.105017][ T812] ? kasan_record_aux_stack (mm/kasan/generic.c:559) [ 63.105176][ T812] ? __call_rcu_common.constprop.0 (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:109 ./arch/x86/include/asm/irqflags.h:127 kernel/rcu/tree.c:3125) [ 63.105487][ T812] ? copy_msghdr_from_user (net/socket.c:2673) [ 63.105658][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.105832][ T812] ? __lock_acquire (kernel/locking/lockdep.c:5237) [ 63.105994][ T812] ? find_held_lock (kernel/locking/lockdep.c:5350) [ 63.106157][ T812] ? __virt_addr_valid (./include/linux/rcupdate.h:341 ./include/linux/rcupdate.h:979 ./include/linux/mmzone.h:2197 arch/x86/mm/physaddr.c:65) [ 63.106334][ T812] ? __lock_release (kernel/locking/lockdep.c:5536) [ 63.106493][ T812] __sys_sendmsg (net/socket.c:2716) [ 63.106691][ T812] ? __call_rcu_common.constprop.0 (kernel/rcu/tree.c:3148) [ 63.106891][ T812] ? __sys_sendmsg_sock (net/socket.c:2701) [ 63.107056][ T812] ? rcu_is_watching (./include/linux/context_tracking.h:128 kernel/rcu/tree.c:751) [ 63.107221][ T812] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 63.107454][ T812] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 63.107687][ T812] RIP: 0033:0x7f627308a1d7 [ 63.107895][ T812] Code: 0e 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 All code ======== 0: 0e (bad) 1: 00 f7 add %dh,%bh 3: d8 64 89 02 fsubs 0x2(%rcx,%rcx,4) 7: 48 c7 c0 ff ff ff ff mov $0xffffffffffffffff,%rax e: eb b9 jmp 0xffffffffffffffc9 10: 0f 1f 00 nopl (%rax) 13: f3 0f 1e fa endbr64 17: 64 8b 04 25 18 00 00 mov %fs:0x18,%eax 1e: 00 1f: 85 c0 test %eax,%eax 21: 75 10 jne 0x33 23: b8 2e 00 00 00 mov $0x2e,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 51 ja 0x83 32: c3 ret 33: 48 83 ec 28 sub $0x28,%rsp 37: 89 54 24 1c mov %edx,0x1c(%rsp) 3b: 48 89 74 24 10 mov %rsi,0x10(%rsp) Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 51 ja 0x59 8: c3 ret 9: 48 83 ec 28 sub $0x28,%rsp d: 89 54 24 1c mov %edx,0x1c(%rsp) 11: 48 89 74 24 10 mov %rsi,0x10(%rsp) [ 63.108595][ T812] RSP: 002b:00007ffd03374fd8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 63.108887][ T812] RAX: ffffffffffffffda RBX: 00007ffd03375710 RCX: 00007f627308a1d7 [ 63.109162][ T812] RDX: 0000000000000000 RSI: 00007ffd03375040 RDI: 0000000000000005 [ 63.109411][ T812] RBP: 0000000000000002 R08: 0000000000000003 R09: 0000000000000078 [ 63.109702][ T812] R10: 00007f6272f86510 R11: 0000000000000246 R12: 0000000000000002 Finger prints: print_report:kasan_report:kobject_put:netdev_run_todo:rtnl_dellink refcount_warn_saturate:netdev_run_todo:rtnl_dellink:rtnetlink_rcv_msg:netlink_rcv_skb