====================================== | [ 28.817765][ T258] ================================================================== | [ 28.818138][ T258] BUG: KASAN: use-after-free in kobject_put (lib/kobject.c:733) | [ 28.818368][ T258] Read of size 1 at addr ffff88800ed246ac by task packetdrill/258 | [ 28.818667][ T258] [ 28.818768][ T258] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 28.818770][ T258] Call Trace: [ 28.818772][ T258] [ 28.818774][ T258] dump_stack_lvl (lib/dump_stack.c:123) [ 28.818780][ T258] print_address_description.constprop.0 (mm/kasan/report.c:379) [ 28.818787][ T258] ? kobject_put (lib/kobject.c:733) [ 28.818791][ T258] print_report (mm/kasan/report.c:483) [ 28.818795][ T258] ? kobject_put (lib/kobject.c:733) [ 28.818798][ T258] ? kasan_addr_to_slab (./include/linux/mm.h:1245 mm/kasan/../slab.h:191 mm/kasan/common.c:47) [ 28.818802][ T258] ? kobject_put (lib/kobject.c:733) [ 28.818805][ T258] kasan_report (mm/kasan/report.c:597) [ 28.818809][ T258] ? kobject_put (lib/kobject.c:733) [ 28.818815][ T258] kobject_put (lib/kobject.c:733) [ 28.818818][ T258] netdev_run_todo (./include/linux/list.h:381 net/core/dev.c:11670) [ 28.818823][ T258] ? rtnl_is_locked (net/core/rtnetlink.c:169) [ 28.818827][ T258] ? netif_state_change (./include/net/netdev_lock.h:72 ./include/net/netdev_lock.h:80 net/core/dev.c:1577) [ 28.818830][ T258] ? call_netdevice_notifiers_info (net/core/dev.c:1576) [ 28.818833][ T258] ? generic_xdp_install (net/core/dev.c:11630) [ 28.818837][ T258] ? tun_chr_close (drivers/net/tun.c:638 drivers/net/tun.c:3436) tun [ 28.818847][ T258] tun_chr_close (./include/net/sock.h:1990 drivers/net/tun.c:643 drivers/net/tun.c:3436) tun [ 28.818853][ T258] __fput (fs/file_table.c:468) [ 28.818860][ T258] fput_close_sync (fs/file_table.c:571) [ 28.818863][ T258] ? alloc_file_clone (fs/file_table.c:571) [ 28.818868][ T258] __x64_sys_close (fs/open.c:1592 fs/open.c:1574 fs/open.c:1574) [ 28.818872][ T258] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 28.818879][ T258] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 28.818882][ T258] RIP: 0033:0x4901eb [ 28.818887][ T258] Code: 03 00 00 00 0f 05 48 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 c3 78 04 00 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 21 79 04 00 8b 44 All code ======== 0: 03 00 add (%rax),%eax 2: 00 00 add %al,(%rax) 4: 0f 05 syscall 6: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax c: 77 41 ja 0x4f e: c3 ret f: 48 83 ec 18 sub $0x18,%rsp 13: 89 7c 24 0c mov %edi,0xc(%rsp) 17: e8 c3 78 04 00 call 0x478df 1c: 8b 7c 24 0c mov 0xc(%rsp),%edi 20: 41 89 c0 mov %eax,%r8d 23: b8 03 00 00 00 mov $0x3,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 35 ja 0x67 32: 44 89 c7 mov %r8d,%edi 35: 89 44 24 0c mov %eax,0xc(%rsp) 39: e8 21 79 04 00 call 0x4795f 3e: 8b .byte 0x8b 3f: 44 rex.R Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 35 ja 0x3d 8: 44 89 c7 mov %r8d,%edi b: 89 44 24 0c mov %eax,0xc(%rsp) f: e8 21 79 04 00 call 0x47935 14: 8b .byte 0x8b 15: 44 rex.R [ 28.818890][ T258] RSP: 002b:00007ffe62a604c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 28.818893][ T258] RAX: ffffffffffffffda RBX: 00007ffe62a609d8 RCX: 00000000004901eb [ 28.818896][ T258] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000006 [ 28.818897][ T258] RBP: 00007ffe62a60500 R08: 0000000000000000 R09: 0000000000000000 [ 28.818899][ T258] R10: 000000003f210050 R11: 0000000000000293 R12: 00007ffe62a60998 [ 28.818900][ T258] R13: 0000000000000001 R14: 000000000054e030 R15: 0000000000000001 | [ 28.830568][ T258] refcount_t: underflow; use-after-free. | [ 28.830764][ T258] WARNING: CPU: 3 PID: 258 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28 (discriminator 3)) | [ 28.831087][ T258] Modules linked in: xt_tcpudp xt_conntrack nft_compat nf_tables x_tables nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 tun | [ 28.831902][ T258] Tainted: [B]=BAD_PAGE [ 28.832041][ T258] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 28.832270][ T258] RIP: 0010:refcount_warn_saturate (lib/refcount.c:28 (discriminator 3)) [ 28.832560][ T258] Code: 83 90 02 80 fb 01 0f 87 95 6b d6 fe 83 e3 01 0f 85 51 ff ff ff c6 05 b1 83 90 02 01 90 48 c7 c7 a0 de 85 bb e8 c2 8b 15 ff 90 <0f> 0b 90 90 e9 33 ff ff ff 48 89 df e8 f0 34 a1 ff e9 ba fe ff ff All code ======== 0: 83 90 02 80 fb 01 0f adcl $0xf,0x1fb8002(%rax) 7: 87 95 6b d6 fe 83 xchg %edx,-0x7c012995(%rbp) d: e3 01 jrcxz 0x10 f: 0f 85 51 ff ff ff jne 0xffffffffffffff66 15: c6 05 b1 83 90 02 01 movb $0x1,0x29083b1(%rip) # 0x29083cd 1c: 90 nop 1d: 48 c7 c7 a0 de 85 bb mov $0xffffffffbb85dea0,%rdi 24: e8 c2 8b 15 ff call 0xffffffffff158beb 29: 90 nop 2a:* 0f 0b ud2 <-- trapping instruction 2c: 90 nop 2d: 90 nop 2e: e9 33 ff ff ff jmp 0xffffffffffffff66 33: 48 89 df mov %rbx,%rdi 36: e8 f0 34 a1 ff call 0xffffffffffa1352b 3b: e9 ba fe ff ff jmp 0xfffffffffffffefa Code starting with the faulting instruction =========================================== 0: 0f 0b ud2 2: 90 nop 3: 90 nop 4: e9 33 ff ff ff jmp 0xffffffffffffff3c 9: 48 89 df mov %rbx,%rdi c: e8 f0 34 a1 ff call 0xffffffffffa13501 11: e9 ba fe ff ff jmp 0xfffffffffffffed0 [ 28.833222][ T258] RSP: 0018:ffffc900009b7ce8 EFLAGS: 00010282 [ 28.833455][ T258] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 28.833719][ T258] RDX: 0000000000000002 RSI: 0000000000000004 RDI: 0000000000000001 [ 28.833987][ T258] RBP: 0000000000000003 R08: 0000000000000000 R09: fffffbfff783e220 [ 28.834268][ T258] R10: 0000000000000003 R11: ffffc900009b7880 R12: 0000000000000001 [ 28.834558][ T258] R13: dffffc0000000000 R14: dead000000000122 R15: dead000000000100 [ 28.834830][ T258] FS: 000000003f2083c0(0000) GS:ffff888078d6c000(0000) knlGS:0000000000000000 [ 28.835154][ T258] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.835420][ T258] CR2: 00007f0562bac000 CR3: 000000000eca9003 CR4: 0000000000772ef0 [ 28.835715][ T258] PKRU: 55555554 [ 28.835850][ T258] Call Trace: [ 28.835982][ T258] [ 28.836094][ T258] netdev_run_todo (./include/linux/list.h:381 net/core/dev.c:11670) [ 28.836303][ T258] ? rtnl_is_locked (net/core/rtnetlink.c:169) [ 28.836521][ T258] ? netif_state_change (./include/net/netdev_lock.h:72 ./include/net/netdev_lock.h:80 net/core/dev.c:1577) [ 28.836697][ T258] ? call_netdevice_notifiers_info (net/core/dev.c:1576) [ 28.836910][ T258] ? generic_xdp_install (net/core/dev.c:11630) [ 28.837104][ T258] ? tun_chr_close (drivers/net/tun.c:638 drivers/net/tun.c:3436) tun [ 28.837286][ T258] tun_chr_close (./include/net/sock.h:1990 drivers/net/tun.c:643 drivers/net/tun.c:3436) tun [ 28.837501][ T258] __fput (fs/file_table.c:468) [ 28.837639][ T258] fput_close_sync (fs/file_table.c:571) [ 28.837820][ T258] ? alloc_file_clone (fs/file_table.c:571) [ 28.837996][ T258] __x64_sys_close (fs/open.c:1592 fs/open.c:1574 fs/open.c:1574) [ 28.838190][ T258] do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) [ 28.838374][ T258] entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130) [ 28.838618][ T258] RIP: 0033:0x4901eb [ 28.838759][ T258] Code: 03 00 00 00 0f 05 48 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 c3 78 04 00 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 21 79 04 00 8b 44 All code ======== 0: 03 00 add (%rax),%eax 2: 00 00 add %al,(%rax) 4: 0f 05 syscall 6: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax c: 77 41 ja 0x4f e: c3 ret f: 48 83 ec 18 sub $0x18,%rsp 13: 89 7c 24 0c mov %edi,0xc(%rsp) 17: e8 c3 78 04 00 call 0x478df 1c: 8b 7c 24 0c mov 0xc(%rsp),%edi 20: 41 89 c0 mov %eax,%r8d 23: b8 03 00 00 00 mov $0x3,%eax 28: 0f 05 syscall 2a:* 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax <-- trapping instruction 30: 77 35 ja 0x67 32: 44 89 c7 mov %r8d,%edi 35: 89 44 24 0c mov %eax,0xc(%rsp) 39: e8 21 79 04 00 call 0x4795f 3e: 8b .byte 0x8b 3f: 44 rex.R Code starting with the faulting instruction =========================================== 0: 48 3d 00 f0 ff ff cmp $0xfffffffffffff000,%rax 6: 77 35 ja 0x3d 8: 44 89 c7 mov %r8d,%edi b: 89 44 24 0c mov %eax,0xc(%rsp) f: e8 21 79 04 00 call 0x47935 14: 8b .byte 0x8b 15: 44 rex.R [ 28.839423][ T258] RSP: 002b:00007ffe62a604c0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 28.839708][ T258] RAX: ffffffffffffffda RBX: 00007ffe62a609d8 RCX: 00000000004901eb [ 28.839969][ T258] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000006 [ 28.840247][ T258] RBP: 00007ffe62a60500 R08: 0000000000000000 R09: 0000000000000000 [ 28.840536][ T258] R10: 000000003f210050 R11: 0000000000000293 R12: 00007ffe62a60998 Finger prints: refcount_warn_saturate:netdev_run_todo:tun_chr_close:__fput:fput_close_sync print_report:kasan_report:kobject_put:netdev_run_todo:tun_chr_close