================================================================== BUG: KASAN: slab-use-after-free in rose_timer_expiry+0x46a/0x4b0 net/rose/rose_timer.c:183 Read of size 2 at addr ffff88805d04382a by task swapper/0/0 CPU: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x16c/0x230 lib/dump_stack.c:106 print_address_description mm/kasan/report.c:364 [inline] print_report+0xac/0x220 mm/kasan/report.c:468 kasan_report+0x117/0x150 mm/kasan/report.c:581 rose_timer_expiry+0x46a/0x4b0 net/rose/rose_timer.c:183 call_timer_fn+0x16e/0x530 kernel/time/timer.c:1700 expire_timers kernel/time/timer.c:1751 [inline] __run_timers+0x52d/0x7d0 kernel/time/timer.c:2022 run_timer_softirq+0x67/0xf0 kernel/time/timer.c:2035 handle_softirqs+0x280/0x820 kernel/softirq.c:578 __do_softirq kernel/softirq.c:612 [inline] invoke_softirq kernel/softirq.c:452 [inline] __irq_exit_rcu+0xc7/0x190 kernel/softirq.c:661 irq_exit_rcu+0x9/0x20 kernel/softirq.c:673 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline] sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687 RIP: 0010:pv_native_safe_halt+0x13/0x20 arch/x86/kernel/paravirt.c:148 Code: cc cc cc cc cc cc cc f3 0f 1e fa 0f 0b 66 2e 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 66 90 0f 00 2d a3 36 3a 00 f3 0f 1e fa fb f4 cc cc cc cc cc cc cc cc cc cc cc cc 66 0f 1f 00 55 41 57 41 56 RSP: 0000:ffffffff8ca07d80 EFLAGS: 000002c6 RAX: 1ee0ae25e70e2400 RBX: ffffffff8161923b RCX: 1ee0ae25e70e2400 RDX: 0000000000000001 RSI: ffffffff8aaaba20 RDI: ffffffff8afc7040 RBP: ffffffff8ca07eb8 R08: ffff8880b8e36d4b R09: 1ffff110171c6da9 R10: dffffc0000000000 R11: ffffed10171c6daa R12: ffffffff8e4a8f28 R13: 0000000000000000 R14: 0000000000000000 R15: 1ffffffff1952670 arch_safe_halt arch/x86/include/asm/paravirt.h:108 [inline] default_idle+0x13/0x20 arch/x86/kernel/process.c:753 default_idle_call+0x6c/0xa0 kernel/sched/idle.c:97 cpuidle_idle_call kernel/sched/idle.c:170 [inline] do_idle+0x1eb/0x510 kernel/sched/idle.c:282 cpu_startup_entry+0x43/0x60 kernel/sched/idle.c:380 rest_init+0x2e2/0x300 init/main.c:732 arch_call_rest_init+0xe/0x10 init/main.c:829 start_kernel+0x459/0x4e0 init/main.c:1074 x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:555 x86_64_start_kernel+0x60/0x60 arch/x86/kernel/head64.c:536 secondary_startup_64_no_verify+0x179/0x17b Allocated by task 7907: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4e/0x70 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0x8f/0xa0 mm/kasan/common.c:383 kmalloc include/linux/slab.h:600 [inline] rose_add_node+0x23a/0xdd0 net/rose/rose_route.c:85 rose_rt_ioctl+0xa42/0xfb0 net/rose/rose_route.c:740 rose_ioctl+0x3cf/0x8b0 net/rose/af_rose.c:1380 sock_do_ioctl+0xd7/0x2f0 net/socket.c:1222 sock_ioctl+0x623/0x7a0 net/socket.c:1341 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl+0xfd/0x170 fs/ioctl.c:857 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 Freed by task 10578: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4e/0x70 mm/kasan/common.c:52 kasan_save_free_info+0x2e/0x50 mm/kasan/generic.c:522 ____kasan_slab_free+0x126/0x1e0 mm/kasan/common.c:236 kasan_slab_free include/linux/kasan.h:164 [inline] slab_free_hook mm/slub.c:1806 [inline] slab_free_freelist_hook+0x130/0x1b0 mm/slub.c:1832 slab_free mm/slub.c:3816 [inline] __kmem_cache_free+0xba/0x1f0 mm/slub.c:3829 rose_rt_device_down+0x43d/0x490 net/rose/rose_route.c:515 rose_device_event+0x604/0x690 net/rose/af_rose.c:248 notifier_call_chain+0x197/0x390 kernel/notifier.c:93 call_netdevice_notifiers_extack net/core/dev.c:2064 [inline] call_netdevice_notifiers net/core/dev.c:2078 [inline] __dev_notify_flags+0x18e/0x2e0 net/core/dev.c:-1 dev_change_flags+0xe8/0x1a0 net/core/dev.c:8762 dev_ifsioc+0x6a7/0xe20 net/core/dev_ioctl.c:529 dev_ioctl+0x7e2/0x1170 net/core/dev_ioctl.c:786 sock_do_ioctl+0x226/0x2f0 net/socket.c:1236 sock_ioctl+0x623/0x7a0 net/socket.c:1341 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:871 [inline] __se_sys_ioctl+0xfd/0x170 fs/ioctl.c:857 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 Last potentially related work creation: kasan_save_stack+0x3e/0x60 mm/kasan/common.c:45 __kasan_record_aux_stack+0xaf/0xc0 mm/kasan/generic.c:492 __call_rcu_common kernel/rcu/tree.c:2721 [inline] call_rcu+0x158/0x930 kernel/rcu/tree.c:2837 __key_link+0x14a/0x300 security/keys/keyring.c:1375 __key_instantiate_and_link+0x36a/0x4d0 security/keys/key.c:460 __key_create_or_update+0x83e/0xa00 security/keys/key.c:926 key_create_or_update+0x42/0x60 security/keys/key.c:1007 __do_sys_add_key security/keys/keyctl.c:134 [inline] __se_sys_add_key+0x337/0x400 security/keys/keyctl.c:74 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 Second to last potentially related work creation: kasan_save_stack+0x3e/0x60 mm/kasan/common.c:45 __kasan_record_aux_stack+0xaf/0xc0 mm/kasan/generic.c:492 __call_rcu_common kernel/rcu/tree.c:2721 [inline] call_rcu+0x158/0x930 kernel/rcu/tree.c:2837 fib6_info_release include/net/ip6_fib.h:339 [inline] ip6_route_info_create+0x9c0/0x1200 net/ipv6/route.c:3875 ip6_route_add+0x28/0x130 net/ipv6/route.c:3889 addrconf_add_mroute net/ipv6/addrconf.c:2514 [inline] addrconf_add_dev+0x257/0x340 net/ipv6/addrconf.c:2532 inet6_addr_add+0x215/0xb60 net/ipv6/addrconf.c:2995 inet6_rtm_newaddr+0x68d/0x940 net/ipv6/addrconf.c:5003 rtnetlink_rcv_msg+0x7c7/0xf10 net/core/rtnetlink.c:6475 netlink_rcv_skb+0x216/0x480 net/netlink/af_netlink.c:2545 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline] netlink_unicast+0x751/0x8d0 net/netlink/af_netlink.c:1346 netlink_sendmsg+0x8c1/0xbe0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg net/socket.c:745 [inline] __sys_sendto+0x46a/0x620 net/socket.c:2201 __do_sys_sendto net/socket.c:2213 [inline] __se_sys_sendto net/socket.c:2209 [inline] __x64_sys_sendto+0xde/0xf0 net/socket.c:2209 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 The buggy address belongs to the object at ffff88805d043800 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 42 bytes inside of freed 512-byte region [ffff88805d043800, ffff88805d043a00) The buggy address belongs to the physical page: page:ffffea0001741000 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88805d043c00 pfn:0x5d040 head:ffffea0001741000 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0 flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) page_type: 0xffffffff() raw: 00fff00000000840 ffff888017841c80 ffffea0000970710 ffffea0000baee10 raw: ffff88805d043c00 0000000000100007 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 42, tgid 42 (kworker/u4:2), ts 73536923942, free_ts 16823172410 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x1cd/0x210 mm/page_alloc.c:1554 prep_new_page mm/page_alloc.c:1561 [inline] get_page_from_freelist+0x195c/0x19f0 mm/page_alloc.c:3191 __alloc_pages+0x1e3/0x460 mm/page_alloc.c:4457 alloc_slab_page+0x5d/0x170 mm/slub.c:1876 allocate_slab mm/slub.c:2023 [inline] new_slab+0x87/0x2e0 mm/slub.c:2076 ___slab_alloc+0xc6d/0x12f0 mm/slub.c:3230 __slab_alloc mm/slub.c:3329 [inline] __slab_alloc_node mm/slub.c:3382 [inline] slab_alloc_node mm/slub.c:3475 [inline] __kmem_cache_alloc_node+0x1a2/0x260 mm/slub.c:3524 kmalloc_trace+0x2a/0xe0 mm/slab_common.c:1098 kmalloc include/linux/slab.h:600 [inline] kzalloc include/linux/slab.h:721 [inline] mca_alloc net/ipv6/mcast.c:880 [inline] __ipv6_dev_mc_inc+0x3fa/0xa90 net/ipv6/mcast.c:935 addrconf_join_solict net/ipv6/addrconf.c:2205 [inline] addrconf_dad_begin net/ipv6/addrconf.c:4066 [inline] addrconf_dad_work+0x3c5/0x14e0 net/ipv6/addrconf.c:4191 process_one_work kernel/workqueue.c:2634 [inline] process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711 worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792 kthread+0x2fa/0x390 kernel/kthread.c:388 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1154 [inline] free_unref_page_prepare+0x7ce/0x8e0 mm/page_alloc.c:2336 free_unref_page+0x32/0x2e0 mm/page_alloc.c:2429 free_contig_range+0xa1/0x160 mm/page_alloc.c:6369 destroy_args+0x80/0x850 mm/debug_vm_pgtable.c:1015 debug_vm_pgtable+0x3cc/0x410 mm/debug_vm_pgtable.c:1400 do_one_initcall+0x1fd/0x750 init/main.c:1238 do_initcall_level+0x137/0x1f0 init/main.c:1300 do_initcalls+0x69/0xd0 init/main.c:1316 kernel_init_freeable+0x3d2/0x570 init/main.c:1553 kernel_init+0x1d/0x1c0 init/main.c:1443 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293 Memory state around the buggy address: ffff88805d043700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff88805d043780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff88805d043800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff88805d043880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff88805d043900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== ---------------- Code disassembly (best guess): 0: cc int3 1: cc int3 2: cc int3 3: cc int3 4: cc int3 5: cc int3 6: cc int3 7: f3 0f 1e fa endbr64 b: 0f 0b ud2 d: 66 2e 0f 1f 84 00 00 cs nopw 0x0(%rax,%rax,1) 14: 00 00 00 17: f3 0f 1e fa endbr64 1b: 66 90 xchg %ax,%ax 1d: 0f 00 2d a3 36 3a 00 verw 0x3a36a3(%rip) # 0x3a36c7 24: f3 0f 1e fa endbr64 28: fb sti 29: f4 hlt * 2a: c3 ret <-- trapping instruction 2b: cc int3 2c: cc int3 2d: cc int3 2e: cc int3 2f: cc int3 30: cc int3 31: cc int3 32: cc int3 33: cc int3 34: cc int3 35: cc int3 36: cc int3 37: 66 0f 1f 00 nopw (%rax) 3b: 55 push %rbp 3c: 41 57 push %r15 3e: 41 56 push %r14