================================================================== BUG: KASAN: use-after-free in tick_sched_handle+0x16c/0x180 kernel/time/tick-sched.c:164 Read of size 8 at addr ffff8801630c3110 by task syz-executor4/9944 CPU: 0 PID: 9944 Comm: syz-executor4 Not tainted 4.18.0+ #190 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c9/0x2b4 lib/dump_stack.c:113 print_address_description+0x6c/0x20b mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report.cold.7+0x242/0x30d mm/kasan/report.c:412 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:433 tick_sched_handle+0x16c/0x180 kernel/time/tick-sched.c:164 tick_sched_timer+0x45/0x130 kernel/time/tick-sched.c:1274 __run_hrtimer kernel/time/hrtimer.c:1398 [inline] __hrtimer_run_queues+0x3eb/0x10c0 kernel/time/hrtimer.c:1460 hrtimer_interrupt+0x2f3/0x750 kernel/time/hrtimer.c:1518 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1029 [inline] smp_apic_timer_interrupt+0x16d/0x730 arch/x86/kernel/apic/apic.c:1054 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:864 The buggy address belongs to the page: page:ffffea00058c30c0 count:0 mapcount:0 mapping:0000000000000000 index:0x0 flags: 0x2fffc0000000000() raw: 02fffc0000000000 ffffea00058c3108 ffffea00058c3088 0000000000000000 raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801630c3000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8801630c3080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff8801630c3100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff8801630c3180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff8801630c3200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================