================================================================== BUG: KASAN: use-after-free in rose_timer_expiry+0x470/0x490 net/rose/rose_timer.c:183 Read of size 2 at addr ffff88805808082a by task swapper/1/0 CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.1.147-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 Call Trace: dump_stack_lvl+0x168/0x22e lib/dump_stack.c:106 print_address_description mm/kasan/report.c:316 [inline] print_report+0xa8/0x200 mm/kasan/report.c:418 kasan_report+0x10b/0x140 mm/kasan/report.c:522 rose_timer_expiry+0x470/0x490 net/rose/rose_timer.c:183 call_timer_fn+0x1a0/0x670 kernel/time/timer.c:1504 expire_timers kernel/time/timer.c:1549 [inline] __run_timers+0x525/0x7c0 kernel/time/timer.c:1820 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1833 handle_softirqs+0x2a1/0x920 kernel/softirq.c:596 __do_softirq kernel/softirq.c:630 [inline] invoke_softirq kernel/softirq.c:470 [inline] __irq_exit_rcu+0x12f/0x220 kernel/softirq.c:679 irq_exit_rcu+0x5/0x20 kernel/softirq.c:691 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1118 [inline] sysvec_apic_timer_interrupt+0xa0/0xc0 arch/x86/kernel/apic/apic.c:1118 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:691 RIP: 0010:default_idle+0xb/0x10 arch/x86/kernel/process.c:742 Code: 48 89 df e8 c7 c9 b0 f7 e9 4c ff ff ff e8 ed 07 f6 ff 00 00 cc cc 00 00 cc cc 00 00 cc cc 00 66 90 0f 00 2d 67 85 66 00 fb f4 0f 1f 40 00 41 57 41 56 53 49 be 00 00 00 00 00 fc ff df 65 48 RSP: 0000:ffffc90000177de8 EFLAGS: 000002c6 RAX: 1617b8171130ab00 RBX: ffffffff8a201e87 RCX: 1617b8171130ab00 RDX: 0000000000000001 RSI: ffffffff8a8c0460 RDI: ffffffff8adef320 RBP: ffffc90000177f20 R08: dffffc0000000000 R09: ffffed10171e6af6 R10: ffffed10171e6af6 R11: 1ffff110171e6af5 R12: 0000000000000001 R13: dffffc0000000000 R14: ffff88813fef1dc0 R15: 1ffffffff1c3e9b6 default_idle_call+0x84/0xc0 kernel/sched/idle.c:109 cpuidle_idle_call kernel/sched/idle.c:191 [inline] do_idle+0x1fc/0x570 kernel/sched/idle.c:303 cpu_startup_entry+0x3f/0x60 kernel/sched/idle.c:401 start_secondary+0xe4/0xf0 arch/x86/kernel/smpboot.c:281 secondary_startup_64_no_verify+0xcf/0xdb Allocated by task 21: kasan_save_stack mm/kasan/common.c:45 [inline] kasan_set_track+0x4b/0x70 mm/kasan/common.c:52 ____kasan_kmalloc mm/kasan/common.c:374 [inline] __kasan_kmalloc+0x8e/0xa0 mm/kasan/common.c:383 kasan_kmalloc include/linux/kasan.h:211 [inline] __do_kmalloc_node mm/slab_common.c:936 [inline] __kmalloc_node_track_caller+0xae/0x230 mm/slab_common.c:956 kmalloc_reserve net/core/skbuff.c:446 [inline] __alloc_skb+0x22a/0x7e0 net/core/skbuff.c:515 __netdev_alloc_skb+0x107/0x4d0 net/core/skbuff.c:579 netdev_alloc_skb include/linux/skbuff.h:3206 [inline] dev_alloc_skb include/linux/skbuff.h:3219 [inline] __ieee80211_beacon_get+0xc48/0x1f50 net/mac80211/tx.c:5260 ieee80211_beacon_get_tim+0x5b/0x4d0 net/mac80211/tx.c:5342 ieee80211_beacon_get include/net/mac80211.h:5262 [inline] mac80211_hwsim_beacon_tx+0x21c/0xae0 drivers/net/wireless/mac80211_hwsim.c:2091 __iterate_interfaces+0x243/0x500 net/mac80211/util.c:788 ieee80211_iterate_active_interfaces_atomic+0xd7/0x170 net/mac80211/util.c:824 mac80211_hwsim_beacon+0xb7/0x1b0 drivers/net/wireless/mac80211_hwsim.c:2147 __run_hrtimer kernel/time/hrtimer.c:1752 [inline] __hrtimer_run_queues+0x554/0xd60 kernel/time/hrtimer.c:1816 hrtimer_run_softirq+0x183/0x2a0 kernel/time/hrtimer.c:1833 handle_softirqs+0x2a1/0x920 kernel/softirq.c:596 run_ksoftirqd+0x98/0xf0 kernel/softirq.c:963 smpboot_thread_fn+0x64a/0xa40 kernel/smpboot.c:164 kthread+0x29d/0x330 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 The buggy address belongs to the object at ffff888058080800 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 42 bytes inside of 512-byte region [ffff888058080800, ffff888058080a00) The buggy address belongs to the physical page: page:ffffea0001602000 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888058082000 pfn:0x58080 head:ffffea0001602000 order:2 compound_mapcount:0 compound_pincount:0 flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000010200 ffffea0001578608 ffffea00009f9a08 ffff888017441c80 raw: ffff888058082000 0000000000100005 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4376, tgid 4376 (udevd), ts 95053517893, free_ts 92033656601 set_page_owner include/linux/page_owner.h:31 [inline] post_alloc_hook+0x173/0x1a0 mm/page_alloc.c:2532 prep_new_page mm/page_alloc.c:2539 [inline] get_page_from_freelist+0x1a26/0x1ac0 mm/page_alloc.c:4328 __alloc_pages+0x1df/0x4e0 mm/page_alloc.c:5614 alloc_slab_page+0x5d/0x160 mm/slub.c:1794 allocate_slab mm/slub.c:1939 [inline] new_slab+0x87/0x2c0 mm/slub.c:1992 ___slab_alloc+0xbc6/0x1220 mm/slub.c:3180 __slab_alloc mm/slub.c:3279 [inline] slab_alloc_node mm/slub.c:3364 [inline] __kmem_cache_alloc_node+0x1a0/0x260 mm/slub.c:3437 kmalloc_trace+0x26/0xe0 mm/slab_common.c:1026 kmalloc include/linux/slab.h:563 [inline] kzalloc include/linux/slab.h:699 [inline] kernfs_fop_open+0x3f1/0xcc0 fs/kernfs/file.c:672 do_dentry_open+0x7e9/0x10d0 fs/open.c:882 do_open fs/namei.c:3626 [inline] path_openat+0x25c6/0x2e70 fs/namei.c:3783 do_filp_open+0x1c1/0x3c0 fs/namei.c:3810 do_sys_openat2+0x142/0x490 fs/open.c:1318 do_sys_open fs/open.c:1334 [inline] __do_sys_openat fs/open.c:1350 [inline] __se_sys_openat fs/open.c:1345 [inline] __x64_sys_openat+0x135/0x160 fs/open.c:1345 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81 entry_SYSCALL_64_after_hwframe+0x68/0xd2 page last free stack trace: reset_page_owner include/linux/page_owner.h:24 [inline] free_pages_prepare mm/page_alloc.c:1459 [inline] free_pcp_prepare mm/page_alloc.c:1509 [inline] free_unref_page_prepare+0x8b4/0x9a0 mm/page_alloc.c:3384 free_unref_page+0x2e/0x3f0 mm/page_alloc.c:3479 qlink_free mm/kasan/quarantine.c:168 [inline] qlist_free_all+0x76/0xe0 mm/kasan/quarantine.c:187 kasan_quarantine_reduce+0x144/0x160 mm/kasan/quarantine.c:294 __kasan_slab_alloc+0x1e/0x80 mm/kasan/common.c:305 kasan_slab_alloc include/linux/kasan.h:201 [inline] slab_post_alloc_hook+0x4b/0x480 mm/slab.h:737 slab_alloc_node mm/slub.c:3398 [inline] __kmem_cache_alloc_node+0x140/0x260 mm/slub.c:3437 __do_kmalloc_node mm/slab_common.c:935 [inline] __kmalloc+0xa0/0x240 mm/slab_common.c:949 kmalloc include/linux/slab.h:568 [inline] kzalloc include/linux/slab.h:699 [inline] fib_create_info+0xa53/0x2490 net/ipv4/fib_semantics.c:1459 fib_table_insert+0xc3/0x1b50 net/ipv4/fib_trie.c:1217 fib_magic+0x2c1/0x390 net/ipv4/fib_frontend.c:1118 fib_add_ifaddr+0x140/0x5e0 net/ipv4/fib_frontend.c:1140 fib_inetaddr_event+0x13c/0x1c0 net/ipv4/fib_frontend.c:1454 notifier_call_chain kernel/notifier.c:87 [inline] blocking_notifier_call_chain+0x103/0x1b0 kernel/notifier.c:382 __inet_insert_ifa+0x9aa/0xb60 net/ipv4/devinet.c:569 inet_rtm_newaddr+0x930/0x1890 net/ipv4/devinet.c:971 Memory state around the buggy address: ffff888058080700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc ffff888058080780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc >ffff888058080800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888058080880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888058080900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== ---------------- Code disassembly (best guess): 0: 48 89 df mov %rbx,%rdi 3: e8 c7 c9 b0 f7 call 0xf7b0c9cf 8: e9 4c ff ff ff jmp 0xffffff59 d: e8 ed 07 f6 ff call 0xfff607ff 12: 00 00 add %al,(%rax) 14: cc int3 15: cc int3 16: 00 00 add %al,(%rax) 18: cc int3 19: cc int3 1a: 00 00 add %al,(%rax) 1c: cc int3 1d: cc int3 1e: 00 66 90 add %ah,-0x70(%rsi) 21: 0f 00 2d 67 85 66 00 verw 0x668567(%rip) # 0x66858f 28: fb sti 29: f4 hlt * 2a: c3 ret <-- trapping instruction 2b: 0f 1f 40 00 nopl 0x0(%rax) 2f: 41 57 push %r15 31: 41 56 push %r14 33: 53 push %rbx 34: 49 be 00 00 00 00 00 movabs $0xdffffc0000000000,%r14 3b: fc ff df 3e: 65 gs 3f: 48 rex.W