================================================================== BUG: KASAN: use-after-free in rose_timer_expiry+0x470/0x490 net/rose/rose_timer.c:183 Read of size 2 at addr ffff888022c5c02a by task syz.4.651/6486 CPU: 0 PID: 6486 Comm: syz.4.651 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106 print_address_description+0x60/0x2d0 mm/kasan/report.c:248 __kasan_report mm/kasan/report.c:434 [inline] kasan_report+0xdf/0x130 mm/kasan/report.c:451 rose_timer_expiry+0x470/0x490 net/rose/rose_timer.c:183 call_timer_fn+0x17b/0x540 kernel/time/timer.c:1451 expire_timers kernel/time/timer.c:1496 [inline] __run_timers+0x53a/0x7f0 kernel/time/timer.c:1767 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1780 handle_softirqs+0x339/0x830 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] invoke_softirq kernel/softirq.c:450 [inline] __irq_exit_rcu+0x13b/0x230 kernel/softirq.c:659 irq_exit_rcu+0x5/0x20 kernel/softirq.c:671 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline] sysvec_apic_timer_interrupt+0x52/0xc0 arch/x86/kernel/apic/apic.c:1108 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676 RIP: 0033:0x7fd0489b9781 Code: 39 d0 75 dc 48 89 f0 25 ff 1f 00 00 49 89 34 c1 41 88 3c 00 31 c0 c3 66 90 41 38 3c 10 74 0b 41 88 3c 10 31 c0 49 89 34 d1 c3 01 00 00 00 c3 66 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 7c RSP: 002b:00007ffde507c358 EFLAGS: 00000246 RAX: 0000000081854cad RBX: ffffffff81854cad RCX: ffffffff81854cad RDX: 0000000000000cad RSI: ffffffff81854cad RDI: 0000000000000005 RBP: 0000000000000000 R08: 00007fd048d6a000 R09: 00007fd048d6c000 R10: 0000000081854cb1 R11: 0000000000000005 R12: 00007fd048d80038 R13: 000000000001c025 R14: ffffffff8185488f R15: 00007fd0498af720 Allocated by task 6020: kasan_save_stack mm/kasan/common.c:38 [inline] kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc mm/kasan/common.c:513 [inline] __kasan_kmalloc+0xb5/0xf0 mm/kasan/common.c:522 kmalloc_reserve net/core/skbuff.c:356 [inline] __alloc_skb+0x22c/0x750 net/core/skbuff.c:427 __netdev_alloc_skb+0x110/0x4c0 net/core/skbuff.c:494 netdev_alloc_skb include/linux/skbuff.h:3024 [inline] dev_alloc_skb include/linux/skbuff.h:3037 [inline] __ieee80211_beacon_get+0xaa1/0x2000 net/mac80211/tx.c:5088 ieee80211_beacon_get_tim+0x48/0x840 net/mac80211/tx.c:5202 ieee80211_beacon_get include/net/mac80211.h:4983 [inline] mac80211_hwsim_beacon_tx+0xf4/0x920 drivers/net/wireless/mac80211_hwsim.c:1812 __iterate_interfaces+0x243/0x500 net/mac80211/util.c:793 ieee80211_iterate_active_interfaces_atomic+0xb3/0x140 net/mac80211/util.c:829 mac80211_hwsim_beacon+0x9b/0x180 drivers/net/wireless/mac80211_hwsim.c:1865 __run_hrtimer kernel/time/hrtimer.c:1685 [inline] __hrtimer_run_queues+0x4eb/0xb70 kernel/time/hrtimer.c:1749 hrtimer_run_softirq+0x176/0x240 kernel/time/hrtimer.c:1766 handle_softirqs+0x339/0x830 kernel/softirq.c:576 __do_softirq kernel/softirq.c:610 [inline] invoke_softirq kernel/softirq.c:450 [inline] __irq_exit_rcu+0x13b/0x230 kernel/softirq.c:659 irq_exit_rcu+0x5/0x20 kernel/softirq.c:671 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1108 [inline] sysvec_apic_timer_interrupt+0xa0/0xc0 arch/x86/kernel/apic/apic.c:1108 asm_sysvec_apic_timer_interrupt+0x16/0x20 arch/x86/include/asm/idtentry.h:676 The buggy address belongs to the object at ffff888022c5c000 which belongs to the cache kmalloc-512 of size 512 The buggy address is located 42 bytes inside of 512-byte region [ffff888022c5c000, ffff888022c5c200) The buggy address belongs to the page: page:ffffea00008b1700 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888022c5f400 pfn:0x22c5c head:ffffea00008b1700 order:2 compound_mapcount:0 compound_pincount:0 flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) raw: 00fff00000010200 ffffea000095ef08 ffffea00017e4208 ffff888016c41c80 raw: ffff888022c5f400 0000000000100007 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as allocated page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1237, ts 9650122769, free_ts 0 prep_new_page mm/page_alloc.c:2426 [inline] get_page_from_freelist+0x1bbd/0x1ca0 mm/page_alloc.c:4192 __alloc_pages+0x1ee/0x480 mm/page_alloc.c:5487 alloc_slab_page mm/slub.c:1780 [inline] allocate_slab mm/slub.c:1917 [inline] new_slab+0xc0/0x4b0 mm/slub.c:1980 ___slab_alloc+0x80a/0xdd0 mm/slub.c:3013 __slab_alloc mm/slub.c:3100 [inline] slab_alloc_node mm/slub.c:3191 [inline] slab_alloc mm/slub.c:3233 [inline] kmem_cache_alloc_trace+0x1a5/0x2a0 mm/slub.c:3250 kmalloc include/linux/slab.h:607 [inline] kzalloc include/linux/slab.h:738 [inline] alloc_bprm+0x56/0x6a0 fs/exec.c:1516 kernel_execve+0x49/0x900 fs/exec.c:1978 call_usermodehelper_exec_async+0x207/0x350 kernel/umh.c:112 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 page_owner free stack trace missing Memory state around the buggy address: ffff888022c5bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888022c5bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888022c5c000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff888022c5c080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ffff888022c5c100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ==================================================================