==================================================================
BUG: KASAN: slab-use-after-free in __list_del_entry_valid_or_report+0x92/0x190
Read of size 8 at addr ffff88810a080560 by task syz-executor/5843

CPU: 1 UID: 0 PID: 5843 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250
 print_report+0xca/0x240
 kasan_report+0x118/0x150
 __list_del_entry_valid_or_report+0x92/0x190
 bt_accept_unlink+0x39/0x240
 l2cap_sock_teardown_cb+0x17e/0x460
 l2cap_chan_del+0xb5/0x5e0
 l2cap_conn_del+0x388/0x680
 hci_conn_hash_flush+0x10d/0x230
 hci_dev_close_sync+0xaef/0x1330
 hci_unregister_dev+0x21a/0x510
 vhci_release+0x152/0x1a0
 __fput+0x44c/0xa70
 task_work_run+0x1d4/0x260
 do_exit+0x6b5/0x2300
 do_group_exit+0x21c/0x2d0
 __x64_sys_exit_group+0x3f/0x40
 x64_sys_call+0x21f7/0x2200
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fbcdfb8ec29
Code: Unable to access opcode bytes at 0x7fbcdfb8ebff.
RSP: 002b:00007ffeb4b80ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007fbcdfc1367b RCX: 00007fbcdfb8ec29
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043
RBP: 00007fbcdfc1368d R08: 00007ffeb4b7ea86 R09: 00000000000927c0
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016
R13: 00000000000927c0 R14: 000000000001cfd7 R15: 00007ffeb4b80e90
 </TASK>

Allocated by task 7189:
 kasan_save_track+0x3e/0x80
 __kasan_kmalloc+0x93/0xb0
 __kmalloc_noprof+0x27a/0x4f0
 xlog_cil_commit+0x2d8/0x2b80
 __xfs_trans_commit+0x3d8/0xbd0
 xfs_trans_roll+0x136/0x3d0
 xfs_defer_trans_roll+0x17e/0x5b0
 xfs_defer_finish_noroll+0x842/0x12d0
 xfs_trans_commit+0x10b/0x1c0
 xfs_iomap_write_unwritten+0x554/0xa70
 xfs_dio_write_end_io+0x4df/0x700
 iomap_dio_complete+0x145/0x980
 xfs_file_dio_write_aligned+0x157/0x1b0
 xfs_file_write_iter+0x8b2/0xa60
 iter_file_splice_write+0x975/0x10e0
 direct_splice_actor+0x101/0x160
 splice_direct_to_actor+0x5a8/0xcc0
 do_splice_direct+0x181/0x270
 do_sendfile+0x4da/0x7e0
 __se_sys_sendfile64+0x13e/0x190
 do_syscall_64+0xfa/0x3b0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 127:
 kasan_save_track+0x3e/0x80
 kasan_save_free_info+0x46/0x50
 __kasan_slab_free+0x5b/0x80
 kfree+0x18e/0x440
 xlog_cil_committed+0xf35/0x1040
 xlog_cil_process_committed+0x15c/0x1b0
 xlog_state_do_callback+0x55c/0xd40
 xlog_ioend_work+0xc6/0x100
 process_scheduled_works+0xae1/0x17b0
 worker_thread+0x8a0/0xda0
 kthread+0x711/0x8a0
 ret_from_fork+0x439/0x7d0
 ret_from_fork_asm+0x1a/0x30

The buggy address belongs to the object at ffff88810a080000
 which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 1376 bytes inside of
 freed 2048-byte region [ffff88810a080000, ffff88810a080800)

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10a080
head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0x57ff00000000040(head|node=1|zone=2|lastcpupid=0x7ff)
page_type: f5(slab)
raw: 057ff00000000040 ffff88801a442000 ffffea0004200000 dead000000000002
raw: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
head: 057ff00000000040 ffff88801a442000 ffffea0004200000 dead000000000002
head: 0000000000000000 0000000000080008 00000000f5000000 0000000000000000
head: 057ff00000000003 ffffea0004282001 00000000ffffffff 00000000ffffffff
head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5849, tgid 5849 (syz-executor), ts 55151594864, free_ts 54781939270
 post_alloc_hook+0x240/0x2a0
 get_page_from_freelist+0x21e4/0x22c0
 __alloc_frozen_pages_noprof+0x181/0x370
 alloc_pages_mpol+0x232/0x4a0
 allocate_slab+0x8a/0x370
 ___slab_alloc+0xbeb/0x1420
 __kmalloc_node_track_caller_noprof+0x2f8/0x4e0
 kmalloc_reserve+0x136/0x290
 __alloc_skb+0x142/0x2d0
 rtmsg_ifinfo_build_skb+0x84/0x260
 rtmsg_ifinfo+0x8c/0x1a0
 register_netdevice+0x1712/0x1ae0
 __ip_tunnel_create+0x3e7/0x560
 ip_tunnel_init_net+0x2ba/0x800
 ops_init+0x35c/0x5c0
 setup_net+0x10c/0x320
page last free pid 5772 tgid 5772 stack trace:
 __free_frozen_pages+0xbc4/0xd30
 __folio_put+0x21b/0x2c0
 skb_release_data+0x49a/0x7c0
 napi_consume_skb+0x158/0x1e0
 net_rx_action+0x51b/0xe30
 handle_softirqs+0x286/0x870
 do_softirq+0xec/0x180
 __local_bh_enable_ip+0x17d/0x1c0
 __dev_queue_xmit+0x1d79/0x3b50
 ip_finish_output2+0xd03/0x1160
 ip_output+0x2a1/0x3c0
 __ip_queue_xmit+0x1106/0x1b00
 __tcp_transmit_skb+0x2215/0x3680
 tcp_write_xmit+0x1862/0x67f0
 __tcp_push_pending_frames+0x97/0x360
 tcp_rcv_established+0x1012/0x1eb0

Memory state around the buggy address:
 ffff88810a080400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88810a080480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
>ffff88810a080500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                       ^
 ffff88810a080580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88810a080600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
