================================================================== BUG: KASAN: use-after-free in device_for_each_child+0x17a/0x190 drivers/base/core.c:4044 Read of size 8 at addr ffff88802399d5f8 by task kbnepd bnep0/9848 CPU: 1 PID: 9848 Comm: kbnepd bnep0 Not tainted 6.9.0-rc5-syzkaller-00296-g5eb4573ea63d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 device_for_each_child+0x17a/0x190 drivers/base/core.c:4044 pm_runtime_set_memalloc_noio+0xf2/0x180 drivers/base/power/runtime.c:248 netdev_unregister_kobject+0x1ed/0x270 net/core/net-sysfs.c:2106 unregister_netdevice_many_notify+0xc8a/0x19f0 net/core/dev.c:11135 unregister_netdevice_many net/core/dev.c:11163 [inline] unregister_netdevice_queue+0x307/0x3f0 net/core/dev.c:11042 unregister_netdevice include/linux/netdevice.h:3115 [inline] unregister_netdev+0x1c/0x30 net/core/dev.c:11181 bnep_session+0x220d/0x2d60 net/bluetooth/bnep/core.c:525 kthread+0x2c1/0x3a0 kernel/kthread.c:388 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x400000000 pfn:0x2399d flags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff) page_type: 0xffffffff() raw: 00fff80000000000 0000000000000000 dead000000000122 0000000000000000 raw: 0000000400000000 0000000000000000 00000000ffffffff 0000000000000000 page dumped because: kasan: bad access detected page_owner tracks the page as freed page last allocated via order 2, migratetype Unmovable, gfp_mask 0x102000(__GFP_NOWARN|__GFP_HARDWALL), pid 11048, tgid -484822078 (syz-executor.3), ts 11048, free_ts 446191844407 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x2d4/0x350 mm/page_alloc.c:1534 prep_new_page mm/page_alloc.c:1541 [inline] get_page_from_freelist+0xa28/0x3780 mm/page_alloc.c:3317 __alloc_pages+0x22b/0x2460 mm/page_alloc.c:4575 alloc_pages_mpol+0x275/0x610 mm/mempolicy.c:2264 stack_depot_save_flags+0x566/0x8f0 lib/stackdepot.c:635 kasan_save_stack+0x42/0x60 mm/kasan/common.c:48 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:240 [inline] __kasan_slab_free+0x11d/0x1a0 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2106 [inline] slab_free mm/slub.c:4280 [inline] kfree+0x129/0x390 mm/slub.c:4390 kobject_cleanup lib/kobject.c:689 [inline] kobject_release lib/kobject.c:720 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1fa/0x5b0 lib/kobject.c:737 kset_unregister+0x62/0x70 lib/kobject.c:891 remove_queue_kobjects net/core/net-sysfs.c:1956 [inline] netdev_unregister_kobject+0x1e3/0x270 net/core/net-sysfs.c:2104 unregister_netdevice_many_notify+0xc8a/0x19f0 net/core/dev.c:11135 unregister_netdevice_many net/core/dev.c:11163 [inline] unregister_netdevice_queue+0x307/0x3f0 net/core/dev.c:11042 unregister_netdevice include/linux/netdevice.h:3115 [inline] __tun_detach+0x11ae/0x14c0 drivers/net/tun.c:685 page last free pid 11048 tgid 11048 stack trace: reset_page_owner include/linux/page_owner.h:25 [inline] free_pages_prepare mm/page_alloc.c:1141 [inline] free_unref_page_prepare+0x527/0xb10 mm/page_alloc.c:2347 free_unref_page+0x33/0x3c0 mm/page_alloc.c:2487 stack_depot_save_flags+0x2da/0x8f0 lib/stackdepot.c:673 kasan_save_stack+0x42/0x60 mm/kasan/common.c:48 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object mm/kasan/common.c:240 [inline] __kasan_slab_free+0x11d/0x1a0 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2106 [inline] slab_free mm/slub.c:4280 [inline] kfree+0x129/0x390 mm/slub.c:4390 kobject_cleanup lib/kobject.c:689 [inline] kobject_release lib/kobject.c:720 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x1fa/0x5b0 lib/kobject.c:737 kset_unregister+0x62/0x70 lib/kobject.c:891 remove_queue_kobjects net/core/net-sysfs.c:1956 [inline] netdev_unregister_kobject+0x1e3/0x270 net/core/net-sysfs.c:2104 unregister_netdevice_many_notify+0xc8a/0x19f0 net/core/dev.c:11135 unregister_netdevice_many net/core/dev.c:11163 [inline] unregister_netdevice_queue+0x307/0x3f0 net/core/dev.c:11042 unregister_netdevice include/linux/netdevice.h:3115 [inline] __tun_detach+0x11ae/0x14c0 drivers/net/tun.c:685 tun_detach drivers/net/tun.c:701 [inline] tun_chr_close+0xc8/0x250 drivers/net/tun.c:3500 __fput+0x270/0xb80 fs/file_table.c:422 Memory state around the buggy address: ffff88802399d480: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88802399d500: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff >ffff88802399d580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff88802399d600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff88802399d680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================