==================================================================
BUG: KASAN: use-after-free in __write_once_size include/linux/compiler.h:226 [inline]
BUG: KASAN: use-after-free in __hlist_del include/linux/list.h:762 [inline]
BUG: KASAN: use-after-free in detach_timer kernel/time/timer.c:824 [inline]
BUG: KASAN: use-after-free in detach_if_pending kernel/time/timer.c:841 [inline]
BUG: KASAN: use-after-free in try_to_del_timer_sync+0x3bd/0x480 kernel/time/timer.c:1238
Write of size 8 at addr ffff8881c76231c0 by task syz-executor.1/10615

CPU: 0 PID: 10615 Comm: syz-executor.1 Not tainted 5.4.59-syzkaller-00507-ga2bf50800d51 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x14a/0x1ce lib/dump_stack.c:118
 print_address_description+0x93/0x620 mm/kasan/report.c:374
 __kasan_report+0x16d/0x1e0 mm/kasan/report.c:506
 kasan_report+0x36/0x60 mm/kasan/common.c:634
 __write_once_size include/linux/compiler.h:226 [inline]
 __hlist_del include/linux/list.h:762 [inline]
 detach_timer kernel/time/timer.c:824 [inline]
 detach_if_pending kernel/time/timer.c:841 [inline]
 try_to_del_timer_sync+0x3bd/0x480 kernel/time/timer.c:1238
 del_timer_sync+0x74/0xe0 kernel/time/timer.c:1377
 tun_flow_uninit drivers/net/tun.c:1374 [inline]
 tun_free_netdev+0x99/0x3a0 drivers/net/tun.c:2307
 netdev_run_todo+0xbe3/0xe90 net/core/dev.c:9351
 tun_detach drivers/net/tun.c:743 [inline]
 tun_chr_close+0xc0/0xd0 drivers/net/tun.c:3461
 __fput+0x27d/0x6c0 fs/file_table.c:280
 task_work_run+0x176/0x1a0 kernel/task_work.c:113
 tracehook_notify_resume include/linux/tracehook.h:188 [inline]
 exit_to_usermode_loop arch/x86/entry/common.c:163 [inline]
 prepare_exit_to_usermode+0x286/0x2e0 arch/x86/entry/common.c:194
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x416e21
Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01
RSP: 002b:00007ffe0a743420 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416e21
RDX: 0000000000000000 RSI: 0000000000001db6 RDI: 0000000000000003
RBP: 0000000000000001 R08: 000000004d505db6 R09: 000000004d505dba
R10: 00007ffe0a743510 R11: 0000000000000293 R12: 00000000011924e0
R13: 000000000009290a R14: ffffffffffffffff R15: 000000000118cf4c

The buggy address belongs to the page:
page:ffffea00071d88c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0
flags: 0x8000000000000000()
raw: 8000000000000000 0000000000000000 ffffea000725b688 0000000000000000
raw: 0000000000000000 0000000000150000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881c7623080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff8881c7623100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
>ffff8881c7623180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                           ^
 ffff8881c7623200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff8881c7623280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================