netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. bridge0: port 2(bridge_slave_1) entered disabled state bridge0: port 1(bridge_slave_0) entered disabled state device bridge0 entered promiscuous mode BUG: unable to handle kernel NULL pointer dereference at 00000000000000fc PGD 0 P4D 0 Oops: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 21344 Comm: systemd-udevd Not tainted 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166 Code: 90 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 fc 00 00 00 4c 8b 23 48 29 c3 48 83 3d c3 03 59 08 00 0f RSP: 0018:ffff8882311ef750 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000770 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff812b6eca RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: ffff888000000770 R13: ffff8882311ef788 R14: 0000000000000000 R15: 0000000000000282 FS: 00007f7d262ae8c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000fc CR3: 000000009fc38000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc_node mm/slab.c:3340 [inline] kmem_cache_alloc_node+0x133/0x3b0 mm/slab.c:3647 __alloc_skb+0x71/0x560 net/core/skbuff.c:193 alloc_skb include/linux/skbuff.h:995 [inline] netlink_alloc_large_skb net/netlink/af_netlink.c:1192 [inline] netlink_sendmsg+0x9ee/0xc40 net/netlink/af_netlink.c:1886 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2227 __sys_sendmsg net/socket.c:2265 [inline] __do_sys_sendmsg net/socket.c:2274 [inline] __se_sys_sendmsg net/socket.c:2272 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2272 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7d253f4e67 Code: 89 02 48 c7 c0 ff ff ff ff eb d0 0f 1f 84 00 00 00 00 00 8b 05 6a b5 20 00 85 c0 75 2e 48 63 ff 48 63 d2 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 11 71 20 00 f7 d8 64 89 02 48 RSP: 002b:00007ffc72fa0f88 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 0000000000008010 RCX: 00007f7d253f4e67 RDX: 0000000000000000 RSI: 00007ffc72fa0fa0 RDI: 000000000000000e RBP: 00007ffc72fa0fa0 R08: 000055db1a3ef924 R09: 0000000000000000 R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 R13: 00000000000000c9 R14: 000055db1a3fd340 R15: 0000000000000000 Modules linked in: CR2: 00000000000000fc BUG: unable to handle kernel NULL pointer dereference at 00000000000000fc PGD 0 P4D 0 Oops: 0000 [#2] PREEMPT SMP KASAN CPU: 1 PID: 4695 Comm: systemd-journal Tainted: G D 4.19.207-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166 Code: 90 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 fc 00 00 00 4c 8b 23 48 29 c3 48 83 3d c3 03 59 08 00 0f netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. RSP: 0018:ffff8880a0eefb38 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000077 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff812b6eca RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000009 R12: ffff888000000077 R13: ffff8880a0eefb70 R14: 0000000000000000 R15: 0000000000000282 FS: 00007f7c2d4518c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000000000fc CR3: 00000000a115c000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 ---[ end trace a520399f5786095d ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166 Code: 90 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 fc 00 00 00 4c 8b 23 48 29 c3 48 83 3d c3 03 59 08 00 0f RSP: 0018:ffff8882311ef750 EFLAGS: 00010246 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x110/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 RAX: ffffea0000000000 RBX: ffff888000000770 RCX: ffffea0000000007 getname fs/namei.c:211 [inline] user_path_create fs/namei.c:3696 [inline] do_mkdirat+0x8d/0x2d0 fs/namei.c:3834 RDX: 0000000000000000 RSI: ffffffff812b6eca RDI: 0000000000000007 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f7c2c70c687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 R10: 0000000000000007 R11: 0000000000000000 R12: ffff888000000770 RSP: 002b:00007ffe8d477788 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffe8d47a6a0 RCX: 00007f7c2c70c687 RDX: 00007f7c2d17da00 RSI: 00000000000001ed RDI: 0000559e806528a0 RBP: 00007ffe8d4777c0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: ffff8882311ef788 R14: 0000000000000000 R15: 0000000000000282 R13: 0000000000000000 R14: 00007ffe8d47a6a0 R15: 00007ffe8d477cb0 Modules linked in: CR2: 00000000000000fc caif:caif_disconnect_client(): nothing to disconnect FS: 00007f7d262ae8c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. bridge0: port 2(bridge_slave_1) entered blocking state bridge0: port 2(bridge_slave_1) entered forwarding state bridge0: port 1(bridge_slave_0) entered blocking state bridge0: port 1(bridge_slave_0) entered forwarding state device bridge0 left promiscuous mode caif:caif_disconnect_client(): nothing to disconnect device wlan1 entered promiscuous mode netlink: 'syz-executor.4': attribute type 10 has an invalid length. netlink: 'syz-executor.4': attribute type 10 has an invalid length. CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020030000 CR3: 000000009fc38000 CR4: 00000000001426f0 ---[ end trace a520399f5786095e ]--- RIP: 0010:qlink_to_object mm/kasan/quarantine.c:136 [inline] RIP: 0010:qlink_free mm/kasan/quarantine.c:141 [inline] RIP: 0010:qlist_free_all+0x28/0x140 mm/kasan/quarantine.c:166 Code: 90 90 41 57 41 56 41 55 41 54 55 53 48 8b 1f 48 85 db 0f 84 08 01 00 00 48 89 f5 49 89 fd 48 85 ed 49 89 ee 0f 84 8b 00 00 00 <49> 63 86 fc 00 00 00 4c 8b 23 48 29 c3 48 83 3d c3 03 59 08 00 0f RSP: 0018:ffff8882311ef750 EFLAGS: 00010246 RAX: ffffea0000000000 RBX: ffff888000000770 RCX: ffffea0000000007 RDX: 0000000000000000 RSI: ffffffff812b6eca RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: ffff888000000770 R13: ffff8882311ef788 R14: 0000000000000000 R15: 0000000000000282 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 FS: 00007f7c2d4518c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 41 57 push %r15 4: 41 56 push %r14 6: 41 55 push %r13 8: 41 54 push %r12 a: 55 push %rbp b: 53 push %rbx c: 48 8b 1f mov (%rdi),%rbx f: 48 85 db test %rbx,%rbx 12: 0f 84 08 01 00 00 je 0x120 18: 48 89 f5 mov %rsi,%rbp 1b: 49 89 fd mov %rdi,%r13 1e: 48 85 ed test %rbp,%rbp 21: 49 89 ee mov %rbp,%r14 24: 0f 84 8b 00 00 00 je 0xb5 * 2a: 49 63 86 fc 00 00 00 movslq 0xfc(%r14),%rax <-- trapping instruction 31: 4c 8b 23 mov (%rbx),%r12 34: 48 29 c3 sub %rax,%rbx 37: 48 83 3d c3 03 59 08 cmpq $0x0,0x85903c3(%rip) # 0x8590402 3e: 00 3f: 0f .byte 0xf