netlink: 'syz-executor.1': attribute type 1 has an invalid length. watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz-executor.4:26489] Modules linked in: irq event stamp: 3835125 hardirqs last enabled at (3835124): [] trace_hardirqs_on_thunk+0x1a/0x1c hardirqs last disabled at (3835125): [] trace_hardirqs_off_thunk+0x1a/0x1c ieee802154 phy0 wpan0: encryption failed: -22 softirqs last enabled at (233010): [] __do_softirq+0x678/0x980 kernel/softirq.c:318 softirqs last disabled at (233435): [] invoke_softirq kernel/softirq.c:372 [inline] softirqs last disabled at (233435): [] irq_exit+0x215/0x260 kernel/softirq.c:412 CPU: 1 PID: 26489 Comm: syz-executor.4 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ieee802154 phy1 wpan1: encryption failed: -22 RIP: 0010:__preempt_count_dec_and_test arch/x86/include/asm/preempt.h:91 [inline] RIP: 0010:rcu_read_unlock_sched_notrace include/linux/rcupdate.h:771 [inline] RIP: 0010:trace_timer_expire_entry include/trace/events/timer.h:90 [inline] RIP: 0010:call_timer_fn+0x585/0x700 kernel/time/timer.c:1337 Code: f8 0e 00 44 0f b6 35 3b fe ba 09 31 ff 44 89 f6 e8 60 f9 0e 00 45 84 f6 0f 84 da 00 00 00 e8 22 f8 0e 00 65 ff 0d fb 51 ae 7e <41> 0f 94 c6 31 ff 44 89 f6 e8 3d f9 0e 00 45 84 f6 0f 84 cd fb ff RSP: 0018:ffff8880ba107d28 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 RAX: ffff88803fabe200 RBX: ffff88804f42b850 RCX: ffffffff81538e39 RDX: 0000000000000100 RSI: ffffffff81538d4e RDI: 0000000000000005 RBP: 0000000000000102 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880ba107d58 R13: 1ffff11017420fa7 R14: 0000000000000001 R15: 0000000000000000 FS: 00007feff2e95700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2efae00028 CR3: 000000002ba3e000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: expire_timers+0x243/0x4e0 kernel/time/timer.c:1375 __run_timers kernel/time/timer.c:1696 [inline] run_timer_softirq+0x21c/0x670 kernel/time/timer.c:1709 __do_softirq+0x265/0x980 kernel/softirq.c:292 invoke_softirq kernel/softirq.c:372 [inline] irq_exit+0x215/0x260 kernel/softirq.c:412 exiting_irq arch/x86/include/asm/apic.h:536 [inline] smp_apic_timer_interrupt+0x136/0x550 arch/x86/kernel/apic/apic.c:1098 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:894 RIP: 0010:kasan_mem_to_shadow include/linux/kasan.h:29 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/kasan.c:211 [inline] RIP: 0010:memory_is_poisoned mm/kasan/kasan.c:241 [inline] RIP: 0010:check_memory_region_inline mm/kasan/kasan.c:257 [inline] RIP: 0010:check_memory_region+0x41/0x170 mm/kasan/kasan.c:267 Code: 48 39 c7 0f 86 20 01 00 00 4c 8d 54 37 ff 41 54 48 b8 00 00 00 00 00 fc ff df 4d 89 d1 55 48 89 fd 49 c1 e9 03 48 c1 ed 03 53 <49> 01 c1 48 01 c5 49 8d 59 01 48 89 e8 48 89 da 48 29 ea 48 83 fa RSP: 0018:ffff88801fbb7a08 EFLAGS: 00000a07 ORIG_RAX: ffffffffffffff13 RAX: dffffc0000000000 RBX: 0000000000000018 RCX: ffffffff818c72e7 device bridge943 entered promiscuous mode RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffea0002529274 RBP: 1ffffd40004a524e R08: 0000000000000000 R09: 1ffffd40004a524e R10: ffffea0002529277 R11: 0000000048102452 R12: ffffea0002529274 R13: dffffc0000000000 R14: ffffea0002529240 R15: ffffea0002529248 atomic_read include/asm-generic/atomic-instrumented.h:21 [inline] page_ref_count include/linux/page_ref.h:67 [inline] get_page include/linux/mm.h:936 [inline] copy_one_pte mm/memory.c:1052 [inline] copy_pte_range mm/memory.c:1114 [inline] copy_pmd_range mm/memory.c:1165 [inline] copy_pud_range mm/memory.c:1199 [inline] copy_p4d_range mm/memory.c:1221 [inline] copy_page_range+0x1057/0x2ff0 mm/memory.c:1283 dup_mmap kernel/fork.c:549 [inline] dup_mm kernel/fork.c:1285 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x5b22/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7feff4520059 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 audit: type=1804 audit(1645650924.287:866): pid=26502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir868675823/syzkaller.91BL2s/3644/memory.events" dev="sda1" ino=13951 res=1 RSP: 002b:00007feff2e95118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007feff4632f60 RCX: 00007feff4520059 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000028003000 RBP: 00007feff457a08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 00007ffcaee15bdf R14: 00007feff2e95300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 33 Comm: kauditd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__read_once_size include/linux/compiler.h:263 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:69 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x1c/0x50 kernel/kcov.c:101 Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b <8b> 90 60 13 00 00 83 fa 02 75 20 48 8b 88 68 13 00 00 8b 80 64 13 RSP: 0018:ffff8880b50ff8d0 EFLAGS: 00000046 RAX: ffff8880b50f61c0 RBX: 000000000000006c RCX: ffffffff87f01901 RDX: 0000000000000000 RSI: ffffffff87f0190f RDI: 0000000000000001 RBP: ffff8880b50ff9f0 R08: 0000000000000001 R09: 000000000000002e R10: 0000000000000001 R11: 0000000000000000 R12: ffffffff886ad5c9 R13: ffffffff886ad5c6 R14: 1ffff11016a1ff1e R15: 0000000000000036 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000400007 CR3: 0000000021631000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: format_decode+0x2ff/0xad0 lib/vsprintf.c:2114 vsnprintf+0x155/0x14f0 lib/vsprintf.c:2271 sprintf+0xc0/0x100 lib/vsprintf.c:2521 print_time kernel/printk/printk.c:1264 [inline] print_prefix+0x265/0x3f0 kernel/printk/printk.c:1287 msg_print_text+0xcd/0x1c0 kernel/printk/printk.c:1314 console_unlock+0x321/0x1110 kernel/printk/printk.c:2434 vprintk_emit+0x2d1/0x740 kernel/printk/printk.c:1965 vprintk_func+0x79/0x180 kernel/printk/printk_safe.c:405 printk+0xba/0xed kernel/printk/printk.c:2040 kauditd_printk_skb kernel/audit.c:546 [inline] kauditd_hold_skb.cold+0x41/0x50 kernel/audit.c:579 kauditd_send_queue+0x12f/0x170 kernel/audit.c:742 kauditd_thread+0x5c0/0x7a0 kernel/audit.c:868 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess), 2 bytes skipped: 0: 00 44 0f b6 add %al,-0x4a(%rdi,%rcx,1) 4: 35 3b fe ba 09 xor $0x9bafe3b,%eax 9: 31 ff xor %edi,%edi b: 44 89 f6 mov %r14d,%esi e: e8 60 f9 0e 00 callq 0xef973 13: 45 84 f6 test %r14b,%r14b 16: 0f 84 da 00 00 00 je 0xf6 1c: e8 22 f8 0e 00 callq 0xef843 21: 65 ff 0d fb 51 ae 7e decl %gs:0x7eae51fb(%rip) # 0x7eae5223 * 28: 41 0f 94 c6 sete %r14b <-- trapping instruction 2c: 31 ff xor %edi,%edi 2e: 44 89 f6 mov %r14d,%esi 31: e8 3d f9 0e 00 callq 0xef973 36: 45 84 f6 test %r14b,%r14b 39: 0f .byte 0xf 3a: 84 cd test %cl,%ch 3c: fb sti 3d: ff .byte 0xff