mac80211_hwsim hwsim11 syzkaller0: entered allmulticast mode netlink: 'syz.4.358': attribute type 10 has an invalid length. ================================================================== BUG: KASAN: slab-out-of-bounds in ieee80211_add_virtual_monitor+0xa24/0xe1c net/mac80211/iface.c:1255 Read of size 1 at addr ffff0000c66d3d90 by task syz.4.358/7881 CPU: 1 UID: 0 PID: 7881 Comm: syz.4.358 Tainted: G L syzkaller #0 PREEMPT Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 Call trace: show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:499 (C) __dump_stack+0x30/0x40 lib/dump_stack.c:94 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120 print_address_description+0xa8/0x238 mm/kasan/report.c:378 print_report+0x68/0x84 mm/kasan/report.c:482 kasan_report+0xb0/0x110 mm/kasan/report.c:595 __asan_report_load1_noabort+0x20/0x2c mm/kasan/report_generic.c:378 ieee80211_add_virtual_monitor+0xa24/0xe1c net/mac80211/iface.c:1255 ieee80211_do_stop+0x13a4/0x1a84 net/mac80211/iface.c:746 ieee80211_stop+0x1ac/0x220 net/mac80211/iface.c:828 __dev_close_many+0x3a8/0x704 net/core/dev.c:1756 __dev_close net/core/dev.c:1768 [inline] __dev_change_flags+0x3d0/0x54c net/core/dev.c:9732 netif_change_flags+0x80/0x15c net/core/dev.c:9797 do_setlink+0xa58/0x3658 net/core/rtnetlink.c:3158 rtnl_changelink net/core/rtnetlink.c:3776 [inline] __rtnl_newlink net/core/rtnetlink.c:3935 [inline] rtnl_newlink+0x1104/0x15e8 net/core/rtnetlink.c:4072 rtnetlink_rcv_msg+0x664/0x97c net/core/rtnetlink.c:6958 netlink_rcv_skb+0x220/0x3fc net/netlink/af_netlink.c:2550 rtnetlink_rcv+0x28/0x38 net/core/rtnetlink.c:6985 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x694/0x8c4 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x648/0x930 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x490/0x7c4 net/socket.c:2592 ___sys_sendmsg+0x204/0x278 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __arm64_sys_sendmsg+0x184/0x238 net/socket.c:2681 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x26c arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 The buggy address belongs to the physical page: page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff0000c66d3a80 pfn:0x1066d0 head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 memcg:ffff0000d930b302 flags: 0x5ffc00000000040(head|node=0|zone=2|lastcpupid=0x7ff) page_type: f8(unknown) raw: 05ffc00000000040 0000000000000000 dead000000000122 0000000000000000 raw: ffff0000c66d3a80 0000000000000000 00000000f8000000 ffff0000d930b302 head: 05ffc00000000040 0000000000000000 dead000000000122 0000000000000000 head: ffff0000c66d3a80 0000000000000000 00000000f8000000 ffff0000d930b302 head: 05ffc00000000002 fffffdffc319b401 00000000ffffffff 00000000ffffffff head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff0000c66d3c80: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ffff0000c66d3d00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe >ffff0000c66d3d80: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ^ ffff0000c66d3e00: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ffff0000c66d3e80: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe ================================================================== bond0: (slave wlan1): Enslaving as an active interface with an up link