netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. BUG: unable to handle kernel paging request at ffffe902f205fb38 kobject: 'loop1' (00000000e30a17a7): kobject_uevent_env #PF error: [WRITE] PGD 0 P4D 0 Oops: 0002 [#1] PREEMPT SMP KASAN CPU: 0 PID: 26400 Comm: modprobe Not tainted 4.20.0+ #3 kobject: 'loop1' (00000000e30a17a7): fill_kobj_path: path = '/devices/virtual/block/loop1' Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:___cache_free+0x60/0x380 mm/slab.c:3539 Code: 55 89 83 3d 45 70 96 08 01 0f 8f e7 00 00 00 41 8b 47 04 41 39 07 0f 83 97 01 00 00 0f 1f 44 00 00 41 8b 07 8d 50 01 41 89 17 <4d> 89 6c c7 10 48 8b 45 d0 65 48 33 04 25 28 00 00 00 0f 85 f4 02 RSP: 0018:ffff888092b3f718 EFLAGS: 00010003 RAX: 000000005e485e00 RBX: 0000000000000282 RCX: ffffffff8139c48a kobject: 'loop2' (00000000b3ffc920): kobject_uevent_env RDX: 000000005e485e01 RSI: ffffffff8139c494 RDI: ffffea0002a5c300 RBP: ffff888092b3f778 R08: ffff8880628a4300 R09: ffff8880628a4ba0 R10: ffff8880628a4300 R11: 0000000000000000 R12: ffff8882167dbd80 R13: ffff8880a970ccc0 R14: ffff888092b3f7c8 R15: ffffe8ffffc30b28 kobject: 'loop2' (00000000b3ffc920): fill_kobj_path: path = '/devices/virtual/block/loop2' FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffe902f205fb38 CR3: 000000006a626000 CR4: 00000000001406f0 kobject: 'loop1' (00000000e30a17a7): kobject_uevent_env DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kobject: 'loop1' (00000000e30a17a7): fill_kobj_path: path = '/devices/virtual/block/loop1' qlink_free mm/kasan/quarantine.c:147 [inline] qlist_free_all+0x85/0x150 mm/kasan/quarantine.c:166 quarantine_reduce+0x169/0x1a0 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa0/0xf0 mm/kasan/kasan.c:538 kasan_slab_alloc+0xf/0x20 mm/kasan/kasan.c:490 slab_post_alloc_hook mm/slab.h:444 [inline] slab_alloc mm/slab.c:3392 [inline] kmem_cache_alloc+0x11b/0x700 mm/slab.c:3552 vm_area_alloc+0x7a/0x1d0 kernel/fork.c:336 __install_special_mapping+0x32/0x460 mm/mmap.c:3407 _install_special_mapping+0x3c/0x50 mm/mmap.c:3457 map_vdso+0x8e/0x130 arch/x86/entry/vdso/vma.c:168 map_vdso_randomized+0x74/0xb0 arch/x86/entry/vdso/vma.c:249 arch_setup_additional_pages+0x1d/0x20 arch/x86/entry/vdso/vma.c:294 load_elf_binary+0x25f8/0x53c0 fs/binfmt_elf.c:1123 search_binary_handler fs/exec.c:1653 [inline] search_binary_handler+0x17f/0x570 fs/exec.c:1631 exec_binprm fs/exec.c:1695 [inline] __do_execve_file.isra.0+0x147f/0x2540 fs/exec.c:1819 do_execveat_common fs/exec.c:1866 [inline] do_execve+0x33/0x40 fs/exec.c:1883 call_usermodehelper_exec_async+0x6be/0xa50 kernel/umh.c:107 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Modules linked in: CR2: ffffe902f205fb38 ---[ end trace 9eb21b32799431e8 ]--- RIP: 0010:___cache_free+0x60/0x380 mm/slab.c:3539 Code: 55 89 83 3d 45 70 96 08 01 0f 8f e7 00 00 00 41 8b 47 04 41 39 07 0f 83 97 01 00 00 0f 1f 44 00 00 41 8b 07 8d 50 01 41 89 17 <4d> 89 6c c7 10 48 8b 45 d0 65 48 33 04 25 28 00 00 00 0f 85 f4 02 RSP: 0018:ffff888092b3f718 EFLAGS: 00010003 RAX: 000000005e485e00 RBX: 0000000000000282 RCX: ffffffff8139c48a RDX: 000000005e485e01 RSI: ffffffff8139c494 RDI: ffffea0002a5c300 RBP: ffff888092b3f778 R08: ffff8880628a4300 R09: ffff8880628a4ba0 R10: ffff8880628a4300 R11: 0000000000000000 R12: ffff8882167dbd80 R13: ffff8880a970ccc0 R14: ffff888092b3f7c8 R15: ffffe8ffffc30b28 FS: 0000000000000000(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffe902f205fb38 CR3: 000000006a626000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400