netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. Unable to handle kernel access to user memory without uaccess routines at virtual address 0000000000000000 Oops [#1] Modules linked in: CPU: 1 PID: 3577 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 Hardware name: riscv-virtio,qemu (DT) epc : sock_ioctl+0x4c4/0x66c net/socket.c:1124 ra : sock_ioctl+0x4c4/0x66c net/socket.c:1124 epc : ffffffe0020e2068 ra : ffffffe0020e2068 sp : ffffffe01d3c7da0 gp : ffffffe004588910 tp : ffffffe00784df00 t0 : 0000000000000000 t1 : 0000000000000001 t2 : 00000000000f4240 s0 : ffffffe01d3c7e30 s1 : 0000000000040000 a0 : 0000000000000000 a1 : 0000000000000007 a2 : 1ffffffc00f09be0 a3 : ffffffe002a8f8e6 a4 : 0000000000000000 a5 : 0000000000000000 a6 : 0000000000f00000 a7 : ffffffe000084ac8 s2 : 0000000000000000 s3 : 0000000000008902 s4 : 0000000000000000 s5 : ffffffe00458c0d0 s6 : ffffffe00d077480 s7 : ffffffe00a1c9c80 s8 : 0000000000008903 s9 : ffffffe00d077540 s10: 0000000000000000 s11: 0000000000020000 t3 : f781a67111743300 t4 : ffffffc4040a6fb2 t5 : ffffffc4040a6fba t6 : 0000000000040000 status: 0000000000000120 badaddr: 0000000000000000 cause: 000000000000000f Call Trace: [] sock_ioctl+0x4c4/0x66c net/socket.c:1124 [] vfs_ioctl fs/ioctl.c:48 [inline] [] __do_sys_ioctl fs/ioctl.c:753 [inline] [] sys_ioctl+0x5c2/0xd56 fs/ioctl.c:739 [] ret_from_syscall+0x0/0x2 ---[ end trace 25df798dea930fd0 ]---