netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 11967 Comm: syz-executor0 Not tainted 4.9.155+ #27 task: ffff8801c71b8000 task.stack: ffff8801d70e0000 RIP: 0010:[] [] perf_event_count kernel/events/core.c:3583 [inline] RIP: 0010:[] [] perf_output_read_group kernel/events/core.c:5734 [inline] RIP: 0010:[] [] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5771 RSP: 0018:ffff8801d70e70f8 EFLAGS: 00010207 RAX: 000000000000001b RBX: 0000000000000004 RCX: ffffc9000a977000 RDX: 0000000000040000 RSI: ffffffff813be240 RDI: 00000000000000dc RBP: ffff8801d70e7270 R08: 1ffff1003a6241a0 R09: ffffed003a6241a1 R10: ffffed003a6241a0 R11: ffff8801d3120d07 R12: ffff8801d6b8f2c8 R13: ffff8801d70e7408 R14: dffffc0000000000 R15: ffff8801d6b8f250 FS: 00007f5cc4878700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002054953f CR3: 00000001c674f000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8801c71b88b0 ffff8801d70e7410 ffffed003ae1ce82 0000000000000008 0000000000000000 0000000000000008 ffffed003ae1ce85 1ffff1003ae1ce2d ffff8801a4ac6ea0 ffff8801d70e7428 ffff8801d70e7420 ffff8801d70e71d8 Call Trace: [] perf_output_sample+0x1142/0x17e0 kernel/events/core.c:5813 [] __perf_event_output kernel/events/core.c:6085 [inline] [] perf_event_output_forward+0x129/0x240 kernel/events/core.c:6098 [] __perf_event_overflow+0x121/0x330 kernel/events/core.c:7198 [] perf_swevent_overflow+0x17c/0x210 kernel/events/core.c:7274 [] perf_swevent_event+0x1ac/0x280 kernel/events/core.c:7307 [] do_perf_sw_event kernel/events/core.c:7415 [inline] [] ___perf_sw_event+0x299/0x4c0 kernel/events/core.c:7446 [] __perf_sw_event+0x47/0x90 kernel/events/core.c:7458 [] perf_sw_event include/linux/perf_event.h:1040 [inline] [] __do_page_fault+0x6cd/0xa60 arch/x86/mm/fault.c:1447 [] do_page_fault+0x28/0x30 arch/x86/mm/fault.c:1469 [] page_fault+0x25/0x30 arch/x86/entry/entry_64.S:951 [] generic_perform_write+0x1b6/0x500 mm/filemap.c:2743 [] __generic_file_write_iter+0x340/0x530 mm/filemap.c:2878 [] generic_file_write_iter+0x38a/0x630 mm/filemap.c:2906 [] new_sync_write fs/read_write.c:498 [inline] [] __vfs_write+0x3c1/0x560 fs/read_write.c:511 [] vfs_write+0x185/0x520 fs/read_write.c:559 [] SYSC_write fs/read_write.c:606 [inline] [] SyS_write+0xdc/0x1c0 fs/read_write.c:598 [] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: 74 08 3c 03 0f 8e 55 0a 00 00 41 83 bf 88 00 00 00 01 0f 84 09 07 00 00 e8 e0 d2 f5 ff 48 8d bb d8 00 00 00 48 89 f8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 15 0a 00 00 48 8b 9b d8 00 00 00 48 85 db RIP [] perf_event_count kernel/events/core.c:3583 [inline] RIP [] perf_output_read_group kernel/events/core.c:5734 [inline] RIP [] perf_output_read+0x63e/0x12e0 kernel/events/core.c:5771 RSP ---[ end trace 72e7a8d198fa3fc3 ]---