TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 11895 Comm: syz-executor.2 Not tainted 4.14.144 #0 kobject: 'queues' (ffff88805e524348): kobject_uevent_env Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88808c324240 task.stack: ffff88808bdd0000 RIP: 0010:do_tcp_sendpages+0x33d/0x18f0 net/ipv4/tcp.c:967 RSP: 0018:ffff88808bdd7898 EFLAGS: 00010202 RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffc9000bc84000 RDX: 0000000000001253 RSI: ffffffff8523f03b RDI: 0000000000000080 RBP: ffff88808bdd79c0 R08: ffff88808c324240 R09: 0000000000000001 R10: 0000000000000000 R11: ffff88808c324240 R12: 0000000000005555 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff888093eb42c0 FS: 00007f850225b700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb3cfc89010 CR3: 00000000a8e4b000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kobject: 'queues' (ffff88805e524348): kobject_uevent_env: filter function caused the event to drop! kobject: 'rx-0' (ffff888059d20010): kobject_add_internal: parent: 'queues', set: 'queues' tls_push_sg+0x1e1/0x660 net/tls/tls_main.c:120 kobject: 'rx-0' (ffff888059d20010): kobject_uevent_env tls_push_record+0xa4a/0x1210 net/tls/tls_sw.c:287 tls_sw_sendmsg+0x8c9/0x1020 net/tls/tls_sw.c:501 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 kobject: 'rx-0' (ffff888059d20010): fill_kobj_path: path = '/devices/virtual/net/bridge9/queues/rx-0' sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 SYSC_sendto+0x206/0x310 net/socket.c:1763 SyS_sendto+0x40/0x50 net/socket.c:1731 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'tx-0' (ffff8880626ce7d8): kobject_add_internal: parent: 'queues', set: 'queues' RIP: 0033:0x4598e9 RSP: 002b:00007f850225ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00000000004598e9 RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b R10: 0000000000000040 R11: 0000000000000246 R12: 00007f850225b6d4 R13: 00000000004c7880 R14: 00000000004dd188 R15: 00000000ffffffff Code: kobject: 'tx-0' (ffff8880626ce7d8): kobject_uevent_env ff ff 48 0f 44 d8 e8 c3 f2 38 fc 4d 85 e4 0f 84 9b 03 00 00 e8 b5 f2 38 fc 48 8d bb 80 00 00 00 44 8b 65 a8 48 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 74 08 3c 03 0f 8e 85 11 00 00 44 2b a3 80 kobject: 'tx-0' (ffff8880626ce7d8): fill_kobj_path: path = '/devices/virtual/net/bridge9/queues/tx-0' RIP: do_tcp_sendpages+0x33d/0x18f0 net/ipv4/tcp.c:967 RSP: ffff88808bdd7898 ---[ end trace fa81c8eeb0665299 ]---