kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN kobject: 'loop5' (ffff8880a4a68aa0): kobject_uevent_env Modules linked in: CPU: 0 PID: 9055 Comm: syz-executor.1 Not tainted 4.14.145 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff888067344240 task.stack: ffff888067b10000 RIP: 0010:tcp_mark_push net/ipv4/tcp.c:630 [inline] RIP: 0010:tcp_push+0xe9/0x610 net/ipv4/tcp.c:694 RSP: 0018:ffff888067b17a48 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90006c4c000 RDX: 0000000000000007 RSI: ffffffff85231ce0 RDI: 0000000000000038 RBP: ffff888067b17a98 R08: ffff88807b69999c R09: ffff888067344ae0 R10: 0000000000000000 R11: 0000000000000000 R12: ffff88807b699100 R13: 0000000000000000 R14: ffff88807b699994 R15: 0000000000000000 FS: 00007f36d3e73700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f01bf580af0 CR3: 0000000091db9000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tcp_sendmsg_locked+0x2307/0x3200 net/ipv4/tcp.c:1426 kobject: 'loop5' (ffff8880a4a68aa0): fill_kobj_path: path = '/devices/virtual/block/loop5' tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1457 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 SYSC_sendto+0x206/0x310 net/socket.c:1763 kobject: 'loop3' (ffff8880a49a0120): kobject_uevent_env kobject: 'loop3' (ffff8880a49a0120): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (ffff8880a497b1e0): kobject_uevent_env SyS_sendto+0x40/0x50 net/socket.c:1731 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 kobject: 'loop2' (ffff8880a497b1e0): fill_kobj_path: path = '/devices/virtual/block/loop2' entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a09 kobject: 'loop4' (ffff8880a4a30a20): kobject_uevent_env RSP: 002b:00007f36d3e72c78 EFLAGS: 00000246 kobject: 'loop4' (ffff8880a4a30a20): fill_kobj_path: path = '/devices/virtual/block/loop4' ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a09 RDX: ffffffffffffffc1 RSI: 00000000200005c0 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: 1201000000003618 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f36d3e736d4 R13: 00000000004c79b8 R14: 00000000004dd418 R15: 00000000ffffffff Code: 00 4d 8d 84 24 9c 08 00 protocol 88fb is buggy, dev hsr_slave_0 00 protocol 88fb is buggy, dev hsr_slave_1 4c 89 45 b8 e8 10 c6 39 fc 48 8d 7b 38 4c 8b 45 b8 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 06 0f 8e 1e 04 00 00 48 b8 00 00 00 00 00 RIP: tcp_mark_push net/ipv4/tcp.c:630 [inline] RSP: ffff888067b17a48 RIP: tcp_push+0xe9/0x610 net/ipv4/tcp.c:694 RSP: ffff888067b17a48 kobject: 'loop5' (ffff8880a4a68aa0): kobject_uevent_env ---[ end trace f8fe65bb8972945b ]---