general protection fault: 0000 [#1] PREEMPT SMP KASAN kobject: 'kvm' (ffff888219fd2610): kobject_uevent_env Modules linked in: CPU: 0 PID: 13674 Comm: syz-executor.1 Not tainted 4.14.145 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 kobject: 'loop4' (ffff8880a4a0f1e0): kobject_uevent_env task: ffff88809a6762c0 task.stack: ffff888062ef8000 RIP: 0010:tcp_sendmsg_locked+0x50e/0x3200 net/ipv4/tcp.c:1281 RSP: 0018:ffff888062effaa8 EFLAGS: 00010206 kobject: 'loop4' (ffff8880a4a0f1e0): fill_kobj_path: path = '/devices/virtual/block/loop4' RAX: 0000000000000012 RBX: 0000000000000000 RCX: ffffc90008a53000 RDX: 000000000000009d RSI: ffffffff85240e44 RDI: 0000000000000090 RBP: ffff888062effc40 R08: 0000000000000001 R09: ffff88809a676b60 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880a1f06800 R14: ffff888062effd60 R15: ffff88808ef86000 FS: 00007f91c6cc9700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 000000009fb12000 CR4: 00000000001426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kobject: 'kvm' (ffff888219fd2610): fill_kobj_path: path = '/devices/virtual/misc/kvm' tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1457 kobject: 'kvm' (ffff888219fd2610): kobject_uevent_env inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 kobject: 'kvm' (ffff888219fd2610): fill_kobj_path: path = '/devices/virtual/misc/kvm' sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 SYSC_sendto+0x206/0x310 net/socket.c:1763 kobject: 'loop4' (ffff8880a4a0f1e0): kobject_uevent_env kobject: 'loop4' (ffff8880a4a0f1e0): fill_kobj_path: path = '/devices/virtual/block/loop4' SyS_sendto+0x40/0x50 net/socket.c:1731 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x459a09 kobject: 'loop5' (ffff8880a4ac3260): kobject_uevent_env RSP: 002b:00007f91c6cc8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a09 RDX: fffffffffffffccf RSI: 0000000020000000 RDI: 0000000000000003 RBP: 000000000075bf20 R08: 0000000000000000 R09: ffffffffffffff37 R10: 0000000000000003 R11: 0000000000000246 R12: 00007f91c6cc96d4 R13: 00000000004c79ac R14: 00000000004dd400 R15: 00000000ffffffff Code: kobject: 'loop5' (ffff8880a4ac3260): fill_kobj_path: path = '/devices/virtual/block/loop5' d4 38 fc 4d 85 ed 0f 84 40 08 00 00 kobject: 'kvm' (ffff888219fd2610): kobject_uevent_env e8 ac d4 38 fc 8b 85 78 ff ff ff 48 8d bb 90 00 00 00 89 85 50 ff ff ff 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 06 0f 8e 4a 25 00 00 f6 83 90 00 00 00 RIP: tcp_sendmsg_locked+0x50e/0x3200 net/ipv4/tcp.c:1281 RSP: ffff888062effaa8 kobject: 'kvm' (ffff888219fd2610): fill_kobj_path: path = '/devices/virtual/misc/kvm' ---[ end trace 1137b9b76a6d9beb ]--- kobject: 'loop0' (ffff8880a490f660): kobject_uevent_env