TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 19759 Comm: syz-executor.3 Not tainted 4.14.145 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88805d3ca140 task.stack: ffff88805adc8000 RIP: 0010:do_tcp_sendpages+0x33d/0x18f0 net/ipv4/tcp.c:967 RSP: 0018:ffff88805adcf898 EFLAGS: 00010202 RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffc9000a651000 RDX: 0000000000000e2b RSI: ffffffff8523f1eb RDI: 0000000000000080 RBP: ffff88805adcf9c0 R08: ffff88805d3ca140 R09: 0000000000000001 R10: 0000000000000000 R11: ffff88805d3ca140 R12: 0000000000005555 R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88806117acc0 FS: 00007fc0aa4d4700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b32a25000 CR3: 00000000998a6000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: tls_push_sg+0x1e1/0x660 net/tls/tls_main.c:120 tls_push_record+0xa4a/0x1210 net/tls/tls_sw.c:287 tls_sw_sendmsg+0x9e8/0x1020 net/tls/tls_sw.c:457 inet_sendmsg+0x122/0x500 net/ipv4/af_inet.c:762 sock_sendmsg_nosec net/socket.c:646 [inline] sock_sendmsg+0xce/0x110 net/socket.c:656 SYSC_sendto+0x206/0x310 net/socket.c:1763 SyS_sendto+0x40/0x50 net/socket.c:1731 do_syscall_64+0x1e8/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 kobject: 'loop1' (ffff8880a49891a0): kobject_uevent_env RIP: 0033:0x459a09 RSP: 002b:00007fc0aa4d3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a09 RDX: ffffffffffffffc1 RSI: 0000000020000080 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: fffffffffffffe5b R10: 0000000000000040 R11: 0000000000000246 R12: 00007fc0aa4d46d4 R13: 00000000004c79b8 R14: 00000000004dd418 R15: 00000000ffffffff Code: kobject: 'loop0' (ffff8880a4940f20): kobject_uevent_env ff ff 48 0f 44 d8 e8 13 f1 38 fc 4d 85 e4 0f 84 9b 03 00 00 e8 05 f1 38 fc 48 8d bb 80 00 00 00 44 8b 65 a8 48 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 74 08 3c 03 0f 8e 85 11 00 00 44 2b a3 80 kobject: 'loop1' (ffff8880a49891a0): fill_kobj_path: path = '/devices/virtual/block/loop1' RIP: do_tcp_sendpages+0x33d/0x18f0 net/ipv4/tcp.c:967 RSP: ffff88805adcf898 ---[ end trace bc7148bfa09b6d84 ]--- kobject: 'loop0' (ffff8880a4940f20): fill_kobj_path: path = '/devices/virtual/block/loop0' IPVS: sync thread started: state = BACKUP, mcast_ifn = syz_tun, syncid = 0, id = 0