kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 8342 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #349
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline]
RIP: 0010:inet_lhash2_lookup+0xc0/0x610 net/ipv4/inet_hashtables.c:274
Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 bb 08 dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40
RSP: 0018:ffff8881daf07050 EFLAGS: 00010202
RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014
RDX: 0000000000000100 RSI: ffffffff86a27bd5 RDI: 0000000000000040
RBP: ffff8881daf07168 R08: 000000000c1414ac R09: 000000000000189b
R10: 0000000000000000 R11: ffffffff8bc672ec R12: dffffc0000000000
R13: 0000000000000000 R14: ffffffff8bc672c0 R15: 000000000c1414ac
FS: 00007fcc049a8700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ff7c5316000 CR3: 00000001d8e03000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
__inet_lookup_listener+0x129/0x2d0 net/ipv4/inet_hashtables.c:309
__inet_lookup include/net/inet_hashtables.h:349 [inline]
__inet_lookup_skb include/net/inet_hashtables.h:386 [inline]
dccp_v4_rcv+0x11ad/0x1f58 net/dccp/ipv4.c:815
ip_protocol_deliver_rcu+0xb5/0xa10 net/ipv4/ip_input.c:208
ip_local_deliver_finish+0x243/0x390 net/ipv4/ip_input.c:234
NF_HOOK include/linux/netfilter.h:289 [inline]
ip_local_deliver+0x1e9/0x750 net/ipv4/ip_input.c:255
dst_input include/net/dst.h:450 [inline]
ip_rcv_finish+0x1f9/0x300 net/ipv4/ip_input.c:414
NF_HOOK include/linux/netfilter.h:289 [inline]
ip_rcv+0xed/0x600 net/ipv4/ip_input.c:523
__netif_receive_skb_one_core+0x14d/0x200 net/core/dev.c:4973
__netif_receive_skb+0x2c/0x1e0 net/core/dev.c:5083
process_backlog+0x24e/0x7a0 net/core/dev.c:5923
napi_poll net/core/dev.c:6346 [inline]
net_rx_action+0x7fa/0x19b0 net/core/dev.c:6412
__do_softirq+0x308/0xb7e kernel/softirq.c:292
do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1027
do_softirq.part.14+0x126/0x160 kernel/softirq.c:337
do_softirq kernel/softirq.c:329 [inline]
__local_bh_enable_ip+0x21d/0x260 kernel/softirq.c:189
local_bh_enable include/linux/bottom_half.h:32 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:696 [inline]
ip_finish_output2+0xabc/0x1a30 net/ipv4/ip_output.c:231
kobject: 'loop2' (00000000f8931cdb): kobject_uevent_env
ip_finish_output+0x7fd/0xfa0 net/ipv4/ip_output.c:317
kobject: 'loop2' (00000000f8931cdb): fill_kobj_path: path = '/devices/virtual/block/loop2'
NF_HOOK_COND include/linux/netfilter.h:278 [inline]
ip_output+0x21d/0x8d0 net/ipv4/ip_output.c:405
dst_output include/net/dst.h:444 [inline]
ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124
__ip_queue_xmit+0x9af/0x1f40 net/ipv4/ip_output.c:505
kobject: 'loop0' (00000000ff791edf): kobject_uevent_env
ip_queue_xmit+0x56/0x70 include/net/ip.h:198
kobject: 'loop0' (00000000ff791edf): fill_kobj_path: path = '/devices/virtual/block/loop0'
dccp_transmit_skb+0x98c/0x12e0 net/dccp/output.c:142
dccp_connect+0x39a/0x6e0 net/dccp/output.c:564
kobject: 'loop3' (000000003e043039): kobject_uevent_env
dccp_v4_connect+0xd57/0x1540 net/dccp/ipv4.c:126
dccp_v6_connect+0x1574/0x1f20 net/dccp/ipv6.c:893
kobject: 'loop3' (000000003e043039): fill_kobj_path: path = '/devices/virtual/block/loop3'
kobject: 'loop4' (00000000f1817621): kobject_uevent_env
__inet_stream_connect+0x992/0x1150 net/ipv4/af_inet.c:655
kobject: 'loop4' (00000000f1817621): fill_kobj_path: path = '/devices/virtual/block/loop4'
kobject: 'loop0' (00000000ff791edf): kobject_uevent_env
inet_stream_connect+0x58/0xa0 net/ipv4/af_inet.c:719
__sys_connect+0x37d/0x4c0 net/socket.c:1664
kobject: 'loop0' (00000000ff791edf): fill_kobj_path: path = '/devices/virtual/block/loop0'
kobject: 'loop5' (00000000f306c1f6): kobject_uevent_env
kobject: 'loop5' (00000000f306c1f6): fill_kobj_path: path = '/devices/virtual/block/loop5'
__do_sys_connect net/socket.c:1675 [inline]
__se_sys_connect net/socket.c:1672 [inline]
__x64_sys_connect+0x73/0xb0 net/socket.c:1672
kasan: CONFIG_KASAN_INLINE enabled
do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
kasan: GPF could be caused by NULL-ptr deref or user memory access
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x457669
Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fcc049a7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669
RDX: 000000000000001c RSI: 0000000020000100 RDI: 0000000000000003
RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcc049a86d4
R13: 00000000004bdc27 R14: 00000000004cd638 R15: 00000000ffffffff
Modules linked in:
general protection fault: 0000 [#2] PREEMPT SMP KASAN
---[ end trace 63558a5422e7153c ]---
CPU: 0 PID: 8364 Comm: syz-executor5 Tainted: G D 4.20.0-rc6+ #349
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline]
RIP: 0010:inet_lhash2_lookup+0xc0/0x610 net/ipv4/inet_hashtables.c:274
RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline]
RIP: 0010:inet_lhash2_lookup+0xc0/0x610 net/ipv4/inet_hashtables.c:274
Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 bb 08 dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40
RSP: 0018:ffff8881dae07050 EFLAGS: 00010202
Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 bb 08 dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40
RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014
RDX: 0000000000000100 RSI: ffffffff86a27bd5 RDI: 0000000000000040
RBP: ffff8881dae07168 R08: 000000000c1414ac R09: 0000000000001e9b
RSP: 0018:ffff8881daf07050 EFLAGS: 00010202
R10: 0000000000000000 R11: ffffffff8bc672ec R12: dffffc0000000000
R13: 0000000000000000 R14: ffffffff8bc672c0 R15: 000000000c1414ac
FS: 00007fe642fcc700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000002119978 CR3: 0000000191187000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
RDX: 0000000000000100 RSI: ffffffff86a27bd5 RDI: 0000000000000040
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
RBP: ffff8881daf07168 R08: 000000000c1414ac R09: 000000000000189b
R10: 0000000000000000 R11: ffffffff8bc672ec R12: dffffc0000000000
R13: 0000000000000000 R14: ffffffff8bc672c0 R15: 000000000c1414ac
FS: 00007fcc049a8700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000
__inet_lookup_listener+0x129/0x2d0 net/ipv4/inet_hashtables.c:309
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
__inet_lookup include/net/inet_hashtables.h:349 [inline]
__inet_lookup_skb include/net/inet_hashtables.h:386 [inline]
dccp_v4_rcv+0x11ad/0x1f58 net/dccp/ipv4.c:815
CR2: 00007ff7c5316000 CR3: 00000001d8e03000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
ip_protocol_deliver_rcu+0xb5/0xa10 net/ipv4/ip_input.c:208