kasan: CONFIG_KASAN_INLINE enabled
kasan: GPF could be caused by NULL-ptr deref or user memory access
general protection fault: 0000 [#1] PREEMPT SMP KASAN
kobject: 'loop5' (00000000d0f08641): kobject_uevent_env
CPU: 0 PID: 14951 Comm: syz-executor2 Not tainted 4.20.0-rc6+ #347
kobject: 'loop5' (00000000d0f08641): fill_kobj_path: path = '/devices/virtual/block/loop5'
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline]
RIP: 0010:inet_lhash2_lookup+0xc0/0x610 net/ipv4/inet_hashtables.c:274
Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 ab 1f dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40
RSP: 0018:ffff8881dae07050 EFLAGS: 00010202
RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014
RDX: 0000000000000100 RSI: ffffffff86a264e5 RDI: 0000000000000040
RBP: ffff8881dae07168 R08: 000000000100007f R09: 00000000000060c2
R10: 0000000000000000 R11: ffffffff8bc662ec R12: dffffc0000000000
kobject: 'loop3' (0000000034e2389c): kobject_uevent_env
R13: 0000000000000000 R14: ffffffff8bc662c0 R15: 000000000100007f
FS: 00007fc3b74cd700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004efc58 CR3: 00000001d92c3000 CR4: 00000000001406f0
kobject: 'loop3' (0000000034e2389c): fill_kobj_path: path = '/devices/virtual/block/loop3'
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
kobject: 'loop1' (00000000f3180075): kobject_uevent_env
kobject: 'loop1' (00000000f3180075): fill_kobj_path: path = '/devices/virtual/block/loop1'
__inet_lookup_listener+0x129/0x2d0 net/ipv4/inet_hashtables.c:309
__inet_lookup include/net/inet_hashtables.h:349 [inline]
__inet_lookup_skb include/net/inet_hashtables.h:386 [inline]
dccp_v4_rcv+0x11ad/0x1f58 net/dccp/ipv4.c:815
kobject: 'loop5' (00000000d0f08641): kobject_uevent_env
ip_protocol_deliver_rcu+0xb5/0xa10 net/ipv4/ip_input.c:208
kobject: 'loop5' (00000000d0f08641): fill_kobj_path: path = '/devices/virtual/block/loop5'
ip_local_deliver_finish+0x243/0x390 net/ipv4/ip_input.c:234
NF_HOOK include/linux/netfilter.h:289 [inline]
ip_local_deliver+0x1e9/0x750 net/ipv4/ip_input.c:255
dst_input include/net/dst.h:450 [inline]
ip_rcv_finish+0x1f9/0x300 net/ipv4/ip_input.c:414
NF_HOOK include/linux/netfilter.h:289 [inline]
ip_rcv+0xed/0x600 net/ipv4/ip_input.c:523
kobject: 'loop3' (0000000034e2389c): kobject_uevent_env
kobject: 'loop3' (0000000034e2389c): fill_kobj_path: path = '/devices/virtual/block/loop3'
__netif_receive_skb_one_core+0x14d/0x200 net/core/dev.c:4973
kobject: 'loop1' (00000000f3180075): kobject_uevent_env
__netif_receive_skb+0x2c/0x1e0 net/core/dev.c:5083
process_backlog+0x24e/0x7a0 net/core/dev.c:5923
napi_poll net/core/dev.c:6346 [inline]
net_rx_action+0x7fa/0x19b0 net/core/dev.c:6412
kobject: 'loop1' (00000000f3180075): fill_kobj_path: path = '/devices/virtual/block/loop1'
__do_softirq+0x308/0xb7e kernel/softirq.c:292
do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1027
do_softirq.part.14+0x126/0x160 kernel/softirq.c:337
do_softirq kernel/softirq.c:329 [inline]
__local_bh_enable_ip+0x21d/0x260 kernel/softirq.c:189
local_bh_enable include/linux/bottom_half.h:32 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:696 [inline]
ip_finish_output2+0xabc/0x1a30 net/ipv4/ip_output.c:231
ip_finish_output+0x7fd/0xfa0 net/ipv4/ip_output.c:317
NF_HOOK_COND include/linux/netfilter.h:278 [inline]
ip_output+0x21d/0x8d0 net/ipv4/ip_output.c:405
dst_output include/net/dst.h:444 [inline]
ip_local_out+0xc5/0x1b0 net/ipv4/ip_output.c:124
__ip_queue_xmit+0x9af/0x1f40 net/ipv4/ip_output.c:505
ip_queue_xmit+0x56/0x70 include/net/ip.h:198
dccp_transmit_skb+0x98c/0x12e0 net/dccp/output.c:142
dccp_connect+0x39a/0x6e0 net/dccp/output.c:564
dccp_v4_connect+0xd57/0x1540 net/dccp/ipv4.c:126
dccp_v6_connect+0x1574/0x1f20 net/dccp/ipv6.c:893
__inet_stream_connect+0x992/0x1150 net/ipv4/af_inet.c:655
inet_stream_connect+0x58/0xa0 net/ipv4/af_inet.c:719
__sys_connect+0x37d/0x4c0 net/socket.c:1664
__do_sys_connect net/socket.c:1675 [inline]
__se_sys_connect net/socket.c:1672 [inline]
__x64_sys_connect+0x73/0xb0 net/socket.c:1672
do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290
entry_SYSCALL_64_after_hwframe+0x49/0xbe
RIP: 0033:0x457669
Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00
RSP: 002b:00007fc3b74ccc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669
RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003
RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc3b74cd6d4
R13: 00000000004bdc27 R14: 00000000004cd638 R15: 00000000ffffffff
Modules linked in:
---[ end trace 000ed4c33ca385b1 ]---
kasan: CONFIG_KASAN_INLINE enabled
RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline]
RIP: 0010:inet_lhash2_lookup+0xc0/0x610 net/ipv4/inet_hashtables.c:274
Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 ab 1f dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40
RSP: 0018:ffff8881dae07050 EFLAGS: 00010202
kasan: GPF could be caused by NULL-ptr deref or user memory access
RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014
general protection fault: 0000 [#2] PREEMPT SMP KASAN
RDX: 0000000000000100 RSI: ffffffff86a264e5 RDI: 0000000000000040
CPU: 1 PID: 14981 Comm: syz-executor2 Tainted: G D 4.20.0-rc6+ #347
RBP: ffff8881dae07168 R08: 000000000100007f R09: 00000000000060c2
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:__read_once_size include/linux/compiler.h:182 [inline]
RIP: 0010:inet_lhash2_lookup+0xc0/0x610 net/ipv4/inet_hashtables.c:274
Code: f2 f2 f2 f2 c7 40 0c 00 f2 f2 f2 65 48 8b 04 25 28 00 00 00 48 89 45 d0 31 c0 e8 ab 1f dd fa 48 8d 7b 40 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 39 05 00 00 4c 8d a5 58 ff ff ff 48 8b 5b 40
R10: 0000000000000000 R11: ffffffff8bc662ec R12: dffffc0000000000
RSP: 0018:ffff8881daf07050 EFLAGS: 00010202
RAX: 0000000000000008 RBX: 0000000000000000 RCX: 0000000000000014
RDX: 0000000000000100 RSI: ffffffff86a264e5 RDI: 0000000000000040
RBP: ffff8881daf07168 R08: 000000000100007f R09: 00000000000062c2
R13: 0000000000000000 R14: ffffffff8bc662c0 R15: 000000000100007f
R10: 0000000000000000 R11: ffffffff8bc662ec R12: dffffc0000000000
R13: 0000000000000000 R14: ffffffff8bc662c0 R15: 000000000100007f
FS: 00007fc3b74ac700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
FS: 00007fc3b74cd700(0000) GS:ffff8881dae00000(0000) knlGS:0000000000000000
CR2: 000000000072c000 CR3: 00000001d92c3000 CR4: 00000000001406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000004efc58 CR3: 00000001d92c3000 CR4: 00000000001406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
__inet_lookup_listener+0x129/0x2d0 net/ipv4/inet_hashtables.c:309
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
__inet_lookup include/net/inet_hashtables.h:349 [inline]
__inet_lookup_skb include/net/inet_hashtables.h:386 [inline]
dccp_v4_rcv+0x11ad/0x1f58 net/dccp/ipv4.c:815