kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 19336 Comm: syz-executor.3 Not tainted 4.19.158-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:flex_array_get+0x27/0x250 lib/flex_array.c:320 Code: 90 90 90 41 56 41 55 41 54 55 89 f5 53 48 89 fb 48 83 ec 08 e8 1a f2 e7 fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b7 01 00 00 44 8b 2b 31 ff 44 RSP: 0018:ffff88804f02f5d0 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90013137000 RDX: 0000000000000000 RSI: ffffffff837cdde6 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880a04408e8 R13: 0000000000000000 R14: ffff88809ea1fb80 R15: 1ffff11014088121 FS: 00007f53ad68e700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005598230a7000 CR3: 00000000aaefb000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: sctp_stream_out include/net/sctp/structs.h:1474 [inline] sctp_sched_dequeue_done+0x1f8/0x2e0 net/sctp/stream_sched.c:255 __sctp_outq_teardown+0x6cc/0xc20 net/sctp/outqueue.c:268 sctp_association_free+0x212/0x7a3 net/sctp/associola.c:361 sctp_cmd_delete_tcb net/sctp/sm_sideeffect.c:944 [inline] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1332 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x39ee/0x5110 net/sctp/sm_sideeffect.c:1170 sctp_primitive_SHUTDOWN+0x9b/0xc0 net/sctp/primitive.c:104 sctp_close+0x3d9/0x7f0 net/sctp/socket.c:1560 inet_release+0xd7/0x1e0 net/ipv4/af_inet.c:427 inet6_release+0x4c/0x70 net/ipv6/af_inet6.c:472 __sock_release+0xcd/0x2a0 net/socket.c:579 sock_close+0x15/0x20 net/socket.c:1140 __fput+0x2ce/0x890 fs/file_table.c:278 task_work_run+0x148/0x1c0 kernel/task_work.c:113 get_signal+0x1b64/0x1f70 kernel/signal.c:2400 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x45deb9 Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f53ad68dc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: 0000000000034000 RBX: 000000000002e940 RCX: 000000000045deb9 RDX: 0000000000034000 RSI: 0000000020847fff RDI: 0000000000000003 RBP: 00007f53ad68dca0 R08: 000000002005ffe4 R09: 000000000000001c R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f R13: 00007ffc5483e74f R14: 00007f53ad68e9c0 R15: 000000000118bf2c Modules linked in: ---[ end trace d7a518544858b51f ]--- RIP: 0010:flex_array_get+0x27/0x250 lib/flex_array.c:320 Code: 90 90 90 41 56 41 55 41 54 55 89 f5 53 48 89 fb 48 83 ec 08 e8 1a f2 e7 fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b7 01 00 00 44 8b 2b 31 ff 44 RSP: 0018:ffff88804f02f5d0 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90013137000 RDX: 0000000000000000 RSI: ffffffff837cdde6 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880a04408e8 R13: 0000000000000000 R14: ffff88809ea1fb80 R15: 1ffff11014088121 FS: 00007f53ad68e700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc60bed0000 CR3: 00000000aaefb000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600