kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 5701 Comm: syz-executor0 Not tainted 4.13.0-rc5+ #13 netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801d0ec8640 task.stack: ffff8801cdbe0000 RIP: 0010:__lock_acquire+0xac8/0x3dc0 kernel/locking/lockdep.c:3246 RSP: 0018:ffff8801cdbe6ac0 EFLAGS: 00010006 RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 0000000000000002 RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffffffff85acafc0 RBP: ffff8801cdbe6f20 R08: 0000000000000001 R09: 0000000000000000 R10: ffff8801d0ec8640 R11: ffffffff842eb530 R12: 1ffff10039b7cdf2 R13: 0000000000000001 R14: 0000000000000030 R15: 0000000000000000 FS: 00007f739f6e0700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020005fe4 CR3: 00000001d62b7000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: RDS: rds_bind could not find a transport for 224.0.0.1, load rds_tcp or rds_rdma? netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:3855 __raw_read_lock_bh include/linux/rwlock_api_smp.h:176 [inline] _raw_read_lock_bh+0x34/0x50 kernel/locking/spinlock.c:247 rt6_make_pcpu_route net/ipv6/route.c:1044 [inline] ip6_pol_route+0x1ae0/0x2bb0 net/ipv6/route.c:1161 ip6_pol_route_output+0x4c/0x60 net/ipv6/route.c:1214 fib6_rule_lookup+0x9e/0x2a0 net/ipv6/ip6_fib.c:281 ip6_route_output_flags+0x1f1/0x2b0 net/ipv6/route.c:1242 ip6_route_output include/net/ip6_route.h:80 [inline] ip6_dst_lookup_tail+0x4ea/0x970 net/ipv6/ip6_output.c:953 ip6_dst_lookup_flow+0xc8/0x270 net/ipv6/ip6_output.c:1076 sctp_v6_get_dst+0x667/0x19f0 net/sctp/ipv6.c:274 sctp_transport_route+0xa8/0x430 net/sctp/transport.c:287 sctp_assoc_add_peer+0x4fe/0x1100 net/sctp/associola.c:656 __sctp_connect+0x251/0xc70 net/sctp/socket.c:1186 sctp_connect+0xb4/0xf0 net/sctp/socket.c:4137 inet_dgram_connect+0x16b/0x1f0 net/ipv4/af_inet.c:540 SYSC_connect+0x204/0x470 net/socket.c:1642 SyS_connect+0x24/0x30 net/socket.c:1623 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x4512e9 RSP: 002b:00007f739f6dfc08 EFLAGS: 00000216 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000718000 RCX: 00000000004512e9 RDX: 000000000000001c RSI: 0000000020005fe4 RDI: 0000000000000005 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000216 R12: 00000000004b70fd R13: 00000000ffffffff R14: 0000000020006000 R15: 0000000000001000 Code: 81 c4 30 04 00 00 44 89 f8 5b 41 5a 41 5c 41 5d 41 5e 41 5f 5d 49 8d 62 f8 c3 4c 89 f2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 e8 31 00 00 49 81 3e c0 51 6a 86 41 bd 00 00 RIP: __lock_acquire+0xac8/0x3dc0 kernel/locking/lockdep.c:3246 RSP: ffff8801cdbe6ac0 ---[ end trace 51579f4e971e2a17 ]---