kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 1 PID: 23350 Comm: syz-executor.3 Not tainted 5.1.0-rc6+ #188 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:rt_cache_valid+0x33/0x190 net/ipv4/route.c:1545 Code: 31 e4 53 48 89 fb e8 2c 2c 95 fb 48 85 db 74 4f e8 22 2c 95 fb 48 8d 7b 3a 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 07 RSP: 0018:ffff888091197580 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000003b10 RCX: ffffc9000e75d000 RDX: 0000000000000769 RSI: ffffffff85db60ce RDI: 0000000000003b4a RBP: ffff888091197598 R08: ffff88808fbb2640 R09: ffffed1015d05bc8 R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000003b10 R15: ffff8880a4f98280 FS: 00007f73e2ec4700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7600c41518 CR3: 0000000097008000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __mkroute_output net/ipv4/route.c:2301 [inline] ip_route_output_key_hash_rcu+0x89d/0x30e0 net/ipv4/route.c:2533 ip_route_output_key_hash+0x212/0x380 net/ipv4/route.c:2362 __ip_route_output_key include/net/route.h:124 [inline] ip_route_output_flow+0x28/0xc0 net/ipv4/route.c:2617 ip_route_output_ports include/net/route.h:161 [inline] __ip_queue_xmit+0x12a2/0x1bf0 net/ipv4/ip_output.c:461 ip_queue_xmit+0x5a/0x70 include/net/ip.h:198 __tcp_transmit_skb+0x1a32/0x3750 net/ipv4/tcp_output.c:1159 tcp_transmit_skb net/ipv4/tcp_output.c:1175 [inline] tcp_write_xmit+0xe83/0x5310 net/ipv4/tcp_output.c:2400 tcp_push_one+0xd7/0x110 net/ipv4/tcp_output.c:2590 tcp_sendmsg_locked+0xa2e/0x34b0 net/ipv4/tcp.c:1387 tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1445 inet_sendmsg+0x147/0x5d0 net/ipv4/af_inet.c:798 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xdd/0x130 net/socket.c:661 __sys_sendto+0x262/0x380 net/socket.c:1932 __do_sys_sendto net/socket.c:1944 [inline] __se_sys_sendto net/socket.c:1940 [inline] __x64_sys_sendto+0xe1/0x1a0 net/socket.c:1940 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x458da9 Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f73e2ec3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458da9 RDX: 00000000ed5f0fde RSI: 00000000200003c0 RDI: 0000000000000004 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000184 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73e2ec46d4 R13: 00000000004c6726 R14: 00000000004db0d8 R15: 00000000ffffffff Modules linked in: ---[ end trace 35dbb5fc11aa6bca ]--- RIP: 0010:rt_cache_valid+0x33/0x190 net/ipv4/route.c:1545 Code: 31 e4 53 48 89 fb e8 2c 2c 95 fb 48 85 db 74 4f e8 22 2c 95 fb 48 8d 7b 3a 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 07 RSP: 0018:ffff888091197580 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: 0000000000003b10 RCX: ffffc9000e75d000 RDX: 0000000000000769 RSI: ffffffff85db60ce RDI: 0000000000003b4a RBP: ffff888091197598 R08: ffff88808fbb2640 R09: ffffed1015d05bc8 R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000003b10 R15: ffff8880a4f98280 FS: 00007f73e2ec4700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b31c25000 CR3: 0000000097008000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400