Use struct sctp_assoc_value instead kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 12628 Comm: syz-executor1 Not tainted 4.14.0-rc4+ #80 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8801c45364c0 task.stack: ffff8801c9db0000 RIP: 0010:__lock_acquire+0xd34/0x4620 kernel/locking/lockdep.c:3376 RSP: 0018:ffff8801c9db6820 EFLAGS: 00010006 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffffffff85ac9960 RBP: ffff8801c9db6d20 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: ffffffff87062d20 R12: ffff8801c45364c0 R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000030 FS: 00007fefd0001700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000a6fa18 CR3: 00000001cb97e000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x31/0x40 kernel/locking/spinlock.c:175 spin_lock_bh include/linux/spinlock.h:321 [inline] rt6_select net/ipv6/route.c:786 [inline] ip6_pol_route+0x1bd5/0x3b90 net/ipv6/route.c:1650 ip6_pol_route_output+0x4c/0x60 net/ipv6/route.c:1843 fib6_rule_lookup+0x9e/0x2a0 net/ipv6/ip6_fib.c:309 ip6_route_output_flags+0x1f1/0x2b0 net/ipv6/route.c:1871 ip6_route_output include/net/ip6_route.h:80 [inline] ip6_dst_lookup_tail+0x4ea/0x970 net/ipv6/ip6_output.c:953 ip6_dst_lookup_flow+0xc8/0x270 net/ipv6/ip6_output.c:1076 ip6_sk_dst_lookup_flow+0x44a/0x590 net/ipv6/ip6_output.c:1107 udpv6_sendmsg+0x2242/0x3380 net/ipv6/udp.c:1322 inet_sendmsg+0x11f/0x5e0 net/ipv4/af_inet.c:763 sock_sendmsg_nosec net/socket.c:633 [inline] sock_sendmsg+0xca/0x110 net/socket.c:643 SYSC_sendto+0x358/0x5a0 net/socket.c:1750 SyS_sendto+0x40/0x50 net/socket.c:1718 entry_SYSCALL_64_fastpath+0x1f/0xbe RIP: 0033:0x4520a9 RSP: 002b:00007fefd0000c08 EFLAGS: 00000216 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00000000007180b0 RCX: 00000000004520a9 RDX: 0000000000000045 RSI: 0000000020fd5fbb RDI: 0000000000000016 RBP: 0000000000000086 R08: 0000000020ec1000 R09: 000000000000001c R10: 0000000000040000 R11: 0000000000000216 R12: 0000000000000000 R13: 0000000000a6f7ef R14: 00007fefd00019c0 R15: 0000000000000017 Code: e9 03 f3 48 ab 48 81 c4 d8 04 00 00 44 89 f0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 4c 89 fa 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 0d 33 00 00 49 81 3f 40 e8 48 86 41 be 00 00 RIP: __lock_acquire+0xd34/0x4620 kernel/locking/lockdep.c:3376 RSP: ffff8801c9db6820 ---[ end trace 4093cedad2e225fa ]---