RBP: 00007fce2cf0b1d0 R08: 0000000020618000 R09: 0000000000000010 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 R13: 00007ffce8ee741f R14: 00007fce2cf0b300 R15: 0000000000022000 kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:flex_array_get+0x27/0x250 lib/flex_array.c:320 Code: 90 90 90 41 56 41 55 41 54 55 89 f5 53 48 89 fb 48 83 ec 08 e8 1a a0 ee fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b7 01 00 00 44 8b 2b 31 ff 44 RSP: 0018:ffff8880b5a5f2c8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff87770a90 RDX: 0000000000000000 RSI: ffffffff8373e556 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888057710e68 R13: 0000000000000000 R14: ffff8880a8ca2580 R15: 1ffff1100aee21d1 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8824714008 CR3: 000000009a7fe000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: sctp_stream_out include/net/sctp/structs.h:1474 [inline] sctp_sched_dequeue_done+0x1f8/0x2e0 net/sctp/stream_sched.c:255 __sctp_outq_teardown+0x6cc/0xc20 net/sctp/outqueue.c:268 sctp_association_free+0x212/0x7b0 net/sctp/associola.c:361 sctp_cmd_delete_tcb net/sctp/sm_sideeffect.c:944 [inline] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1332 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x39ee/0x5110 net/sctp/sm_sideeffect.c:1170 sctp_assoc_bh_rcv+0x345/0x650 net/sctp/associola.c:1073 sctp_inq_push+0x1da/0x270 net/sctp/inqueue.c:95 sctp_rcv+0x1642/0x3300 net/sctp/input.c:268 ip_local_deliver_finish+0x495/0xc00 net/ipv4/ip_input.c:215 NF_HOOK include/linux/netfilter.h:289 [inline] ip_local_deliver+0x188/0x500 net/ipv4/ip_input.c:256 dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1ca/0x2e0 net/ipv4/ip_input.c:414 NF_HOOK include/linux/netfilter.h:289 [inline] ip_rcv+0xca/0x3c0 net/ipv4/ip_input.c:524 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:4954 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5849 napi_poll net/core/dev.c:6280 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6346 __do_softirq+0x265/0x980 kernel/softirq.c:292 run_ksoftirqd+0x57/0x110 kernel/softirq.c:653 smpboot_thread_fn+0x655/0x9e0 kernel/smpboot.c:164 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Modules linked in: ---[ end trace f91e2a17e83c3323 ]--- RIP: 0010:flex_array_get+0x27/0x250 lib/flex_array.c:320 Code: 90 90 90 41 56 41 55 41 54 55 89 f5 53 48 89 fb 48 83 ec 08 e8 1a a0 ee fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b7 01 00 00 44 8b 2b 31 ff 44 RSP: 0018:ffff8880b5a5f2c8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff87770a90 RDX: 0000000000000000 RSI: ffffffff8373e556 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff888057710e68 R13: 0000000000000000 R14: ffff8880a8ca2580 R15: 1ffff1100aee21d1 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f8824714008 CR3: 0000000009e6d000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 41 56 push %r14 5: 41 55 push %r13 7: 41 54 push %r12 9: 55 push %rbp a: 89 f5 mov %esi,%ebp c: 53 push %rbx d: 48 89 fb mov %rdi,%rbx 10: 48 83 ec 08 sub $0x8,%rsp 14: e8 1a a0 ee fd callq 0xfdeea033 19: 48 89 da mov %rbx,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e b7 01 00 00 jle 0x1f1 3a: 44 8b 2b mov (%rbx),%r13d 3d: 31 ff xor %edi,%edi 3f: 44 rex.R