kasan: GPF could be caused by NULL-ptr deref or user memory access Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0xa/0xf lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:3088 [inline] prepare_alloc_pages mm/page_alloc.c:4346 [inline] __alloc_pages_nodemask+0x239/0x2890 mm/page_alloc.c:4393 general protection fault: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:flex_array_get+0x27/0x250 lib/flex_array.c:320 Code: 90 90 90 41 56 41 55 41 54 55 89 f5 53 48 89 fb 48 83 ec 08 e8 1a a0 ee fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b7 01 00 00 44 8b 2b 31 ff 44 RSP: 0018:ffff8880b5a5f2c8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff87770a90 RDX: 0000000000000000 RSI: ffffffff8373e556 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880b0150a68 R13: 0000000000000000 R14: ffff8880b0e9b100 R15: 1ffff1101602a151 alloc_pages_current+0x193/0x2a0 mm/mempolicy.c:2197 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 alloc_pages include/linux/gfp.h:532 [inline] __get_free_pages+0x8/0x40 mm/page_alloc.c:4443 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 tlb_next_batch mm/memory.c:216 [inline] __tlb_remove_page_size+0x2a2/0x470 mm/memory.c:318 CR2: 00007fcd6596a000 CR3: 00000000b05ff000 CR4: 00000000003406f0 __tlb_remove_page include/asm-generic/tlb.h:161 [inline] zap_pte_range mm/memory.c:1353 [inline] zap_pmd_range mm/memory.c:1463 [inline] zap_pud_range mm/memory.c:1492 [inline] zap_p4d_range mm/memory.c:1513 [inline] unmap_page_range+0x14e7/0x2c50 mm/memory.c:1534 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: sctp_stream_out include/net/sctp/structs.h:1474 [inline] sctp_sched_dequeue_done+0x1f8/0x2e0 net/sctp/stream_sched.c:255 __sctp_outq_teardown+0x6cc/0xc20 net/sctp/outqueue.c:268 unmap_single_vma+0x198/0x300 mm/memory.c:1579 unmap_vmas+0xa9/0x180 mm/memory.c:1609 sctp_association_free+0x212/0x7b0 net/sctp/associola.c:361 exit_mmap+0x2b9/0x530 mm/mmap.c:3093 sctp_cmd_delete_tcb net/sctp/sm_sideeffect.c:944 [inline] sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1332 [inline] sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline] sctp_do_sm+0x39ee/0x5110 net/sctp/sm_sideeffect.c:1170 __mmput kernel/fork.c:1016 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1037 exit_mm kernel/exit.c:549 [inline] do_exit+0xaec/0x2be0 kernel/exit.c:857 sctp_assoc_bh_rcv+0x345/0x650 net/sctp/associola.c:1073 do_group_exit+0x125/0x310 kernel/exit.c:967 sctp_inq_push+0x1da/0x270 net/sctp/inqueue.c:95 __do_sys_exit_group kernel/exit.c:978 [inline] __se_sys_exit_group kernel/exit.c:976 [inline] __x64_sys_exit_group+0x3a/0x50 kernel/exit.c:976 sctp_rcv+0x1642/0x3300 net/sctp/input.c:268 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f6f8b618e29 Code: 00 49 c7 c0 c0 ff ff ff be e7 00 00 00 ba 3c 00 00 00 eb 12 0f 1f 44 00 00 89 d0 0f 05 48 3d 00 f0 ff ff 77 1c f4 89 f0 0f 05 <48> 3d 00 f0 ff ff 76 e7 f7 d8 64 41 89 00 eb df 0f 1f 80 00 00 00 RSP: 002b:00007fff3cec7a48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 00007f6f8b68d3f0 RCX: 00007f6f8b618e29 RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000 RBP: 0000000000000000 R08: ffffffffffffffc0 R09: 0000000000000010 ip_local_deliver_finish+0x495/0xc00 net/ipv4/ip_input.c:215 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6f8b68d3f0 NF_HOOK include/linux/netfilter.h:289 [inline] ip_local_deliver+0x188/0x500 net/ipv4/ip_input.c:256 R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 nfs_commit_data 3KB 14KB dst_input include/net/dst.h:461 [inline] ip_rcv_finish+0x1ca/0x2e0 net/ipv4/ip_input.c:414 NF_HOOK include/linux/netfilter.h:289 [inline] ip_rcv+0xca/0x3c0 net/ipv4/ip_input.c:524 nfs_write_data 34KB 44KB ext4_system_zone 1KB 7KB __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:4954 __netif_receive_skb+0x27/0x1c0 net/core/dev.c:5066 process_backlog+0x241/0x700 net/core/dev.c:5849 napi_poll net/core/dev.c:6280 [inline] net_rx_action+0x4ac/0xfb0 net/core/dev.c:6346 __do_softirq+0x265/0x980 kernel/softirq.c:292 run_ksoftirqd+0x57/0x110 kernel/softirq.c:653 smpboot_thread_fn+0x655/0x9e0 kernel/smpboot.c:164 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Modules linked in: ---[ end trace 7cee9fde194611db ]--- RIP: 0010:flex_array_get+0x27/0x250 lib/flex_array.c:320 Code: 90 90 90 41 56 41 55 41 54 55 89 f5 53 48 89 fb 48 83 ec 08 e8 1a a0 ee fd 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e b7 01 00 00 44 8b 2b 31 ff 44 RSP: 0018:ffff8880b5a5f2c8 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff87770a90 RDX: 0000000000000000 RSI: ffffffff8373e556 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: 0000000000000000 R12: ffff8880b0150a68 R13: 0000000000000000 R14: ffff8880b0e9b100 R15: 1ffff1101602a151 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fcd6596a000 CR3: 00000000b05ff000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 41 56 push %r14 5: 41 55 push %r13 7: 41 54 push %r12 9: 55 push %rbp a: 89 f5 mov %esi,%ebp c: 53 push %rbx d: 48 89 fb mov %rdi,%rbx 10: 48 83 ec 08 sub $0x8,%rsp 14: e8 1a a0 ee fd callq 0xfdeea033 19: 48 89 da mov %rbx,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2e: 84 c0 test %al,%al 30: 74 08 je 0x3a 32: 3c 03 cmp $0x3,%al 34: 0f 8e b7 01 00 00 jle 0x1f1 3a: 44 8b 2b mov (%rbx),%r13d 3d: 31 ff xor %edi,%edi 3f: 44 rex.R