BUG: unable to handle page fault for address: ffffed1011959800 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 5ffcd067 P4D 5ffcd067 PUD 2fff7067 PMD 0 Oops: Oops: 0000 [#1] SMP KASAN NOPTI CPU: 0 UID: 0 PID: 5319 Comm: syz.0.0 Not tainted syzkaller #0 PREEMPT(full) Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:__mkroute_output net/ipv4/route.c:2649 [inline] RIP: 0010:ip_route_output_key_hash_rcu+0x1264/0x25d0 net/ipv4/route.c:2875 Code: 11 19 09 49 83 c6 38 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 b9 1e 32 f8 49 03 1e 4d 89 fd 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 9d 1e 32 f8 4c 8b 3b e8 c5 f5 a0 RSP: 0018:ffffc9000b1d75c0 EFLAGS: 00010a06 RAX: 1ffff11011959800 RBX: ffff88808cacc000 RCX: 0000000000100000 RDX: ffffc90020802000 RSI: 0000000000002cc2 RDI: 0000000000002cc3 RBP: 0000000080000000 R08: ffff8880341d4900 R09: 0000000000000003 R10: 0000000000000005 R11: 0000000000000002 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff8880338a5158 R15: 0000000000000000 FS: 00007f5fd48296c0(0000) GS:ffff88808cacc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed1011959800 CR3: 00000000421ce000 CR4: 0000000000352ef0 Call Trace: ip_route_output_key_hash+0x18d/0x2a0 net/ipv4/route.c:2705 __ip_route_output_key include/net/route.h:169 [inline] ip_route_output_flow+0x2a/0x150 net/ipv4/route.c:2932 ip_route_output_key include/net/route.h:179 [inline] sctp_v4_get_dst+0x3f8/0x12b0 net/sctp/protocol.c:455 sctp_transport_route+0x118/0x2f0 net/sctp/transport.c:448 sctp_assoc_add_peer+0x650/0x13b0 net/sctp/associola.c:663 sctp_connect_new_asoc+0x329/0x6b0 net/sctp/socket.c:1100 __sctp_connect+0x5cb/0xdc0 net/sctp/socket.c:1198 sctp_getsockopt_connectx3+0x227/0x360 net/sctp/socket.c:1422 sctp_getsockopt+0x984/0xb90 net/sctp/socket.c:8174 do_sock_getsockopt+0x37f/0x670 net/socket.c:2383 __sys_getsockopt net/socket.c:2412 [inline] __do_sys_getsockopt net/socket.c:2419 [inline] __se_sys_getsockopt net/socket.c:2416 [inline] __x64_sys_getsockopt+0x1a4/0x240 net/socket.c:2416 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f5fd399bf79 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f5fd4829028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 RAX: ffffffffffffffda RBX: 00007f5fd3c15fa0 RCX: 00007f5fd399bf79 RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000004 RBP: 00007f5fd3a327e0 R08: 0000200000000140 R09: 0000000000000000 R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f5fd3c16038 R14: 00007f5fd3c15fa0 R15: 00007ffd5e230678 Modules linked in: CR2: ffffed1011959800 ---[ end trace 0000000000000000 ]--- RIP: 0010:__mkroute_output net/ipv4/route.c:2649 [inline] RIP: 0010:ip_route_output_key_hash_rcu+0x1264/0x25d0 net/ipv4/route.c:2875 Code: 11 19 09 49 83 c6 38 4c 89 f0 48 c1 e8 03 42 80 3c 20 00 74 08 4c 89 f7 e8 b9 1e 32 f8 49 03 1e 4d 89 fd 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 9d 1e 32 f8 4c 8b 3b e8 c5 f5 a0 RSP: 0018:ffffc9000b1d75c0 EFLAGS: 00010a06 RAX: 1ffff11011959800 RBX: ffff88808cacc000 RCX: 0000000000100000 RDX: ffffc90020802000 RSI: 0000000000002cc2 RDI: 0000000000002cc3 RBP: 0000000080000000 R08: ffff8880341d4900 R09: 0000000000000003 R10: 0000000000000005 R11: 0000000000000002 R12: dffffc0000000000 R13: 0000000000000000 R14: ffff8880338a5158 R15: 0000000000000000 FS: 00007f5fd48296c0(0000) GS:ffff88808cacc000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffed1011959800 CR3: 00000000421ce000 CR4: 0000000000352ef0 ---------------- Code disassembly (best guess): 0: 11 19 adc %ebx,(%rcx) 2: 09 49 83 or %ecx,-0x7d(%rcx) 5: c6 38 xabort $0x38,(bad) 7: 4c 89 f0 mov %r14,%rax a: 48 c1 e8 03 shr $0x3,%rax e: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) 13: 74 08 je 0x1d 15: 4c 89 f7 mov %r14,%rdi 18: e8 b9 1e 32 f8 call 0xf8321ed6 1d: 49 03 1e add (%r14),%rbx 20: 4d 89 fd mov %r15,%r13 23: 48 89 d8 mov %rbx,%rax 26: 48 c1 e8 03 shr $0x3,%rax * 2a: 42 80 3c 20 00 cmpb $0x0,(%rax,%r12,1) <-- trapping instruction 2f: 74 08 je 0x39 31: 48 89 df mov %rbx,%rdi 34: e8 9d 1e 32 f8 call 0xf8321ed6 39: 4c 8b 3b mov (%rbx),%r15 3c: e8 .byte 0xe8 3d: c5 .byte 0xc5 3e: f5 cmc 3f: a0 .byte 0xa0