mkiss: ax0: crc mode is auto. BUG: unable to handle page fault for address: ffffed1012e4a200 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 7ffd5067 P4D 7ffd5067 PUD 3fffa067 PMD 0 Oops: Oops: 0000 [#1] SMP KASAN NOPTI CPU: 1 UID: 0 PID: 28327 Comm: syz.0.6836 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 RIP: 0010:__mkroute_output net/ipv4/route.c:2649 [inline] RIP: 0010:ip_route_output_key_hash_rcu+0x6c0/0x2870 net/ipv4/route.c:2875 Code: 24 30 48 85 ed 0f 84 91 14 00 00 e8 4a 57 1d f8 48 83 c5 30 e8 41 57 1d f8 48 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 06 1e 00 00 48 8b 6d 00 e8 4d 2b a2 01 31 ff 41 RSP: 0018:ffffc90003e27458 EFLAGS: 00010a06 RAX: dffffc0000000000 RBX: ffffc90003e276a8 RCX: ffffc90028ec3000 RDX: 1ffff11012e4a200 RSI: ffffffff89eaa3ff RDI: ffff8880793d2758 RBP: ffff888097251000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880793d2720 R13: ffff8880240d9000 R14: ffffc90003e27508 R15: ffff88806ee00000 FS: 0000000000000000(0000) GS:ffff888097251000(0063) knlGS:00000000f5394b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: ffffed1012e4a200 CR3: 000000004e7c5000 CR4: 0000000000352ef0 Call Trace: ip_route_output_key_hash+0x118/0x2b0 net/ipv4/route.c:2705 __ip_route_output_key include/net/route.h:169 [inline] ip_route_output_flow+0x27/0x150 net/ipv4/route.c:2932 ip_route_output_key include/net/route.h:179 [inline] sctp_v4_get_dst+0x3c4/0x1220 net/sctp/protocol.c:455 sctp_transport_route+0x131/0x360 net/sctp/transport.c:448 sctp_assoc_add_peer+0x765/0x14f0 net/sctp/associola.c:663 sctp_connect_new_asoc+0x1f8/0x770 net/sctp/socket.c:1100 __sctp_connect+0x3e7/0xc70 net/sctp/socket.c:1198 __sctp_setsockopt_connectx+0x100/0x190 net/sctp/socket.c:1337 sctp_getsockopt_connectx3 net/sctp/socket.c:1422 [inline] sctp_getsockopt+0x3e88/0x7080 net/sctp/socket.c:8174 do_sock_getsockopt+0x259/0x3d0 net/socket.c:2383 __sys_getsockopt+0x133/0x1d0 net/socket.c:2412 __do_sys_getsockopt net/socket.c:2419 [inline] __se_sys_getsockopt net/socket.c:2416 [inline] __ia32_sys_getsockopt+0xbc/0x160 net/socket.c:2416 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0xe3/0x8c0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x32/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf7f14f6c Code: d2 74 05 c1 e8 0c 89 02 8b 5d fc 31 c0 c9 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 58 b8 77 00 00 00 cd 80 0f 0b 8d b6 00 00 00 00 b8 ad RSP: 002b:00000000f539450c EFLAGS: 00000292 ORIG_RAX: 000000000000016d RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000000084 RDX: 000000000000006f RSI: 0000000080000200 RDI: 0000000080000140 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000292 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 Modules linked in: CR2: ffffed1012e4a200 ---[ end trace 0000000000000000 ]--- RIP: 0010:__mkroute_output net/ipv4/route.c:2649 [inline] RIP: 0010:ip_route_output_key_hash_rcu+0x6c0/0x2870 net/ipv4/route.c:2875 Code: 24 30 48 85 ed 0f 84 91 14 00 00 e8 4a 57 1d f8 48 83 c5 30 e8 41 57 1d f8 48 89 ea 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 06 1e 00 00 48 8b 6d 00 e8 4d 2b a2 01 31 ff 41 RSP: 0018:ffffc90003e27458 EFLAGS: 00010a06 RAX: dffffc0000000000 RBX: ffffc90003e276a8 RCX: ffffc90028ec3000 RDX: 1ffff11012e4a200 RSI: ffffffff89eaa3ff RDI: ffff8880793d2758 RBP: ffff888097251000 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880793d2720 R13: ffff8880240d9000 R14: ffffc90003e27508 R15: ffff88806ee00000 FS: 0000000000000000(0000) GS:ffff888097251000(0063) knlGS:00000000f5394b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: ffffed1012e4a200 CR3: 000000004e7c5000 CR4: 0000000000352ef0 ---------------- Code disassembly (best guess): 0: 24 30 and $0x30,%al 2: 48 85 ed test %rbp,%rbp 5: 0f 84 91 14 00 00 je 0x149c b: e8 4a 57 1d f8 call 0xf81d575a 10: 48 83 c5 30 add $0x30,%rbp 14: e8 41 57 1d f8 call 0xf81d575a 19: 48 89 ea mov %rbp,%rdx 1c: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 23: fc ff df 26: 48 c1 ea 03 shr $0x3,%rdx * 2a: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) <-- trapping instruction 2e: 0f 85 06 1e 00 00 jne 0x1e3a 34: 48 8b 6d 00 mov 0x0(%rbp),%rbp 38: e8 4d 2b a2 01 call 0x1a22b8a 3d: 31 ff xor %edi,%edi 3f: 41 rex.B