INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-net-kasan-gce-2,10.128.0.22' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz2.accept_dad = 0 net.ipv6.conf.syz1.accept_dad = 0 net.ipv6.conf.syz6.accept_dad = 0 net.ipv6.conf.syz3.accept_dad = 0 net.ipv6.conf.syz5.accept_dad = 0 net.ipv6.conf.syz4.accept_dad = 0 net.ipv6.conf.syz7.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 net.ipv6.conf.syz6.router_solicitations = 0 net.ipv6.conf.syz1.router_solicitations = 0 net.ipv6.conf.syz2.router_solicitations = 0 net.ipv6.conf.syz3.router_solicitations = 0 net.ipv6.conf.syz4.router_solicitations = 0 net.ipv6.conf.syz5.router_solicitations = 0 net.ipv6.conf.syz7.router_solicitations = 0 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 29.961900] ================================================================== [ 29.962969] BUG: KASAN: use-after-free in aead_recvmsg+0x1552/0x1970 [ 29.963840] Read of size 4 at addr ffff8801c54bb3dc by task syzkaller579572/3669 [ 29.964824] [ 29.965055] CPU: 1 PID: 3669 Comm: syzkaller579572 Not tainted 4.14.0+ #130 [ 29.965985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.967202] Call Trace: [ 29.967559] dump_stack+0x194/0x257 [ 29.968053] ? arch_local_irq_restore+0x53/0x53 [ 29.968677] ? show_regs_print_info+0x65/0x65 [ 29.969278] ? af_alg_make_sg+0x510/0x510 [ 29.969833] ? aead_recvmsg+0x1552/0x1970 [ 29.970389] print_address_description+0x73/0x250 [ 29.971033] ? aead_recvmsg+0x1552/0x1970 [ 29.971587] kasan_report+0x25b/0x340 [ 29.972102] __asan_report_load4_noabort+0x14/0x20 [ 29.972755] aead_recvmsg+0x1552/0x1970 [ 29.973305] ? aead_sendpage_nokey+0xa0/0xa0 [ 29.973895] ? selinux_socket_recvmsg+0x36/0x40 [ 29.974516] ? security_socket_recvmsg+0x91/0xc0 [ 29.975150] ? aead_sendpage_nokey+0xa0/0xa0 [ 29.975740] sock_recvmsg+0xc9/0x110 [ 29.976237] ? __sock_recv_wifi_status+0x210/0x210 [ 29.976897] ___sys_recvmsg+0x29b/0x630 [ 29.977438] ? ___sys_sendmsg+0x8a0/0x8a0 [ 29.978021] ? fget_raw+0x20/0x20 [ 29.978487] ? __handle_mm_fault+0x3ad0/0x3ad0 [ 29.979097] ? vmacache_find+0x5f/0x280 [ 29.979636] ? up_read+0x1a/0x40 [ 29.980093] ? __do_page_fault+0x3d6/0xc90 [ 29.980667] ? __fdget+0x18/0x20 [ 29.981129] __sys_recvmsg+0xe2/0x210 [ 29.981639] ? __sys_recvmsg+0xe2/0x210 [ 29.982174] ? SyS_sendmmsg+0x60/0x60 [ 29.985940] ? __do_page_fault+0xc90/0xc90 [ 29.990144] ? lockdep_sys_exit+0x47/0xf0 [ 29.994267] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.999257] SyS_recvmsg+0x2d/0x50 [ 30.002768] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.005643] BUG: unable to handle kernel NULL pointer dereference at (null) [ 30.005650] IP: (null) [ 30.005652] PGD 1c50fd067 P4D 1c50fd067 PUD 1c5795067 PMD 0 [ 30.005661] Oops: 0010 [#1] SMP KASAN [ 30.005668] Dumping ftrace buffer: [ 30.005671] (ftrace buffer empty) [ 30.005672] Modules linked in: [ 30.005678] CPU: 0 PID: 3704 Comm: syzkaller579572 Not tainted 4.14.0+ #130 [ 30.005680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.005682] task: ffff8801c4804180 task.stack: ffff8801c47b8000 [ 30.005684] RIP: 0010: (null) [ 30.005686] RSP: 0018:ffff8801c47bf960 EFLAGS: 00010292 [ 30.005690] RAX: ffff8801c7977cc0 RBX: 1ffff100388f7f2d RCX: ffffffff823a7981 [ 30.005693] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8801c47bf968 [ 30.005695] RBP: ffff8801c47bfb00 R08: 0000000000000000 R09: ffff8801c4807310 [ 30.005697] R10: 0000000000000008 R11: ffffed0038900e69 R12: dffffc0000000000 [ 30.005700] R13: ffff8801c7977ce8 R14: ffff8801bdd33280 R15: ffff8801c4807300 [ 30.005703] FS: 00007fd663ecb700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 30.005705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 30.005708] CR2: 0000000000000000 CR3: 00000001caf11000 CR4: 00000000001406f0 [ 30.005712] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 30.005714] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 30.005715] Call Trace: [ 30.005722] ? aead_recvmsg+0x7db/0x1970 [ 30.005730] ? aead_recvmsg+0x67d/0x1970 [ 30.005752] ? aead_sendpage_nokey+0xa0/0xa0 [ 30.005758] ? selinux_socket_recvmsg+0x36/0x40 [ 30.005762] ? security_socket_recvmsg+0x91/0xc0 [ 30.005767] ? aead_sendpage_nokey+0xa0/0xa0 [ 30.005773] sock_recvmsg+0xc9/0x110 [ 30.005777] ? __sock_recv_wifi_status+0x210/0x210 [ 30.005782] ___sys_recvmsg+0x29b/0x630 [ 30.005790] ? ___sys_sendmsg+0x8a0/0x8a0 [ 30.005804] ? fget_raw+0x20/0x20 [ 30.005808] ? __handle_mm_fault+0x3ad0/0x3ad0 [ 30.005813] ? vmacache_find+0x5f/0x280 [ 30.005821] ? up_read+0x1a/0x40 [ 30.005826] ? __do_page_fault+0x3d6/0xc90 [ 30.005830] ? lock_downgrade+0x980/0x980 [ 30.005837] ? __fdget+0x18/0x20 [ 30.005844] __sys_recvmsg+0xe2/0x210 [ 30.005847] ? __sys_recvmsg+0xe2/0x210 [ 30.005852] ? SyS_sendmmsg+0x60/0x60 [ 30.005858] ? __do_page_fault+0xc90/0xc90 [ 30.005861] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.005867] ? lockdep_sys_exit+0x47/0xf0 [ 30.005876] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.005883] SyS_recvmsg+0x2d/0x50 [ 30.005889] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.005892] RIP: 0033:0x44a6f9 [ 30.005894] RSP: 002b:00007fd663ecadc8 EFLAGS: 00000202 ORIG_RAX: 000000000000002f [ 30.005898] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000044a6f9 [ 30.005900] RDX: 0000000000000040 RSI: 00000000207e0000 RDI: 0000000000000005 [ 30.005902] RBP: 0000000000000086 R08: 00007fd663ecb700 R09: 00007fd663ecb700 [ 30.005905] R10: 00007fd663ecb700 R11: 0000000000000202 R12: 0000000000000000 [ 30.005907] R13: 00007ffeab98e91f R14: 00007fd663ecb9c0 R15: 0000000000000000 [ 30.005916] Code: Bad RIP value. [ 30.005923] RIP: (null) RSP: ffff8801c47bf960 [ 30.005924] CR2: 0000000000000000 [ 30.005950] ---[ end trace f657afc7bf3f99fb ]--- [ 30.005952] Kernel panic - not syncing: Fatal exception [ 30.321133] RIP: 0033:0x44a6f9 [ 30.324287] RSP: 002b:00007fd663ecadc8 EFLAGS: 00000202 ORIG_RAX: 000000000000002f [ 30.331957] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000044a6f9 [ 30.339189] RDX: 0000000000000040 RSI: 00000000207e0000 RDI: 0000000000000005 [ 30.346428] RBP: 0000000000000086 R08: 00007fd663ecb700 R09: 00007fd663ecb700 [ 30.353665] R10: 00007fd663ecb700 R11: 0000000000000202 R12: 0000000000000000 [ 30.360902] R13: 00007ffeab98e91f R14: 00007fd663ecb9c0 R15: 0000000000000000 [ 30.368154] [ 30.369750] Allocated by task 3506: [ 30.373346] save_stack+0x43/0xd0 [ 30.376763] kasan_kmalloc+0xad/0xe0 [ 30.380438] __kmalloc+0x162/0x760 [ 30.383942] crypto_create_tfm+0x82/0x2e0 [ 30.388051] crypto_alloc_tfm+0x10e/0x2f0 [ 30.392170] crypto_alloc_skcipher+0x2c/0x40 [ 30.396541] crypto_get_default_null_skcipher+0x5f/0x80 [ 30.401866] aead_bind+0x89/0x140 [ 30.405281] alg_bind+0x1ab/0x440 [ 30.408699] SYSC_bind+0x1b4/0x3f0 [ 30.412201] SyS_bind+0x24/0x30 [ 30.415445] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.420161] [ 30.421751] Freed by task 3581: [ 30.424993] save_stack+0x43/0xd0 [ 30.428407] kasan_slab_free+0x71/0xc0 [ 30.432256] kfree+0xca/0x250 [ 30.435324] kzfree+0x28/0x30 [ 30.438391] crypto_destroy_tfm+0x140/0x2e0 [ 30.442678] crypto_put_default_null_skcipher+0x35/0x60 [ 30.448007] aead_sock_destruct+0x13c/0x220 [ 30.452294] __sk_destruct+0xfd/0x910 [ 30.456059] sk_destruct+0x47/0x80 [ 30.459560] __sk_free+0x57/0x230 [ 30.462977] sk_free+0x2a/0x40 [ 30.466131] af_alg_release+0x5d/0x70 [ 30.469892] sock_release+0x8d/0x1e0 [ 30.473567] sock_close+0x16/0x20 [ 30.476985] __fput+0x333/0x7f0 [ 30.480225] ____fput+0x15/0x20 [ 30.483467] task_work_run+0x199/0x270 [ 30.487318] do_exit+0x9bb/0x1ae0 [ 30.490735] do_group_exit+0x149/0x400 [ 30.494585] SyS_exit_group+0x1d/0x20 [ 30.498352] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 30.503065] [ 30.504656] The buggy address belongs to the object at ffff8801c54bb3c0 [ 30.504656] which belongs to the cache kmalloc-128 of size 128 [ 30.517275] The buggy address is located 28 bytes inside of [ 30.517275] 128-byte region [ffff8801c54bb3c0, ffff8801c54bb440) [ 30.529023] The buggy address belongs to the page: [ 30.533913] page:ffffea0007152ec0 count:1 mapcount:0 mapping:ffff8801c54bb000 index:0x0 [ 30.542017] flags: 0x2fffc0000000100(slab) [ 30.546218] raw: 02fffc0000000100 ffff8801c54bb000 0000000000000000 0000000100000015 [ 30.554064] raw: ffffea00071674a0 ffffea0007143f20 ffff8801db000640 0000000000000000 [ 30.561906] page dumped because: kasan: bad access detected [ 30.567576] [ 30.569165] Memory state around the buggy address: [ 30.574055] ffff8801c54bb280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.581382] ffff8801c54bb300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.588703] >ffff8801c54bb380: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 30.596022] ^ [ 30.602217] ffff8801c54bb400: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.609537] ffff8801c54bb480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.616854] ================================================================== [ 30.624204] Dumping ftrace buffer: [ 30.627744] (ftrace buffer empty) [ 30.631419] Kernel Offset: disabled [ 30.635015] Rebooting in 86400 seconds..