INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-kasan-gce-0,10.128.0.59' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 41.834902] ================================================================== [ 41.836031] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0 [ 41.836888] Read of size 4 at addr ffff8801cc69861c by task syzkaller699056/3151 [ 41.837893] [ 41.838128] CPU: 1 PID: 3151 Comm: syzkaller699056 Not tainted 4.15.0-rc1+ #203 [ 41.839120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.840340] Call Trace: [ 41.840700] dump_stack+0x194/0x257 [ 41.841194] ? arch_local_irq_restore+0x53/0x53 [ 41.841822] ? show_regs_print_info+0x65/0x65 [ 41.842427] ? af_alg_make_sg+0x510/0x510 [ 41.842984] ? aead_recvmsg+0x1758/0x1bc0 [ 41.843543] print_address_description+0x73/0x250 [ 41.844189] ? aead_recvmsg+0x1758/0x1bc0 [ 41.844746] kasan_report+0x25b/0x340 [ 41.845279] __asan_report_load4_noabort+0x14/0x20 [ 41.845938] aead_recvmsg+0x1758/0x1bc0 [ 41.846492] ? aead_release+0x50/0x50 [ 41.847012] ? selinux_socket_recvmsg+0x36/0x40 [ 41.847653] ? security_socket_recvmsg+0x91/0xc0 [ 41.848289] ? aead_release+0x50/0x50 [ 41.848806] sock_recvmsg+0xc9/0x110 [ 41.849312] sock_read_iter+0x361/0x560 [ 41.849849] ? sock_recvmsg+0x110/0x110 [ 41.850383] ? selinux_file_permission+0x82/0x460 [ 41.851043] ? rw_verify_area+0xe5/0x2b0 [ 41.851597] aio_read+0x2b0/0x3a0 [ 41.852068] ? aio_write+0x5a0/0x5a0 [ 41.852573] ? lock_downgrade+0x980/0x980 [ 41.853140] ? lock_release+0xda0/0xda0 [ 41.853698] ? __might_sleep+0x95/0x190 [ 41.854252] do_io_submit+0xf99/0x14f0 [ 41.854781] ? do_io_submit+0xf99/0x14f0 [ 41.857267] ? aio_read+0x3a0/0x3a0 [ 41.860868] ? lock_downgrade+0x980/0x980 [ 41.864993] ? SyS_io_setup+0x10e/0x390 [ 41.868945] ? lock_release+0xda0/0xda0 [ 41.872927] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 41.877939] SyS_io_submit+0x27/0x30 [ 41.881622] ? SyS_io_submit+0x27/0x30 [ 41.885488] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 41.890212] RIP: 0033:0x440de9 [ 41.893372] RSP: 002b:00007ffc82c600d8 EFLAGS: 00000213 ORIG_RAX: 00000000000000d1 [ 41.901053] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440de9 [ 41.908295] RDX: 0000000020bd9fe0 RSI: 0000000000000002 RDI: 00007fc869b65000 [ 41.915536] RBP: 000000000000a2f2 R08: 0000000000000000 R09: 0000000000000004 [ 41.922775] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 41.930014] R13: 0000000000402270 R14: 0000000000000000 R15: 0000000000000000 [ 41.937271] [ 41.938870] Allocated by task 3098: [ 41.942469] save_stack+0x43/0xd0 [ 41.945901] kasan_kmalloc+0xad/0xe0 [ 41.949580] __kmalloc+0x162/0x760 [ 41.953093] crypto_create_tfm+0x82/0x2e0 [ 41.957207] crypto_alloc_tfm+0x10e/0x2f0 [ 41.961324] crypto_alloc_skcipher+0x2c/0x40 [ 41.965712] crypto_get_default_null_skcipher+0x5f/0x80 [ 41.971050] aead_init_geniv+0x164/0x310 [ 41.975079] crypto_aead_init_tfm+0x11e/0x180 [ 41.979543] crypto_create_tfm+0xdf/0x2e0 [ 41.983657] crypto_alloc_tfm+0x10e/0x2f0 [ 41.987773] crypto_alloc_aead+0x2c/0x40 [ 41.991805] aead_bind+0x70/0x140 [ 41.995232] alg_bind+0x1ab/0x440 [ 41.998657] SYSC_bind+0x1b4/0x3f0 [ 42.002166] SyS_bind+0x24/0x30 [ 42.005415] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 42.010135] [ 42.011729] Freed by task 3098: [ 42.014975] save_stack+0x43/0xd0 [ 42.018407] kasan_slab_free+0x71/0xc0 [ 42.022275] kfree+0xca/0x250 [ 42.025351] kzfree+0x28/0x30 [ 42.028431] crypto_destroy_tfm+0x140/0x2e0 [ 42.032737] crypto_put_default_null_skcipher+0x35/0x60 [ 42.038071] aead_sock_destruct+0x13c/0x220 [ 42.042364] __sk_destruct+0xfd/0x910 [ 42.046133] sk_destruct+0x47/0x80 [ 42.049641] __sk_free+0x57/0x230 [ 42.053062] sk_free+0x2a/0x40 [ 42.056224] af_alg_release+0x5d/0x70 [ 42.059991] sock_release+0x8d/0x1e0 [ 42.063671] sock_close+0x16/0x20 [ 42.067092] __fput+0x333/0x7f0 [ 42.070340] ____fput+0x15/0x20 [ 42.073591] task_work_run+0x199/0x270 [ 42.077448] do_exit+0x9bb/0x1ae0 [ 42.080867] do_group_exit+0x149/0x400 [ 42.084721] SyS_exit_group+0x1d/0x20 [ 42.088491] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 42.093210] [ 42.094810] The buggy address belongs to the object at ffff8801cc698600 [ 42.094810] which belongs to the cache kmalloc-128 of size 128 [ 42.107435] The buggy address is located 28 bytes inside of [ 42.107435] 128-byte region [ffff8801cc698600, ffff8801cc698680) [ 42.119191] The buggy address belongs to the page: [ 42.124091] page:000000002b957fc1 count:1 mapcount:0 mapping:00000000e230c2e4 index:0x0 [ 42.132206] flags: 0x2fffc0000000100(slab) [ 42.136415] raw: 02fffc0000000100 ffff8801cc698000 0000000000000000 0000000100000015 [ 42.144269] raw: ffffea00072ea060 ffffea0007318ea0 ffff8801db000640 0000000000000000 [ 42.152116] page dumped because: kasan: bad access detected [ 42.157794] [ 42.159388] Memory state around the buggy address: [ 42.164290] ffff8801cc698500: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 42.171619] ffff8801cc698580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.178947] >ffff8801cc698600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.186272] ^ [ 42.190386] ffff8801cc698680: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 42.197713] ffff8801cc698700: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.205040] ================================================================== [ 42.212364] Disabling lock debugging due to kernel taint [ 42.217867] Kernel panic - not syncing: panic_on_warn set ... [ 42.217867] [ 42.225202] CPU: 1 PID: 3151 Comm: syzkaller699056 Tainted: G B 4.15.0-rc1+ #203 [ 42.233937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.243259] Call Trace: [ 42.245825] dump_stack+0x194/0x257 [ 42.249426] ? arch_local_irq_restore+0x53/0x53 [ 42.254067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 42.258794] ? vsnprintf+0x1ed/0x1900 [ 42.262569] ? aead_recvmsg+0x1740/0x1bc0 [ 42.266693] panic+0x1e4/0x41c [ 42.269855] ? refcount_error_report+0x214/0x214 [ 42.274578] ? add_taint+0x1c/0x50 [ 42.278083] ? add_taint+0x1c/0x50 [ 42.281590] ? aead_recvmsg+0x1758/0x1bc0 [ 42.285704] kasan_end_report+0x50/0x50 [ 42.289645] kasan_report+0x144/0x340 [ 42.293411] __asan_report_load4_noabort+0x14/0x20 [ 42.298304] aead_recvmsg+0x1758/0x1bc0 [ 42.302255] ? aead_release+0x50/0x50 [ 42.306024] ? selinux_socket_recvmsg+0x36/0x40 [ 42.310662] ? security_socket_recvmsg+0x91/0xc0 [ 42.315385] ? aead_release+0x50/0x50 [ 42.319153] sock_recvmsg+0xc9/0x110 [ 42.322837] sock_read_iter+0x361/0x560 [ 42.326779] ? sock_recvmsg+0x110/0x110 [ 42.330718] ? selinux_file_permission+0x82/0x460 [ 42.335535] ? rw_verify_area+0xe5/0x2b0 [ 42.339571] aio_read+0x2b0/0x3a0 [ 42.342992] ? aio_write+0x5a0/0x5a0 [ 42.346678] ? lock_downgrade+0x980/0x980 [ 42.350797] ? lock_release+0xda0/0xda0 [ 42.354749] ? __might_sleep+0x95/0x190 [ 42.358692] do_io_submit+0xf99/0x14f0 [ 42.362544] ? do_io_submit+0xf99/0x14f0 [ 42.366576] ? aio_read+0x3a0/0x3a0 [ 42.370174] ? lock_downgrade+0x980/0x980 [ 42.374288] ? SyS_io_setup+0x10e/0x390 [ 42.378243] ? lock_release+0xda0/0xda0 [ 42.382205] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 42.387195] SyS_io_submit+0x27/0x30 [ 42.390876] ? SyS_io_submit+0x27/0x30 [ 42.394733] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 42.399453] RIP: 0033:0x440de9 [ 42.402608] RSP: 002b:00007ffc82c600d8 EFLAGS: 00000213 ORIG_RAX: 00000000000000d1 [ 42.410283] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440de9 [ 42.417521] RDX: 0000000020bd9fe0 RSI: 0000000000000002 RDI: 00007fc869b65000 [ 42.424759] RBP: 000000000000a2f2 R08: 0000000000000000 R09: 0000000000000004 [ 42.432000] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 42.439239] R13: 0000000000402270 R14: 0000000000000000 R15: 0000000000000000 [ 42.446533] Dumping ftrace buffer: [ 42.450041] (ftrace buffer empty) [ 42.453721] Kernel Offset: disabled [ 42.457317] Rebooting in 86400 seconds..