INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-kasan-gce-9,10.128.15.221' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 50.914592] ================================================================== [ 50.915693] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0 [ 50.916038] BUG: unable to handle kernel NULL pointer dereference at (null) [ 50.916044] IP: (null) [ 50.916046] PGD 1cc557067 P4D 1cc557067 PUD 1d76a3067 PMD 0 [ 50.916054] Oops: 0010 [#1] SMP KASAN [ 50.916059] Dumping ftrace buffer: [ 50.916061] (ftrace buffer empty) [ 50.916063] Modules linked in: [ 50.916069] CPU: 0 PID: 3157 Comm: syzkaller898400 Not tainted 4.15.0-rc2+ #207 [ 50.916071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.916074] task: 000000003ed9b163 task.stack: 00000000fbefd28b [ 50.916076] RIP: 0010: (null) [ 50.916078] RSP: 0018:ffff8801cbd4f818 EFLAGS: 00010286 [ 50.916081] RAX: ffff8801cb0f1a80 RBX: 1ffff100397a9f04 RCX: ffffffff823a8ded [ 50.916083] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8801cbd4f820 [ 50.916086] RBP: ffff8801cbd4f9c0 R08: 0000000000000000 R09: ffff8801cac88010 [ 50.916088] R10: 0000000000000008 R11: ffffed0039591009 R12: ffff8801caf42898 [ 50.916090] R13: ffff8801cb0f1aa8 R14: ffff8801cbd4f820 R15: dffffc0000000000 [ 50.916093] FS: 0000000001440880(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 50.916096] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 50.916098] CR2: 0000000000000000 CR3: 00000001cc6c8000 CR4: 00000000001406f0 [ 50.916102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 50.916104] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 50.916106] Call Trace: [ 50.916116] ? aead_recvmsg+0xac7/0x1bc0 [ 50.916123] ? aead_recvmsg+0x967/0x1bc0 [ 50.916140] ? aead_release+0x50/0x50 [ 50.916148] ? selinux_socket_recvmsg+0x36/0x40 [ 50.916153] ? security_socket_recvmsg+0x91/0xc0 [ 50.916158] ? aead_release+0x50/0x50 [ 50.916164] sock_recvmsg+0xc9/0x110 [ 50.916170] sock_read_iter+0x361/0x560 [ 50.916175] ? sock_recvmsg+0x110/0x110 [ 50.916179] ? selinux_file_permission+0x82/0x460 [ 50.916190] ? rw_verify_area+0xe5/0x2b0 [ 50.916198] aio_read+0x2b0/0x3a0 [ 50.916203] ? aio_write+0x5a0/0x5a0 [ 50.916211] ? lock_downgrade+0x980/0x980 [ 50.916219] ? lock_release+0xda0/0xda0 [ 50.916230] ? __might_sleep+0x95/0x190 [ 50.916237] do_io_submit+0xf99/0x14f0 [ 50.916240] ? do_io_submit+0xf99/0x14f0 [ 50.916250] ? aio_read+0x3a0/0x3a0 [ 50.916256] ? mm_fault_error+0x2c0/0x2c0 [ 50.916259] ? lock_downgrade+0x980/0x980 [ 50.916264] ? SyS_io_setup+0x10e/0x390 [ 50.916270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 50.916276] ? do_page_fault+0xee/0x720 [ 50.916281] ? __do_page_fault+0xc90/0xc90 [ 50.916294] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 50.916300] SyS_io_submit+0x27/0x30 [ 50.916304] ? SyS_io_submit+0x27/0x30 [ 50.916311] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 50.916313] RIP: 0033:0x440c69 [ 50.916315] RSP: 002b:00007ffe1ae17f08 EFLAGS: 00000213 ORIG_RAX: 00000000000000d1 [ 50.916319] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440c69 [ 50.916321] RDX: 0000000020bd9fe0 RSI: 0000000000000002 RDI: 00007f18fa7c2000 [ 50.916323] RBP: 000000000000c6ca R08: 0000000000000000 R09: 0000000000000004 [ 50.916325] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 50.916327] R13: 00000000004020f0 R14: 0000000000000000 R15: 0000000000000000 [ 50.916336] Code: Bad RIP value. [ 50.916343] RIP: (null) RSP: ffff8801cbd4f818 [ 50.916344] CR2: 0000000000000000 [ 50.916358] ---[ end trace e5d78baad04b96d9 ]--- [ 50.916360] Kernel panic - not syncing: Fatal exception [ 51.121963] Read of size 4 at addr ffff8801cb0f1a9c by task syzkaller898400/3159 [ 51.129456] [ 51.131050] CPU: 1 PID: 3159 Comm: syzkaller898400 Tainted: G D 4.15.0-rc2+ #207 [ 51.139758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.149074] Call Trace: [ 51.151632] dump_stack+0x194/0x257 [ 51.155224] ? arch_local_irq_restore+0x53/0x53 [ 51.159858] ? show_regs_print_info+0x65/0x65 [ 51.164318] ? af_alg_make_sg+0x510/0x510 [ 51.168429] ? aead_recvmsg+0x1758/0x1bc0 [ 51.172539] print_address_description+0x73/0x250 [ 51.177346] ? aead_recvmsg+0x1758/0x1bc0 [ 51.181457] kasan_report+0x25b/0x340 [ 51.185225] __asan_report_load4_noabort+0x14/0x20 [ 51.190118] aead_recvmsg+0x1758/0x1bc0 [ 51.194066] ? aead_release+0x50/0x50 [ 51.197832] ? selinux_socket_recvmsg+0x36/0x40 [ 51.202464] ? security_socket_recvmsg+0x91/0xc0 [ 51.207185] ? aead_release+0x50/0x50 [ 51.210952] sock_recvmsg+0xc9/0x110 [ 51.214633] sock_read_iter+0x361/0x560 [ 51.218573] ? sock_recvmsg+0x110/0x110 [ 51.222509] ? selinux_file_permission+0x82/0x460 [ 51.227318] ? rw_verify_area+0xe5/0x2b0 [ 51.231344] aio_read+0x2b0/0x3a0 [ 51.234763] ? aio_write+0x5a0/0x5a0 [ 51.238444] ? lock_downgrade+0x980/0x980 [ 51.242560] ? lock_release+0xda0/0xda0 [ 51.246501] ? __might_sleep+0x95/0x190 [ 51.250441] do_io_submit+0xf99/0x14f0 [ 51.254298] ? do_io_submit+0xf99/0x14f0 [ 51.258327] ? aio_read+0x3a0/0x3a0 [ 51.261920] ? mm_fault_error+0x2c0/0x2c0 [ 51.266030] ? lock_downgrade+0x980/0x980 [ 51.270140] ? SyS_io_setup+0x10e/0x390 [ 51.274082] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 51.278804] ? do_page_fault+0xee/0x720 [ 51.282742] ? __do_page_fault+0xc90/0xc90 [ 51.286947] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 51.291928] SyS_io_submit+0x27/0x30 [ 51.295604] ? SyS_io_submit+0x27/0x30 [ 51.299457] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 51.304177] RIP: 0033:0x440c69 [ 51.307330] RSP: 002b:00007ffe1ae17f08 EFLAGS: 00000213 ORIG_RAX: 00000000000000d1 [ 51.314999] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440c69 [ 51.322233] RDX: 0000000020bd9fe0 RSI: 0000000000000002 RDI: 00007f18fa7c2000 [ 51.329468] RBP: 000000000000c6c8 R08: 0000000000000000 R09: 0000000000000005 [ 51.336713] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 51.343948] R13: 00000000004020f0 R14: 0000000000000000 R15: 0000000000000000 [ 51.351191] [ 51.352786] Allocated by task 3151: [ 51.356377] save_stack+0x43/0xd0 [ 51.359791] kasan_kmalloc+0xad/0xe0 [ 51.363470] __kmalloc+0x162/0x760 [ 51.366972] crypto_create_tfm+0x82/0x2e0 [ 51.371085] crypto_alloc_tfm+0x10e/0x2f0 [ 51.375196] crypto_alloc_skcipher+0x2c/0x40 [ 51.379568] crypto_get_default_null_skcipher+0x5f/0x80 [ 51.384893] aead_init_geniv+0x164/0x310 [ 51.388919] crypto_aead_init_tfm+0x11e/0x180 [ 51.393376] crypto_create_tfm+0xdf/0x2e0 [ 51.397485] crypto_alloc_tfm+0x10e/0x2f0 [ 51.401593] crypto_alloc_aead+0x2c/0x40 [ 51.405617] aead_bind+0x70/0x140 [ 51.409033] alg_bind+0x1ab/0x440 [ 51.412450] SYSC_bind+0x1b4/0x3f0 [ 51.415951] SyS_bind+0x24/0x30 [ 51.419192] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 51.423906] [ 51.425498] Freed by task 3154: [ 51.428739] save_stack+0x43/0xd0 [ 51.432242] kasan_slab_free+0x71/0xc0 [ 51.436090] kfree+0xca/0x250 [ 51.439158] kzfree+0x28/0x30 [ 51.442230] crypto_destroy_tfm+0x140/0x2e0 [ 51.446514] crypto_put_default_null_skcipher+0x35/0x60 [ 51.451839] aead_sock_destruct+0x13c/0x220 [ 51.456125] __sk_destruct+0xfd/0x910 [ 51.459894] sk_destruct+0x47/0x80 [ 51.463396] __sk_free+0x57/0x230 [ 51.466810] sk_free+0x2a/0x40 [ 51.469975] af_alg_release+0x5d/0x70 [ 51.473738] sock_release+0x8d/0x1e0 [ 51.477415] sock_close+0x16/0x20 [ 51.480831] __fput+0x333/0x7f0 [ 51.484073] ____fput+0x15/0x20 [ 51.487315] task_work_run+0x199/0x270 [ 51.491261] do_exit+0x9bb/0x1ae0 [ 51.494679] do_group_exit+0x149/0x400 [ 51.498528] SyS_exit_group+0x1d/0x20 [ 51.502291] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 51.507014] [ 51.508607] The buggy address belongs to the object at ffff8801cb0f1a80 [ 51.508607] which belongs to the cache kmalloc-128 of size 128 [ 51.521225] The buggy address is located 28 bytes inside of [ 51.521225] 128-byte region [ffff8801cb0f1a80, ffff8801cb0f1b00) [ 51.532972] The buggy address belongs to the page: [ 51.537866] page:00000000713bb913 count:1 mapcount:0 mapping:000000004240bfd9 index:0x0 [ 51.545970] flags: 0x2fffc0000000100(slab) [ 51.550169] raw: 02fffc0000000100 ffff8801cb0f1000 0000000000000000 0000000100000015 [ 51.558012] raw: ffffea00072f2220 ffffea00072c7660 ffff8801db000640 0000000000000000 [ 51.565851] page dumped because: kasan: bad access detected [ 51.571523] [ 51.573116] Memory state around the buggy address: [ 51.578007] ffff8801cb0f1980: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 51.585326] ffff8801cb0f1a00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.592648] >ffff8801cb0f1a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.599966] ^ [ 51.604075] ffff8801cb0f1b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 51.611394] ffff8801cb0f1b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 51.618712] ================================================================== [ 51.626059] Dumping ftrace buffer: [ 51.629599] (ftrace buffer empty) [ 51.633279] Kernel Offset: disabled [ 51.636876] Rebooting in 86400 seconds..