INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-mmots-kasan-gce-4,10.128.15.201' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 28.969530] ================================================================== [ 28.969655] BUG: unable to handle kernel NULL pointer dereference at (null) [ 28.969662] IP: (null) [ 28.969666] PGD 1cb92d067 P4D 1cb92d067 PUD 1cbf4f067 PMD 0 [ 28.969675] Oops: 0010 [#1] SMP KASAN [ 28.969681] Dumping ftrace buffer: [ 28.969684] (ftrace buffer empty) [ 28.969686] Modules linked in: [ 28.969693] CPU: 0 PID: 3152 Comm: syzkaller342511 Not tainted 4.15.0-rc1-mm1+ #29 [ 28.969696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.969698] task: 000000002a3073e3 task.stack: 000000009e1cbbb3 [ 28.969700] RIP: 0010: (null) [ 28.969702] RSP: 0018:ffff8801cb827818 EFLAGS: 00010286 [ 28.969706] RAX: ffff8801cba77b40 RBX: 1ffff10039704f04 RCX: ffffffff823afbad [ 28.969713] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8801cb827820 [ 28.969715] RBP: ffff8801cb8279c0 R08: 0000000000000000 R09: ffff8801cb09a910 [ 28.969717] R10: 0000000000000008 R11: ffffed0039613529 R12: ffff8801cae86b18 [ 28.969720] R13: ffff8801cba77b68 R14: ffff8801cb827820 R15: dffffc0000000000 [ 28.969724] FS: 000000000199f880(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 28.969726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 28.969729] CR2: 0000000000000000 CR3: 00000001d58d3000 CR4: 00000000001406f0 [ 28.969734] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 28.969736] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 28.969737] Call Trace: [ 28.969748] ? aead_recvmsg+0xac7/0x1bc0 [ 28.969756] ? aead_recvmsg+0x967/0x1bc0 [ 28.969769] ? aead_release+0x50/0x50 [ 28.969776] ? selinux_socket_recvmsg+0x36/0x40 [ 28.969783] ? security_socket_recvmsg+0x91/0xc0 [ 28.969788] ? aead_release+0x50/0x50 [ 28.969795] sock_recvmsg+0xc9/0x110 [ 28.969801] sock_read_iter+0x361/0x560 [ 28.969807] ? sock_recvmsg+0x110/0x110 [ 28.969812] ? selinux_file_permission+0x82/0x460 [ 28.969823] ? rw_verify_area+0xe5/0x2b0 [ 28.969832] aio_read+0x2b0/0x3a0 [ 28.969837] ? aio_write+0x5a0/0x5a0 [ 28.969847] ? lock_downgrade+0x980/0x980 [ 28.969856] ? lock_release+0xda0/0xda0 [ 28.969868] ? __might_sleep+0x95/0x190 [ 28.969875] do_io_submit+0xf99/0x14f0 [ 28.969879] ? do_io_submit+0xf99/0x14f0 [ 28.969888] ? aio_read+0x3a0/0x3a0 [ 28.969893] ? lock_downgrade+0x980/0x980 [ 28.969897] ? SyS_io_setup+0x10e/0x390 [ 28.969904] ? lock_release+0xda0/0xda0 [ 28.969919] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 28.969925] SyS_io_submit+0x27/0x30 [ 28.969929] ? SyS_io_submit+0x27/0x30 [ 28.969938] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 28.969941] RIP: 0033:0x440d49 [ 28.969943] RSP: 002b:00007ffdb8d2f008 EFLAGS: 00000213 ORIG_RAX: 00000000000000d1 [ 28.969947] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440d49 [ 28.969949] RDX: 0000000020bd9fe0 RSI: 0000000000000002 RDI: 00007f89f388e000 [ 28.969951] RBP: 0000000000007104 R08: 0000000000000000 R09: 0000000000000001 [ 28.969954] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 28.969956] R13: 00000000004021d0 R14: 0000000000000000 R15: 0000000000000000 [ 28.969965] Code: Bad RIP value. [ 28.969973] RIP: (null) RSP: ffff8801cb827818 [ 28.969974] CR2: 0000000000000000 [ 28.969982] ---[ end trace e0c3dc2668b27d07 ]--- [ 28.969984] Kernel panic - not syncing: Fatal exception [ 29.159134] BUG: KASAN: use-after-free in aead_recvmsg+0x1758/0x1bc0 [ 29.165591] Read of size 4 at addr ffff8801cba77b5c by task syzkaller342511/3151 [ 29.173085] [ 29.174683] CPU: 1 PID: 3151 Comm: syzkaller342511 Tainted: G D 4.15.0-rc1-mm1+ #29 [ 29.183655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.192971] Call Trace: [ 29.195529] dump_stack+0x194/0x257 [ 29.199123] ? arch_local_irq_restore+0x53/0x53 [ 29.203761] ? show_regs_print_info+0x65/0x65 [ 29.208223] ? af_alg_make_sg+0x510/0x510 [ 29.212335] ? aead_recvmsg+0x1758/0x1bc0 [ 29.216450] print_address_description+0x73/0x250 [ 29.221257] ? aead_recvmsg+0x1758/0x1bc0 [ 29.225370] kasan_report+0x25b/0x340 [ 29.229137] __asan_report_load4_noabort+0x14/0x20 [ 29.234031] aead_recvmsg+0x1758/0x1bc0 [ 29.237996] ? aead_release+0x50/0x50 [ 29.241762] ? selinux_socket_recvmsg+0x36/0x40 [ 29.246395] ? security_socket_recvmsg+0x91/0xc0 [ 29.251116] ? aead_release+0x50/0x50 [ 29.254883] sock_recvmsg+0xc9/0x110 [ 29.258562] sock_read_iter+0x361/0x560 [ 29.262502] ? sock_recvmsg+0x110/0x110 [ 29.266440] ? selinux_file_permission+0x82/0x460 [ 29.271250] ? rw_verify_area+0xe5/0x2b0 [ 29.275278] aio_read+0x2b0/0x3a0 [ 29.278698] ? aio_write+0x5a0/0x5a0 [ 29.282379] ? lock_downgrade+0x980/0x980 [ 29.286496] ? lock_release+0xda0/0xda0 [ 29.290440] ? __might_sleep+0x95/0x190 [ 29.294387] do_io_submit+0xf99/0x14f0 [ 29.298240] ? do_io_submit+0xf99/0x14f0 [ 29.302279] ? aio_read+0x3a0/0x3a0 [ 29.305877] ? lock_downgrade+0x980/0x980 [ 29.310011] ? SyS_io_setup+0x10e/0x390 [ 29.313964] ? lock_release+0xda0/0xda0 [ 29.317941] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.322939] SyS_io_submit+0x27/0x30 [ 29.326637] ? SyS_io_submit+0x27/0x30 [ 29.330495] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 29.335223] RIP: 0033:0x440d49 [ 29.338381] RSP: 002b:00007ffdb8d2f008 EFLAGS: 00000213 ORIG_RAX: 00000000000000d1 [ 29.346053] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000440d49 [ 29.353288] RDX: 0000000020bd9fe0 RSI: 0000000000000002 RDI: 00007f89f388e000 [ 29.360521] RBP: 0000000000007105 R08: 0000000000000000 R09: 0000000000000005 [ 29.367757] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000000000000 [ 29.374990] R13: 00000000004021d0 R14: 0000000000000000 R15: 0000000000000000 [ 29.382234] [ 29.383827] Allocated by task 3143: [ 29.387422] save_stack+0x43/0xd0 [ 29.390847] kasan_kmalloc+0xad/0xe0 [ 29.394527] __kmalloc+0x162/0x760 [ 29.398035] crypto_create_tfm+0x82/0x2e0 [ 29.402147] crypto_alloc_tfm+0x10e/0x2f0 [ 29.406258] crypto_alloc_skcipher+0x2c/0x40 [ 29.410632] crypto_get_default_null_skcipher+0x5f/0x80 [ 29.415957] aead_init_geniv+0x164/0x310 [ 29.419981] crypto_aead_init_tfm+0x11e/0x180 [ 29.424440] crypto_create_tfm+0xdf/0x2e0 [ 29.428551] crypto_alloc_tfm+0x10e/0x2f0 [ 29.432662] crypto_alloc_aead+0x2c/0x40 [ 29.436688] aead_bind+0x70/0x140 [ 29.440106] alg_bind+0x1ab/0x440 [ 29.443526] SYSC_bind+0x1b4/0x3f0 [ 29.447030] SyS_bind+0x24/0x30 [ 29.450277] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 29.455005] [ 29.456597] Freed by task 3146: [ 29.459840] save_stack+0x43/0xd0 [ 29.463257] kasan_slab_free+0x71/0xc0 [ 29.467106] kfree+0xca/0x250 [ 29.470177] kzfree+0x28/0x30 [ 29.473245] crypto_destroy_tfm+0x140/0x2e0 [ 29.477532] crypto_put_default_null_skcipher+0x35/0x60 [ 29.482860] aead_sock_destruct+0x13c/0x220 [ 29.487143] __sk_destruct+0xfd/0x910 [ 29.490906] sk_destruct+0x47/0x80 [ 29.494409] __sk_free+0x57/0x230 [ 29.497825] sk_free+0x2a/0x40 [ 29.500982] af_alg_release+0x5d/0x70 [ 29.504748] sock_release+0x8d/0x1e0 [ 29.508422] sock_close+0x16/0x20 [ 29.511841] __fput+0x333/0x7f0 [ 29.515083] ____fput+0x15/0x20 [ 29.518327] task_work_run+0x199/0x270 [ 29.522181] do_exit+0x9bb/0x1ae0 [ 29.525596] do_group_exit+0x149/0x400 [ 29.529444] SyS_exit_group+0x1d/0x20 [ 29.533207] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 29.537922] [ 29.539515] The buggy address belongs to the object at ffff8801cba77b40 [ 29.539515] which belongs to the cache kmalloc-128 of size 128 [ 29.552133] The buggy address is located 28 bytes inside of [ 29.552133] 128-byte region [ffff8801cba77b40, ffff8801cba77bc0) [ 29.563881] The buggy address belongs to the page: [ 29.568862] page:000000000c8e666d count:1 mapcount:0 mapping:00000000627ba257 index:0x0 [ 29.576977] flags: 0x2fffc0000000100(slab) [ 29.581179] raw: 02fffc0000000100 ffff8801cba77000 0000000000000000 0000000100000015 [ 29.589034] raw: ffffea000732e120 ffffea00072cac60 ffff8801db000640 0000000000000000 [ 29.596876] page dumped because: kasan: bad access detected [ 29.602546] [ 29.604137] Memory state around the buggy address: [ 29.609030] ffff8801cba77a00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.616351] ffff8801cba77a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.623673] >ffff8801cba77b00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 29.630996] ^ [ 29.637190] ffff8801cba77b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.644516] ffff8801cba77c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.651835] ================================================================== [ 29.659192] Dumping ftrace buffer: [ 29.662781] (ftrace buffer empty) [ 29.666471] Kernel Offset: disabled [ 29.670071] Rebooting in 86400 seconds..