================================================================== BUG: KASAN: use-after-free in memcpy include/linux/string.h:373 [inline] BUG: KASAN: use-after-free in memcpy_dir crypto/scatterwalk.c:28 [inline] BUG: KASAN: use-after-free in scatterwalk_copychunks+0x271/0x6c0 crypto/scatterwalk.c:43 Read of size 4096 at addr ffff888084055000 by task syz-executor.2/1167 CPU: 0 PID: 1167 Comm: syz-executor.2 Not tainted 4.19.152-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x22c/0x33e lib/dump_stack.c:118 print_address_description.cold+0x56/0x25c mm/kasan/report.c:256 kasan_report_error.cold+0x66/0xb9 mm/kasan/report.c:354 kasan_report+0x8f/0x96 mm/kasan/report.c:412 memcpy+0x20/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:373 [inline] memcpy_dir crypto/scatterwalk.c:28 [inline] scatterwalk_copychunks+0x271/0x6c0 crypto/scatterwalk.c:43 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x125/0x1b0 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.0+0x760/0xdd0 arch/x86/crypto/aesni-intel_glue.c:956 The buggy address belongs to the page: page:ffffea0002101540 count:0 mapcount:-128 mapping:0000000000000000 index:0x1 flags: 0xfff00000000000() raw: 00fff00000000000 ffffea0001713248 ffffea0001e9fb88 0000000000000000 raw: 0000000000000001 0000000000000000 00000000ffffff7f 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff888084054f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff888084054f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff888084055000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ^ ffff888084055080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ffff888084055100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ==================================================================