kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 10633 Comm: syz-executor.0 Not tainted 4.14.305-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 task: ffff888059d88640 task.stack: ffff88805a198000 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:86 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:111 [inline] RIP: 0010:scatterwalk_copychunks+0x4a3/0x680 crypto/scatterwalk.c:55 RSP: 0018:ffff88805a19f520 EFLAGS: 00010202 RAX: dffffc0000000000 RBX: 0000000000001000 RCX: ffffc90006070000 RDX: 0000000000000002 RSI: ffffffff83179874 RDI: ffff8880a25ad468 RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed100b55a351 R10: ffff88805aad1a8c R11: 0000000000000000 R12: 0000000000001000 R13: ffff88805a19f5d8 R14: 0000000000003000 R15: ffff8880a25ad474 FS: 00007f3fc3877700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f228000 CR3: 00000000aa05b000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x100/0x1a0 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.0+0x5b5/0xc00 arch/x86/crypto/aesni-intel_glue.c:778 Code: fc ff df 80 3c 02 00 0f 85 d9 01 00 00 48 8d 45 10 49 89 6d 00 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 81 01 00 00 48 b8 00 00 00 RIP: scatterwalk_start include/crypto/scatterwalk.h:86 [inline] RSP: ffff88805a19f520 RIP: scatterwalk_pagedone include/crypto/scatterwalk.h:111 [inline] RSP: ffff88805a19f520 RIP: scatterwalk_copychunks+0x4a3/0x680 crypto/scatterwalk.c:55 RSP: ffff88805a19f520 ---[ end trace 3841ff028e56b0c0 ]--- ---------------- Code disassembly (best guess), 2 bytes skipped: 0: df 80 3c 02 00 0f filds 0xf00023c(%rax) 6: 85 d9 test %ebx,%ecx 8: 01 00 add %eax,(%rax) a: 00 48 8d add %cl,-0x73(%rax) d: 45 10 49 89 adc %r9b,-0x77(%r9) 11: 6d insl (%dx),%es:(%rdi) 12: 00 48 89 add %cl,-0x77(%rax) 15: c2 48 89 retq $0x8948 18: 44 24 18 rex.R and $0x18,%al 1b: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 22: fc ff df 25: 48 c1 ea 03 shr $0x3,%rdx * 29: 0f b6 04 02 movzbl (%rdx,%rax,1),%eax <-- trapping instruction 2d: 84 c0 test %al,%al 2f: 74 08 je 0x39 31: 3c 03 cmp $0x3,%al 33: 0f 8e 81 01 00 00 jle 0x1ba 39: 48 rex.W 3a: b8 .byte 0xb8 3b: 00 00 add %al,(%rax)