BUG: unable to handle kernel paging request at 000000000aadea62 IP: lock_release+0x195/0xda0 kernel/locking/lockdep.c:4021 PGD 5e28067 P4D 5e28067 PUD 5e2a067 PMD 0 Oops: 0002 [#1] SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 18101 Comm: syz-executor3 Not tainted 4.15.0-rc2-next-20171204+ #58 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: 00000000394baca2 task.stack: 0000000053a5a1f6 RIP: 0010:lock_release+0x195/0xda0 kernel/locking/lockdep.c:4021 RSP: 0018:ffff8801c8eae7e0 EFLAGS: 00010046 RAX: 0000000000000007 RBX: 1ffff100391d5d01 RCX: ffffffff8170ee2d RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8801d66bea44 RBP: ffff8801c8eae950 R08: 0000000000000000 R09: 000000000000000a R10: 0000000000000000 R11: ffffffff8748dd60 R12: ffff8801d66be1c0 R13: ffff8801c8eae928 R14: ffffffff85f44c40 R15: ffff8801d66be1c0 FS: 00007f65496c3700(0000) GS:ffff8801db500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: fffffffffffffff8 CR3: 00000001cebe1000 CR4: 00000000001426e0 Call Trace: rcu_lock_release include/linux/rcupdate.h:249 [inline] rcu_read_unlock include/linux/rcupdate.h:686 [inline] __is_insn_slot_addr+0x225/0x330 kernel/kprobes.c:301 is_kprobe_optinsn_slot include/linux/kprobes.h:344 [inline] kernel_text_address+0x11b/0x140 kernel/extable.c:150 __kernel_text_address+0xd/0x40 kernel/extable.c:107 unwind_get_return_address+0x61/0xa0 arch/x86/kernel/unwind_frame.c:18 __save_stack_trace+0x7e/0xd0 arch/x86/kernel/stacktrace.c:45 save_stack_trace+0x1a/0x20 arch/x86/kernel/stacktrace.c:60 save_stack+0x43/0xd0 mm/kasan/kasan.c:447 set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0x71/0xc0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3492 [inline] kfree+0xca/0x250 mm/slab.c:3807 __sock_kfree_s net/core/sock.c:2000 [inline] sock_kfree_s+0x29/0x60 net/core/sock.c:2006 af_alg_pull_tsgl+0x7d2/0xc20 crypto/af_alg.c:642 skcipher_sock_destruct+0xe6/0x1f0 crypto/algif_skcipher.c:356 __sk_destruct+0xfd/0x910 net/core/sock.c:1558 sk_destruct+0x47/0x80 net/core/sock.c:1593 __sk_free+0x57/0x230 net/core/sock.c:1601 sk_free+0x2a/0x40 net/core/sock.c:1612 sock_put include/net/sock.h:1657 [inline] af_alg_release+0x5d/0x70 crypto/af_alg.c:126 sock_release+0x8d/0x1e0 net/socket.c:600 sock_close+0x16/0x20 net/socket.c:1129 __fput+0x333/0x7f0 fs/file_table.c:210 ____fput+0x15/0x20 fs/file_table.c:244 task_work_run+0x199/0x270 kernel/task_work.c:113 exit_task_work include/linux/task_work.h:22 [inline] do_exit+0x9bb/0x1ae0 kernel/exit.c:869 do_group_exit+0x149/0x400 kernel/exit.c:972 get_signal+0x73f/0x16c0 kernel/signal.c:2335 do_signal+0x94/0x1ee0 arch/x86/kernel/signal.c:809 exit_to_usermode_loop+0x214/0x310 arch/x86/entry/common.c:158 prepare_exit_to_usermode arch/x86/entry/common.c:195 [inline] syscall_return_slowpath+0x490/0x550 arch/x86/entry/common.c:264 entry_SYSCALL_64_fastpath+0x94/0x96 RIP: 0033:0x4529d9 RSP: 002b:00007f65496c2ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00000000007581b8 RCX: 00000000004529d9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000007581b8 RBP: 00000000007581b8 R08: 000000000000060a R09: 0000000000758190 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f65496c39c0 R15: 000000000000000c Code: 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 c4 08 00 00 41 c7 87 84 08 00 00 01 00 00 00 3f 05 00 00 65 8b 05 4f d5 aa 7e 89 c0 48 0f a3 05 95 6b 08 RIP: lock_release+0x195/0xda0 kernel/locking/lockdep.c:4021 RSP: ffff8801c8eae7e0 CR2: fffffffffffffff8 ---[ end trace 4bbd241184d7c70b ]---