================================================================== BUG: KASAN: stack-out-of-bounds in __le32_to_cpup include/uapi/linux/byteorder/little_endian.h:58 [inline] BUG: KASAN: stack-out-of-bounds in le32_to_cpuvp crypto/chacha20_generic.c:19 [inline] BUG: KASAN: stack-out-of-bounds in crypto_chacha20_init crypto/chacha20_generic.c:60 [inline] BUG: KASAN: stack-out-of-bounds in crypto_chacha20_crypt+0xac6/0xbd0 crypto/chacha20_generic.c:91 netlink: 'syz-executor2': attribute type 27 has an invalid length. netlink: 'syz-executor2': attribute type 27 has an invalid length. Read of size 4 at addr ffff8801be0cf228 by task kworker/1:3/16267 CPU: 1 PID: 16267 Comm: kworker/1:3 Not tainted 4.15.0-rc3+ #156 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: crypto cryptd_queue_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 print_address_description+0x73/0x250 mm/kasan/report.c:252 kasan_report_error mm/kasan/report.c:351 [inline] kasan_report+0x25b/0x340 mm/kasan/report.c:409 __asan_report_load4_noabort+0x14/0x20 mm/kasan/report.c:429 __le32_to_cpup include/uapi/linux/byteorder/little_endian.h:58 [inline] le32_to_cpuvp crypto/chacha20_generic.c:19 [inline] crypto_chacha20_init crypto/chacha20_generic.c:60 [inline] crypto_chacha20_crypt+0xac6/0xbd0 crypto/chacha20_generic.c:91 chacha20_simd+0xe4/0x410 arch/x86/crypto/chacha20_glue.c:78 crypto_skcipher_decrypt include/crypto/skcipher.h:463 [inline] cryptd_skcipher_decrypt+0x2de/0x5a0 crypto/cryptd.c:523 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51407 sclass=netlink_route_socket pig=1903 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51407 sclass=netlink_route_socket pig=1904 comm=syz-executor5 cryptd_queue_worker+0xff/0x1b0 crypto/cryptd.c:190 process_one_work+0xbf3/0x1bc0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x33c/0x400 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:441 The buggy address belongs to the page: page:000000003b4adea2 count:0 mapcount:0 mapping: (null) index:0x0 flags: 0x2fffc0000000000() raw: 02fffc0000000000 0000000000000000 0000000000000000 00000000ffffffff raw: 0000000000000000 0000000100000001 0000000000000000 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8801be0cf100: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 f2 f2 ffff8801be0cf180: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8801be0cf200: 00 00 00 00 00 f2 f3 f3 f3 f3 00 00 00 00 00 00 ^ ffff8801be0cf280: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 ffff8801be0cf300: 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 00 00 ==================================================================