bisecting fixing commit since 4762bcd451a9e92e79d5146d3d4a5ffe2b4e0ec5 building syzkaller on 048f2d494ee4a016e2386c28bf8cccdd87896cbd testing commit 4762bcd451a9e92e79d5146d3d4a5ffe2b4e0ec5 with gcc (GCC) 8.1.0 kernel signature: f70d7c34011f52c95ed09dd324f1b6b1a214288cf1354dbd35c66be5329c4784 all runs: crashed: kernel BUG at include/linux/scatterlist.h:LINE! testing current HEAD c10b57a567e4333b9fdf60b5ec36de9859263ca2 testing commit c10b57a567e4333b9fdf60b5ec36de9859263ca2 with gcc (GCC) 8.1.0 kernel signature: 2aa5c0c978d432c6eab8cecb8fea3646ffe2f66aaa211746f6bf31e0a80c9aac all runs: crashed: kernel BUG at include/linux/scatterlist.h:LINE! revisions tested: 2, total time: 23m43.014971141s (build: 16m40.392557104s, test: 6m15.314505634s) the crash still happens on HEAD commit msg: Linux 4.14.176 crash: kernel BUG at include/linux/scatterlist.h:LINE! IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 8021q: adding VLAN 0 to HW filter on device batadv0 ------------[ cut here ]------------ kernel BUG at include/linux/scatterlist.h:124! invalid opcode: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 7341 Comm: syz-executor.0 Not tainted 4.14.176-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88808b9de380 task.stack: ffff88808b698000 RIP: 0010:sg_page include/linux/scatterlist.h:124 [inline] RIP: 0010:gcmaes_decrypt.constprop.13+0x8e9/0xe20 arch/x86/crypto/aesni-intel_glue.c:828 RSP: 0018:ffff88808b69f928 EFLAGS: 00010202 RAX: ffffea00022e04c2 RBX: ffff8880a86dd608 RCX: ffff8880a86dd250 RDX: 0000000087654321 RSI: 00000000c890fa8a RDI: 1ffff110150dba4a RBP: ffff88808b69fa20 R08: 0000000000000007 R09: 0000000000000000 R10: ffffed10116d3f4b R11: ffff88808b69fa5b R12: 0000000000000010 R13: ffff88808b826900 R14: ffff88808b826908 R15: ffff8880a86dd5c8 FS: 00007f4f6c704700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055c55cb9a960 CR3: 000000008cd19000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: generic_gcmaes_decrypt+0xf8/0x140 arch/x86/crypto/aesni-intel_glue.c:1126 crypto_aead_decrypt include/crypto/aead.h:362 [inline] gcmaes_wrapper_decrypt+0x141/0x1c0 arch/x86/crypto/aesni-intel_glue.c:961 crypto_aead_decrypt include/crypto/aead.h:362 [inline] _aead_recvmsg crypto/algif_aead.c:316 [inline] aead_recvmsg+0x1171/0x2660 crypto/algif_aead.c:335 aead_recvmsg_nokey+0x50/0x60 crypto/algif_aead.c:453 sock_recvmsg_nosec net/socket.c:819 [inline] sock_recvmsg+0xb7/0xf0 net/socket.c:826 SYSC_recvfrom+0x302/0x3d0 net/socket.c:1815 SyS_recvfrom+0x9/0x10 net/socket.c:1787 do_syscall_64+0x1c7/0x5b0 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x42/0xb7 RIP: 0033:0x45a219 RSP: 002b:00007f4f6c703c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045a219 RDX: 0000000100000205 RSI: 0000000020003240 RDI: 0000000000000004 RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000415 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f6c7046d4 R13: 00000000004c7c34 R14: 00000000004ddd38 R15: 00000000ffffffff Code: 87 04 00 00 41 f6 44 24 08 01 0f 84 c6 fd ff ff 0f 0b e8 a4 ef d1 ff e9 1b fe ff ff 0f 0b 0f 0b 0f 0b 0f 0b e8 92 ef d1 ff eb 93 <0f> 0b b8 f4 ff ff ff e9 54 fa ff ff 0f 0b 48 b8 00 00 00 00 00 RIP: sg_page include/linux/scatterlist.h:124 [inline] RSP: ffff88808b69f928 RIP: gcmaes_decrypt.constprop.13+0x8e9/0xe20 arch/x86/crypto/aesni-intel_glue.c:828 RSP: ffff88808b69f928 ---[ end trace a4182d0df6934270 ]---