bisecting fixing commit since 9f31eb60d7a23536bf3902d4dc602f10c822b79e building syzkaller on 34bf9440bd06034f86b5d9ac8afbf078129cbdae testing commit 9f31eb60d7a23536bf3902d4dc602f10c822b79e with gcc (GCC) 8.4.1 20210217 kernel signature: becfdf4c183438fac9c4d033a207c79363d00b49d55832cf5e3a59a498accaaa run #0: crashed: general protection fault in scatterwalk_copychunks run #1: crashed: general protection fault in scatterwalk_copychunks run #2: crashed: general protection fault in scatterwalk_copychunks run #3: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #4: crashed: general protection fault in scatterwalk_copychunks run #5: crashed: general protection fault in scatterwalk_copychunks run #6: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #7: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #8: crashed: general protection fault in scatterwalk_copychunks run #9: crashed: general protection fault in scatterwalk_copychunks run #10: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #11: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #12: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #13: crashed: general protection fault in scatterwalk_copychunks run #14: crashed: general protection fault in scatterwalk_copychunks run #15: crashed: general protection fault in scatterwalk_copychunks run #16: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #17: crashed: general protection fault in scatterwalk_copychunks run #18: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #19: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks testing current HEAD 6b7b0056defc6eb5c87bbe4690ccda547b2891aa testing commit 6b7b0056defc6eb5c87bbe4690ccda547b2891aa with gcc (GCC) 8.4.1 20210217 kernel signature: ce26d0915d3f8f104ed3d58764078c81d651e3aa5071648538d3c61a923f34e9 run #0: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #1: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #2: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #3: crashed: KASAN: use-after-free Read in scatterwalk_copychunks run #4: crashed: KASAN: slab-out-of-bounds Read in scatterwalk_copychunks run #5: crashed: general protection fault in scatterwalk_copychunks run #6: crashed: general protection fault in scatterwalk_copychunks run #7: crashed: general protection fault in scatterwalk_copychunks run #8: crashed: general protection fault in scatterwalk_copychunks run #9: crashed: general protection fault in scatterwalk_copychunks revisions tested: 2, total time: 27m59.211135469s (build: 20m40.134364297s, test: 6m42.34010997s) the crash still happens on HEAD commit msg: Linux 4.19.192 crash: general protection fault in scatterwalk_copychunks RSP: 002b:00007f9baf37e1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bfa8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 kasan: GPF could be caused by NULL-ptr deref or user memory access RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 general protection fault: 0000 [#1] PREEMPT SMP KASAN R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 CPU: 0 PID: 6563 Comm: syz-executor.2 Not tainted 4.19.192-syzkaller #0 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f9baf37e6bc Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready Code: ff ff 48 89 c7 e8 17 69 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 RSP: 0018:ffff8881ce9cf498 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8881d127ba0c RCX: 000000000000401e RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881d127ba00 RBP: ffff8881ce9cf4f8 R08: ffffed103c782804 R09: ffffed103c782800 R10: 0000000000000000 R11: ffff8881e3c1401d R12: 0000000000000fff R13: 000000000000001e R14: ffff8881ce9cf538 R15: dffffc0000000000 FS: 00007fb06d929700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f36bf4e4000 CR3: 00000001e7871002 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 gcmaes_encrypt.constprop.15+0x81b/0xda0 arch/x86/crypto/aesni-intel_glue.c:980 IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb06d9291a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fb06d9296bc Modules linked in: ---[ end trace 80ed186dfdb854e5 ]--- FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 8021q: adding VLAN 0 to HW filter on device batadv0 CPU: 0 PID: 6587 Comm: syz-executor.5 Tainted: G D 4.19.192-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:3088 [inline] prepare_alloc_pages mm/page_alloc.c:4346 [inline] __alloc_pages_nodemask+0x1d5/0x710 mm/page_alloc.c:4393 alloc_pages_current+0xd6/0x1b0 mm/mempolicy.c:2197 alloc_pages include/linux/gfp.h:532 [inline] skb_page_frag_refill+0x20b/0x400 net/core/sock.c:2220 sk_page_frag_refill+0x46/0x1d0 net/core/sock.c:2240 sk_alloc_sg+0x108/0x7d0 net/core/sock.c:2264 alloc_encrypted_sg+0x81/0x100 net/tls/tls_sw.c:123 tls_sw_sendpage+0x502/0xc00 net/tls/tls_sw.c:555 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f601d62b1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bfa8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f601d62b6bc CPU: 1 PID: 6584 Comm: syz-executor.0 Tainted: G D 4.19.192-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 RIP: 0010:scatterwalk_start include/crypto/scatterwalk.h:73 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:98 [inline] RIP: 0010:scatterwalk_pagedone include/crypto/scatterwalk.h:82 [inline] RIP: 0010:scatterwalk_copychunks+0x379/0x610 crypto/scatterwalk.c:55 should_failslab+0x9/0x20 mm/slab_common.c:1588 Code: ff ff 48 89 c7 e8 17 69 2a 00 4c 89 f2 48 c1 ea 03 42 80 3c 3a 00 0f 85 a8 01 00 00 48 8d 70 08 49 89 06 48 89 f2 48 c1 ea 03 <42> 0f b6 14 3a 84 d2 74 09 80 fa 03 0f 8e 6b 01 00 00 48 8b 5d d0 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] aead_request_alloc include/crypto/aead.h:427 [inline] tls_push_record+0xff/0x1600 net/tls/tls_sw.c:209 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 RSP: 0018:ffff8881ce9cf498 EFLAGS: 00010202 RAX: 0000000000000000 RBX: ffff8881d127ba0c RCX: 000000000000401e splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fbfb95a81a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fbfb95a86bc FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff8881d127ba00 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 RBP: ffff8881ce9cf4f8 R08: ffffed103c782804 R09: ffffed103c782800 CPU: 1 PID: 6598 Comm: syz-executor.1 Tainted: G D 4.19.192-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] aead_request_alloc include/crypto/aead.h:427 [inline] tls_push_record+0xff/0x1600 net/tls/tls_sw.c:209 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f04527261a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f04527266bc CPU: 1 PID: 6599 Comm: syz-executor.4 Tainted: G D 4.19.192-syzkaller #0 R10: 0000000000000000 R11: ffff8881e3c1401d R12: 0000000000000fff Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc_node mm/slab.c:3304 [inline] kmem_cache_alloc_node+0x262/0x720 mm/slab.c:3647 __alloc_skb+0xa7/0x580 net/core/skbuff.c:193 alloc_skb_fclone include/linux/skbuff.h:1037 [inline] sk_stream_alloc_skb+0x9e/0x810 net/ipv4/tcp.c:884 do_tcp_sendpages+0x774/0x1d30 net/ipv4/tcp.c:1003 tcp_sendpage_locked net/ipv4/tcp.c:1106 [inline] tcp_sendpage_locked+0x63/0xa0 net/ipv4/tcp.c:1098 tcp_sendpage+0x37/0x50 net/ipv4/tcp.c:1116 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 R13: 000000000000001e R14: ffff8881ce9cf538 R15: dffffc0000000000 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 FS: 00007fb06d929700(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000 splice_from_pipe+0xbb/0x120 fs/splice.c:662 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 CR2: 00007f36bf569008 CR3: 00000001e7871006 CR4: 00000000001606f0 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc06720f1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052c0f8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fc06720f6bc FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 ================================================================== CPU: 0 PID: 6615 Comm: syz-executor.4 Tainted: G D 4.19.192-syzkaller #0 BUG: KASAN: use-after-free in memcpy include/linux/string.h:377 [inline] BUG: KASAN: use-after-free in memcpy_dir crypto/scatterwalk.c:28 [inline] BUG: KASAN: use-after-free in scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Read of size 4094 at addr ffff8881e20e2000 by task syz-executor.1/6598 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 __should_failslab+0xba/0xf0 mm/failslab.c:32 should_failslab+0x9/0x20 mm/slab_common.c:1588 slab_pre_alloc_hook mm/slab.h:424 [inline] slab_alloc mm/slab.c:3383 [inline] __do_kmalloc mm/slab.c:3725 [inline] __kmalloc+0x2dd/0x770 mm/slab.c:3736 kmalloc include/linux/slab.h:520 [inline] aead_request_alloc include/crypto/aead.h:427 [inline] tls_push_record+0xff/0x1600 net/tls/tls_sw.c:209 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fc0672721a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007fc0672726bc CPU: 1 PID: 6598 Comm: syz-executor.1 Tainted: G D 4.19.192-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 print_address_description.cold.8+0x9/0x1ff mm/kasan/report.c:256 kasan_report_error mm/kasan/report.c:354 [inline] kasan_report mm/kasan/report.c:412 [inline] kasan_report.cold.9+0x242/0x2fe mm/kasan/report.c:396 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 check_memory_region_inline mm/kasan/kasan.c:260 [inline] check_memory_region+0x13e/0x1b0 mm/kasan/kasan.c:267 memcpy+0x23/0x50 mm/kasan/kasan.c:302 memcpy include/linux/string.h:377 [inline] memcpy_dir crypto/scatterwalk.c:28 [inline] scatterwalk_copychunks+0x1e1/0x610 crypto/scatterwalk.c:43 scatterwalk_map_and_copy crypto/scatterwalk.c:72 [inline] scatterwalk_map_and_copy+0x128/0x190 crypto/scatterwalk.c:60 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 gcmaes_encrypt.constprop.15+0x6d6/0xda0 arch/x86/crypto/aesni-intel_glue.c:956 generic_gcmaes_encrypt+0xfd/0x150 arch/x86/crypto/aesni-intel_glue.c:1297 crypto_aead_encrypt include/crypto/aead.h:337 [inline] gcmaes_wrapper_encrypt+0x109/0x180 arch/x86/crypto/aesni-intel_glue.c:1130 crypto_aead_encrypt include/crypto/aead.h:337 [inline] tls_do_encryption net/tls/tls_sw.c:193 [inline] tls_push_record+0x9ae/0x1600 net/tls/tls_sw.c:228 tls_sw_sendpage+0x462/0xc00 net/tls/tls_sw.c:585 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f04527261a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052bf00 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f04527266bc Allocated by task 3296: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] kasan_kmalloc mm/kasan/kasan.c:553 [inline] kasan_kmalloc+0xc7/0xe0 mm/kasan/kasan.c:531 kasan_slab_alloc+0x12/0x20 mm/kasan/kasan.c:490 kmem_cache_alloc+0x12e/0x720 mm/slab.c:3559 vm_area_dup+0x1b/0x150 kernel/fork.c:329 dup_mmap kernel/fork.c:489 [inline] dup_mm kernel/fork.c:1284 [inline] copy_mm kernel/fork.c:1340 [inline] copy_process.part.34+0x307c/0x76d0 kernel/fork.c:1912 copy_process kernel/fork.c:1718 [inline] _do_fork+0x16a/0xcb0 kernel/fork.c:2218 __do_sys_clone kernel/fork.c:2325 [inline] __se_sys_clone kernel/fork.c:2319 [inline] __x64_sys_clone+0xba/0x140 kernel/fork.c:2319 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe Freed by task 6594: save_stack+0x43/0xd0 mm/kasan/kasan.c:448 set_track mm/kasan/kasan.c:460 [inline] __kasan_slab_free+0x102/0x150 mm/kasan/kasan.c:521 kasan_slab_free+0xe/0x10 mm/kasan/kasan.c:528 __cache_free mm/slab.c:3503 [inline] kmem_cache_free+0x83/0x290 mm/slab.c:3765 vm_area_free+0x13/0x20 kernel/fork.c:340 remove_vma+0x105/0x140 mm/mmap.c:180 exit_mmap+0x2d1/0x470 mm/mmap.c:3104 __mmput kernel/fork.c:1015 [inline] mmput+0x107/0x3f0 kernel/fork.c:1036 exit_mm kernel/exit.c:549 [inline] do_exit+0x9ce/0x2cf0 kernel/exit.c:857 do_group_exit+0xf4/0x2f0 kernel/exit.c:967 __do_sys_exit_group kernel/exit.c:978 [inline] __se_sys_exit_group kernel/exit.c:976 [inline] __x64_sys_exit_group+0x39/0x40 kernel/exit.c:976 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe The buggy address belongs to the object at ffff8881e20e2000 which belongs to the cache vm_area_struct of size 200 The buggy address is located 0 bytes inside of 200-byte region [ffff8881e20e2000, ffff8881e20e20c8) The buggy address belongs to the page: page:ffffea0007883880 count:1 mapcount:0 mapping:ffff8881f654e840 index:0x0 flags: 0x2fffc0000000100(slab) raw: 02fffc0000000100 ffffea0007885948 ffffea0007885ec8 ffff8881f654e840 raw: 0000000000000000 ffff8881e20e2000 000000010000000f 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8881e20e1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8881e20e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8881e20e2000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ^ ffff8881e20e2080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc ffff8881e20e2100: fc fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb ================================================================== CPU: 0 PID: 6619 Comm: syz-executor.3 Tainted: G B D 4.19.192-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x123/0x171 lib/dump_stack.c:118 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold.4+0x5/0xa lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:3088 [inline] prepare_alloc_pages mm/page_alloc.c:4346 [inline] __alloc_pages_nodemask+0x1d5/0x710 mm/page_alloc.c:4393 alloc_pages_current+0xd6/0x1b0 mm/mempolicy.c:2197 alloc_pages include/linux/gfp.h:532 [inline] skb_page_frag_refill+0x20b/0x400 net/core/sock.c:2220 sk_page_frag_refill+0x46/0x1d0 net/core/sock.c:2240 sk_alloc_sg+0x108/0x7d0 net/core/sock.c:2264 alloc_encrypted_sg+0x81/0x100 net/tls/tls_sw.c:123 tls_sw_sendpage+0x502/0xc00 net/tls/tls_sw.c:555 inet_sendpage+0x122/0x600 net/ipv4/af_inet.c:815 kernel_sendpage+0x60/0xd0 net/socket.c:3378 sock_sendpage+0x6d/0xd0 net/socket.c:847 pipe_to_sendpage+0x212/0x430 fs/splice.c:452 splice_from_pipe_feed fs/splice.c:503 [inline] __splice_from_pipe+0x2cb/0x720 fs/splice.c:627 splice_from_pipe+0xbb/0x120 fs/splice.c:662 generic_splice_sendpage+0x10/0x20 fs/splice.c:833 do_splice_from fs/splice.c:852 [inline] do_splice+0xa25/0x12b0 fs/splice.c:1154 __do_sys_splice fs/splice.c:1428 [inline] __se_sys_splice fs/splice.c:1408 [inline] __x64_sys_splice+0x248/0x300 fs/splice.c:1408 do_syscall_64+0xd0/0x4e0 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x460b89 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f9baf33c1a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 RAX: ffffffffffffffda RBX: 000000000052c0f8 RCX: 0000000000460b89 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 RBP: 0000000000000001 R08: 0000000100000300 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 R13: 00000000004f7150 R14: 00000000004b4af0 R15: 00007f9baf33c6bc CPU: 1 PID: 6616 Comm: syz-executor.5 Tainted: G B D 4.19.192-syzkaller #0