INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-kasan-gce-8,10.128.0.44' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program syzkaller login: [ 44.485127] ================================================================== [ 44.485414] BUG: unable to handle kernel NULL pointer dereference at (null) [ 44.485420] IP: (null) [ 44.485423] PGD 1cb5c9067 P4D 1cb5c9067 PUD 1ca471067 PMD 0 [ 44.485431] Oops: 0010 [#1] SMP KASAN [ 44.485436] Dumping ftrace buffer: [ 44.485439] (ftrace buffer empty) [ 44.485440] Modules linked in: [ 44.485449] CPU: 0 PID: 3636 Comm: syzkaller687795 Not tainted 4.15.0-rc1+ #197 [ 44.485451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.485454] task: ffff8801c91c42c0 task.stack: ffff8801bf000000 [ 44.485455] RIP: 0010: (null) [ 44.485457] RSP: 0018:ffff8801bf007960 EFLAGS: 00010292 [ 44.485461] RAX: ffff8801cabcfd80 RBX: 1ffff10037e00f2d RCX: ffffffff823a6c31 [ 44.485463] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8801bf007968 [ 44.485466] RBP: ffff8801bf007b00 R08: 0000000000000000 R09: ffff8801c91f2c90 [ 44.485468] R10: 0000000000000008 R11: ffffed003923e599 R12: dffffc0000000000 [ 44.485470] R13: ffff8801cabcfda8 R14: ffff8801c9351400 R15: ffff8801c91f2c80 [ 44.485473] FS: 00007f7ab2d65700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 44.485476] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 44.485478] CR2: 0000000000000000 CR3: 00000001ccbe8000 CR4: 00000000001406f0 [ 44.485483] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 44.485485] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 44.485486] Call Trace: [ 44.485495] ? aead_recvmsg+0x7db/0x1970 [ 44.485503] ? aead_recvmsg+0x67d/0x1970 [ 44.485516] ? aead_sendpage_nokey+0xa0/0xa0 [ 44.485523] ? selinux_socket_recvmsg+0x36/0x40 [ 44.485528] ? security_socket_recvmsg+0x91/0xc0 [ 44.485533] ? aead_sendpage_nokey+0xa0/0xa0 [ 44.485539] sock_recvmsg+0xc9/0x110 [ 44.485543] ? __sock_recv_wifi_status+0x210/0x210 [ 44.485549] ___sys_recvmsg+0x29b/0x630 [ 44.485557] ? ___sys_sendmsg+0x8a0/0x8a0 [ 44.485571] ? fget_raw+0x20/0x20 [ 44.485578] ? __handle_mm_fault+0x3ad0/0x3ad0 [ 44.485582] ? vmacache_find+0x5f/0x280 [ 44.485591] ? up_read+0x1a/0x40 [ 44.485598] ? __do_page_fault+0x3d6/0xc90 [ 44.485605] ? __fdget+0x18/0x20 [ 44.485612] __sys_recvmsg+0xe2/0x210 [ 44.485616] ? __sys_recvmsg+0xe2/0x210 [ 44.485621] ? SyS_sendmmsg+0x60/0x60 [ 44.485626] ? __do_page_fault+0xc90/0xc90 [ 44.485633] ? lockdep_sys_exit+0x47/0xf0 [ 44.485642] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 44.485649] SyS_recvmsg+0x2d/0x50 [ 44.485655] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 44.485658] RIP: 0033:0x446439 [ 44.485660] RSP: 002b:00007f7ab2d64d08 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 44.485664] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000446439 [ 44.485666] RDX: 0000000000000040 RSI: 00000000207e0000 RDI: 0000000000000004 [ 44.485668] RBP: 0000000000000000 R08: 00007f7ab2d65700 R09: 00007f7ab2d65700 [ 44.485670] R10: 00007f7ab2d65700 R11: 0000000000000246 R12: 0000000000000000 [ 44.485672] R13: 00007ffc4419186f R14: 00007f7ab2d659c0 R15: 0000000000000000 [ 44.485681] Code: Bad RIP value. [ 44.485688] RIP: (null) RSP: ffff8801bf007960 [ 44.485689] CR2: 0000000000000000 [ 44.485707] ---[ end trace 1d6cf58a48d5320c ]--- [ 44.485710] Kernel panic - not syncing: Fatal exception [ 44.666959] BUG: KASAN: use-after-free in aead_recvmsg+0x1552/0x1970 [ 44.673419] Read of size 4 at addr ffff8801cabcfd9c by task syzkaller687795/3634 [ 44.680911] [ 44.682509] CPU: 1 PID: 3634 Comm: syzkaller687795 Tainted: G D 4.15.0-rc1+ #197 [ 44.691218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.700534] Call Trace: [ 44.703092] dump_stack+0x194/0x257 [ 44.706690] ? arch_local_irq_restore+0x53/0x53 [ 44.711326] ? show_regs_print_info+0x65/0x65 [ 44.715788] ? af_alg_make_sg+0x510/0x510 [ 44.719898] ? aead_recvmsg+0x1552/0x1970 [ 44.724010] print_address_description+0x73/0x250 [ 44.728817] ? aead_recvmsg+0x1552/0x1970 [ 44.732928] kasan_report+0x25b/0x340 [ 44.736693] __asan_report_load4_noabort+0x14/0x20 [ 44.741584] aead_recvmsg+0x1552/0x1970 [ 44.745530] ? aead_sendpage_nokey+0xa0/0xa0 [ 44.749908] ? selinux_socket_recvmsg+0x36/0x40 [ 44.755063] ? security_socket_recvmsg+0x91/0xc0 [ 44.759785] ? aead_sendpage_nokey+0xa0/0xa0 [ 44.764160] sock_recvmsg+0xc9/0x110 [ 44.767836] ? __sock_recv_wifi_status+0x210/0x210 [ 44.772731] ___sys_recvmsg+0x29b/0x630 [ 44.776675] ? ___sys_sendmsg+0x8a0/0x8a0 [ 44.780795] ? fget_raw+0x20/0x20 [ 44.784213] ? __handle_mm_fault+0x3ad0/0x3ad0 [ 44.788765] ? vmacache_find+0x5f/0x280 [ 44.792706] ? schedule+0xf5/0x430 [ 44.796209] ? up_read+0x1a/0x40 [ 44.799547] ? __schedule+0x2060/0x2060 [ 44.803483] ? lock_downgrade+0x980/0x980 [ 44.807597] ? __fdget+0x18/0x20 [ 44.810930] __sys_recvmsg+0xe2/0x210 [ 44.814694] ? __sys_recvmsg+0xe2/0x210 [ 44.818634] ? SyS_sendmmsg+0x60/0x60 [ 44.822399] ? exit_to_usermode_loop+0x198/0x310 [ 44.827121] ? __do_page_fault+0xc90/0xc90 [ 44.831320] ? lockdep_sys_exit+0x47/0xf0 [ 44.835441] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 44.840427] SyS_recvmsg+0x2d/0x50 [ 44.843934] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 44.848652] RIP: 0033:0x446439 [ 44.851807] RSP: 002b:00007f7ab2d64d08 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 44.859486] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000446439 [ 44.866729] RDX: 0000000000000040 RSI: 00000000207e0000 RDI: 0000000000000004 [ 44.873983] RBP: 0000000000000000 R08: 00007f7ab2d65700 R09: 00007f7ab2d65700 [ 44.881220] R10: 00007f7ab2d65700 R11: 0000000000000246 R12: 0000000000000000 [ 44.888454] R13: 00007ffc4419186f R14: 00007f7ab2d659c0 R15: 0000000000000000 [ 44.895703] [ 44.897302] Allocated by task 3442: [ 44.900908] save_stack+0x43/0xd0 [ 44.904323] kasan_kmalloc+0xad/0xe0 [ 44.908000] __kmalloc+0x162/0x760 [ 44.911506] crypto_create_tfm+0x82/0x2e0 [ 44.915615] crypto_alloc_tfm+0x10e/0x2f0 [ 44.919729] crypto_alloc_skcipher+0x2c/0x40 [ 44.924108] crypto_get_default_null_skcipher+0x5f/0x80 [ 44.929439] aead_bind+0x89/0x140 [ 44.932852] alg_bind+0x1ab/0x440 [ 44.936270] SYSC_bind+0x1b4/0x3f0 [ 44.939774] SyS_bind+0x24/0x30 [ 44.943016] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 44.947734] [ 44.949324] Freed by task 3522: [ 44.952565] save_stack+0x43/0xd0 [ 44.955980] kasan_slab_free+0x71/0xc0 [ 44.959831] kfree+0xca/0x250 [ 44.962900] kzfree+0x28/0x30 [ 44.965971] crypto_destroy_tfm+0x140/0x2e0 [ 44.970255] crypto_put_default_null_skcipher+0x35/0x60 [ 44.975580] aead_sock_destruct+0x13c/0x220 [ 44.979864] __sk_destruct+0xfd/0x910 [ 44.983627] sk_destruct+0x47/0x80 [ 44.987129] __sk_free+0x57/0x230 [ 44.990542] sk_free+0x2a/0x40 [ 44.993695] af_alg_release+0x5d/0x70 [ 44.997458] sock_release+0x8d/0x1e0 [ 45.001135] sock_close+0x16/0x20 [ 45.004551] __fput+0x333/0x7f0 [ 45.007793] ____fput+0x15/0x20 [ 45.011034] task_work_run+0x199/0x270 [ 45.014883] do_exit+0x9bb/0x1ae0 [ 45.018300] do_group_exit+0x149/0x400 [ 45.022148] SyS_exit_group+0x1d/0x20 [ 45.025911] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 45.030626] [ 45.032217] The buggy address belongs to the object at ffff8801cabcfd80 [ 45.032217] which belongs to the cache kmalloc-128 of size 128 [ 45.044836] The buggy address is located 28 bytes inside of [ 45.044836] 128-byte region [ffff8801cabcfd80, ffff8801cabcfe00) [ 45.056585] The buggy address belongs to the page: [ 45.061476] page:ffffea00072af3c0 count:1 mapcount:0 mapping:ffff8801cabcf000 index:0x0 [ 45.069674] flags: 0x2fffc0000000100(slab) [ 45.073874] raw: 02fffc0000000100 ffff8801cabcf000 0000000000000000 0000000100000015 [ 45.081720] raw: ffffea00072a6ba0 ffffea0007291c20 ffff8801db000640 0000000000000000 [ 45.089570] page dumped because: kasan: bad access detected [ 45.095246] [ 45.096840] Memory state around the buggy address: [ 45.101734] ffff8801cabcfc80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 45.109054] ffff8801cabcfd00: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.116376] >ffff8801cabcfd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.123702] ^ [ 45.127816] ffff8801cabcfe00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 45.135138] ffff8801cabcfe80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.142459] ================================================================== [ 45.149808] Dumping ftrace buffer: [ 45.153345] (ftrace buffer empty) [ 45.157022] Kernel Offset: disabled [ 45.160620] Rebooting in 86400 seconds..