IPVS: set_ctl: invalid protocol: 63 224.0.0.1:20003 netlink: 15 bytes leftover after parsing attributes in process `syz-executor2'. BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 8996, name: syz-executor5 1 lock held by syz-executor5/8996: #0: 00000000d84689da (sk_lock-AF_ALG){+.+.}, at: lock_sock include/net/sock.h:1502 [inline] #0: 00000000d84689da (sk_lock-AF_ALG){+.+.}, at: skcipher_recvmsg+0xbb/0x1420 crypto/algif_skcipher.c:163 IPVS: set_ctl: invalid protocol: 63 224.0.0.1:20003 Preemption disabled at: [] kernel_fpu_begin+0x16/0x260 arch/x86/kernel/fpu/core.c:127 CPU: 0 PID: 8996 Comm: syz-executor5 Not tainted 4.20.0-rc6-next-20181214+ #171 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3707 [inline] __kmalloc+0x2da/0x760 mm/slab.c:3718 kmalloc include/linux/slab.h:550 [inline] kzalloc include/linux/slab.h:740 [inline] skcipher_next_slow crypto/skcipher.c:254 [inline] skcipher_walk_next+0x7f9/0x17f0 crypto/skcipher.c:358 netlink: 15 bytes leftover after parsing attributes in process `syz-executor2'. skcipher_walk_first+0xff/0x3a0 crypto/skcipher.c:441 skcipher_walk_skcipher+0x541/0x700 crypto/skcipher.c:469 skcipher_walk_virt+0x58/0xd0 crypto/skcipher.c:479 chacha_simd_stream_xor+0xb3/0xa40 arch/x86/crypto/chacha_glue.c:141 chacha_simd+0xd8/0x110 arch/x86/crypto/chacha_glue.c:179 crypto_skcipher_decrypt include/crypto/skcipher.h:538 [inline] _skcipher_recvmsg crypto/algif_skcipher.c:146 [inline] skcipher_recvmsg+0xcc9/0x1420 crypto/algif_skcipher.c:165 sock_recvmsg_nosec net/socket.c:795 [inline] sock_recvmsg+0xd0/0x110 net/socket.c:802 ___sys_recvmsg+0x2b6/0x680 net/socket.c:2279 do_recvmmsg+0x303/0xb90 net/socket.c:2392 __sys_recvmmsg+0xe5/0x2a0 net/socket.c:2473 __do_sys_recvmmsg net/socket.c:2494 [inline] __se_sys_recvmmsg net/socket.c:2487 [inline] __x64_sys_recvmmsg+0xe6/0x140 net/socket.c:2487 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457669 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f9f26bf8c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457669 RDX: 0000000000000001 RSI: 000000002000a280 RDI: 0000000000000005 RBP: 000000000072c180 R08: 000000002000a500 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9f26bf96d4 R13: 00000000004c3b77 R14: 00000000004d6770 R15: 00000000ffffffff netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. autofs4:pid:9098:autofs_fill_super: called with bogus options autofs4:pid:9098:autofs_fill_super: called with bogus options audit: type=1400 audit(1544967642.455:38): apparmor="DENIED" operation="change_onexec" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/exec" pid=9117 comm="syz-executor0" XFS (loop3): Invalid superblock magic number netlink: 3286 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 3286 bytes leftover after parsing attributes in process `syz-executor2'. ntfs: (device loop2): parse_options(): Unrecognized mount option obj_user. audit: type=1326 audit(1544967645.930:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9396 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 audit: type=1326 audit(1544967646.689:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9396 comm="syz-executor0" exe="/root/syz-executor0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'.