audit: type=1800 audit(1545004644.110:155): pid=14680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file1" dev="sda1" ino=17121 res=0 BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 0, pid: 14680, name: syz-executor0 1 lock held by syz-executor0/14680: #0: 0000000095e79991 (sk_lock-AF_ALG){+.+.}, at: lock_sock include/net/sock.h:1502 [inline] #0: 0000000095e79991 (sk_lock-AF_ALG){+.+.}, at: skcipher_recvmsg+0xbb/0x1420 crypto/algif_skcipher.c:163 Preemption disabled at: [] kernel_fpu_begin+0x16/0x260 arch/x86/kernel/fpu/core.c:127 CPU: 1 PID: 14680 Comm: syz-executor0 Not tainted 4.20.0-rc6-next-20181214+ #171 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 ___might_sleep.cold.86+0x221/0x254 kernel/sched/core.c:6148 __might_sleep+0x95/0x190 kernel/sched/core.c:6101 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3365 [inline] __do_kmalloc mm/slab.c:3707 [inline] __kmalloc+0x2da/0x760 mm/slab.c:3718 kmalloc include/linux/slab.h:550 [inline] kzalloc include/linux/slab.h:740 [inline] skcipher_next_slow crypto/skcipher.c:254 [inline] skcipher_walk_next+0x7f9/0x17f0 crypto/skcipher.c:358 skcipher_walk_first+0xff/0x3a0 crypto/skcipher.c:441 skcipher_walk_skcipher+0x541/0x700 crypto/skcipher.c:469 skcipher_walk_virt+0x58/0xd0 crypto/skcipher.c:479 chacha_simd_stream_xor+0xb3/0xa40 arch/x86/crypto/chacha_glue.c:141 chacha_simd+0xd8/0x110 arch/x86/crypto/chacha_glue.c:179 crypto_skcipher_decrypt include/crypto/skcipher.h:538 [inline] _skcipher_recvmsg crypto/algif_skcipher.c:146 [inline] skcipher_recvmsg+0xcc9/0x1420 crypto/algif_skcipher.c:165 sock_recvmsg_nosec net/socket.c:795 [inline] sock_recvmsg+0xd0/0x110 net/socket.c:802 ___sys_recvmsg+0x2b6/0x680 net/socket.c:2279 do_recvmmsg+0x303/0xb90 net/socket.c:2392 __sys_recvmmsg+0xe5/0x2a0 net/socket.c:2473 __do_sys_recvmmsg net/socket.c:2494 [inline] __se_sys_recvmmsg net/socket.c:2487 [inline] __x64_sys_recvmmsg+0xe6/0x140 net/socket.c:2487 QAT: Invalid ioctl do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457669 Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007f2653ed9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457669 RDX: 0000000000000001 RSI: 000000002000a280 RDI: 0000000000000006 RBP: 000000000072bf00 R08: 000000002000a500 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2653eda6d4 R13: 00000000004c3b77 R14: 00000000004d6770 R15: 00000000ffffffff audit: type=1800 audit(1545004644.610:156): pid=14680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="file1" dev="sda1" ino=17121 res=0 loop1: p1 p2 p3 p4 < > __loop_clr_fd: partition scan of loop1 failed (rc=-22) IPVS: ftp: loaded support on port[0] = 21 Unknown ioctl 19268 Unknown ioctl -1070836187 Unknown ioctl 19268 Unknown ioctl -1070836187 IPVS: ftp: loaded support on port[0] = 21 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. REISERFS warning (device loop1): super-6505 reiserfs_getopt: head of option "usrjquota" is only correct REISERFS warning (device loop1): super-6505 reiserfs_getopt: head of option "usrjquota" is only correct overlayfs: filesystem on './file0' not supported as upperdir Unknown ioctl 1074025832 llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 Unknown ioctl 1074025832 llcp: llcp_sock_recvmsg: Recv datagram failed state 5 -512 0 UBIFS error (pid: 15128): cannot open "(null)", error -22 UBIFS error (pid: 15133): cannot open "(null)", error -22 kvm [15125]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 kvm [15125]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 IPVS: ftp: loaded support on port[0] = 21 overlayfs: unrecognized mount option "ÿÿ" or missing value overlayfs: unrecognized mount option "ÿÿ" or missing value overlayfs: unrecognized mount option "upper ir=./file0" or missing value overlayfs: unrecognized mount option "upper ir=./file0" or missing value netlink: 'syz-executor1': attribute type 29 has an invalid length. netlink: 'syz-executor1': attribute type 29 has an invalid length. netlink: 'syz-executor1': attribute type 29 has an invalid length. netlink: 'syz-executor1': attribute type 29 has an invalid length.