dccp_v4_rcv: dropped packet with invalid checksum BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 3791, name: kworker/1:4 2 locks held by kworker/1:4/3791: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:212 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 3791 Comm: kworker/1:4 Not tainted 4.15.0-rc1+ #197 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:441 dccp_v4_rcv: dropped packet with invalid checksum netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl binder: 19420:19426 Acquire 1 refcount change on invalid ref 0 ret -22 binder: 19420:19426 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 binder: 19420:19426 BC_ACQUIRE_DONE u0000000000000000 no match netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=19652 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=19666 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=19652 comm=syz-executor2 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=19681 comm=syz-executor2 loop_reread_partitions: partition scan of loop0 (2°]€fI¸Òæ¶Ì”B±!S,›ùDÏ') failed (rc=-13) loop: Write error at byte offset 18446744073709547520, length 512. print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0, logical block 0, lost async page write loop: Write error at byte offset 18446744073709547520, length 512. print_req_error: I/O error, dev loop0, sector 0 Buffer I/O error on dev loop0, logical block 0, lost async page write loop_reread_partitions: partition scan of loop0 () failed (rc=-13) kauditd_printk_skb: 412 callbacks suppressed audit: type=1326 audit(1511855422.222:7746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.222:7747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.222:7748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.222:7749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.223:7750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.223:7751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.223:7752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.226:7753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.226:7754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855422.227:7755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=19787 comm="syz-executor0" exe="/root/syz-executor0" sig=0 arch=c000003e syscall=9 compat=0 ip=0x4529d9 code=0x7ffc0000 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=20156 comm=syz-executor2 QAT: Device 0 not found QAT: Device 0 not found nla_parse: 10 callbacks suppressed netlink: 6 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 6 bytes leftover after parsing attributes in process `syz-executor5'. kvm_hv_set_msr: 118 callbacks suppressed kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008f data 0x71 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008e data 0x71 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008d data 0x71 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008c data 0x71 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008b data 0xd1 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008a data 0x31 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000089 data 0x31 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000088 data 0x31 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000087 data 0x31 kvm [20282]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000086 data 0x31 device gre0 entered promiscuous mode binder: 20425:20428 BC_ACQUIRE_DONE u0000000000000000 no match binder: 20425:20439 BC_ACQUIRE_DONE u0000000000000000 no match 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 QAT: Invalid ioctl QAT: Invalid ioctl netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 4313, name: kworker/0:3 2 locks held by kworker/0:3/4313: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:212 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 0 PID: 4313 Comm: kworker/0:3 Tainted: G W 4.15.0-rc1+ #197 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 sctp: [Deprecated]: syz-executor1 (pid 20752) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:441 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. sctp: [Deprecated]: syz-executor1 (pid 20759) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device gre0 entered promiscuous mode device gre0 entered promiscuous mode kauditd_printk_skb: 227 callbacks suppressed audit: type=1326 audit(1511855428.541:7983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=66 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=55 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=64 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=65 compat=0 ip=0x4529d9 code=0x7ffc0000 audit: type=1326 audit(1511855428.541:7992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=20917 comm="syz-executor7" exe="/root/syz-executor7" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4529d9 code=0x7ffc0000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 9pnet_virtio: no channels available for device ./file0/file0 9pnet_virtio: no channels available for device ./file0/file0 netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 9 bytes leftover after parsing attributes in process `syz-executor4'.