BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 17, name: kworker/1:0 2 locks held by kworker/1:0/17: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:212 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 17 Comm: kworker/1:0 Not tainted 4.14.0-mm1+ #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1467 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437 netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. device gre0 entered promiscuous mode IPv6: ADDRCONF(NETDEV_UP): syz5: link is not ready sctp: [Deprecated]: syz-executor7 (pid 13322) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor7 (pid 13322) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device syz3 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode kauditd_printk_skb: 66 callbacks suppressed audit: type=1326 audit(1511750131.218:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13508 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 ?: renamed from sit0 audit: type=1326 audit(1511750131.295:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13508 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 kvm_hv_set_msr: 1 callbacks suppressed kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008b data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008a data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000089 data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000088 data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000087 data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000086 data 0xe0000011 kvm [13485]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000020 data 0xe0000011 futex_wake_op: syz-executor7 tries to shift op by 4031; fix this program futex_wake_op: syz-executor7 tries to shift op by 4031; fix this program nla_parse: 7 callbacks suppressed netlink: 2 bytes leftover after parsing attributes in process `syz-executor2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=13705 comm=syz-executor2 netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. audit: type=1326 audit(1511750132.784:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13735 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. audit: type=1326 audit(1511750132.902:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13735 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. encrypted_key: master key parameter '0>tj;eI|‡}{o' is invalid encrypted_key: master key parameter '0>tj;eI|‡}{o' is invalid netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1545 sclass=netlink_tcpdiag_socket pig=13852 comm=syz-executor4 netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1545 sclass=netlink_tcpdiag_socket pig=13847 comm=syz-executor4 device gre0 entered promiscuous mode netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor7'. QAT: Invalid ioctl QAT: Invalid ioctl netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl sctp: [Deprecated]: syz-executor6 (pid 14067) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor6 (pid 14067) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. TCP: request_sock_TCP: Possible SYN flooding on port 20022. Sending cookies. Check SNMP counters. sctp: [Deprecated]: syz-executor7 (pid 14358) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead TCP: request_sock_TCPv6: Possible SYN flooding on port 20014. Sending cookies. Check SNMP counters. sctp: [Deprecated]: syz-executor7 (pid 14366) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32134 sclass=netlink_route_socket pig=14451 comm=syz-executor2 QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32134 sclass=netlink_route_socket pig=14451 comm=syz-executor2 loop_reread_partitions: partition scan of loop4 (-\t@r9hxGQ:[il L*@R-Tr-x) failed (rc=-13) QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=14558 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14569 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3379 sclass=netlink_route_socket pig=14569 comm=syz-executor0 audit: type=1326 audit(1511750137.665:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=14573 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14569 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14585 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=14569 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14558 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3379 sclass=netlink_route_socket pig=14569 comm=syz-executor0 nla_parse: 9 callbacks suppressed netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14585 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=14569 comm=syz-executor0 netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. sctp: [Deprecated]: syz-executor1 (pid 14664) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor1 (pid 14675) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. sctp: [Deprecated]: syz-executor6 (pid 14681) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor6 (pid 14681) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead