BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 9200, name: kworker/1:4 2 locks held by kworker/1:4/9200: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:207 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 9200 Comm: kworker/1:4 Not tainted 4.14.0+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437 audit: type=1326 audit(1511547847.295:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15901 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511547847.296:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15901 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511547847.299:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15901 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=66 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511547847.299:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15901 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511547847.299:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15901 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511547847.300:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=15901 comm="syz-executor6" exe="/root/syz-executor6" sig=0 arch=c000003e syscall=55 compat=0 ip=0x452879 code=0x7ffc0000 sctp: [Deprecated]: syz-executor5 (pid 15930) Use of int in maxseg socket option. Use struct sctp_assoc_value instead kvm_set_msr_common: 43 callbacks suppressed kvm [15845]: vcpu0, guest rIP: 0x29 disabled perfctr wrmsr: 0xc1 data 0xffffffff sctp: [Deprecated]: syz-executor5 (pid 15930) Use of int in maxseg socket option. Use struct sctp_assoc_value instead kvm [15900]: vcpu0, guest rIP: 0x29 disabled perfctr wrmsr: 0xc1 data 0xffffffff kvm [15845]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0xffffffff kvm [15900]: vcpu0, guest rIP: 0x0 disabled perfctr wrmsr: 0xc1 data 0xffffffff dccp_invalid_packet: P.Data Offset(4) too small dccp_invalid_packet: P.Data Offset(4) too small sctp: [Deprecated]: syz-executor0 (pid 15996) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor0 (pid 16022) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode nla_parse: 3 callbacks suppressed netlink: 37 bytes leftover after parsing attributes in process `syz-executor3'. could not allocate digest TFM handle digest_null netlink: 37 bytes leftover after parsing attributes in process `syz-executor3'. could not allocate digest TFM handle digest_null QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. QAT: Invalid ioctl QAT: Invalid ioctl netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl netlink: 6 bytes leftover after parsing attributes in process `syz-executor7'. device  entered promiscuous mode netlink: 6 bytes leftover after parsing attributes in process `syz-executor7'. device  left promiscuous mode netlink: 2 bytes leftover after parsing attributes in process `syz-executor1'. sctp: [Deprecated]: syz-executor4 (pid 16285) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead netlink: 3 bytes leftover after parsing attributes in process `syz-executor3'. sctp: [Deprecated]: syz-executor4 (pid 16299) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead dccp_invalid_packet: P.Data Offset(124) too large dccp_invalid_packet: P.Data Offset(124) too large device eql entered promiscuous mode device gre0 entered promiscuous mode device eql entered promiscuous mode device eql entered promiscuous mode kauditd_printk_skb: 74 callbacks suppressed audit: type=1326 audit(1511547851.195:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 sctp: [Deprecated]: syz-executor3 (pid 16561) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead audit: type=1326 audit(1511547851.223:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 sctp: [Deprecated]: syz-executor3 (pid 16561) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead audit: type=1326 audit(1511547851.223:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.228:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.228:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.228:1323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.228:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.228:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.228:1326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 audit: type=1326 audit(1511547851.229:1327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=16558 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000 BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 9200, name: kworker/1:4 2 locks held by kworker/1:4/9200: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:207 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 9200 Comm: kworker/1:4 Tainted: G W 4.14.0+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437 sctp: [Deprecated]: syz-executor6 (pid 16782) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 16782) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode dccp_invalid_packet: P.CsCov 15 exceeds packet length 1020 dccp_invalid_packet: P.CsCov 15 exceeds packet length 1020 QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl xprt_adjust_timeout: rq_timeout = 0! xprt_adjust_timeout: rq_timeout = 0! QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl nla_parse: 9 callbacks suppressed netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor2'. sctp: [Deprecated]: syz-executor5 (pid 17094) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor5 (pid 17099) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. sctp: [Deprecated]: syz-executor1 (pid 17308) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor1 (pid 17324) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead QAT: Invalid ioctl