BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 23, name: kworker/1:1 2 locks held by kworker/1:1/23: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:207 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 23 Comm: kworker/1:1 Not tainted 4.14.0+ #194 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pencrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437 QAT: Invalid ioctl nla_parse: 18 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. rpcbind: RPC call returned error 22 rpcbind: RPC call returned error 22 netlink: 5 bytes leftover after parsing attributes in process `syz-executor4'. RDS: rds_bind could not find a transport for 0.0.0.7, load rds_tcp or rds_rdma? RDS: rds_bind could not find a transport for 0.0.0.7, load rds_tcp or rds_rdma? dccp_invalid_packet: P.Data Offset(4) too small dccp_invalid_packet: P.Data Offset(4) too small device eql entered promiscuous mode sctp: [Deprecated]: syz-executor5 (pid 12444) Use of int in maxseg socket option. Use struct sctp_assoc_value instead QAT: Invalid ioctl sg_write: data in/out 1989083209/180 bytes for SCSI command 0x0-- guessing data in; program syz-executor1 not setting count and/or reply_len properly QAT: Invalid ioctl sg_write: data in/out 1989083209/180 bytes for SCSI command 0x0-- guessing data in; program syz-executor1 not setting count and/or reply_len properly QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode netlink: 6 bytes leftover after parsing attributes in process `syz-executor2'. devpts: called with bogus options SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12519 comm=syz-executor2 devpts: called with bogus options handle_userfault: 66 callbacks suppressed FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 12623 Comm: syz-executor7 Tainted: G W 4.14.0+ #194 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2e8c/0x3ad0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801d50afe38 EFLAGS: 00010206 RAX: ffffed003aa15fd7 RBX: 0000000020002000 RCX: 0000000000000003 RDX: 0000000000000000 RSI: 0000000020002000 RDI: ffff8801d50afea0 RBP: ffff8801d50afe68 R08: ffffed003aa15fd7 R09: ffffed003aa15fd7 R10: 0000000000000003 R11: ffffed003aa15fd6 R12: 0000000000000018 R13: ffff8801d50afea0 R14: 00007ffffffff000 R15: 0000000020002018 copy_from_user include/linux/uaccess.h:147 [inline] SYSC_sigaltstack kernel/signal.c:3232 [inline] SyS_sigaltstack+0xa1/0x280 kernel/signal.c:3228 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f2b04f62be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000083 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000000 RSI: 0000000020009ff8 RDI: 0000000020002000 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f2608 R13: 00000000ffffffff R14: 00007f2b04f636d4 R15: 0000000000000000 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008f data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008e data 0xe0000011 kvm: pic: non byte write kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008d data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008c data 0xe0000011 kvm: pic: non byte write kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008b data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x4000008a data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000089 data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000088 data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000087 data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000086 data 0xe0000011 kvm [12592]: vcpu0, guest rIP: 0x9115 Hyper-V uhandled wrmsr: 0x40000020 data 0xe0000011 sctp: [Deprecated]: syz-executor4 (pid 12730) Use of int in max_burst socket option. Use struct sctp_assoc_value instead netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. sctp: [Deprecated]: syz-executor4 (pid 12730) Use of int in max_burst socket option. Use struct sctp_assoc_value instead netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. RDS: rds_bind could not find a transport for 0.0.0.1, load rds_tcp or rds_rdma? RDS: rds_bind could not find a transport for 0.0.0.1, load rds_tcp or rds_rdma? SELinux: unrecognized netlink message: protocol=0 nlmsg_type=281 sclass=netlink_route_socket pig=12892 comm=syz-executor0 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=281 sclass=netlink_route_socket pig=12892 comm=syz-executor0 device lo left promiscuous mode FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 12942 Comm: syz-executor2 Tainted: G W 4.14.0+ #194 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2e8c/0x3ad0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:fault_in_pages_readable include/linux/pagemap.h:601 [inline] RIP: 0010:iov_iter_fault_in_readable+0x1a7/0x410 lib/iov_iter.c:421 RSP: 0018:ffff8801c879f928 EFLAGS: 00010246 RAX: 0000000000010000 RBX: 0000000020011fd2 RCX: ffffffff825058c1 RDX: 00000000000000c6 RSI: ffffc90001cb8000 RDI: ffff8801c879fd28 RBP: ffff8801c879fa08 R08: 1ffff100389c05ba R09: 0000000000000000 R10: ffff8801c4998180 R11: 0000000000000000 R12: 1ffff100390f3f28 R13: ffff8801c879f9e0 R14: 0000000000000000 R15: ffff8801c879fd20 generic_perform_write+0x200/0x600 mm/filemap.c:3129 __generic_file_write_iter+0x366/0x5b0 mm/filemap.c:3264 generic_file_write_iter+0x399/0x7a0 mm/filemap.c:3292 call_write_iter include/linux/fs.h:1772 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f011b7a1be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000030 RSI: 0000000020011fd2 RDI: 0000000000000014 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f16d8 R13: 00000000ffffffff R14: 00007f011b7a26d4 R15: 0000000000000000 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 12942 Comm: syz-executor2 Tainted: G W 4.14.0+ #194 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3121 [inline] handle_pte_fault mm/memory.c:3934 [inline] __handle_mm_fault+0x2e8c/0x3ad0 mm/memory.c:4060 handle_mm_fault+0x334/0x8d0 mm/memory.c:4097 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:fault_in_pages_readable include/linux/pagemap.h:601 [inline] RIP: 0010:iov_iter_fault_in_readable+0x1a7/0x410 lib/iov_iter.c:421 RSP: 0018:ffff8801c879f928 EFLAGS: 00010246 RAX: 0000000000010000 RBX: 0000000020011fd2 RCX: ffffffff825058c1 RDX: 0000000000000108 RSI: ffffc90001cb8000 RDI: ffff8801c879fd28 RBP: ffff8801c879fa08 R08: 1ffffffff0d2f3db R09: 1ffff100390f3edf R10: ffff8801c4998180 R11: 0000000000000003 R12: 1ffff100390f3f28 R13: ffff8801c879f9e0 R14: 0000000000000000 R15: ffff8801c879fd20 generic_perform_write+0x200/0x600 mm/filemap.c:3129 __generic_file_write_iter+0x366/0x5b0 mm/filemap.c:3264 generic_file_write_iter+0x399/0x7a0 mm/filemap.c:3292 call_write_iter include/linux/fs.h:1772 [inline] new_sync_write fs/read_write.c:469 [inline] __vfs_write+0x68a/0x970 fs/read_write.c:482 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f011b7a1be8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000030 RSI: 0000000020011fd2 RDI: 0000000000000017 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f2608 R13: 00000000ffffffff R14: 00007f011b7a26d4 R15: 0000000000000000 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=13011 comm=syz-executor6 SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pig=13011 comm=syz-executor6 netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode audit: type=1326 audit(1511699721.050:2986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511699721.076:2987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=206 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511699721.083:2988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511699721.085:2989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=208 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511699721.085:2990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511699721.086:2991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=9 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511699721.086:2992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=13165 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. TCP: request_sock_TCP: Possible SYN flooding on port 20018. Sending cookies. Check SNMP counters. netlink: 8 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor4'. device lo entered promiscuous mode device lo left promiscuous mode RDS: rds_bind could not find a transport for 255.255.255.255, load rds_tcp or rds_rdma? device lo entered promiscuous mode RDS: rds_bind could not find a transport for 255.255.255.255, load rds_tcp or rds_rdma? device lo left promiscuous mode device gre0 entered promiscuous mode sctp: [Deprecated]: syz-executor3 (pid 13440) Use of int in maxseg socket option. Use struct sctp_assoc_value instead QAT: Invalid ioctl sctp: [Deprecated]: syz-executor3 (pid 13440) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device gre0 entered promiscuous mode QAT: Invalid ioctl device gre0 entered promiscuous mode device gre0 entered promiscuous mode Bearer <> rejected, not supported in standalone mode Bearer <> rejected, not supported in standalone mode device gre0 entered promiscuous mode