nla_parse: 11 callbacks suppressed netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 1307, name: kworker/0:2 2 locks held by kworker/0:2/1307: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:212 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 0 PID: 1307 Comm: kworker/0:2 Not tainted 4.14.0-mm1+ #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1467 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437 QAT: Invalid ioctl QAT: Invalid ioctl netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 11 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 2 bytes leftover after parsing attributes in process `syz-executor2'. netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. The task syz-executor4 (23001) triggered the difference, watch for misbehavior. netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. device lo entered promiscuous mode handle_userfault: 323 callbacks suppressed FAULT_FLAG_ALLOW_RETRY missing 30 FAULT_FLAG_ALLOW_RETRY missing 30 CPU: 0 PID: 23067 Comm: syz-executor0 Tainted: G W 4.14.0-mm1+ #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3109 [inline] handle_pte_fault mm/memory.c:3922 [inline] __handle_mm_fault+0x3402/0x3dd0 mm/memory.c:4048 handle_mm_fault+0x38f/0x930 mm/memory.c:4085 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801d06b7a80 EFLAGS: 00010203 RAX: 0000000000000004 RBX: ffff8801c503ea00 RCX: 0000000000000004 RDX: 0000000000000004 RSI: 0000000020013fd8 RDI: ffff8801d06b7b20 RBP: ffff8801d06b7cc8 R08: ffffed003a0d6f68 R09: ffffed003a0d6f69 R10: 0000000000000005 R11: ffffed003a0d6f68 R12: ffff8801d79ed300 R13: 0000000020013fd8 R14: 00007ffffffff000 R15: ffff8801d06b7b20 __vfs_write+0xef/0x970 fs/read_write.c:480 vfs_write+0x18f/0x510 fs/read_write.c:544 SYSC_write fs/read_write.c:589 [inline] SyS_write+0xef/0x220 fs/read_write.c:581 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f738418fbe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000001 RAX: ffffffffffffffda RBX: 0000000000758020 RCX: 0000000000452879 RDX: 0000000000000028 RSI: 0000000020013fd8 RDI: 0000000000000014 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 R13: 0000000000a6f7ff R14: 00007f73841909c0 R15: 0000000000000000 CPU: 1 PID: 23072 Comm: syz-executor0 Tainted: G W 4.14.0-mm1+ #25 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 handle_userfault+0x12fa/0x24c0 fs/userfaultfd.c:427 do_anonymous_page mm/memory.c:3109 [inline] handle_pte_fault mm/memory.c:3922 [inline] __handle_mm_fault+0x3402/0x3dd0 mm/memory.c:4048 handle_mm_fault+0x38f/0x930 mm/memory.c:4085 __do_page_fault+0x5c9/0xc90 arch/x86/mm/fault.c:1429 do_page_fault+0xee/0x720 arch/x86/mm/fault.c:1504 page_fault+0x22/0x30 arch/x86/entry/entry_64.S:1088 RIP: 0010:copy_user_generic_unrolled+0x86/0xc0 arch/x86/lib/copy_user_64.S:65 RSP: 0018:ffff8801c875fd68 EFLAGS: 00010202 RAX: ffffed00390ebfc4 RBX: 0000000020013000 RCX: 0000000000000002 RDX: 0000000000000000 RSI: 0000000020013000 RDI: ffff8801c875fe10 RBP: ffff8801c875fd98 R08: ffffed00390ebfc4 R09: ffffed00390ebfc4 R10: 0000000000000002 R11: ffffed00390ebfc3 R12: 0000000000000010 R13: ffff8801c875fe10 R14: 00007ffffffff000 R15: 0000000020013010 copy_from_user include/linux/uaccess.h:147 [inline] SYSC_rt_sigtimedwait+0xec/0x1c0 kernel/signal.c:2885 SyS_rt_sigtimedwait+0x2d/0x40 kernel/signal.c:2868 entry_SYSCALL_64_fastpath+0x1f/0x96 RIP: 0033:0x452879 RSP: 002b:00007f738416ebe8 EFLAGS: 00000212 ORIG_RAX: 0000000000000080 RAX: ffffffffffffffda RBX: 00000000007580d8 RCX: 0000000000452879 RDX: 0000000020013000 RSI: 0000000020001ff0 RDI: 0000000020000000 RBP: 0000000000000086 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000008 R11: 0000000000000212 R12: 00000000006f5f50 R13: 00000000ffffffff R14: 00007f738416f6d4 R15: 0000000000000001 RDS: rds_bind could not find a transport for 172.20.1.187, load rds_tcp or rds_rdma? QAT: Invalid ioctl QAT: Invalid ioctl RDS: rds_bind could not find a transport for 172.20.1.187, load rds_tcp or rds_rdma? QAT: Invalid ioctl QAT: Invalid ioctl encrypted_key: master key parameter '0>ÏìÌtjû;£º©‡Óò¹eIà|‡˜Ãù} Ÿ{¥÷o' is invalid netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor1'. ICMPv6: NA: 5c:3c:bf:77:c1:1c advertised our address fe80::4aa on syz4! encrypted_key: master key parameter '0>ÏìÌtjû;£º©‡Óò¹eIà|‡˜Ãù} Ÿ{¥÷o' is invalid QAT: Invalid ioctl QAT: Invalid ioctl audit: type=1326 audit(1511679306.352:4121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=23639 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0xffff0000 netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. sctp: [Deprecated]: syz-executor3 (pid 23773) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor3 (pid 23773) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60672 sclass=netlink_route_socket pig=23806 comm=%ppp0@¬&#.secur Disabled LAPIC found during irq injection sctp: [Deprecated]: syz-executor7 (pid 23816) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sctp: [Deprecated]: syz-executor7 (pid 23816) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead device gre0 entered promiscuous mode SELinux: unrecognized netlink message: protocol=0 nlmsg_type=60672 sclass=netlink_route_socket pig=23826 comm= sctp: [Deprecated]: syz-executor2 (pid 23878) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 23885) Use of int in max_burst socket option deprecated. Use struct sctp_assoc_value instead QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl pit: kvm: requested 838 ns i8254 timer period limited to 500000 ns sctp: [Deprecated]: syz-executor0 (pid 23970) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor0 (pid 23988) Use of int in maxseg socket option. Use struct sctp_assoc_value instead dccp_invalid_packet: pskb_may_pull failed dccp_invalid_packet: pskb_may_pull failed netlink: 17 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 17 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl device gre0 entered promiscuous mode QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47638 sclass=netlink_route_socket pig=24211 comm=syz-executor1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47638 sclass=netlink_route_socket pig=24216 comm=syz-executor1