RDS: rds_bind could not find a transport for 172.20.7.170, load rds_tcp or rds_rdma? BUG: sleeping function called from invalid context at net/core/sock.c:2761 in_atomic(): 1, irqs_disabled(): 0, pid: 3735, name: kworker/1:4 2 locks held by kworker/1:4/3735: #0: ((wq_completion)"%s"name){+.+.}, at: [] __write_once_size include/linux/compiler.h:207 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:57 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_data kernel/workqueue.c:618 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline] #0: ((wq_completion)"%s"name){+.+.}, at: [] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083 #1: ((work_completion)(&squeue->work)){+.+.}, at: [] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087 CPU: 1 PID: 3735 Comm: kworker/1:4 Not tainted 4.14.0+ #192 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pdecrypt padata_serial_worker Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:53 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060 __might_sleep+0x95/0x190 kernel/sched/core.c:6013 lock_sock_nested+0x37/0x110 net/core/sock.c:2761 lock_sock include/net/sock.h:1465 [inline] af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039 aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123 padata_serial_worker+0x476/0x750 kernel/padata.c:348 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112 worker_thread+0x223/0x1990 kernel/workqueue.c:2246 kthread+0x37a/0x440 kernel/kthread.c:238 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437 audit: type=1326 audit(1511577323.822:26637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.822:26638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.823:26639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=22 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.824:26640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.824:26641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.825:26642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=9 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.825:26643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.825:26644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.826:26645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=41 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577323.826:26646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=7800 comm="syz-executor4" exe="/root/syz-executor4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 sg_write: data in/out 52077/2 bytes for SCSI command 0xff-- guessing data in; program syz-executor0 not setting count and/or reply_len properly device gre0 entered promiscuous mode sg_write: data in/out 52077/2 bytes for SCSI command 0xff-- guessing data in; program syz-executor0 not setting count and/or reply_len properly netlink: 104 bytes leftover after parsing attributes in process `syz-executor0'. encrypted_key: master key parameter '0>ÏìÌtjû;£º©‡Óò¹eIà|‡˜Ãù} Ÿ{¥÷o' is invalid netlink: 104 bytes leftover after parsing attributes in process `syz-executor0'. QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl QAT: Invalid ioctl kvm_hv_get_msr: 226 callbacks suppressed kvm [8003]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008f kvm [8003]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008e kvm [8003]: vcpu0, guest rIP: 0x9135 Hyper-V unhandled rdmsr: 0x4000008d loop_reread_partitions: partition scan of loop4 () failed (rc=-13) device lo entered promiscuous mode IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready Empty option to dns_resolver key QAT: Invalid ioctl encrypted_key: master key parameter '0>ÏìÌtjû;£º©‡Óò¹eIà|‡˜Ãù} Ÿ{¥÷o' is invalid irq bypass consumer (token ffff8801db121c00) registration fails: -16 QAT: Invalid ioctl nla_parse: 2 callbacks suppressed netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 16 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. could not allocate digest TFM handle ctr(des3_ede) netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. could not allocate digest TFM handle ctr(des3_ede) netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. device gre0 entered promiscuous mode device gre0 entered promiscuous mode netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. netlink: 1 bytes leftover after parsing attributes in process `syz-executor7'. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14917 sclass=netlink_route_socket pig=8504 comm=syz-executor5 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14917 sclass=netlink_route_socket pig=8512 comm=syz-executor5 NFS: bad mount option value specified: v; NFS: bad mount option value specified: v; SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: failure in selinux_parse_skb(), unable to parse packet QAT: Invalid ioctl device lo entered promiscuous mode QAT: Invalid ioctl device lo left promiscuous mode sctp: [Deprecated]: syz-executor3 (pid 8945) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead kauditd_printk_skb: 380 callbacks suppressed audit: type=1326 audit(1511577331.529:27027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.529:27028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.559:27029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.559:27030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45561a code=0x7ffc0000 audit: type=1326 audit(1511577331.559:27031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=9 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.559:27032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.560:27033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.560:27034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.562:27035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 audit: type=1326 audit(1511577331.562:27036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=8948 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000 sctp: [Deprecated]: syz-executor3 (pid 8952) Use of struct sctp_assoc_value in delayed_ack socket option. Use struct sctp_sack_info instead sd 0:0:1:0: [sg0] tag#0 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK sd 0:0:1:0: [sg0] tag#0 CDB: Test Unit Ready sd 0:0:1:0: [sg0] tag#0 CDB[00]: 00 00 00 00 00 00 01 00 01 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#0 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 sd 0:0:1:0: [sg0] tag#0 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 IPv6: Can't replace route, no match found sd 0:0:1:0: [sg0] tag#0 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 QAT: Invalid ioctl QAT: Invalid ioctl IPv6: Can't replace route, no match found SELinux: failure in selinux_parse_skb(), unable to parse packet SELinux: failure in selinux_parse_skb(), unable to parse packet device gre0 entered promiscuous mode nla_parse: 16 callbacks suppressed netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'.