================================ WARNING: inconsistent lock state 4.17.0-rc2+ #22 Not tainted -------------------------------- inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. sshd/4482 [HC1[1]:SC0[0]:HE0:SE1] takes: (ptrval) (fs_reclaim){?.+.}, at: fs_reclaim_acquire.part.82+0x0/0x30 mm/page_alloc.c:463 {HARDIRQ-ON-W} state was registered at: lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3920 fs_reclaim_acquire.part.82+0x24/0x30 mm/page_alloc.c:3739 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3740 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc_node mm/slab.c:3299 [inline] kmem_cache_alloc_node_trace+0x39/0x770 mm/slab.c:3661 kmalloc_node include/linux/slab.h:550 [inline] kzalloc_node include/linux/slab.h:712 [inline] alloc_worker+0xbd/0x2e0 kernel/workqueue.c:1704 init_rescuer.part.25+0x1f/0x190 kernel/workqueue.c:4000 init_rescuer kernel/workqueue.c:3997 [inline] workqueue_init+0x51f/0x7d0 kernel/workqueue.c:5732 kernel_init_freeable+0x2ad/0x58e init/main.c:1115 kernel_init+0x11/0x1b3 init/main.c:1053 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:412 irq event stamp: 134494 hardirqs last enabled at (134493): [] seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] hardirqs last enabled at (134493): [] read_seqcount_begin include/linux/seqlock.h:164 [inline] hardirqs last enabled at (134493): [] ktime_get_ts64+0x405/0x510 kernel/time/timekeeping.c:850 hardirqs last disabled at (134494): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (134486): [] spin_unlock_bh include/linux/spinlock.h:355 [inline] softirqs last enabled at (134486): [] release_sock+0x1e2/0x2b0 net/core/sock.c:2864 softirqs last disabled at (134484): [] spin_lock_bh include/linux/spinlock.h:315 [inline] softirqs last disabled at (134484): [] release_sock+0x74/0x2b0 net/core/sock.c:2851 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock(fs_reclaim); lock(fs_reclaim); *** DEADLOCK *** 1 lock held by sshd/4482: #0: (ptrval) (rcu_read_lock){....}, at: core_sys_select+0xb4/0xb60 fs/select.c:611 stack backtrace: CPU: 0 PID: 4482 Comm: sshd Not tainted 4.17.0-rc2+ #22 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 print_usage_bug.cold.59+0x320/0x41a kernel/locking/lockdep.c:2542 valid_state kernel/locking/lockdep.c:2555 [inline] mark_lock_irq kernel/locking/lockdep.c:2749 [inline] mark_lock+0x1034/0x19e0 kernel/locking/lockdep.c:3147 mark_irqflags kernel/locking/lockdep.c:3022 [inline] __lock_acquire+0x1595/0x5140 kernel/locking/lockdep.c:3388 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. lock_acquire+0x1dc/0x520 kernel/locking/lockdep.c:3920 fs_reclaim_acquire.part.82+0x24/0x30 mm/page_alloc.c:3739 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3740 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x45/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:arch_local_save_flags arch/x86/include/asm/paravirt.h:778 [inline] RIP: 0010:arch_local_irq_save arch/x86/include/asm/paravirt.h:800 [inline] RIP: 0010:lock_release+0xe8/0xa10 kernel/locking/lockdep.c:3935 RSP: 0018:ffff8801cee7f968 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffd5 RAX: dffffc0000000000 RBX: 1ffff10039dcff32 RCX: ffffffff81c60bf4 RDX: 1ffffffff11a315c RSI: 0000000000000001 RDI: ffffffff88d18ae0 RBP: ffff8801cee7fa98 R08: 0000000000000000 R09: ffffed003b5c46c2 R10: ffffed003b5c46c2 R11: ffff8801dae23613 R12: ffff8801cee7fa70 R13: ffffffff88d8e660 R14: 0000000000000001 R15: ffff8801b2bfa740 rcu_lock_release include/linux/rcupdate.h:251 [inline] rcu_read_unlock include/linux/rcupdate.h:688 [inline] core_sys_select+0x25e/0xb60 fs/select.c:618 kern_select+0x1b7/0x250 fs/select.c:696 __do_sys_select fs/select.c:705 [inline] __se_sys_select fs/select.c:702 [inline] __x64_sys_select+0xbe/0x150 fs/select.c:702 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa5bbd0fdd3 RSP: 002b:00007ffe28403138 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 RAX: ffffffffffffffda RBX: 00007ffe284031c0 RCX: 00007fa5bbd0fdd3 RDX: 000055fa2a023aa0 RSI: 000055fa2a023ac0 RDI: 000000000000000c RBP: 000055fa288148dc R08: 00007ffe28403160 R09: 0101010101010101 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe284031c8 R13: 0000000000000000 R14: 00007ffe284031b8 R15: 00007ffe284031bc BUG: sleeping function called from invalid context at mm/slab.h:421 in_atomic(): 1, irqs_disabled(): 1, pid: 4482, name: sshd INFO: lockdep is turned off. irq event stamp: 134494 hardirqs last enabled at (134493): [] seqcount_lockdep_reader_access include/linux/seqlock.h:83 [inline] hardirqs last enabled at (134493): [] read_seqcount_begin include/linux/seqlock.h:164 [inline] hardirqs last enabled at (134493): [] ktime_get_ts64+0x405/0x510 kernel/time/timekeeping.c:850 hardirqs last disabled at (134494): [] interrupt_entry+0xb5/0xf0 arch/x86/entry/entry_64.S:625 softirqs last enabled at (134486): [] spin_unlock_bh include/linux/spinlock.h:355 [inline] softirqs last enabled at (134486): [] release_sock+0x1e2/0x2b0 net/core/sock.c:2864 softirqs last disabled at (134484): [] spin_lock_bh include/linux/spinlock.h:315 [inline] softirqs last disabled at (134484): [] release_sock+0x74/0x2b0 net/core/sock.c:2851 CPU: 0 PID: 4482 Comm: sshd Not tainted 4.17.0-rc2+ #22 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1b9/0x294 lib/dump_stack.c:113 ___might_sleep.cold.87+0x11f/0x13a kernel/sched/core.c:6188 __might_sleep+0x95/0x190 kernel/sched/core.c:6141 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3378 [inline] __do_kmalloc mm/slab.c:3716 [inline] __kmalloc+0x2b9/0x760 mm/slab.c:3727 kmalloc_array include/linux/slab.h:631 [inline] kcalloc include/linux/slab.h:642 [inline] numa_crng_init drivers/char/random.c:798 [inline] crng_reseed+0x427/0x920 drivers/char/random.c:923 credit_entropy_bits+0x98d/0xa30 drivers/char/random.c:708 add_interrupt_randomness+0x494/0x860 drivers/char/random.c:1254 handle_irq_event_percpu+0xf9/0x1c0 kernel/irq/handle.c:191 handle_irq_event+0xa7/0x135 kernel/irq/handle.c:206 handle_edge_irq+0x20f/0x870 kernel/irq/chip.c:791 generic_handle_irq_desc include/linux/irqdesc.h:159 [inline] handle_irq+0x18c/0x2e7 arch/x86/kernel/irq_64.c:77 do_IRQ+0x78/0x190 arch/x86/kernel/irq.c:245 common_interrupt+0xf/0xf arch/x86/entry/entry_64.S:642 RIP: 0010:arch_local_save_flags arch/x86/include/asm/paravirt.h:778 [inline] RIP: 0010:arch_local_irq_save arch/x86/include/asm/paravirt.h:800 [inline] RIP: 0010:lock_release+0xe8/0xa10 kernel/locking/lockdep.c:3935 RSP: 0018:ffff8801cee7f968 EFLAGS: 00000246 ORIG_RAX: ffffffffffffffd5 RAX: dffffc0000000000 RBX: 1ffff10039dcff32 RCX: ffffffff81c60bf4 RDX: 1ffffffff11a315c RSI: 0000000000000001 RDI: ffffffff88d18ae0 RBP: ffff8801cee7fa98 R08: 0000000000000000 R09: ffffed003b5c46c2 R10: ffffed003b5c46c2 R11: ffff8801dae23613 R12: ffff8801cee7fa70 R13: ffffffff88d8e660 R14: 0000000000000001 R15: ffff8801b2bfa740 rcu_lock_release include/linux/rcupdate.h:251 [inline] rcu_read_unlock include/linux/rcupdate.h:688 [inline] core_sys_select+0x25e/0xb60 fs/select.c:618 kern_select+0x1b7/0x250 fs/select.c:696 __do_sys_select fs/select.c:705 [inline] __se_sys_select fs/select.c:702 [inline] __x64_sys_select+0xbe/0x150 fs/select.c:702 do_syscall_64+0x1b1/0x800 arch/x86/entry/common.c:287 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fa5bbd0fdd3 RSP: 002b:00007ffe28403138 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 RAX: ffffffffffffffda RBX: 00007ffe284031c0 RCX: 00007fa5bbd0fdd3 RDX: 000055fa2a023aa0 RSI: 000055fa2a023ac0 RDI: 000000000000000c RBP: 000055fa288148dc R08: 00007ffe28403160 R09: 0101010101010101 R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe284031c8 R13: 0000000000000000 R14: 00007ffe284031b8 R15: 00007ffe284031bc random: crng init done nla_parse: 3 callbacks suppressed netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor5'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. netlink: 20 bytes leftover after parsing attributes in process `syz-executor6'. sctp: [Deprecated]: syz-executor6 (pid 9772) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 9794) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 9825) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 9873) Use of int in maxseg socket option. Use struct sctp_assoc_value instead device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode