RDS: rds_bind could not find a transport for 172.20.6.170, load rds_tcp or rds_rdma?
BUG: sleeping function called from invalid context at net/core/sock.c:2761
in_atomic(): 1, irqs_disabled(): 0, pid: 12996, name: kworker/1:4
2 locks held by kworker/1:4/12996:
 #0:  ((wq_completion)"%s"name){+.+.}, at: [<ffffffff8147c254>] __write_once_size include/linux/compiler.h:207 [inline]
 #0:  ((wq_completion)"%s"name){+.+.}, at: [<ffffffff8147c254>] atomic64_set arch/x86/include/asm/atomic64_64.h:34 [inline]
 #0:  ((wq_completion)"%s"name){+.+.}, at: [<ffffffff8147c254>] atomic_long_set include/asm-generic/atomic-long.h:57 [inline]
 #0:  ((wq_completion)"%s"name){+.+.}, at: [<ffffffff8147c254>] set_work_data kernel/workqueue.c:618 [inline]
 #0:  ((wq_completion)"%s"name){+.+.}, at: [<ffffffff8147c254>] set_work_pool_and_clear_pending kernel/workqueue.c:645 [inline]
 #0:  ((wq_completion)"%s"name){+.+.}, at: [<ffffffff8147c254>] process_one_work+0xad4/0x1be0 kernel/workqueue.c:2083
 #1:  ((work_completion)(&squeue->work)){+.+.}, at: [<ffffffff8147c2af>] process_one_work+0xb2f/0x1be0 kernel/workqueue.c:2087
CPU: 1 PID: 12996 Comm: kworker/1:4 Not tainted 4.14.0+ #192
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: pdecrypt padata_serial_worker
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x194/0x257 lib/dump_stack.c:53
 ___might_sleep+0x2b2/0x470 kernel/sched/core.c:6060
 __might_sleep+0x95/0x190 kernel/sched/core.c:6013
 lock_sock_nested+0x37/0x110 net/core/sock.c:2761
 lock_sock include/net/sock.h:1465 [inline]
 af_alg_async_cb+0x86/0x1a0 crypto/af_alg.c:1039
 aead_request_complete include/crypto/internal/aead.h:75 [inline]
 pcrypt_aead_serial+0x75/0xa0 crypto/pcrypt.c:123
 padata_serial_worker+0x476/0x750 kernel/padata.c:348
 process_one_work+0xbfd/0x1be0 kernel/workqueue.c:2112
 worker_thread+0x223/0x1990 kernel/workqueue.c:2246
 kthread+0x37a/0x440 kernel/kthread.c:238
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:437
RDS: rds_bind could not find a transport for 172.20.6.170, load rds_tcp or rds_rdma?
syz5: Invalid MTU 225897 requested, hw max 65535
sctp: [Deprecated]: syz-executor0 (pid 29698) Use of int in maxseg socket option.
Use struct sctp_assoc_value instead
syz5: Invalid MTU 225897 requested, hw max 65535
device gre0 entered promiscuous mode
device gre0 entered promiscuous mode
kauditd_printk_skb: 347 callbacks suppressed
audit: type=1326 audit(1511580464.956:4773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.956:4774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.956:4775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.956:4776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.957:4777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.957:4778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.957:4779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.957:4780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.957:4781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
audit: type=1326 audit(1511580464.957:4782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=29721 comm="syz-executor5" exe="/root/syz-executor5" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x50000
netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'.
netlink: 9 bytes leftover after parsing attributes in process `syz-executor1'.
netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'.
netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'.
sctp: [Deprecated]: syz-executor1 (pid 29921) Use of struct sctp_assoc_value in delayed_ack socket option.
Use struct sctp_sack_info instead
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'.
sctp: [Deprecated]: syz-executor1 (pid 29929) Use of struct sctp_assoc_value in delayed_ack socket option.
Use struct sctp_sack_info instead
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'.
9pnet_virtio: no channels available for device ./file0/file0
9pnet_virtio: no channels available for device ./file0/file0
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
device gre0 entered promiscuous mode
RDS: rds_bind could not find a transport for 0.0.0.7, load rds_tcp or rds_rdma?
RDS: rds_bind could not find a transport for 0.0.0.7, load rds_tcp or rds_rdma?
device gre0 entered promiscuous mode
kvm_hv_set_msr: 13 callbacks suppressed
kvm [30405]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008f data 0x71
QAT: Invalid ioctl
kvm [30405]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008e data 0x71
kvm [30405]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008d data 0x71
kvm [30405]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008c data 0x71
QAT: Invalid ioctl
kvm [30405]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008b data 0xd1
kvm [30405]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008a data 0x31
kvm [30446]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008f data 0x71
kvm [30446]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008e data 0x71
kvm [30446]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008d data 0x71
kvm [30446]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x4000008c data 0x71
device gre0 entered promiscuous mode
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
QAT: Invalid ioctl
sctp: [Deprecated]: syz-executor1 (pid 30518) Use of struct sctp_assoc_value in delayed_ack socket option.
Use struct sctp_sack_info instead
QAT: Invalid ioctl
device gre0 entered promiscuous mode
sctp: [Deprecated]: syz-executor1 (pid 30518) Use of struct sctp_assoc_value in delayed_ack socket option.
Use struct sctp_sack_info instead
QAT: Invalid ioctl
sctp: [Deprecated]: syz-executor6 (pid 30584) Use of int in max_burst socket option.
Use struct sctp_assoc_value instead
sctp: [Deprecated]: syz-executor6 (pid 30597) Use of int in max_burst socket option.
Use struct sctp_assoc_value instead
device lo left promiscuous mode
device lo entered promiscuous mode
IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
device lo left promiscuous mode
SELinux:  unknown mount option
kauditd_printk_skb: 390 callbacks suppressed
audit: type=1326 audit(1511580470.288:5171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=329 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
SELinux:  unknown mount option
audit: type=1326 audit(1511580470.299:5174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=9 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=257 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
audit: type=1326 audit(1511580470.299:5180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=kernel pid=30628 comm="syz-executor2" exe="/root/syz-executor2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x452879 code=0x7ffc0000
device gre0 entered promiscuous mode
device gre0 left promiscuous mode
device gre0 entered promiscuous mode
irq bypass consumer (token ffff8801d1ae0540) registration fails: -16
nla_parse: 4 callbacks suppressed
netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'.
netlink: 13 bytes leftover after parsing attributes in process `syz-executor5'.
netlink: 13 bytes leftover after parsing attributes in process `syz-executor5'.
device gre0 entered promiscuous mode
Subscription rejected, illegal request
Subscription rejected, illegal request
netlink: 17 bytes leftover after parsing attributes in process `syz-executor6'.
device lo entered promiscuous mode
device lo left promiscuous mode
netlink: 17 bytes leftover after parsing attributes in process `syz-executor6'.
device lo entered promiscuous mode
device lo left promiscuous mode
device gre0 entered promiscuous mode
netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'.
netlink: 2 bytes leftover after parsing attributes in process `syz-executor3'.
Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1
netlink: 1 bytes leftover after parsing attributes in process `security'.
netlink: 1 bytes leftover after parsing attributes in process `syz-executor3'.