xs_tcp_setup_socket: connect returned unhandled error -113 xs_tcp_setup_socket: connect returned unhandled error -113 xs_tcp_setup_socket: connect returned unhandled error -113 ====================================================== WARNING: possible circular locking dependency detected 4.13.0+ #76 Not tainted ------------------------------------------------------ kworker/0:2/1271 is trying to acquire lock: ("xprtiod"){+.+.}, at: [] start_flush_work kernel/workqueue.c:2857 [inline] ("xprtiod"){+.+.}, at: [] flush_work+0x5a2/0x8f0 kernel/workqueue.c:2889 but task is already holding lock: ((&task->u.tk_work)){+.+.}, at: [] process_one_work+0xb2c/0x1bd0 kernel/workqueue.c:2094 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 ((&task->u.tk_work)){+.+.}: check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 process_one_work+0xba2/0x1bd0 kernel/workqueue.c:2095 worker_thread+0x223/0x1860 kernel/workqueue.c:2253 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 -> #0 ("xprtiod"){+.+.}: check_prev_add+0x865/0x1520 kernel/locking/lockdep.c:1894 check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 start_flush_work kernel/workqueue.c:2858 [inline] flush_work+0x5c7/0x8f0 kernel/workqueue.c:2889 __cancel_work_timer+0x30a/0x7e0 kernel/workqueue.c:2961 cancel_work_sync+0x17/0x20 kernel/workqueue.c:2997 xprt_destroy+0xa1/0x130 net/sunrpc/xprt.c:1418 xprt_destroy_kref net/sunrpc/xprt.c:1428 [inline] kref_put include/linux/kref.h:70 [inline] xprt_put+0x38/0x40 net/sunrpc/xprt.c:1452 rpc_task_release_client+0x299/0x430 net/sunrpc/clnt.c:986 rpc_release_resources_task+0x7f/0xa0 net/sunrpc/sched.c:1020 rpc_release_task net/sunrpc/sched.c:1059 [inline] __rpc_execute+0x4d9/0xe70 net/sunrpc/sched.c:824 rpc_async_schedule+0x16/0x20 net/sunrpc/sched.c:848 process_one_work+0xbfa/0x1bd0 kernel/workqueue.c:2119 worker_thread+0x223/0x1860 kernel/workqueue.c:2253 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock((&task->u.tk_work)); lock("xprtiod"); lock((&task->u.tk_work)); lock("xprtiod"); *** DEADLOCK *** 2 locks held by kworker/0:2/1271: #0: ("rpciod"){+.+.}, at: [] __write_once_size include/linux/compiler.h:305 [inline] #0: ("rpciod"){+.+.}, at: [] atomic64_set arch/x86/include/asm/atomic64_64.h:33 [inline] #0: ("rpciod"){+.+.}, at: [] atomic_long_set include/asm-generic/atomic-long.h:56 [inline] #0: ("rpciod"){+.+.}, at: [] set_work_data kernel/workqueue.c:617 [inline] #0: ("rpciod"){+.+.}, at: [] set_work_pool_and_clear_pending kernel/workqueue.c:644 [inline] #0: ("rpciod"){+.+.}, at: [] process_one_work+0xad4/0x1bd0 kernel/workqueue.c:2090 #1: ((&task->u.tk_work)){+.+.}, at: [] process_one_work+0xb2c/0x1bd0 kernel/workqueue.c:2094 stack backtrace: CPU: 0 PID: 1271 Comm: kworker/0:2 Not tainted 4.13.0+ #76 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: rpciod rpc_async_schedule Call Trace: __dump_stack lib/dump_stack.c:16 [inline] dump_stack+0x194/0x257 lib/dump_stack.c:52 print_circular_bug+0x503/0x710 kernel/locking/lockdep.c:1259 check_prev_add+0x865/0x1520 kernel/locking/lockdep.c:1894 check_prevs_add kernel/locking/lockdep.c:2020 [inline] validate_chain kernel/locking/lockdep.c:2469 [inline] __lock_acquire+0x328f/0x4620 kernel/locking/lockdep.c:3498 lock_acquire+0x1d5/0x580 kernel/locking/lockdep.c:4002 start_flush_work kernel/workqueue.c:2858 [inline] flush_work+0x5c7/0x8f0 kernel/workqueue.c:2889 __cancel_work_timer+0x30a/0x7e0 kernel/workqueue.c:2961 cancel_work_sync+0x17/0x20 kernel/workqueue.c:2997 xprt_destroy+0xa1/0x130 net/sunrpc/xprt.c:1418 xprt_destroy_kref net/sunrpc/xprt.c:1428 [inline] kref_put include/linux/kref.h:70 [inline] xprt_put+0x38/0x40 net/sunrpc/xprt.c:1452 rpc_task_release_client+0x299/0x430 net/sunrpc/clnt.c:986 rpc_release_resources_task+0x7f/0xa0 net/sunrpc/sched.c:1020 rpc_release_task net/sunrpc/sched.c:1059 [inline] __rpc_execute+0x4d9/0xe70 net/sunrpc/sched.c:824 rpc_async_schedule+0x16/0x20 net/sunrpc/sched.c:848 process_one_work+0xbfa/0x1bd0 kernel/workqueue.c:2119 worker_thread+0x223/0x1860 kernel/workqueue.c:2253 kthread+0x39c/0x470 kernel/kthread.c:231 ret_from_fork+0x2a/0x40 arch/x86/entry/entry_64.S:431 irq bypass consumer (token ffff8801c8877000) registration fails: -16 irq bypass consumer (token ffff8801c24d33c0) registration fails: -16 irq bypass consumer (token ffff8801d06abb40) registration fails: -16 irq bypass consumer (token ffff8801c324d900) registration fails: -16 irq bypass consumer (token ffff8801c36310c0) registration fails: -16 irq bypass consumer (token ffff8801d06abf00) registration fails: -16 irq bypass consumer (token ffff8801c1bbb600) registration fails: -16 irq bypass consumer (token ffff8801d95fa0c0) registration fails: -16 irq bypass consumer (token ffff8801d52e1f00) registration fails: -16 irq bypass consumer (token ffff8801d52e1cc0) registration fails: -16 irq bypass consumer (token ffff8801d95fa240) registration fails: -16 irq bypass consumer (token ffff8801c1e06480) registration fails: -16 irq bypass consumer (token ffff8801bf8379c0) registration fails: -16 irq bypass consumer (token ffff8801c24c0300) registration fails: -16 irq bypass consumer (token ffff8801c750af00) registration fails: -16 irq bypass consumer (token ffff8801d85d7180) registration fails: -16 sctp: [Deprecated]: syz-executor1 (pid 10316) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor1 (pid 10316) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor1 (pid 10393) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor5 (pid 10403) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor5 (pid 10403) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 10424) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor3 (pid 10435) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor1 (pid 10393) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 10424) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor3 (pid 10435) Use of int in maxseg socket option. Use struct sctp_assoc_value instead net_ratelimit: 10 callbacks suppressed Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable nla_parse: 14 callbacks suppressed netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. sctp: [Deprecated]: syz-executor6 (pid 10679) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. sctp: [Deprecated]: syz-executor6 (pid 10679) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor0 (pid 10691) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 10695) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor7 (pid 10694) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. netlink: 3 bytes leftover after parsing attributes in process `syz-executor1'. sctp: [Deprecated]: syz-executor7 (pid 10694) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor6 (pid 10695) Use of int in maxseg socket option. Use struct sctp_assoc_value instead netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. sctp: [Deprecated]: syz-executor2 (pid 10742) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor0 (pid 10756) Use of int in maxseg socket option. Use struct sctp_assoc_value instead sctp: [Deprecated]: syz-executor2 (pid 10742) Use of int in maxseg socket option. Use struct sctp_assoc_value instead 9pnet_virtio: no channels available for device ./file0 ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:07aa on syz7! 9pnet_virtio: no channels available for device ./file0 ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:07aa on syz7! ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:07aa on syz7! ICMPv6: NA: someone advertises our address fe80:0000:0000:0000:0000:0000:0000:07aa on syz7! 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 9pnet_virtio: no channels available for device ./file0 ?: renamed from sit0 sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor4 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor4 not setting count and/or reply_len properly SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=11150 comm=syz-executor6 ?: renamed from sit0 sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor4 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor4 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor6 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor0 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor6 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor0 not setting count and/or reply_len properly sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor6 not setting count and/or reply_len properly ?: renamed from sit0 sg_write: data in/out 327644/4384 bytes for SCSI command 0x0-- guessing data in; program syz-executor6 not setting count and/or reply_len properly mmap: syz-executor5 (11319) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. kvm [11321]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000 kvm [11346]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000 kvm [11349]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000 kvm [11349]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000 kvm [11346]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000 kvm [11461]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000 kvm [11461]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0xffffffffffff8000