netlink: 104 bytes leftover after parsing attributes in process `syz-executor.4'. INFO: task syz-executor.5:21679 blocked for more than 140 seconds. Not tainted 4.14.198-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D28288 21679 6371 0x00000004 Call Trace: context_switch kernel/sched/core.c:2808 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3384 schedule+0x8d/0x1b0 kernel/sched/core.c:3428 schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1731 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 flush_work+0x3fe/0x770 kernel/workqueue.c:2893 __cancel_work_timer+0x321/0x460 kernel/workqueue.c:2964 p9_conn_destroy net/9p/trans_fd.c:898 [inline] p9_fd_close+0x28d/0x420 net/9p/trans_fd.c:925 p9_client_create+0x736/0x12c0 net/9p/client.c:1095 v9fs_session_init+0x1c5/0x1540 fs/9p/v9fs.c:422 v9fs_mount+0x73/0x860 fs/9p/vfs_super.c:135 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2549 [inline] do_mount+0xe53/0x2a00 fs/namespace.c:2879 SYSC_mount fs/namespace.c:3095 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3072 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x45d5f9 RSP: 002b:00007f09965a5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 0000000000021300 RCX: 000000000045d5f9 RDX: 0000000020000080 RSI: 0000000020000300 RDI: 0000000000000000 RBP: 000000000118d030 R08: 0000000020000740 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cfec R13: 00007ffdde853f5f R14: 00007f09965a69c0 R15: 000000000118cfec Showing all locks held in the system: 1 lock held by khungtaskd/1067: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 2 locks held by kworker/0:2/2874: #0: ("events"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2087 #1: ((&m->rq)){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2091 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1067 Comm: khungtaskd Not tainted 4.14.198-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x283 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x17f lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 3639 Comm: systemd-journal Not tainted 4.14.198-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880948086c0 task.stack: ffff888094810000 RIP: 0010:qlink_free mm/kasan/quarantine.c:150 [inline] RIP: 0010:qlist_free_all+0x79/0x140 mm/kasan/quarantine.c:166 RSP: 0018:ffff888094817b40 EFLAGS: 00000082 RAX: 000000000000000b RBX: ffff88809b9423c0 RCX: 000000000000002e RDX: 000000000000000c RSI: ffffffff86e462c0 RDI: ffff88809b9423c0 RBP: 0000000000000000 R08: ffff88812fffb830 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880980ab040 R13: ffff888094817b78 R14: ffff88812fe50640 R15: 0000000000000286 FS: 00007f3564cfe8c0(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f35621b8000 CR3: 00000000948dd000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x185/0x200 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:536 slab_post_alloc_hook mm/slab.h:442 [inline] slab_alloc mm/slab.c:3390 [inline] kmem_cache_alloc+0x111/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 getname fs/namei.c:209 [inline] user_path_create fs/namei.c:3732 [inline] SYSC_mkdirat fs/namei.c:3864 [inline] SyS_mkdirat+0x83/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f3563fba687 RSP: 002b:00007ffd49199c88 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffd4919cba0 RCX: 00007f3563fba687 RDX: 00007f3564a2ba00 RSI: 00000000000001ed RDI: 000055adf97e38c0 RBP: 00007ffd49199cc0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffd4919cba0 R15: 00007ffd4919a1b0 Code: f4 4b 06 00 49 89 c7 0f 84 d0 00 00 00 fa 66 0f 1f 44 00 00 e8 59 13 c1 ff 48 c7 c2 1b 74 85 81 48 89 de 4c 89 f7 e8 c7 bc ff ff <41> f7 c7 00 02 00 00 75 66 48 83 3d be f4 4b 06 00 0f 84 9d 00