netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. INFO: task kworker/1:0:19 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/1:0 D26192 19 2 0x80000000 Workqueue: usb_hub_wq hub_event Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 usb_kill_urb.part.0+0x197/0x220 drivers/usb/core/urb.c:697 usb_kill_urb+0x7c/0x90 drivers/usb/core/urb.c:692 usb_start_wait_urb+0x252/0x4c0 drivers/usb/core/message.c:63 usb_internal_control_msg drivers/usb/core/message.c:101 [inline] usb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:152 usb_get_descriptor+0xc5/0x1b0 drivers/usb/core/message.c:654 usb_get_device_descriptor+0x81/0xf0 drivers/usb/core/message.c:926 hub_port_init+0x74b/0x3120 drivers/usb/core/hub.c:4799 hub_port_connect drivers/usb/core/hub.c:5070 [inline] hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] port_event drivers/usb/core/hub.c:5361 [inline] hub_event+0x1ccd/0x44a0 drivers/usb/core/hub.c:5441 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 5 locks held by kworker/1:0/19: #0: 00000000ef73e89b ((wq_completion)"usb_hub_wq"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000693cb5e0 ((work_completion)(&hub->events)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 0000000010ac41f6 (&dev->mutex){....}, at: device_lock include/linux/device.h:1174 [inline] #2: 0000000010ac41f6 (&dev->mutex){....}, at: hub_event+0x11e/0x44a0 drivers/usb/core/hub.c:5387 #3: 000000003e65882f (&port_dev->status_lock){+.+.}, at: usb_lock_port drivers/usb/core/hub.c:2983 [inline] #3: 000000003e65882f (&port_dev->status_lock){+.+.}, at: hub_port_connect drivers/usb/core/hub.c:5069 [inline] #3: 000000003e65882f (&port_dev->status_lock){+.+.}, at: hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] #3: 000000003e65882f (&port_dev->status_lock){+.+.}, at: port_event drivers/usb/core/hub.c:5361 [inline] #3: 000000003e65882f (&port_dev->status_lock){+.+.}, at: hub_event+0x1cb8/0x44a0 drivers/usb/core/hub.c:5441 #4: 0000000042705db0 (hcd->address0_mutex){+.+.}, at: hub_port_init+0x1b9/0x3120 drivers/usb/core/hub.c:4578 1 lock held by khungtaskd/1570: #0: 00000000d2d036c3 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7798: #0: 00000000550535fa (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 4 locks held by kworker/u4:12/17737: #0: 00000000a2c61e84 ((wq_completion)"%s""netns"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 000000003ee82918 (net_cleanup_work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000008d9a9875 (pernet_ops_rwsem){++++}, at: cleanup_net+0xa8/0x8b0 net/core/net_namespace.c:521 #3: 0000000000cfc662 (rcu_preempt_state.barrier_mutex){+.+.}, at: _rcu_barrier+0x59/0x3e0 kernel/rcu/tree.c:3430 2 locks held by agetty/23728: #0: 00000000b6494ae1 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272 #1: 0000000031c1d464 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4695 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:security_inode_permission+0xd0/0xf0 security/security.c:705 Code: 30 fe 48 89 d8 48 c1 e8 03 80 3c 28 00 75 2d 48 8b 1b 48 85 db 75 b6 45 31 e4 e8 ab b1 30 fe 44 89 e0 5b 5d 41 5c 41 5d 41 5e e8 fa 8d 66 fe e9 66 ff ff ff e8 80 8e 66 fe eb a7 48 89 df e8 RSP: 0018:ffff8880a0897aa0 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8331d354 RDX: 0000000000000000 RSI: ffffffff8331d3c5 RDI: 0000000000000005 RBP: ffff88809b26d3f0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000000 R13: 0000000000000081 R14: ffff88809b26d3f2 R15: ffff88808f7729a9 FS: 00007f5c03ece8c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f5c015c8000 CR3: 00000000a1379000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: inode_permission.part.0+0x104/0x450 fs/namei.c:459 inode_permission fs/namei.c:432 [inline] may_lookup fs/namei.c:1697 [inline] link_path_walk.part.0+0x1a0/0x1230 fs/namei.c:2085 link_path_walk fs/namei.c:2073 [inline] path_parentat+0x51/0x140 fs/namei.c:2367 filename_parentat+0x198/0x590 fs/namei.c:2389 filename_create+0x9e/0x490 fs/namei.c:3621 user_path_create fs/namei.c:3696 [inline] do_mkdirat+0xa0/0x2d0 fs/namei.c:3834 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f5c03189687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffd86e73ce8 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffd86e76c00 RCX: 00007f5c03189687 RDX: 00007f5c03bfaa00 RSI: 00000000000001ed RDI: 000055d8e367e8a0 RBP: 00007ffd86e73d20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffd86e76c00 R15: 00007ffd86e74210 ---------------- Code disassembly (best guess): 0: 30 fe xor %bh,%dh 2: 48 89 d8 mov %rbx,%rax 5: 48 c1 e8 03 shr $0x3,%rax 9: 80 3c 28 00 cmpb $0x0,(%rax,%rbp,1) d: 75 2d jne 0x3c f: 48 8b 1b mov (%rbx),%rbx 12: 48 85 db test %rbx,%rbx 15: 75 b6 jne 0xffffffcd 17: 45 31 e4 xor %r12d,%r12d 1a: e8 ab b1 30 fe callq 0xfe30b1ca 1f: 44 89 e0 mov %r12d,%eax 22: 5b pop %rbx 23: 5d pop %rbp 24: 41 5c pop %r12 26: 41 5d pop %r13 28: 41 5e pop %r14 * 2a: c3 retq <-- trapping instruction 2b: e8 fa 8d 66 fe callq 0xfe668e2a 30: e9 66 ff ff ff jmpq 0xffffff9b 35: e8 80 8e 66 fe callq 0xfe668eba 3a: eb a7 jmp 0xffffffe3 3c: 48 89 df mov %rbx,%rdi 3f: e8 .byte 0xe8