netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. INFO: task kworker/1:4:9344 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. netlink: 5 bytes leftover after parsing attributes in process `syz-executor.3'. kworker/1:4 D25816 9344 2 0x80000000 Workqueue: usb_hub_wq hub_event Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 usb_kill_urb.part.0+0x197/0x220 drivers/usb/core/urb.c:697 usb_kill_urb+0x7c/0x90 drivers/usb/core/urb.c:692 usb_start_wait_urb+0x252/0x4c0 drivers/usb/core/message.c:63 usb_internal_control_msg drivers/usb/core/message.c:101 [inline] usb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:152 hub_port_init+0x12dc/0x3120 drivers/usb/core/hub.c:4704 hub_port_connect drivers/usb/core/hub.c:5070 [inline] hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] port_event drivers/usb/core/hub.c:5361 [inline] hub_event+0x1ccd/0x44a0 drivers/usb/core/hub.c:5441 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 000000001c6a47ac (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 3 locks held by systemd-udevd/4703: 1 lock held by in:imklog/7813: #0: 000000008c4ca087 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 1 lock held by syz-executor.5/8324: #0: 00000000097f20a1 (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline] #0: 00000000097f20a1 (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667 5 locks held by kworker/1:4/9344: #0: 00000000e3ce90ce ((wq_completion)"usb_hub_wq"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 000000007732086e ((work_completion)(&hub->events)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 0000000077149018 (&dev->mutex){....}, at: device_lock include/linux/device.h:1174 [inline] #2: 0000000077149018 (&dev->mutex){....}, at: hub_event+0x11e/0x44a0 drivers/usb/core/hub.c:5387 #3: 00000000318bf58d (&port_dev->status_lock){+.+.}, at: usb_lock_port drivers/usb/core/hub.c:2983 [inline] #3: 00000000318bf58d (&port_dev->status_lock){+.+.}, at: hub_port_connect drivers/usb/core/hub.c:5069 [inline] #3: 00000000318bf58d (&port_dev->status_lock){+.+.}, at: hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] #3: 00000000318bf58d (&port_dev->status_lock){+.+.}, at: port_event drivers/usb/core/hub.c:5361 [inline] #3: 00000000318bf58d (&port_dev->status_lock){+.+.}, at: hub_event+0x1cb8/0x44a0 drivers/usb/core/hub.c:5441 #4: 000000007b9bc889 (hcd->address0_mutex){+.+.}, at: hub_port_init+0x1b9/0x3120 drivers/usb/core/hub.c:4578 2 locks held by kworker/0:2/774: #0: 000000008004ef0a ((wq_completion)"rcu_gp"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000cb839d30 ((work_completion)(&rew.rew_work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 1 lock held by syz-executor.2/13949: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4687 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 RIP: 0010:trace_lock_acquire include/trace/events/lock.h:13 [inline] RIP: 0010:lock_acquire+0x139/0x3c0 kernel/locking/lockdep.c:3907 Code: 00 c7 83 84 08 00 00 01 00 00 00 e9 e1 00 00 00 65 8b 05 6a 2d b6 7e 83 f8 07 0f 87 e2 01 00 00 89 c0 48 0f a3 05 7f 8b db 09 <0f> 82 95 01 00 00 4c 8b 4c 24 08 44 89 ea 6a 00 48 89 ef 6a 00 45 RSP: 0018:ffff8880a11a78e8 EFLAGS: 00000097 RAX: 0000000000000000 RBX: ffff8880b4b084a8 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: ffffffff83771e31 RDI: ffffffff89f6d4a0 RBP: ffff88823fff8e18 R08: 0000000000000002 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000009 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000001 FS: 00007f6cea9f18c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff599aeed70 CR3: 00000000a11d5000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: seqcount_lockdep_reader_access include/linux/seqlock.h:81 [inline] read_seqcount_begin include/linux/seqlock.h:164 [inline] read_seqbegin include/linux/seqlock.h:440 [inline] zone_span_seqbegin include/linux/memory_hotplug.h:65 [inline] page_outside_zone_boundaries mm/page_alloc.c:491 [inline] bad_range+0xc0/0x3c0 mm/page_alloc.c:520 __free_one_page mm/page_alloc.c:820 [inline] free_one_page+0x12b/0x10b0 mm/page_alloc.c:1201 __free_pages_ok+0x41a/0xd30 mm/page_alloc.c:1285 slab_destroy mm/slab.c:1713 [inline] slabs_destroy+0x90/0xd0 mm/slab.c:1729 __cache_free_alien mm/slab.c:821 [inline] cache_free_alien mm/slab.c:837 [inline] ___cache_free+0x20a/0x3a0 mm/slab.c:3525 qlink_free mm/kasan/quarantine.c:147 [inline] qlist_free_all+0x79/0x140 mm/kasan/quarantine.c:166 quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x110/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 getname fs/namei.c:211 [inline] user_path_create fs/namei.c:3696 [inline] do_mkdirat+0x8d/0x2d0 fs/namei.c:3834 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f6ce9cac687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff5afffb28 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fff5b002b90 RCX: 00007f6ce9cac687 RDX: 0000000000000000 RSI: 00000000000001ed RDI: 00005628975178a0 RBP: 00007fff5afffb60 R08: 0000562896a063e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000001 R14: 00005628975178a0 R15: 00007fff5b0001a0