validate_nla: 3 callbacks suppressed netlink: 'syz-executor.0': attribute type 4 has an invalid length. INFO: task segctord:30112 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30128 30112 2 0x80000000 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000387743be (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by systemd-udevd/4700: netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. 1 lock held by in:imklog/7799: #0: 00000000742a640e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by kworker/u4:8/9518: #0: 00000000d0b63455 ((wq_completion)"events_unbound"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000387743be (rcu_read_lock){....}, at: trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] #1: 00000000387743be (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 kernel/sched/fair.c:857 5 locks held by syz-executor.3/13460: 2 locks held by agetty/16211: #0: 000000009bc79656 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:272 netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. #1: 00000000f2a61f37 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x217/0x1950 drivers/tty/n_tty.c:2154 3 locks held by kworker/u4:13/19074: 4 locks held by syz-executor.5/30115: 1 lock held by segctord/30112: #0: 00000000930b9a34 (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 4 locks held by syz-executor.2/4256: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4684 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:__mod_zone_page_state+0x88/0xf0 mm/vmstat.c:332 Code: 01 4c 01 eb 65 41 8a 47 4e 48 0f be c0 48 39 c3 7f 27 48 f7 d8 48 39 d8 7f 1f 48 c7 c7 20 ec 71 88 e8 fc 73 f0 01 65 88 5d 00 <48> 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 4e 8d 24 e5 00 06 00 RSP: 0018:ffff8880a148f8e8 EFLAGS: 00000093 RAX: 0000000000000000 RBX: ffffffffffffffe8 RCX: ffffffff83771e8f RDX: 0000000000000000 RSI: ffffffff83771e31 RDI: 0000000000000007 RBP: 000000000002eab7 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 R13: fffffffffffffffe R14: ffff88813fffb6c0 R15: 000000000002ea68 FS: 00007f2d8d3b88c0(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2d8a684000 CR3: 00000000a1a07000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __mod_zone_freepage_state include/linux/vmstat.h:382 [inline] rmqueue mm/page_alloc.c:3039 [inline] get_page_from_freelist+0x254b/0x4170 mm/page_alloc.c:3373 __alloc_pages_nodemask+0x387/0x2890 mm/page_alloc.c:4399 __alloc_pages include/linux/gfp.h:496 [inline] __alloc_pages_node include/linux/gfp.h:509 [inline] kmem_getpages mm/slab.c:1412 [inline] cache_grow_begin+0xa4/0x8a0 mm/slab.c:2682 cache_alloc_refill+0x273/0x340 mm/slab.c:3049 ____cache_alloc mm/slab.c:3132 [inline] __do_cache_alloc mm/slab.c:3354 [inline] slab_alloc mm/slab.c:3389 [inline] kmem_cache_alloc+0x346/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 user_path_at_empty+0x2a/0x50 fs/namei.c:2609 user_path_at include/linux/namei.h:57 [inline] do_faccessat+0x248/0x7a0 fs/open.c:397 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f2d8c6739c7 Code: 83 c4 08 48 3d 01 f0 ff ff 73 01 c3 48 8b 0d c8 d4 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d4 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffe86dee1f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00007ffe86df1110 RCX: 00007f2d8c6739c7 RDX: 00007f2d8d0e4a00 RSI: 0000000000000000 RDI: 000055e2dcfd59a3 RBP: 00007ffe86dee230 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffe86df1110 R15: 00007ffe86dee720