netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. BTRFS error (device loop4): open_ctree failed cgroup: cgroup2: unknown option "defcontext=root" netlink: 'syz-executor.5': attribute type 1 has an invalid length. INFO: task segctord:19249 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. segctord D30376 19249 2 0x80000000 IPv6: ADDRCONF(NETDEV_UP): bond570: link is not ready Call Trace: 8021q: adding VLAN 0 to HW filter on device bond570 context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 __rwsem_down_write_failed_common kernel/locking/rwsem-xadd.c:589 [inline] rwsem_down_write_failed+0x3aa/0x760 kernel/locking/rwsem-xadd.c:618 call_rwsem_down_write_failed+0x13/0x20 arch/x86/lib/rwsem.S:117 __down_write arch/x86/include/asm/rwsem.h:142 [inline] down_write+0x4f/0x90 kernel/locking/rwsem.c:72 nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 nilfs_segctor_thread_construct fs/nilfs2/segment.c:2479 [inline] nilfs_segctor_thread+0x3c0/0xf50 fs/nilfs2/segment.c:2563 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000fc452a26 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 3 locks held by kworker/u4:4/2886: 3 locks held by systemd-udevd/4704: #0: 0000000010855439 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 0000000010855439 (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 #1: 00000000fc452a26 (rcu_read_lock){....}, at: trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] #1: 00000000fc452a26 (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 kernel/sched/fair.c:857 #2: 00000000b4d27c12 (kn->count#24){++++}, at: kernfs_seq_start+0x75/0x260 fs/kernfs/file.c:113 1 lock held by in:imklog/7709: #0: 0000000030034339 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 6 locks held by syz-executor.1/19226: 1 lock held by segctord/19249: #0: 00000000e0b20da0 (&nilfs->ns_segctor_sem){++++}, at: nilfs_transaction_lock+0x1fb/0x8b0 fs/nilfs2/segment.c:362 2 locks held by syz-executor.3/16323: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4690 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:compound_head include/linux/page-flags.h:145 [inline] RIP: 0010:virt_to_head_page include/linux/mm.h:667 [inline] RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline] RIP: 0010:qlist_free_all+0xd4/0x140 mm/kasan/quarantine.c:163 Code: 49 89 ee 0f 85 75 ff ff ff 48 89 df e8 c5 eb 92 ff 48 b9 00 00 00 00 00 ea ff ff 48 c1 e8 0c 48 c1 e0 06 48 01 c8 48 8b 50 08 <48> 8d 4a ff 83 e2 01 48 0f 45 c1 4c 8b 70 18 e9 40 ff ff ff e8 a3 RSP: 0018:ffff8880a0cf7b38 EFLAGS: 00000286 RAX: ffffea00025c1b00 RBX: ffff88809706c480 RCX: ffffea0000000000 RDX: ffffea0000520388 RSI: ffffffff812b5eca RDI: 0000000000000007 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: ffff88809706c480 R13: ffff8880a0cf7b70 R14: 0000000000000000 R15: 0000000000000286 FS: 00007f2e604bd8c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2e5ddf3000 CR3: 00000000a1442000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x110/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 getname fs/namei.c:211 [inline] user_path_create fs/namei.c:3696 [inline] do_mkdirat+0x8d/0x2d0 fs/namei.c:3834 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f2e5f778687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffe23f4a458 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffe23f4d4c0 RCX: 00007f2e5f778687 RDX: 0000000000000000 RSI: 00000000000001ed RDI: 000055fedc7238a0 RBP: 00007ffe23f4a490 R08: 000055fedc2a23e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000001 R14: 000055fedc7238a0 R15: 00007ffe23f4aad0