netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. INFO: task syz-executor.4:28167 blocked for more than 140 seconds. Not tainted 4.14.123+ #2 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D28808 28167 1852 0x80000004 Call Trace: schedule+0x92/0x1c0 kernel/sched/core.c:3498 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x21f/0x3c0 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x45/0xa0 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:511 [inline] do_exit+0x503/0x2960 kernel/exit.c:861 INFO: task syz-executor.4:28172 blocked for more than 140 seconds. Not tainted 4.14.123+ #2 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D28920 28172 1852 0x80000004 Call Trace: schedule+0x92/0x1c0 kernel/sched/core.c:3498 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x21f/0x3c0 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x45/0xa0 kernel/locking/rwsem.c:26 exit_mm kernel/exit.c:511 [inline] do_exit+0x503/0x2960 kernel/exit.c:861 Showing all locks held in the system: 1 lock held by khungtaskd/23: #0: (tasklist_lock){.+.+}, at: [<000000008e614b52>] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4541 1 lock held by rsyslogd/1629: #0: (&f->f_pos_lock){+.+.}, at: [<00000000a1f64d5d>] __fdget_pos+0xa6/0xc0 fs/file.c:769 2 locks held by getty/1757: #0: (&tty->ldisc_sem){++++}, at: [<0000000052bb5d44>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284 #1: (&ldata->atomic_read_lock){+.+.}, at: [<000000000732ed28>] n_tty_read+0x1f7/0x1700 drivers/tty/n_tty.c:2156 1 lock held by syz-executor.4/28167: #0: (&mm->mmap_sem){++++}, at: [<000000006769fec1>] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [<000000006769fec1>] do_exit+0x503/0x2960 kernel/exit.c:861 1 lock held by syz-executor.4/28172: #0: (&mm->mmap_sem){++++}, at: [<000000006769fec1>] exit_mm kernel/exit.c:511 [inline] #0: (&mm->mmap_sem){++++}, at: [<000000006769fec1>] do_exit+0x503/0x2960 kernel/exit.c:861 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.123+ #2 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x10e lib/dump_stack.c:53 nmi_cpu_backtrace.cold+0x47/0x86 lib/nmi_backtrace.c:101 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 28175 Comm: syz-executor.4 Not tainted 4.14.123+ #2 task: 00000000bb46ce13 task.stack: 00000000ad8ee18d RIP: 0010:mark_lock+0x13/0xfa0 kernel/locking/lockdep.c:3157 RSP: 0018:ffff88819fd77878 EFLAGS: 00000046 RAX: dffffc0000000000 RBX: ffff8881d03d377a RCX: 0000000000000002 RDX: 0000000000000002 RSI: ffff8881d03d3758 RDI: ffff8881d03d2f00 RBP: ffff88819fd77a48 R08: 0000000000000001 R09: 00000000000403d6 R10: ffff8881d03d3758 R11: 1ffff1103a07a6ea R12: ffff8881d03d3770 R13: 00000000000003d6 R14: 0000000000000001 R15: 0000000000000002 FS: 00007fc34f5f1700(0000) GS:ffff8881d7600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f28211c6280 CR3: 0000000181e92005 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 Call Trace: mark_irqflags kernel/locking/lockdep.c:3082 [inline] __lock_acquire+0xdd3/0x3fa0 kernel/locking/lockdep.c:3444 Code: 5d 41 5e 41 5f c3 4c 89 ff e8 ba 8a 33 00 eb d7 0f 1f 84 00 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 41 57 89 d1 41 89 d7 41 56 <49> 89 fe 41 55 4c 8d 6e 20 4c 89 ea 41 54 41 bc 01 00 00 00 55