SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=5498 comm=syz-executor.5
SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=5500 comm=syz-executor.5
INFO: task kworker/u4:46:31915 blocked for more than 140 seconds.
      Not tainted 4.14.114+ #63
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kworker/u4:46   D26608 31915      2 0x80000000
Workqueue: netns cleanup_net
Call Trace:
 schedule+0x92/0x1c0 kernel/sched/core.c:3498
 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3556
 __mutex_lock_common kernel/locking/mutex.c:833 [inline]
 __mutex_lock+0x559/0x1430 kernel/locking/mutex.c:893
 cleanup_net+0x136/0x860 net/core/net_namespace.c:450
 process_one_work+0x7c6/0x1510 kernel/workqueue.c:2134
 worker_thread+0x5d7/0x1080 kernel/workqueue.c:2271
 kthread+0x310/0x420 kernel/kthread.c:232
 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:402

Showing all locks held in the system:
1 lock held by khungtaskd/23:
 #0:  (tasklist_lock){.+.+}, at: [<00000000f3c1f949>] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4541
2 locks held by getty/1762:
 #0:  (&tty->ldisc_sem){++++}, at: [<00000000e0d21606>] tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:284
 #1:  (&ldata->atomic_read_lock){+.+.}, at: [<000000003db786f3>] n_tty_read+0x1f7/0x1700 drivers/tty/n_tty.c:2156
3 locks held by kworker/0:2/1955:
 #0:  ("events"){+.+.}, at: [<00000000b52be787>] process_one_work+0x6e5/0x1510 kernel/workqueue.c:2105
 #1:  ((linkwatch_work).work){+.+.}, at: [<00000000c2822a66>] process_one_work+0x71b/0x1510 kernel/workqueue.c:2109
 #2:  (rtnl_mutex){+.+.}, at: [<000000003b998b92>] linkwatch_event+0xa/0x50 net/core/link_watch.c:236
3 locks held by kworker/u4:46/31915:
 #0:  ("%s""netns"){+.+.}, at: [<00000000b52be787>] process_one_work+0x6e5/0x1510 kernel/workqueue.c:2105
 #1:  (net_cleanup_work){+.+.}, at: [<00000000c2822a66>] process_one_work+0x71b/0x1510 kernel/workqueue.c:2109
 #2:  (net_mutex){+.+.}, at: [<000000007146fa8e>] cleanup_net+0x136/0x860 net/core/net_namespace.c:450
2 locks held by syz-executor.3/5457:
 #0:  (net_mutex){+.+.}, at: [<0000000060da0d89>] copy_net_ns+0x156/0x440 net/core/net_namespace.c:410
 #1:  (rtnl_mutex){+.+.}, at: [<0000000032fbd2e1>] ip_tunnel_init_net+0x26f/0x540 net/ipv4/ip_tunnel.c:1032

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 23 Comm: khungtaskd Not tainted 4.14.114+ #63
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0xb9/0x10e lib/dump_stack.c:53
 nmi_cpu_backtrace.cold+0x47/0x86 lib/nmi_backtrace.c:101
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 4015 Comm: syz-executor.5 Not tainted 4.14.114+ #63
task: 000000007e0170c6 task.stack: 00000000005c91c5
RIP: 0033:0x401584
RSP: 002b:00007faed7432690 EFLAGS: 00000282
RAX: 00000000ec474e31 RBX: 000000000000000b RCX: 0000000000458da9
RDX: 0000000000000000 RSI: 00007faed74326c0 RDI: 000000000000000b
RBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  00007faed7433700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000400300 CR3: 00000001d00b6004 CR4: 00000000001606a0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600