R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffca615b8cf R14: 00007fea996bb300 R15: 0000000000022000 INFO: task kworker/0:2:3686 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/0:2 D25720 3686 2 0x80000000 Workqueue: usb_hub_wq hub_event Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 usb_kill_urb.part.0+0x197/0x220 drivers/usb/core/urb.c:697 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. usb_kill_urb+0x7c/0x90 drivers/usb/core/urb.c:692 usb_start_wait_urb+0x252/0x4c0 drivers/usb/core/message.c:63 usb_internal_control_msg drivers/usb/core/message.c:101 [inline] usb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:152 hub_port_init+0x12dc/0x3120 drivers/usb/core/hub.c:4704 hub_port_connect drivers/usb/core/hub.c:5070 [inline] hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] port_event drivers/usb/core/hub.c:5361 [inline] hub_event+0x1ccd/0x44a0 drivers/usb/core/hub.c:5441 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by ksoftirqd/1/18: #0: 00000000e73d903d (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 00000000e73d903d (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 1 lock held by khungtaskd/1570: #0: 000000004ab1bb30 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 5 locks held by kworker/0:2/3686: netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. #0: 000000000785560e ((wq_completion)"usb_hub_wq"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000a5161fab ((work_completion)(&hub->events)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 0000000035f473c6 (&dev->mutex){....}, at: device_lock include/linux/device.h:1174 [inline] #2: 0000000035f473c6 (&dev->mutex){....}, at: hub_event+0x11e/0x44a0 drivers/usb/core/hub.c:5387 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. #3: 0000000038de2109 (&port_dev->status_lock){+.+.}, at: usb_lock_port drivers/usb/core/hub.c:2983 [inline] #3: 0000000038de2109 (&port_dev->status_lock){+.+.}, at: hub_port_connect drivers/usb/core/hub.c:5069 [inline] #3: 0000000038de2109 (&port_dev->status_lock){+.+.}, at: hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] #3: 0000000038de2109 (&port_dev->status_lock){+.+.}, at: port_event drivers/usb/core/hub.c:5361 [inline] #3: 0000000038de2109 (&port_dev->status_lock){+.+.}, at: hub_event+0x1cb8/0x44a0 drivers/usb/core/hub.c:5441 #4: 00000000719b1b5b (hcd->address0_mutex){+.+.}, at: hub_port_init+0x1b9/0x3120 drivers/usb/core/hub.c:4578 1 lock held by in:imklog/7825: #0: 000000002d79ac7c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by kworker/u4:8/10493: 1 lock held by syz-executor.4/23367: #0: 0000000013eacd5a (rcu_preempt_state.exp_mutex){+.+.}, at: exp_funnel_lock kernel/rcu/tree_exp.h:297 [inline] #0: 0000000013eacd5a (rcu_preempt_state.exp_mutex){+.+.}, at: _synchronize_rcu_expedited+0x4dc/0x6f0 kernel/rcu/tree_exp.h:667 1 lock held by systemd-udevd/23384: 2 locks held by syz-executor.5/23386: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 8149 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:check_memory_region+0xb4/0x170 mm/kasan/kasan.c:268 Code: d0 74 7b 48 83 38 00 74 f1 48 8d 50 08 eb 09 48 83 c0 01 48 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 80 38 RSP: 0018:ffff88809d3bfa20 EFLAGS: 00000246 RAX: fffff94000549237 RBX: 0000000000000000 RCX: ffffffff818c7356 RDX: fffff94000549237 RSI: 0000000000000004 RDI: ffffea0002a491b0 RBP: ffffea0002a49180 R08: 0000000000000001 R09: fffff94000549236 R10: ffffea0002a491b3 R11: 0000000048102452 R12: ffffea0002a491b4 R13: dffffc0000000000 R14: ffffea0002a49180 R15: ffffea0002a49188 FS: 00005555559a4400(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f528a99e3be CR3: 00000000984bc000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: atomic_inc include/asm-generic/atomic-instrumented.h:109 [inline] page_dup_rmap include/linux/rmap.h:190 [inline] copy_one_pte mm/memory.c:1053 [inline] copy_pte_range mm/memory.c:1114 [inline] copy_pmd_range mm/memory.c:1165 [inline] copy_pud_range mm/memory.c:1199 [inline] copy_p4d_range mm/memory.c:1221 [inline] copy_page_range+0x10c6/0x2ff0 mm/memory.c:1283 dup_mmap kernel/fork.c:549 [inline] dup_mm kernel/fork.c:1285 [inline] copy_mm kernel/fork.c:1341 [inline] copy_process.part.0+0x5b22/0x8260 kernel/fork.c:1913 copy_process kernel/fork.c:1710 [inline] _do_fork+0x22f/0xf30 kernel/fork.c:2219 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f5289d5233b Code: ed 0f 85 60 01 00 00 64 4c 8b 0c 25 10 00 00 00 45 31 c0 4d 8d 91 d0 02 00 00 31 d2 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 89 00 00 00 41 89 c5 85 c0 0f 85 90 00 00 RSP: 002b:00007fff8129d1a0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5289d5233b RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 0000000000000001 R08: 0000000000000000 R09: 00005555559a4400 R10: 00005555559a46d0 R11: 0000000000000246 R12: 0000000000000001 R13: 0000000000000000 R14: 0000000000000001 R15: 00007fff8129d280 netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'.