INFO: task syz-executor.0:19974 blocked for more than 143 seconds. Not tainted 5.14.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.0 state:D stack:26608 pid:19974 ppid: 6559 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0xc8d/0x1270 kernel/sched/core.c:6287 schedule+0x14b/0x210 kernel/sched/core.c:6366 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6425 __mutex_lock_common+0xdff/0x2550 kernel/locking/mutex.c:669 __mutex_lock kernel/locking/mutex.c:729 [inline] mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:743 device_lock include/linux/device.h:760 [inline] usbdev_release+0x7a/0x7c0 drivers/usb/core/devio.c:1074 __fput+0x3fe/0x870 fs/file_table.c:280 task_work_run+0x146/0x1c0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x209/0x220 kernel/entry/common.c:209 __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline] syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:302 do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x41940b RSP: 002b:00007ffca408a370 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000006 RCX: 000000000041940b RDX: 0000000000000000 RSI: 00007fc2bedc3050 RDI: 0000000000000005 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2da281dc R10: 0000000000001cc1 R11: 0000000000000293 R12: 000000000056cb00 R13: 000000000056cb00 R14: 000000000056bf80 R15: 000000000011a3d3 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8c91c080 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 5 locks held by kworker/1:2/1912: #0: ffff888016689938 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140 #1: ffffc900063c7d20 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272 #2: ffff88801e8b2220 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:760 [inline] #2: ffff88801e8b2220 (&dev->mutex){....}-{3:3}, at: hub_event+0x1b2/0xe40 drivers/usb/core/hub.c:5662 #3: ffff88808a8785c0 (&port_dev->status_lock){+.+.}-{3:3}, at: usb_lock_port drivers/usb/core/hub.c:3086 [inline] #3: ffff88808a8785c0 (&port_dev->status_lock){+.+.}-{3:3}, at: hub_port_connect+0xce1/0x27d0 drivers/usb/core/hub.c:5279 #4: ffff8881471a0868 (hcd->address0_mutex){+.+.}-{3:3}, at: hub_port_init+0x1ef/0x2df0 drivers/usb/core/hub.c:4703 1 lock held by in:imklog/6231: #0: ffff88801e34b270 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24e/0x2f0 fs/file.c:990 1 lock held by syz-executor.0/19974: #0: ffff88801e8b2220 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:760 [inline] #0: ffff88801e8b2220 (&dev->mutex){....}-{3:3}, at: usbdev_release+0x7a/0x7c0 drivers/usb/core/devio.c:1074 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc54/0xca0 kernel/hung_task.c:295 kthread+0x453/0x480 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2963 Comm: systemd-journal Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:memory_is_nonzero mm/kasan/generic.c:101 [inline] RIP: 0010:memory_is_poisoned_n mm/kasan/generic.c:128 [inline] RIP: 0010:memory_is_poisoned mm/kasan/generic.c:159 [inline] RIP: 0010:check_region_inline mm/kasan/generic.c:180 [inline] RIP: 0010:kasan_check_range+0x61/0x2f0 mm/kasan/generic.c:189 Code: c1 ec 03 49 b8 00 00 00 00 00 fc ff df 4f 8d 0c 04 4c 8d 54 37 ff 49 c1 ea 03 49 bd 01 00 00 00 00 fc ff df 4d 01 ea 4d 89 d6 <4d> 29 ce 49 83 fe 10 7f 30 4d 85 f6 0f 84 ae 01 00 00 4c 89 cb 4c RSP: 0018:ffffc900016df5d0 EFLAGS: 00000082 RAX: 0000000000000001 RBX: 000000000001ffff RCX: ffffffff81641518 RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8fd18e08 RBP: ffffc900016df750 R08: dffffc0000000000 R09: fffffbfff1fa31c1 R10: fffffbfff1fa31c2 R11: 0000000000000000 R12: 1ffffffff1fa31c1 R13: dffffc0000000001 R14: fffffbfff1fa31c2 R15: a39aec9f47b9cc93 FS: 00007f7e129c68c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7e0f7ae000 CR3: 000000007ad98000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: instrument_atomic_read include/linux/instrumented.h:71 [inline] test_bit include/asm-generic/bitops/instrumented-non-atomic.h:134 [inline] hlock_class kernel/locking/lockdep.c:199 [inline] __lock_acquire+0x12f8/0x2b00 kernel/locking/lockdep.c:5012 lock_acquire+0x19f/0x4d0 kernel/locking/lockdep.c:5625 __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2a/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:363 [inline] lockref_get_not_dead+0x22/0xb0 lib/lockref.c:211 __legitimize_path fs/namei.c:698 [inline] legitimize_path fs/namei.c:708 [inline] legitimize_root fs/namei.c:743 [inline] try_to_unlazy+0x537/0xce0 fs/namei.c:779 may_lookup fs/namei.c:1684 [inline] link_path_walk+0x298/0xd00 fs/namei.c:2239 path_parentat fs/namei.c:2505 [inline] __filename_parentat+0x27c/0x7b0 fs/namei.c:2527 __filename_create+0xf4/0x4e0 fs/namei.c:3637 do_mkdirat+0xae/0x540 fs/namei.c:3900 __do_sys_mkdir fs/namei.c:3931 [inline] __se_sys_mkdir fs/namei.c:3929 [inline] __x64_sys_mkdir+0x6a/0x80 fs/namei.c:3929 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f7e11c81687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffdcdc68848 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffdcdc6b760 RCX: 00007f7e11c81687 RDX: 00007f7e126f2a00 RSI: 00000000000001ed RDI: 000055a68310f8a0 RBP: 00007ffdcdc68880 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffdcdc6b760 R15: 00007ffdcdc68d70 ---------------- Code disassembly (best guess): 0: c1 ec 03 shr $0x3,%esp 3: 49 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%r8 a: fc ff df d: 4f 8d 0c 04 lea (%r12,%r8,1),%r9 11: 4c 8d 54 37 ff lea -0x1(%rdi,%rsi,1),%r10 16: 49 c1 ea 03 shr $0x3,%r10 1a: 49 bd 01 00 00 00 00 movabs $0xdffffc0000000001,%r13 21: fc ff df 24: 4d 01 ea add %r13,%r10 27: 4d 89 d6 mov %r10,%r14 * 2a: 4d 29 ce sub %r9,%r14 <-- trapping instruction 2d: 49 83 fe 10 cmp $0x10,%r14 31: 7f 30 jg 0x63 33: 4d 85 f6 test %r14,%r14 36: 0f 84 ae 01 00 00 je 0x1ea 3c: 4c 89 cb mov %r9,%rbx 3f: 4c rex.WR