audit: type=1804 audit(1677535835.414:334): pid=29776 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir2436204263/syzkaller.2aHC5a/484/bus" dev="sda1" ino=14776 res=1 INFO: task syz-executor.0:27049 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D28848 27049 8126 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_timeout+0x92d/0xfe0 kernel/time/timer.c:1794 do_wait_for_common kernel/sched/completion.c:83 [inline] __wait_for_common kernel/sched/completion.c:104 [inline] wait_for_common+0x29c/0x470 kernel/sched/completion.c:115 nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. usb_start_wait_urb+0x14b/0x4c0 drivers/usb/core/message.c:62 usb_bulk_msg+0x226/0x550 drivers/usb/core/message.c:253 proc_bulk+0x3de/0x860 drivers/usb/core/devio.c:1211 usbdev_do_ioctl+0x696/0x3030 drivers/usb/core/devio.c:2435 usbdev_ioctl+0x21/0x30 drivers/usb/core/devio.c:2585 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0xcdb/0x12e0 fs/ioctl.c:688 ksys_ioctl+0x9b/0xc0 fs/ioctl.c:705 __do_sys_ioctl fs/ioctl.c:712 [inline] __se_sys_ioctl fs/ioctl.c:710 [inline] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:710 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f4a67c5a0f9 Code: Bad RIP value. RSP: 002b:00007f4a661cc168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f4a67d79f80 RCX: 00007f4a67c5a0f9 RDX: 0000000020000000 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00007f4a67cb5ae9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe4ab9e0bf R14: 00007f4a661cc300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 000000003a42a437 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7799: #0: 0000000051c67aeb (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by kworker/u4:16/19966: 1 lock held by syz-executor.4/29815: 1 lock held by syz-executor.4/29821: #0: 00000000a3982993 (rtnl_mutex){+.+.}, at: devinet_ioctl+0x1b6/0x1b40 net/ipv4/devinet.c:1033 2 locks held by syz-executor.3/29816: 1 lock held by syz-executor.0/29824: #0: 00000000a3982993 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 00000000a3982993 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.1/29830: #0: 00000000a3982993 (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 00000000a3982993 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 4 locks held by syz-executor.2/29841: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 14020 Comm: kworker/u4:11 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 Workqueue: phy31 ieee80211_iface_work RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:23 [inline] RIP: 0010:check_kcov_mode kernel/kcov.c:67 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x50 kernel/kcov.c:101 Code: ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 <65> 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b 8b 90 60 13 00 00 83 RSP: 0000:ffff88806b8776f0 EFLAGS: 00000286 RAX: ffff88809e468080 RBX: ffff8880b342abf0 RCX: ffffffff879b14a6 RDX: 0000000000000000 RSI: ffffffff8798c327 RDI: ffff888090a91f40 RBP: ffff888090a91f40 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880a5242380 R13: ffff8880b342abf0 R14: 0000000000000000 R15: 000000000000004c FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b2f428000 CR3: 000000009d2df000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: ieee80211_rx_bss_put+0x17/0x50 net/mac80211/scan.c:37 ieee80211_rx_bss_info net/mac80211/ibss.c:1198 [inline] ieee80211_rx_mgmt_probe_beacon+0xc5b/0x15c0 net/mac80211/ibss.c:1607 ieee80211_ibss_rx_queued_mgmt+0xe27/0x18b0 net/mac80211/ibss.c:1634 ieee80211_iface_work+0x5c4/0x8a0 net/mac80211/iface.c:1341 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415