INFO: task syz-executor1:13843 blocked for more than 140 seconds. Not tainted 4.9.128+ #93 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor1 D28832 13843 2096 0x00000004 ffff8801d2f1af80 ffff8801d6630b00 ffff8801d6630b00 ffff8801d2f1c740 ffff8801db721018 ffff8801c8f77cf8 ffffffff8277ee02 0000000000000000 ffff8801d2f1b830 ffffed003a5e3705 00ff8801d2f1af80 ffff8801db7218f0 Call Trace: [] schedule+0x7f/0x1b0 kernel/sched/core.c:3553 [] schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3586 [] __mutex_lock_common kernel/locking/mutex.c:582 [inline] [] mutex_lock_nested+0x326/0x870 kernel/locking/mutex.c:621 [] evdev_flush+0x72/0x120 drivers/input/evdev.c:350 [] filp_close+0xa7/0x140 fs/open.c:1129 [] __close_fd+0x156/0x230 fs/file.c:651 [] SYSC_close fs/open.c:1148 [inline] [] SyS_close+0x4c/0x90 fs/open.c:1146 [] do_syscall_64+0x19f/0x480 arch/x86/entry/common.c:282 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Showing all locks held in the system: 2 locks held by khungtaskd/24: #0: (rcu_read_lock){......}, at: [] check_hung_uninterruptible_tasks kernel/hung_task.c:168 [inline] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 kernel/hung_task.c:239 #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 kernel/locking/lockdep.c:4336 2 locks held by getty/2030: #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 drivers/tty/tty_ldsem.c:367 #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 drivers/tty/n_tty.c:2142 1 lock held by syz-executor1/13843: #0: (&evdev->mutex){+.+.+.}, at: [] evdev_flush+0x72/0x120 drivers/input/evdev.c:350 1 lock held by syz-executor1/13853: #0: (&evdev->mutex){+.+.+.}, at: [] evdev_flush+0x72/0x120 drivers/input/evdev.c:350 1 lock held by syz-executor1/13850: #0: (&evdev->mutex){+.+.+.}, at: [] evdev_flush+0x72/0x120 drivers/input/evdev.c:350 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.128+ #93 ffff8801d9907d08 ffffffff81af2469 0000000000000000 0000000000000000 0000000000000000 0000000000000001 ffffffff810967d0 ffff8801d9907d40 ffffffff81afd1c9 0000000000000000 0000000000000000 0000000000000003 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] nmi_cpu_backtrace.cold.0+0x48/0x87 lib/nmi_backtrace.c:99 [] nmi_trigger_cpumask_backtrace+0x12c/0x151 lib/nmi_backtrace.c:60 [] arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:37 [] trigger_all_cpu_backtrace include/linux/nmi.h:58 [inline] [] check_hung_task kernel/hung_task.c:125 [inline] [] check_hung_uninterruptible_tasks kernel/hung_task.c:182 [inline] [] watchdog+0x6ad/0xa20 kernel/hung_task.c:239 [] kthread+0x26d/0x300 kernel/kthread.c:211 [] ret_from_fork+0x5c/0x70 arch/x86/entry/entry_64.S:373 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 3871 Comm: syz-executor3 Not tainted 4.9.128+ #93 task: ffff8801c94a2f80 task.stack: ffff8801ab6d8000 RIP: 0010:[] c [] __sanitizer_cov_trace_pc+0x0/0x50 RSP: 0018:ffff8801ab6df938 EFLAGS: 00000246 RAX: ffffffff8137eb70 RBX: dffffc0000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff8137db73 RDI: ffffffff8288cce8 RBP: ffff8801ab6dfca8 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801ab6dfc80 R13: ffffffff8288c840 R14: ffffc9000ccf7048 R15: 0000000000000095 FS: 00007f42ee2f5700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f9017e91000 CR3: 00000001cb3f8000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffffffff8137eb75c ffff8801c94a3828c 00000000c94a3830c 1ffff100356dbf2cc ffffffff83a2bc48c 0000000041b58ab3c ffffffff82c325f8c ffffffff8137dab0c 0000000000003be9c 0000000000000000c dffffc0000000000c 0000000002ea5cd4c Call Trace: [] seccomp_run_filters kernel/seccomp.c:200 [inline] [] __seccomp_filter+0x14c/0xc80 kernel/seccomp.c:589 [] __secure_computing+0xa6/0x290 kernel/seccomp.c:692 [] syscall_trace_enter+0x550/0xd20 arch/x86/entry/common.c:117 [] do_syscall_64+0x2bc/0x480 arch/x86/entry/common.c:273 [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: c1c c00 ceb c81 c4c c89 cff ce8 c7f ca2 c1c c00 ce9 c5f cff cff cff c48 c89 cdf ce8 cd2 ca1 c1c c00 ce9 cf9 cfe cff cff c66 c2e c0f c1f c84 c00 c00 c00 c00 c00 c0f c1f c00 c<55> c48 c89 ce5 c65 c48 c8b c04 c25 c00 c7e c01 c00 c65 c8b c15 c3c ce3 cd0 c7e c81 c