QAT: failed to copy from user. INFO: task syz-executor4:32604 blocked for more than 140 seconds. Not tainted 5.0.0-rc4+ #58 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor4 D27904 32604 7808 0x00000004 Call Trace: context_switch kernel/sched/core.c:2844 [inline] __schedule+0x817/0x1cc0 kernel/sched/core.c:3485 schedule+0x92/0x180 kernel/sched/core.c:3529 request_wait_answer+0x42f/0x7c0 fs/fuse/dev.c:530 __fuse_request_send+0x12b/0x1d0 fs/fuse/dev.c:550 fuse_request_send+0x60/0xa0 fs/fuse/dev.c:563 fuse_simple_request+0x2f6/0x730 fs/fuse/dev.c:621 fuse_do_getattr+0x24e/0xc80 fs/fuse/dir.c:908 fuse_perm_getattr+0x3d/0x60 fs/fuse/dir.c:1091 fuse_permission+0x3d5/0x530 fs/fuse/dir.c:1128 do_inode_permission fs/namei.c:386 [inline] inode_permission+0x36d/0x570 fs/namei.c:451 may_lookup fs/namei.c:1702 [inline] link_path_walk.part.0+0x9d6/0x1340 fs/namei.c:2084 link_path_walk fs/namei.c:2072 [inline] path_openat+0x1f9/0x4690 fs/namei.c:3533 do_filp_open+0x1a1/0x280 fs/namei.c:3564 do_sys_open+0x3fe/0x5d0 fs/open.c:1063 __do_sys_openat fs/open.c:1090 [inline] __se_sys_openat fs/open.c:1084 [inline] __x64_sys_openat+0x9d/0x100 fs/open.c:1084 do_syscall_64+0x103/0x610 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457e39 Code: Bad RIP value. RSP: 002b:00007fd8cd102c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e39 RDX: 0000000000000002 RSI: 0000000020000540 RDI: ffffffffffffff9c RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd8cd1036d4 R13: 00000000004c3f00 R14: 00000000004d7268 R15: 00000000ffffffff Showing all locks held in the system: 1 lock held by khungtaskd/1039: #0: 000000002343d038 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:4389 1 lock held by rsyslogd/7668: #0: 0000000015a7aa4d (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:795 2 locks held by getty/7759: #0: 000000002bbf1ba3 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000009874f538 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7760: #0: 00000000af43aacf (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000bf530159 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7761: #0: 00000000a46eed7d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000049dfea55 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7762: #0: 00000000509369c7 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000002e99df15 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7763: #0: 000000008526e67f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000000e2e06f7 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7764: #0: 00000000079d31ed (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000009486e985 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 2 locks held by getty/7765: #0: 00000000ea4275a5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000065b0770f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 drivers/tty/n_tty.c:2154 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc4+ #58 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x9df/0xee0 kernel/hung_task.c:287 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0x2/0x10 arch/x86/include/asm/irqflags.h:57