INFO: task syz-executor.5:17759 blocked for more than 140 seconds. Not tainted 4.14.292-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D28880 17759 8005 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1724 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 usb_start_wait_urb+0x125/0x440 drivers/usb/core/message.c:61 usb_bulk_msg+0x1f6/0x500 drivers/usb/core/message.c:252 proc_bulk+0x331/0x6d0 drivers/usb/core/devio.c:1223 usbdev_do_ioctl+0x5b0/0x2b70 drivers/usb/core/devio.c:2449 usb usb6: usbfs: process 13501 (syz-executor.0) did not claim interface 0 before use usbdev_ioctl+0x21/0x30 drivers/usb/core/devio.c:2599 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f5e59cd1409 RSP: 002b:00007f5e58646168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 usb usb6: usbfs: process 13514 (syz-executor.0) did not claim interface 0 before use RAX: ffffffffffffffda RBX: 00007f5e59de3f80 RCX: 00007f5e59cd1409 RDX: 0000000020000080 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00007f5e59d2c367 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc4241efff R14: 00007f5e58646300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1534: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1534 Comm: khungtaskd Not tainted 4.14.292-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 9800 Comm: kworker/u4:0 Not tainted 4.14.292-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 Workqueue: bat_events batadv_nc_worker task: ffff8880a39ac540 task.stack: ffff8880999b8000 RIP: 0010:__lock_release kernel/locking/lockdep.c:3804 [inline] RIP: 0010:lock_release+0x380/0x870 kernel/locking/lockdep.c:4017 RSP: 0018:ffff8880999bfbc8 EFLAGS: 00000046 RAX: dffffc0000000000 RBX: 1ffff11013337f7c RCX: 1ffff110147359c3 RDX: ffffffff8becddc0 RSI: 0000000000000003 RDI: ffff8880a39ac540 RBP: 0000000000000002 R08: ffffffff8b9ad8a0 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8880a39ac540 R12: 4235252562e6e5f6 R13: 0000000000000000 R14: ffff8880a39ac540 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555555708708 CR3: 000000008185d000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:174 [inline] _raw_spin_unlock_bh+0x17/0x30 kernel/locking/spinlock.c:208 spin_unlock_bh include/linux/spinlock.h:362 [inline] batadv_nc_purge_paths+0x20c/0x300 net/batman-adv/network-coding.c:481 batadv_nc_worker+0x628/0xc50 net/batman-adv/network-coding.c:729 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 00 4d 89 a6 78 08 00 00 8d 55 01 44 89 fe 4c 89 f7 e8 f5 ea ff ff 85 c0 75 38 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 41 83 e5 07 <48> c1 ea 03 41 83 c5 03 0f b6 04 02 41 38 c5 7c 08 84 c0 0f 85 usb usb6: usbfs: process 13534 (syz-executor.0) did not claim interface 0 before use