Bluetooth: hci4 command 0x0406 tx timeout Bluetooth: hci2 command 0x0406 tx timeout Bluetooth: hci0 command 0x0406 tx timeout Bluetooth: hci5 command 0x0406 tx timeout Bluetooth: hci1 command 0x0406 tx timeout INFO: task syz-executor.1:10857 blocked for more than 140 seconds. Not tainted 4.14.258-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D29480 10857 7992 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __get_super.part.0+0x271/0x390 fs/super.c:678 __get_super include/linux/spinlock.h:317 [inline] get_super+0x2b/0x50 fs/super.c:707 fsync_bdev+0x14/0xc0 fs/block_dev.c:495 blkdev_flushbuf block/ioctl.c:430 [inline] blkdev_ioctl+0x883/0x1830 block/ioctl.c:514 block_ioctl+0xd9/0x120 fs/block_dev.c:1893 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f7b337cfe99 RSP: 002b:00007f7b32145168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f7b338e2f60 RCX: 00007f7b337cfe99 RDX: 0000000000000000 RSI: 0000000000001261 RDI: 0000000000000003 RBP: 00007f7b33829ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd29bdc41f R14: 00007f7b32145300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1532: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by syz-executor.1/10857: #0: (&type->s_umount_key#49){++++}, at: [] __get_super.part.0+0x271/0x390 fs/super.c:678 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1532 Comm: khungtaskd Not tainted 4.14.258-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 10865 Comm: syz-executor.1 Not tainted 4.14.258-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff88809beee240 task.stack: ffff888067e08000 RIP: 0010:rcu_read_unlock include/linux/rcupdate.h:684 [inline] RIP: 0010:find_get_entry+0x317/0x630 mm/filemap.c:1392 RSP: 0018:ffff888067e0f688 EFLAGS: 00000246 RAX: 0000000000040000 RBX: ffff8880b1dc13e8 RCX: ffffc90009ef9000 RDX: 0000000000040000 RSI: ffffffff81683807 RDI: ffff8880ba52ca8c RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000020012 R10: ffff88809beeeaf0 R11: ffff88809beee240 R12: 0000000000000000 R13: ffff8880b1dc13e8 R14: dffffc0000000000 R15: 0000000000000138 FS: 00007f7b32124700(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fc4808bf000 CR3: 0000000093203000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: pagecache_get_page+0x53/0xab0 mm/filemap.c:1465 find_get_page_flags include/linux/pagemap.h:282 [inline] __find_get_block_slow fs/buffer.c:214 [inline] __find_get_block+0x4cc/0xc40 fs/buffer.c:1357 __getblk_slow+0x127/0x7a0 fs/buffer.c:1100 __getblk_gfp fs/buffer.c:1383 [inline] __bread_gfp+0x206/0x2e0 fs/buffer.c:1428 sb_bread include/linux/buffer_head.h:309 [inline] udf_tread+0xe1/0x130 fs/udf/misc.c:44 udf_read_tagged+0x40/0x4c0 fs/udf/misc.c:219 udf_check_anchor_block+0x18a/0x590 fs/udf/super.c:1823 udf_scan_anchors+0x16d/0x530 fs/udf/super.c:1863 udf_find_anchor fs/udf/super.c:1928 [inline] udf_load_vrs+0x775/0xa90 fs/udf/super.c:1985 udf_fill_super+0x715/0x1660 fs/udf/super.c:2177 mount_bdev+0x2b3/0x360 fs/super.c:1134 mount_fs+0x92/0x2a0 fs/super.c:1237 vfs_kern_mount.part.0+0x5b/0x470 fs/namespace.c:1046 vfs_kern_mount fs/namespace.c:1036 [inline] do_new_mount fs/namespace.c:2572 [inline] do_mount+0xe65/0x2a10 fs/namespace.c:2902 SYSC_mount fs/namespace.c:3118 [inline] SyS_mount+0xa8/0x120 fs/namespace.c:3095 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f7b337cfe99 RSP: 002b:00007f7b32124168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007f7b338e3030 RCX: 00007f7b337cfe99 RDX: 0000000020000040 RSI: 0000000020000280 RDI: 00000000200004c0 RBP: 00007f7b33829ff1 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd29bdc41f R14: 00007f7b32124300 R15: 0000000000022000 Code: 0f 85 8d 01 00 00 e8 69 03 ed ff e8 d4 e4 dd ff 85 c0 74 12 e8 5b 03 ed ff 80 3d c2 d3 8a 08 00 0f 84 0e 01 00 00 e8 49 03 ed ff 74 de dd ff e8 3f 03 ed ff 48 c7 c2 02 38 68 81 be 01 00 00 ---------------- Code disassembly (best guess): 0: 0f 85 8d 01 00 00 jne 0x193 6: e8 69 03 ed ff callq 0xffed0374 b: e8 d4 e4 dd ff callq 0xffdde4e4 10: 85 c0 test %eax,%eax 12: 74 12 je 0x26 14: e8 5b 03 ed ff callq 0xffed0374 19: 80 3d c2 d3 8a 08 00 cmpb $0x0,0x88ad3c2(%rip) # 0x88ad3e2 20: 0f 84 0e 01 00 00 je 0x134 26: e8 49 03 ed ff callq 0xffed0374 * 2b: e8 74 de dd ff callq 0xffdddea4 <-- trapping instruction 30: e8 3f 03 ed ff callq 0xffed0374 35: 48 c7 c2 02 38 68 81 mov $0xffffffff81683802,%rdx 3c: be .byte 0xbe 3d: 01 00 add %eax,(%rax)