INFO: task kworker/1:3:9037 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/1:3 D25720 9037 2 0x80000000 Workqueue: usb_hub_wq hub_event Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 usb_kill_urb.part.0+0x197/0x220 drivers/usb/core/urb.c:697 usb_kill_urb+0x7c/0x90 drivers/usb/core/urb.c:692 usb_start_wait_urb+0x252/0x4c0 drivers/usb/core/message.c:63 usb_internal_control_msg drivers/usb/core/message.c:101 [inline] usb_control_msg+0x31c/0x4a0 drivers/usb/core/message.c:152 usb_get_descriptor+0xc5/0x1b0 drivers/usb/core/message.c:654 usb_get_device_descriptor+0x81/0xf0 drivers/usb/core/message.c:926 hub_port_init+0x74b/0x3120 drivers/usb/core/hub.c:4799 hub_port_connect drivers/usb/core/hub.c:5070 [inline] hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] port_event drivers/usb/core/hub.c:5361 [inline] hub_event+0x1ccd/0x44a0 drivers/usb/core/hub.c:5441 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Showing all locks held in the system: 1 lock held by khungtaskd/1571: #0: 00000000132dd0cf (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7821: #0: 00000000256f39a2 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 5 locks held by kworker/1:3/9037: #0: 00000000432a238d ((wq_completion)"usb_hub_wq"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 0000000048e84236 ((work_completion)(&hub->events)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000004db5f16b (&dev->mutex){....}, at: device_lock include/linux/device.h:1174 [inline] #2: 000000004db5f16b (&dev->mutex){....}, at: hub_event+0x11e/0x44a0 drivers/usb/core/hub.c:5387 #3: 000000008229bc64 (&port_dev->status_lock){+.+.}, at: usb_lock_port drivers/usb/core/hub.c:2983 [inline] #3: 000000008229bc64 (&port_dev->status_lock){+.+.}, at: hub_port_connect drivers/usb/core/hub.c:5069 [inline] #3: 000000008229bc64 (&port_dev->status_lock){+.+.}, at: hub_port_connect_change drivers/usb/core/hub.c:5253 [inline] #3: 000000008229bc64 (&port_dev->status_lock){+.+.}, at: port_event drivers/usb/core/hub.c:5361 [inline] #3: 000000008229bc64 (&port_dev->status_lock){+.+.}, at: hub_event+0x1cb8/0x44a0 drivers/usb/core/hub.c:5441 #4: 0000000093eabb05 (hcd->address0_mutex){+.+.}, at: hub_port_init+0x1b9/0x3120 drivers/usb/core/hub.c:4578 2 locks held by kworker/u4:12/15815: 1 lock held by syz-executor.0/13484: 3 locks held by syz-executor.5/13491: #0: 000000001f79b145 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 000000001f79b145 (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 #1: 00000000132dd0cf (rcu_read_lock){....}, at: trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] #1: 00000000132dd0cf (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 kernel/sched/fair.c:857 #2: 00000000132dd0cf (rcu_read_lock){....}, at: lock_page_memcg+0x0/0x220 include/linux/page_counter.h:64 1 lock held by syz-executor.1/13500: #0: 000000007c2ac084 (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 000000007c2ac084 (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 4 locks held by syz-executor.4/13512: 1 lock held by syz-executor.3/13514: ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 13511 Comm: syz-executor.2 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:get_current arch/x86/include/asm/current.h:15 [inline] RIP: 0010:__sanitizer_cov_trace_pc+0x4/0x50 kernel/kcov.c:100 Code: e8 11 dd 35 00 e9 ab fe ff ff 4c 89 ef e8 04 dd 35 00 e9 23 fe ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 8b 34 24 <65> 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 RSP: 0018:ffff8880914ff888 EFLAGS: 00000246 RAX: 0000000000000002 RBX: ffff8880914ff978 RCX: ffffffff818a8ba2 RDX: 0000000000000000 RSI: ffffffff818a8bb0 RDI: 0000000000000007 RBP: ffff8880a5ce4210 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000002207 R13: 0000000000000000 R14: 0000000020f66000 R15: ffff8880b35b0838 FS: 00007fba58788700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fba5dc77718 CR3: 00000000aac4a000 CR4: 00000000003426f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: pmd_val arch/x86/include/asm/paravirt.h:499 [inline] pmd_trans_huge arch/x86/include/asm/pgtable.h:243 [inline] follow_pmd_mask mm/gup.c:278 [inline] follow_pud_mask mm/gup.c:370 [inline] follow_p4d_mask mm/gup.c:396 [inline] follow_page_mask+0xce0/0x1d00 mm/gup.c:449 __get_user_pages+0x5e3/0x1710 mm/gup.c:742 __get_user_pages_locked mm/gup.c:916 [inline] get_user_pages_remote+0x220/0x460 mm/gup.c:1108 process_vm_rw_single_vec mm/process_vm_access.c:113 [inline] process_vm_rw_core.constprop.0+0x400/0xb00 mm/process_vm_access.c:220 process_vm_rw+0x21a/0x250 mm/process_vm_access.c:288 __do_sys_process_vm_readv mm/process_vm_access.c:302 [inline] __se_sys_process_vm_readv mm/process_vm_access.c:298 [inline] __x64_sys_process_vm_readv+0xdf/0x1b0 mm/process_vm_access.c:298 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fba5a2160a9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fba58788168 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 RAX: ffffffffffffffda RBX: 00007fba5a335f80 RCX: 00007fba5a2160a9 RDX: 0000000000000002 RSI: 0000000020008400 RDI: 00000000000010bb RBP: 00007fba5a271ae9 R08: 0000000000000286 R09: 0000000000000000 R10: 0000000020008640 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd4e627fdf R14: 00007fba58788300 R15: 0000000000022000