usb usb1: usbfs: process 4606 (syz-executor.1) did not claim interface 0 before use INFO: task syz-executor.1:4602 blocked for more than 140 seconds. Not tainted 4.14.231-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28880 4602 25697 0x00000004 Call Trace: context_switch kernel/sched/core.c:2808 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3384 schedule+0x8d/0x1b0 kernel/sched/core.c:3428 schedule_timeout+0x4af/0xe90 kernel/time/timer.c:1747 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 usb_start_wait_urb+0x125/0x440 drivers/usb/core/message.c:61 usb_bulk_msg+0x1f6/0x500 drivers/usb/core/message.c:252 proc_bulk+0x331/0x6d0 drivers/usb/core/devio.c:1223 usbdev_do_ioctl+0x5b0/0x2b70 drivers/usb/core/devio.c:2449 usbdev_ioctl+0x21/0x30 drivers/usb/core/devio.c:2599 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x466459 RSP: 002b:00007f38ac0e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 RDX: 0000000020000000 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00000000004bf9fb R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffe2e9aedcf R14: 00007f38ac0e5300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1533: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by in:imklog/7707: #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0x1fb/0x2b0 fs/file.c:769 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1533 Comm: khungtaskd Not tainted 4.14.231-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4624 Comm: systemd-journal Not tainted 4.14.231-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a1170140 task.stack: ffff8880a1178000 RIP: 0010:memset_erms+0x0/0x10 arch/x86/lib/memset_64.S:63 RSP: 0018:ffff8880a117f860 EFLAGS: 00000206 RAX: ffff8880a1ad6d47 RBX: ffffed101435ada9 RCX: 0000000000400000 RDX: 0000000000000009 RSI: 0000000000000000 RDI: ffffed101435ada0 RBP: 0000000000000048 R08: ffffed101435ada0 R09: 0000000000000000 R10: 0000000000000000 R11: ffff8880a1170140 R12: 00000000014080c0 R13: ffff8880a1ad6d5f R14: ffff88813fe804c0 R15: 0000000000000048 FS: 00007f262497b8c0(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f26217dc008 CR3: 00000000a17d8000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: kasan_poison_shadow mm/kasan/kasan.c:64 [inline] kasan_unpoison_shadow+0x33/0x40 mm/kasan/kasan.c:69 kasan_kmalloc+0x4f/0x160 mm/kasan/kasan.c:546 kmem_cache_alloc_trace+0x131/0x3d0 mm/slab.c:3618 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x129/0x800 security/apparmor/lsm.c:431 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x15c/0x3e0 fs/file_table.c:129 path_openat+0x84/0x2970 fs/namei.c:3545 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f2623f0a85d RSP: 002b:00007ffe23839200 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffe23839510 RCX: 00007f2623f0a85d RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 0000557f44cb7d20 RBP: 000000000000000d R08: 00000000000001c0 R09: 00000000ffffffff R10: 0000000000000069 R11: 0000000000000293 R12: 00000000ffffffff R13: 0000557f44cb4040 R14: 00007ffe238394d0 R15: 0000557f44cc18a0 Code: 49 89 f9 48 89 d1 83 e2 07 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 <49> 89 f9 40 88 f0 48 89 d1 f3 aa 4c 89 c8 c3 90 49 89 fa 40 0f