Bluetooth: hci2 command 0x0406 tx timeout Bluetooth: hci3 command 0x0406 tx timeout Bluetooth: hci4 command 0x0406 tx timeout Bluetooth: hci0 command 0x0406 tx timeout Bluetooth: hci5 command 0x0406 tx timeout INFO: task syz-executor.1:12112 blocked for more than 140 seconds. Not tainted 4.14.265-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28688 12112 8002 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1724 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 usb_start_wait_urb+0x125/0x440 drivers/usb/core/message.c:61 usb_bulk_msg+0x1f6/0x500 drivers/usb/core/message.c:252 proc_bulk+0x331/0x6d0 drivers/usb/core/devio.c:1223 usbdev_do_ioctl+0x5b0/0x2b70 drivers/usb/core/devio.c:2449 usbdev_ioctl+0x21/0x30 drivers/usb/core/devio.c:2599 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f82b52e3059 RSP: 002b:00007f82b3c58168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f82b53f5f60 RCX: 00007f82b52e3059 RDX: 0000000020000000 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00007f82b533d08d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd30d527af R14: 00007f82b3c58300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1529: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by in:imklog/7744: #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0x1fb/0x2b0 fs/file.c:778 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1529 Comm: khungtaskd Not tainted 4.14.265-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 318 Comm: kworker/u4:3 Not tainted 4.14.265-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker task: ffff8880b4e84300 task.stack: ffff8880b4e88000 RIP: 0010:__lock_release kernel/locking/lockdep.c:3776 [inline] RIP: 0010:lock_release+0x291/0x870 kernel/locking/lockdep.c:4017 RSP: 0018:ffff8880b4e8fc48 EFLAGS: 00000802 RAX: dffffc0000000000 RBX: 1ffff110169d1f8c RCX: 1ffff110169d097f RDX: ffff8880b4e84bd8 RSI: ffffffff88f77980 RDI: ffff8880b4e84bfa RBP: ffffffff88f77980 R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8880b4e84300 R12: ffffffff86eb4cd0 R13: ffffffff8becdd40 R14: ffff8880b4e84300 R15: 0000000000000003 FS: 0000000000000000(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb09747b008 CR3: 00000000a1e9f000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_lock_release include/linux/rcupdate.h:247 [inline] rcu_read_unlock include/linux/rcupdate.h:685 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:422 [inline] batadv_nc_worker+0x5a7/0xc50 net/batman-adv/network-coding.c:728 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: c8 7c 08 84 c9 0f 85 50 05 00 00 8b 4a 24 85 c9 0f 85 15 6e c0 05 48 8d 7a 22 48 b8 00 00 00 00 00 fc ff df 48 89 f9 48 c1 e9 03 <0f> b6 0c 01 48 89 f8 83 e0 07 83 c0 01 38 c8 7c 08 84 c9 0f 85 ---------------- Code disassembly (best guess): 0: c8 7c 08 84 enterq $0x87c,$0x84 4: c9 leaveq 5: 0f 85 50 05 00 00 jne 0x55b b: 8b 4a 24 mov 0x24(%rdx),%ecx e: 85 c9 test %ecx,%ecx 10: 0f 85 15 6e c0 05 jne 0x5c06e2b 16: 48 8d 7a 22 lea 0x22(%rdx),%rdi 1a: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 21: fc ff df 24: 48 89 f9 mov %rdi,%rcx 27: 48 c1 e9 03 shr $0x3,%rcx * 2b: 0f b6 0c 01 movzbl (%rcx,%rax,1),%ecx <-- trapping instruction 2f: 48 89 f8 mov %rdi,%rax 32: 83 e0 07 and $0x7,%eax 35: 83 c0 01 add $0x1,%eax 38: 38 c8 cmp %cl,%al 3a: 7c 08 jl 0x44 3c: 84 c9 test %cl,%cl 3e: 0f .byte 0xf 3f: 85 .byte 0x85