INFO: task syz-executor.5:9630 blocked for more than 143 seconds. Not tainted 5.15.0-rc2-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.5 state:D stack:27528 pid: 9630 ppid: 6556 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0x940/0x26f0 kernel/sched/core.c:6287 schedule+0xd3/0x270 kernel/sched/core.c:6366 schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1857 do_wait_for_common kernel/sched/completion.c:85 [inline] __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion_timeout+0x171/0x280 kernel/sched/completion.c:157 usb_start_wait_urb+0x144/0x4c0 drivers/usb/core/message.c:63 usb_bulk_msg+0x226/0x550 drivers/usb/core/message.c:387 do_proc_bulk+0x3a3/0x750 drivers/usb/core/devio.c:1236 proc_bulk drivers/usb/core/devio.c:1273 [inline] usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline] usbdev_ioctl+0x586/0x36c0 drivers/usb/core/devio.c:2713 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f3125ea8709 RSP: 002b:00007f312341f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f3125facf60 RCX: 00007f3125ea8709 RDX: 0000000020000740 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00007f3125f02cb4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffca9fd8bdf R14: 00007f312341f300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8b97fea0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 5 locks held by kworker/u4:2/148: 1 lock held by in:imklog/6235: #0: ffff888074069770 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 2 locks held by kworker/u4:7/9197: #0: ffff8880b9d31a58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:474 [inline] #0: ffff8880b9d31a58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock kernel/sched/sched.h:1317 [inline] #0: ffff8880b9d31a58 (&rq->__lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1620 [inline] #0: ffff8880b9d31a58 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x236/0x26f0 kernel/sched/core.c:6201 #1: ffff8880b9d1f9c8 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x39d/0x480 kernel/sched/psi.c:880 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 9197 Comm: kworker/u4:7 Not tainted 5.15.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: events_unbound toggle_allocation_gate RIP: 0010:arch_jump_label_transform_queue+0x1f/0x100 arch/x86/kernel/jump_label.c:128 Code: 0b 08 66 0f 1f 84 00 00 00 00 00 48 c7 c0 44 1e 6e 8d 55 48 ba 00 00 00 00 00 fc ff df 48 89 c1 48 89 e5 41 55 83 e0 07 41 54 <48> c1 e9 03 83 c0 03 49 89 fc 48 83 ec 10 0f b6 14 11 41 89 f5 38 RSP: 0018:ffffc90002edfb78 EFLAGS: 00000202 RAX: 0000000000000004 RBX: ffffffff8b39cb88 RCX: ffffffff8d6e1e44 RDX: dffffc0000000000 RSI: 0000000000000000 RDI: ffffffff8b39cb80 RBP: ffffc90002edfb88 R08: 0000000000000000 R09: ffffffff9026bf43 R10: ffffffff8199b0d0 R11: 0000000000000000 R12: 0000000000000000 R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f7b4e6a6000 CR3: 000000000b68e000 CR4: 0000000000350ee0 Call Trace: __jump_label_update+0x12e/0x400 kernel/jump_label.c:451 jump_label_update+0x1d5/0x430 kernel/jump_label.c:830 static_key_disable_cpuslocked+0x152/0x1b0 kernel/jump_label.c:207 static_key_disable+0x16/0x20 kernel/jump_label.c:215 toggle_allocation_gate mm/kfence/core.c:640 [inline] toggle_allocation_gate+0x185/0x390 mm/kfence/core.c:618 process_one_work+0x9bf/0x16b0 kernel/workqueue.c:2297 worker_thread+0x658/0x11f0 kernel/workqueue.c:2444 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess): 0: 0b 08 or (%rax),%ecx 2: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 9: 00 00 b: 48 c7 c0 44 1e 6e 8d mov $0xffffffff8d6e1e44,%rax 12: 55 push %rbp 13: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 1a: fc ff df 1d: 48 89 c1 mov %rax,%rcx 20: 48 89 e5 mov %rsp,%rbp 23: 41 55 push %r13 25: 83 e0 07 and $0x7,%eax 28: 41 54 push %r12 * 2a: 48 c1 e9 03 shr $0x3,%rcx <-- trapping instruction 2e: 83 c0 03 add $0x3,%eax 31: 49 89 fc mov %rdi,%r12 34: 48 83 ec 10 sub $0x10,%rsp 38: 0f b6 14 11 movzbl (%rcx,%rdx,1),%edx 3c: 41 89 f5 mov %esi,%r13d 3f: 38 .byte 0x38