Bluetooth: hci3 command 0x0406 tx timeout Bluetooth: hci2 command 0x0406 tx timeout Bluetooth: hci1 command 0x0406 tx timeout Bluetooth: hci0 command 0x0406 tx timeout Bluetooth: hci5 command 0x0406 tx timeout INFO: task kworker/1:3:7702 blocked for more than 140 seconds. Not tainted 4.14.282-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/1:3 D27352 7702 2 0x80000000 Workqueue: ipv6_addrconf addrconf_verify_work Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3489 __mutex_lock_common kernel/locking/mutex.c:833 [inline] __mutex_lock+0x669/0x1310 kernel/locking/mutex.c:893 addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4420 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 INFO: task kworker/1:1:8172 blocked for more than 140 seconds. Not tainted 4.14.282-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. kworker/1:1 D27048 8172 2 0x80000000 Workqueue: events linkwatch_event Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3489 __mutex_lock_common kernel/locking/mutex.c:833 [inline] __mutex_lock+0x669/0x1310 kernel/locking/mutex.c:893 linkwatch_event+0xa/0x50 net/core/link_watch.c:236 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Showing all locks held in the system: 3 locks held by kworker/0:0/3: #0: ("events"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: (deferred_process_work){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 #2: (rtnl_mutex){+.+.}, at: [] switchdev_deferred_process_work+0xa/0x20 net/switchdev/switchdev.c:150 1 lock held by khungtaskd/1533: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 3 locks held by kworker/1:3/7702: #0: ("%s"("ipv6_addrconf")){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: ((addr_chk_work).work){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 #2: (rtnl_mutex){+.+.}, at: [] addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4420 2 locks held by syz-executor.5/7983: #0: (rtnl_mutex){+.+.}, at: [] tun_detach drivers/net/tun.c:593 [inline] #0: (rtnl_mutex){+.+.}, at: [] tun_chr_close+0x34/0x60 drivers/net/tun.c:2732 #1: (rcu_preempt_state.exp_mutex){+.+.}, at: [] exp_funnel_lock kernel/rcu/tree_exp.h:305 [inline] #1: (rcu_preempt_state.exp_mutex){+.+.}, at: [] _synchronize_rcu_expedited+0x32d/0x770 kernel/rcu/tree_exp.h:596 3 locks held by kworker/1:1/8172: #0: ("events"){+.+.}, at: [] process_one_work+0x6b0/0x14a0 kernel/workqueue.c:2088 #1: ((linkwatch_work).work){+.+.}, at: [] process_one_work+0x6e6/0x14a0 kernel/workqueue.c:2092 #2: (rtnl_mutex){+.+.}, at: [] linkwatch_event+0xa/0x50 net/core/link_watch.c:236 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1533 Comm: khungtaskd Not tainted 4.14.282-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 8381 Comm: kworker/u4:3 Not tainted 4.14.282-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_tt_purge task: ffff8880b4e9a680 task.stack: ffff88809a8a0000 RIP: 0010:memcmp+0x62/0xb0 lib/string.c:918 RSP: 0018:ffff8880ba5078b0 EFLAGS: 00000046 RAX: 00000000000000ff RBX: ffff8880ba507966 RCX: 0000000000000006 RDX: 0000000000000000 RSI: ffff88804d2a4f56 RDI: ffff8880ba507948 RBP: dffffc0000000000 R08: ffffffff8ae19fbc R09: ffffffff8ae1a0c0 R10: 00000000001467bb R11: 0000000000066071 R12: ffff8880ba5079a0 R13: 000000000000000b R14: ffff8880ba507948 R15: ffff88804d2a4f20 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000056359a649280 CR3: 00000000a43a6000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: find_stack lib/stackdepot.c:180 [inline] depot_save_stack+0x10d/0x3f0 lib/stackdepot.c:229 save_stack mm/kasan/kasan.c:453 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0x117/0x1a0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3496 [inline] kfree+0xc9/0x250 mm/slab.c:3815 skb_free_head net/core/skbuff.c:563 [inline] skb_release_data+0x5f6/0x820 net/core/skbuff.c:583 skb_release_all net/core/skbuff.c:640 [inline] __kfree_skb net/core/skbuff.c:654 [inline] consume_skb+0xe0/0x380 net/core/skbuff.c:714 can_receive+0x2f5/0x4b0 net/can/af_can.c:712 canfd_rcv+0xfc/0x180 net/can/af_can.c:764 __netif_receive_skb_core+0x15ee/0x2a30 net/core/dev.c:4474 __netif_receive_skb+0x27/0x1a0 net/core/dev.c:4512 process_backlog+0x218/0x6f0 net/core/dev.c:5195 napi_poll net/core/dev.c:5604 [inline] net_rx_action+0x466/0xfd0 net/core/dev.c:5670 __do_softirq+0x24d/0x9ff kernel/softirq.c:288 do_softirq_own_stack+0x2a/0x40 arch/x86/entry/entry_64.S:1016 do_softirq.part.0+0x154/0x1b0 kernel/softirq.c:332 do_softirq kernel/softirq.c:324 [inline] __local_bh_enable_ip+0x12b/0x170 kernel/softirq.c:185 spin_unlock_bh include/linux/spinlock.h:362 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2524 [inline] batadv_tt_purge+0x319/0x930 net/batman-adv/translation-table.c:3795 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: 83 e2 07 0f b6 04 28 38 d0 7f 04 84 c0 75 54 48 89 f2 48 89 f1 0f b6 03 48 c1 ea 03 83 e1 07 0f b6 14 2a 38 ca 7f 04 84 d2 75 1e <0f> b6 16 29 d0 74 b7 48 83 c4 10 5b 5d 41 5c c3 48 83 c4 10 31 ---------------- Code disassembly (best guess): 0: 83 e2 07 and $0x7,%edx 3: 0f b6 04 28 movzbl (%rax,%rbp,1),%eax 7: 38 d0 cmp %dl,%al 9: 7f 04 jg 0xf b: 84 c0 test %al,%al d: 75 54 jne 0x63 f: 48 89 f2 mov %rsi,%rdx 12: 48 89 f1 mov %rsi,%rcx 15: 0f b6 03 movzbl (%rbx),%eax 18: 48 c1 ea 03 shr $0x3,%rdx 1c: 83 e1 07 and $0x7,%ecx 1f: 0f b6 14 2a movzbl (%rdx,%rbp,1),%edx 23: 38 ca cmp %cl,%dl 25: 7f 04 jg 0x2b 27: 84 d2 test %dl,%dl 29: 75 1e jne 0x49 * 2b: 0f b6 16 movzbl (%rsi),%edx <-- trapping instruction 2e: 29 d0 sub %edx,%eax 30: 74 b7 je 0xffffffe9 32: 48 83 c4 10 add $0x10,%rsp 36: 5b pop %rbx 37: 5d pop %rbp 38: 41 5c pop %r12 3a: c3 retq 3b: 48 83 c4 10 add $0x10,%rsp 3f: 31 .byte 0x31