usb usb1: usbfs: process 19458 (syz-executor.3) did not claim interface 0 before use usb usb1: usbfs: process 19457 (syz-executor.5) did not claim interface 0 before use INFO: task syz-executor.4:19423 blocked for more than 140 seconds. Not tainted 4.14.224-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D28960 19423 7995 0x00000004 Call Trace: context_switch kernel/sched/core.c:2808 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3384 schedule+0x8d/0x1b0 kernel/sched/core.c:3428 schedule_timeout+0x4af/0xe90 kernel/time/timer.c:1747 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 usb_start_wait_urb+0x125/0x440 drivers/usb/core/message.c:61 usb_bulk_msg+0x1f6/0x500 drivers/usb/core/message.c:252 proc_bulk+0x331/0x6d0 drivers/usb/core/devio.c:1223 usbdev_do_ioctl+0x5b0/0x2b70 drivers/usb/core/devio.c:2449 usbdev_ioctl+0x21/0x30 drivers/usb/core/devio.c:2599 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x465f69 RSP: 002b:00007fd94a0f7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465f69 RDX: 0000000020000140 RSI: 00000000c0185502 RDI: 0000000000000005 RBP: 00000000004bfa67 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 R13: 00007ffd0775bd3f R14: 00007fd94a0f7300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1531: #0: (tasklist_lock){.+.?}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by in:imklog/7683: #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0x1fb/0x2b0 fs/file.c:769 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1531 Comm: khungtaskd Not tainted 4.14.224-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4607 Comm: systemd-journal Not tainted 4.14.224-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a227a400 task.stack: ffff8880a2280000 RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:328 [inline] RIP: 0010:test_ti_thread_flag include/linux/thread_info.h:75 [inline] RIP: 0010:addr_limit_user_check include/linux/syscalls.h:231 [inline] RIP: 0010:prepare_exit_to_usermode arch/x86/entry/common.c:189 [inline] RIP: 0010:syscall_return_slowpath arch/x86/entry/common.c:270 [inline] RIP: 0010:do_syscall_64+0x2c9/0x640 arch/x86/entry/common.c:297 RSP: 0018:ffff8880a2287f00 EFLAGS: 00000046 RAX: 0000000000000007 RBX: ffff8880a227a400 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880a227ac4c RBP: ffff8880a2287f58 R08: 0000000015edf1c5 R09: ffffed1014450fca R10: ffff8880a2287e57 R11: ffff8880a227a400 R12: ffffffff88f092d0 R13: ffff8880a2287fd0 R14: ffffffff88f092c0 R15: 0000000000000000 FS: 00007f470bc038c0(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f47090f5018 CR3: 00000000a2190000 CR4: 00000000001406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7ffc48dd8b7e RSP: 002b:00007ffc48d91e60 EFLAGS: 00000202 ORIG_RAX: 00000000000000e4 RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007ffc48dd8b7e RDX: ffffffffffffffff RSI: 00007ffc48d91eb0 RDI: 0000000000000007 RBP: 00007ffc48d91e80 R08: 00007ffc48dd6000 R09: 000000741e228a91 R10: 000af6f18d00d93c R11: 0000000000000202 R12: 00007ffc48dd5080 R13: 0000000000000001 R14: 0000000000000001 R15: 0005bcfadb3f560c Code: 02 00 00 48 83 3d b7 43 f0 07 00 0f 84 96 01 00 00 e8 0c d2 54 00 fa 66 0f 1f 44 00 00 65 48 8b 1c 25 80 df 01 00 e8 f7 a1 40 00 <48> 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00