usb usb9: usbfs: process 14205 (syz-executor.2) did not claim interface 0 before use usb usb9: usbfs: process 14205 (syz-executor.2) did not claim interface 0 before use usb usb9: usbfs: process 14205 (syz-executor.2) did not claim interface 0 before use INFO: task syz-executor.4:14174 blocked for more than 140 seconds. Not tainted 4.14.268-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D28880 14174 7990 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_timeout+0x80a/0xe90 kernel/time/timer.c:1724 do_wait_for_common kernel/sched/completion.c:91 [inline] __wait_for_common kernel/sched/completion.c:112 [inline] wait_for_common+0x272/0x430 kernel/sched/completion.c:123 usb_start_wait_urb+0x125/0x440 drivers/usb/core/message.c:61 usb_bulk_msg+0x1f6/0x500 drivers/usb/core/message.c:252 proc_bulk+0x331/0x6d0 drivers/usb/core/devio.c:1223 usbdev_do_ioctl+0x5b0/0x2b70 drivers/usb/core/devio.c:2449 usbdev_ioctl+0x21/0x30 drivers/usb/core/devio.c:2599 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fb33110e049 RSP: 002b:00007fb32fa83168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fb331220f60 RCX: 00007fb33110e049 RDX: 0000000020000080 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00007fb33116808d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffaef02eff R14: 00007fb32fa83300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1527: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1527 Comm: khungtaskd Not tainted 4.14.268-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4624 Comm: systemd-journal Not tainted 4.14.268-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8880a105c140 task.stack: ffff8880a1060000 RIP: 0010:__rcu_read_unlock+0x82/0x160 kernel/rcu/update.c:271 RSP: 0018:ffff8880a10677f8 EFLAGS: 00000017 RAX: 0000000000000000 RBX: ffff8880a105c140 RCX: 1ffffffff1198fad RDX: 0000000000000000 RSI: ffffffff87ccf440 RDI: ffff8880a105c4c4 RBP: ffff8880a105c4c0 R08: 0000000000000000 R09: 00000000000a0012 R10: ffff8880a105c9c8 R11: ffff8880a105c140 R12: 0000000000000000 R13: 0000000000000000 R14: 00000000fffffffe R15: ffff8880a1067e88 FS: 00007f65c06528c0(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f65bb504000 CR3: 00000000a235f000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_unlock include/linux/rcupdate.h:684 [inline] is_bpf_text_address+0x9b/0x150 kernel/bpf/core.c:502 kernel_text_address kernel/extable.c:150 [inline] kernel_text_address+0xbd/0xf0 kernel/extable.c:120 __kernel_text_address+0x9/0x30 kernel/extable.c:105 unwind_get_return_address arch/x86/kernel/unwind_orc.c:252 [inline] unwind_get_return_address+0x51/0x90 arch/x86/kernel/unwind_orc.c:247 __save_stack_trace+0xa0/0x160 arch/x86/kernel/stacktrace.c:45 save_stack mm/kasan/kasan.c:447 [inline] set_track mm/kasan/kasan.c:459 [inline] kasan_slab_free+0xc3/0x1a0 mm/kasan/kasan.c:524 __cache_free mm/slab.c:3496 [inline] kfree+0xc9/0x250 mm/slab.c:3815 aa_free_file_ctx security/apparmor/include/file.h:76 [inline] apparmor_file_free_security+0x7e/0xb0 security/apparmor/lsm.c:441 security_file_free+0x42/0x80 security/security.c:879 put_filp+0x23/0x90 fs/file_table.c:312 path_openat+0x6ce/0x2970 fs/namei.c:3581 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f65bfbe185d RSP: 002b:00007ffdad5baff0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffdad5bb300 RCX: 00007f65bfbe185d RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 000055c695c52b80 RBP: 000000000000000d R08: 000000000000ffc0 R09: 00000000ffffffff R10: 0000000000000069 R11: 0000000000000293 R12: 00000000ffffffff R13: 000055c695c45040 R14: 00007ffdad5bb2c0 R15: 000055c695c53100 Code: 03 0f b6 14 02 48 89 e8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 b4 00 00 00 8b 83 80 03 00 00 3d 01 00 00 c0 0f 83 91 00 00 00 <5b> 5d c3 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 0f ---------------- Code disassembly (best guess): 0: 03 0f add (%rdi),%ecx 2: b6 14 mov $0x14,%dh 4: 02 48 89 add -0x77(%rax),%cl 7: e8 83 e0 07 83 callq 0x8307e08f c: c0 03 38 rolb $0x38,(%rbx) f: d0 7c 08 84 sarb -0x7c(%rax,%rcx,1) 13: d2 0f rorb %cl,(%rdi) 15: 85 b4 00 00 00 8b 83 test %esi,-0x7c750000(%rax,%rax,1) 1c: 80 03 00 addb $0x0,(%rbx) 1f: 00 3d 01 00 00 c0 add %bh,-0x3fffffff(%rip) # 0xc0000026 25: 0f 83 91 00 00 00 jae 0xbc * 2b: 5b pop %rbx <-- trapping instruction 2c: 5d pop %rbp 2d: c3 retq 2e: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 35: fc ff df 38: 48 89 ea mov %rbp,%rdx 3b: 48 c1 ea 03 shr $0x3,%rdx 3f: 0f .byte 0xf