Bluetooth: hci1 command 0x0406 tx timeout Bluetooth: hci3 command 0x0406 tx timeout Bluetooth: hci4 command 0x0406 tx timeout Bluetooth: hci5 command 0x0406 tx timeout Bluetooth: hci0 command 0x0406 tx timeout INFO: task syz-executor.2:11970 blocked for more than 140 seconds. Not tainted 4.14.284-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D30296 11970 7972 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline] rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94 __down_read arch/x86/include/asm/rwsem.h:66 [inline] down_read+0x44/0x80 kernel/locking/rwsem.c:26 __get_super.part.0+0x271/0x390 fs/super.c:678 __get_super include/linux/spinlock.h:317 [inline] get_super+0x2b/0x50 fs/super.c:707 fsync_bdev+0x14/0xc0 fs/block_dev.c:495 blkdev_flushbuf block/ioctl.c:430 [inline] blkdev_ioctl+0x883/0x1830 block/ioctl.c:514 block_ioctl+0xd9/0x120 fs/block_dev.c:1893 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:500 [inline] do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684 SYSC_ioctl fs/ioctl.c:701 [inline] SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f8ecd918109 RSP: 002b:00007f8ecc26c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f8ecda2b030 RCX: 00007f8ecd918109 RDX: 0000000000000000 RSI: 0000000000001261 RDI: 0000000000000003 RBP: 00007f8ecd97205d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffecd7a8d5f R14: 00007f8ecc26c300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1532: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by syz-executor.2/11970: #0: (&type->s_umount_key#61){.+.+}, at: [] __get_super.part.0+0x271/0x390 fs/super.c:678 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1532 Comm: khungtaskd Not tainted 4.14.284-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 2848 Comm: kworker/u4:3 Not tainted 4.14.284-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_purge_orig task: ffff8880ac014540 task.stack: ffff8880ac030000 RIP: 0010:should_resched arch/x86/include/asm/preempt.h:99 [inline] RIP: 0010:__local_bh_enable_ip+0xed/0x170 kernel/softirq.c:192 RSP: 0018:ffff8880ac037ca0 EFLAGS: 00000282 RAX: 1ffffffff11e1343 RBX: 0000000000000201 RCX: 1ffff110158029c2 RDX: dffffc0000000000 RSI: ffff8880ac014df0 RDI: ffff8880ac014dc4 RBP: ffffffff86ec5520 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff8880ae6d9700 R14: ffff88813fe468c0 R15: ffff8880a4f1b400 FS: 0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f4fbf912000 CR3: 00000000a1dc2000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: spin_unlock_bh include/linux/spinlock.h:362 [inline] _batadv_purge_orig+0x400/0xef0 net/batman-adv/originator.c:1325 batadv_purge_orig+0x17/0x60 net/batman-adv/originator.c:1338 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: c7 c0 18 9a f0 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 7a 48 83 3d d4 81 be 07 00 74 23 fb 66 0f 1f 44 00 00 <65> 8b 05 fc 66 d0 7e 85 c0 74 35 5b 5d c3 0f 0b 48 89 ef e8 cb ---------------- Code disassembly (best guess): 0: c7 c0 18 9a f0 88 mov $0x88f09a18,%eax 6: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx d: fc ff df 10: 48 c1 e8 03 shr $0x3,%rax 14: 80 3c 10 00 cmpb $0x0,(%rax,%rdx,1) 18: 75 7a jne 0x94 1a: 48 83 3d d4 81 be 07 cmpq $0x0,0x7be81d4(%rip) # 0x7be81f6 21: 00 22: 74 23 je 0x47 24: fb sti 25: 66 0f 1f 44 00 00 nopw 0x0(%rax,%rax,1) * 2b: 65 8b 05 fc 66 d0 7e mov %gs:0x7ed066fc(%rip),%eax # 0x7ed0672e <-- trapping instruction 32: 85 c0 test %eax,%eax 34: 74 35 je 0x6b 36: 5b pop %rbx 37: 5d pop %rbp 38: c3 retq 39: 0f 0b ud2 3b: 48 89 ef mov %rbp,%rdi 3e: e8 .byte 0xe8 3f: cb lret