INFO: task syz-executor.4:31089 blocked for more than 143 seconds. Not tainted 5.15.0-rc3-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:26864 pid:31089 ppid: 6553 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0xc8d/0x1270 kernel/sched/core.c:6287 schedule+0x14b/0x210 kernel/sched/core.c:6366 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6425 __mutex_lock_common+0xdff/0x2550 kernel/locking/mutex.c:669 __mutex_lock kernel/locking/mutex.c:729 [inline] mutex_lock_nested+0x1a/0x20 kernel/locking/mutex.c:743 device_lock include/linux/device.h:760 [inline] usbdev_release+0x7a/0x7c0 drivers/usb/core/devio.c:1074 __fput+0x3fe/0x870 fs/file_table.c:280 task_work_run+0x146/0x1c0 kernel/task_work.c:164 tracehook_notify_resume include/linux/tracehook.h:189 [inline] exit_to_user_mode_loop kernel/entry/common.c:175 [inline] exit_to_user_mode_prepare+0x209/0x220 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x2e/0x70 kernel/entry/common.c:300 do_syscall_64+0x53/0xd0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbf340d751b RSP: 002b:00007fff50755980 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007fbf340d751b RDX: 0000000000000000 RSI: ffffffff8188f0a2 RDI: 0000000000000006 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2d024e68 R10: 0000000000000854 R11: 0000000000000293 R12: 00007fbf34229b60 R13: 00007fbf34229b60 R14: 00007fbf34228f60 R15: 0000000000182702 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8c91c180 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 1 lock held by in:imklog/6218: #0: ffff888019a04ff0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0x24e/0x2f0 fs/file.c:990 2 locks held by agetty/6240: #0: ffff88801b550098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:252 #1: ffffc900021cc2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6c5/0x1c60 drivers/tty/n_tty.c:2113 5 locks held by kworker/1:13/29432: #0: ffff8880133c1138 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x7ca/0x1140 #1: ffffc90018abfd20 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x808/0x1140 kernel/workqueue.c:2272 #2: ffff888146f93220 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:760 [inline] #2: ffff888146f93220 (&dev->mutex){....}-{3:3}, at: hub_event+0x1b2/0xe40 drivers/usb/core/hub.c:5662 #3: ffff88806d8345c0 (&port_dev->status_lock){+.+.}-{3:3}, at: usb_lock_port drivers/usb/core/hub.c:3086 [inline] #3: ffff88806d8345c0 (&port_dev->status_lock){+.+.}-{3:3}, at: hub_port_connect+0xce1/0x27d0 drivers/usb/core/hub.c:5279 #4: ffff888146ef1968 (hcd->address0_mutex){+.+.}-{3:3}, at: hub_port_init+0x1ef/0x2df0 drivers/usb/core/hub.c:4703 1 lock held by syz-executor.4/31089: #0: ffff888146f93220 (&dev->mutex){....}-{3:3}, at: device_lock include/linux/device.h:760 [inline] #0: ffff888146f93220 (&dev->mutex){....}-{3:3}, at: usbdev_release+0x7a/0x7c0 drivers/usb/core/devio.c:1074 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1dc/0x2d8 lib/dump_stack.c:106 nmi_cpu_backtrace+0x45f/0x490 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x16a/0x280 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc54/0xca0 kernel/hung_task.c:295 kthread+0x453/0x480 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2966 Comm: systemd-journal Not tainted 5.15.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__debug_check_no_obj_freed lib/debugobjects.c:981 [inline] RIP: 0010:debug_check_no_obj_freed+0x155/0x650 lib/debugobjects.c:1023 Code: 48 ba 00 00 00 00 00 fc ff df 41 ff c5 48 8b 44 24 28 48 85 c0 0f 84 2a 04 00 00 49 89 c4 49 89 c6 49 c1 ee 03 41 80 3c 16 00 <74> 12 4c 89 e7 e8 51 0f b8 fd 48 ba 00 00 00 00 00 fc ff df 49 8b RSP: 0018:ffffc9000b3ef840 EFLAGS: 00000046 RAX: ffff88801d210188 RBX: ffff888163d68000 RCX: 0000000000000001 RDX: dffffc0000000000 RSI: ffff888151856c70 RDI: ffffc9000b3ef720 RBP: ffff8880a07e0440 R08: dffffc0000000000 R09: 0000000000000003 R10: fffff5200167dee5 R11: 0000000000000004 R12: ffff88801d210188 R13: 0000000000000001 R14: 1ffff11003a42031 R15: 1ffff110140fc088 FS: 00007fb27981b8c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fb275827000 CR3: 000000007b791000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: free_pages_prepare mm/page_alloc.c:1343 [inline] free_pcp_prepare+0x246/0xd20 mm/page_alloc.c:1389 free_unref_page_prepare mm/page_alloc.c:3315 [inline] free_unref_page+0x7d/0x580 mm/page_alloc.c:3394 free_slab mm/slub.c:2003 [inline] discard_slab mm/slub.c:2009 [inline] __unfreeze_partials+0x1ab/0x200 mm/slub.c:2495 put_cpu_partial+0x132/0x1a0 mm/slub.c:2575 do_slab_free mm/slub.c:3471 [inline] ___cache_free+0xe6/0x120 mm/slub.c:3490 qlist_free_all mm/kasan/quarantine.c:165 [inline] kasan_quarantine_reduce+0x151/0x1c0 mm/kasan/quarantine.c:272 __kasan_slab_alloc+0x2f/0xe0 mm/kasan/common.c:444 kasan_slab_alloc include/linux/kasan.h:254 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3206 [inline] slab_alloc mm/slub.c:3214 [inline] kmem_cache_alloc+0x1c3/0x300 mm/slub.c:3219 prepare_creds+0x3d/0x640 kernel/cred.c:262 access_override_creds fs/open.c:351 [inline] do_faccessat+0xec/0x940 fs/open.c:415 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fb278ad69c7 Code: 83 c4 08 48 3d 01 f0 ff ff 73 01 c3 48 8b 0d c8 d4 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d4 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffcc30b22c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00007ffcc30b51e0 RCX: 00007fb278ad69c7 RDX: 00007fb279547a00 RSI: 0000000000000000 RDI: 000055a1275a89a3 RBP: 00007ffcc30b2300 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00007ffcc30b51e0 R15: 00007ffcc30b27f0 ---------------- Code disassembly (best guess): 0: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 7: fc ff df a: 41 ff c5 inc %r13d d: 48 8b 44 24 28 mov 0x28(%rsp),%rax 12: 48 85 c0 test %rax,%rax 15: 0f 84 2a 04 00 00 je 0x445 1b: 49 89 c4 mov %rax,%r12 1e: 49 89 c6 mov %rax,%r14 21: 49 c1 ee 03 shr $0x3,%r14 25: 41 80 3c 16 00 cmpb $0x0,(%r14,%rdx,1) * 2a: 74 12 je 0x3e <-- trapping instruction 2c: 4c 89 e7 mov %r12,%rdi 2f: e8 51 0f b8 fd callq 0xfdb80f85 34: 48 ba 00 00 00 00 00 movabs $0xdffffc0000000000,%rdx 3b: fc ff df 3e: 49 rex.WB 3f: 8b .byte 0x8b