INFO: task syz-executor.5:28113 blocked for more than 143 seconds. Not tainted 5.14.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.5 state:D stack:28656 pid:28113 ppid: 9056 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4940 [inline] __schedule+0x940/0x26f0 kernel/sched/core.c:6287 schedule+0xd3/0x270 kernel/sched/core.c:6366 schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1857 do_wait_for_common kernel/sched/completion.c:85 [inline] __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion_timeout+0x171/0x280 kernel/sched/completion.c:157 usb_start_wait_urb+0x144/0x4c0 drivers/usb/core/message.c:63 usb_bulk_msg+0x226/0x550 drivers/usb/core/message.c:387 do_proc_bulk+0x3a3/0x750 drivers/usb/core/devio.c:1236 proc_bulk drivers/usb/core/devio.c:1273 [inline] usbdev_do_ioctl drivers/usb/core/devio.c:2547 [inline] usbdev_ioctl+0x586/0x36c0 drivers/usb/core/devio.c:2713 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:874 [inline] __se_sys_ioctl fs/ioctl.c:860 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665f9 RSP: 002b:00007ff1e659b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 RDX: 0000000020000580 RSI: 00000000c0185502 RDI: 0000000000000003 RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 R13: 0000000000a9fb1f R14: 00007ff1e659b300 R15: 0000000000022000 INFO: lockdep is turned off. NMI backtrace for cpu 0 CPU: 0 PID: 1659 Comm: khungtaskd Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:105 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1ae/0x220 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xc1d/0xf50 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4856 Comm: systemd-journal Not tainted 5.14.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:on_stack arch/x86/include/asm/stacktrace.h:49 [inline] RIP: 0010:stack_access_ok arch/x86/kernel/unwind_orc.c:342 [inline] RIP: 0010:deref_stack_reg+0x81/0x150 arch/x86/kernel/unwind_orc.c:352 Code: 85 c3 00 00 00 49 8d 7c 24 10 4d 8b 6c 24 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 94 00 00 00 <49> 39 ed 49 8b 44 24 10 77 13 48 39 e8 76 0e 48 8d 55 08 48 39 d0 RSP: 0018:ffffc9000114f958 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: ffffc9000114faf0 RCX: 0000000000000000 RDX: 1ffff92000229f58 RSI: ffffc9000114fa80 RDI: ffffc9000114fac0 RBP: ffffc9000114fa80 R08: ffffffff8de8adf0 R09: 0000000000000001 R10: fffff52000229f61 R11: 0000000000086089 R12: ffffc9000114fab0 R13: ffffc90001148000 R14: ffffc9000114fab0 R15: ffffc9000114fae4 FS: 00007ff878eb48c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff8763d2000 CR3: 000000007b492000 CR4: 00000000001506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: unwind_next_frame+0x13e0/0x1ce0 arch/x86/kernel/unwind_orc.c:587 __unwind_start+0x51b/0x800 arch/x86/kernel/unwind_orc.c:699 unwind_start arch/x86/include/asm/unwind.h:60 [inline] arch_stack_walk+0x5c/0xe0 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0x8c/0xc0 kernel/stacktrace.c:121 kasan_save_stack+0x1b/0x40 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] ____kasan_kmalloc mm/kasan/common.c:513 [inline] ____kasan_kmalloc mm/kasan/common.c:472 [inline] __kasan_kmalloc+0xa4/0xd0 mm/kasan/common.c:522 kmalloc include/linux/slab.h:596 [inline] kzalloc include/linux/slab.h:721 [inline] lsm_cred_alloc security/security.c:537 [inline] security_prepare_creds+0x10e/0x190 security/security.c:1691 prepare_creds+0x56e/0x7b0 kernel/cred.c:293 access_override_creds fs/open.c:351 [inline] do_faccessat+0x3f4/0x850 fs/open.c:415 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff87816f9c7 Code: 83 c4 08 48 3d 01 f0 ff ff 73 01 c3 48 8b 0d c8 d4 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 b8 15 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 d4 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007ffcd79b69b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000015 RAX: ffffffffffffffda RBX: 00007ffcd79b99e0 RCX: 00007ff87816f9c7 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00005578c05d99a3 RBP: 00007ffcd79b6b00 R08: 00005578c05cf3e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 00005578c250c8a0 R15: 00007ffcd79b6ff0 ---------------- Code disassembly (best guess): 0: 85 c3 test %eax,%ebx 2: 00 00 add %al,(%rax) 4: 00 49 8d add %cl,-0x73(%rcx) 7: 7c 24 jl 0x2d 9: 10 4d 8b adc %cl,-0x75(%rbp) c: 6c insb (%dx),%es:(%rdi) d: 24 08 and $0x8,%al f: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax 16: fc ff df 19: 48 89 fa mov %rdi,%rdx 1c: 48 c1 ea 03 shr $0x3,%rdx 20: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 24: 0f 85 94 00 00 00 jne 0xbe * 2a: 49 39 ed cmp %rbp,%r13 <-- trapping instruction 2d: 49 8b 44 24 10 mov 0x10(%r12),%rax 32: 77 13 ja 0x47 34: 48 39 e8 cmp %rbp,%rax 37: 76 0e jbe 0x47 39: 48 8d 55 08 lea 0x8(%rbp),%rdx 3d: 48 39 d0 cmp %rdx,%rax