INFO: task syz-executor.3:26880 blocked for more than 143 seconds. Not tainted 5.14.0-rc5-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.3 state:D stack:28280 pid:26880 ppid: 8738 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:4681 [inline] __schedule+0x93a/0x26f0 kernel/sched/core.c:5938 schedule+0xd3/0x270 kernel/sched/core.c:6017 schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1857 do_wait_for_common kernel/sched/completion.c:85 [inline] __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion_timeout+0x171/0x280 kernel/sched/completion.c:157 usb_start_wait_urb+0x144/0x4c0 drivers/usb/core/message.c:63 usb_bulk_msg+0x226/0x550 drivers/usb/core/message.c:387 do_proc_bulk+0x3a3/0x750 drivers/usb/core/devio.c:1236 proc_bulk_compat drivers/usb/core/devio.c:2057 [inline] usbdev_do_ioctl drivers/usb/core/devio.c:2608 [inline] usbdev_ioctl+0x990/0x36c0 drivers/usb/core/devio.c:2713 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:1069 [inline] __se_sys_ioctl fs/ioctl.c:1055 [inline] __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:1055 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x4665e9 RSP: 002b:00007f53201cc188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665e9 RDX: 0000000020000040 RSI: 00000000c0105502 RDI: 0000000000000003 RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038 R13: 0000000000a9fb1f R14: 00007f53201cc300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1597: #0: ffffffff8b97c280 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6446 3 locks held by in:imklog/8152: #0: ffff888025709270 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:974 #1: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:460 [inline] #1: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock kernel/sched/sched.h:1307 [inline] #1: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1610 [inline] #1: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x233/0x26f0 kernel/sched/core.c:5852 #2: ffff8880b9c1f988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x39d/0x480 kernel/sched/psi.c:880 2 locks held by login/8166: #0: ffff888018bab098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:252 #1: ffff888018bab130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: tty_write_lock drivers/tty/tty_io.c:961 [inline] #1: ffff888018bab130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: do_tty_write drivers/tty/tty_io.c:984 [inline] #1: ffff888018bab130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: file_tty_write.constprop.0+0x29f/0x910 drivers/tty/tty_io.c:1110 3 locks held by kworker/u4:15/11371: #0: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:460 [inline] #0: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock kernel/sched/sched.h:1307 [inline] #0: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: rq_lock kernel/sched/sched.h:1610 [inline] #0: ffff8880b9c51a98 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x233/0x26f0 kernel/sched/core.c:5852 #1: ffff8880b9c1f988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x16a/0x480 kernel/sched/psi.c:871 #2: ffff8880b9c40258 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x5a/0x1f0 kernel/time/timer.c:946 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1597 Comm: khungtaskd Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:105 nmi_cpu_backtrace.cold+0x44/0xd7 lib/nmi_backtrace.c:105 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:210 [inline] watchdog+0xd0a/0xfc0 kernel/hung_task.c:295 kthread+0x3e5/0x4d0 kernel/kthread.c:319 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4872 Comm: systemd-journal Not tainted 5.14.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__sanitizer_cov_trace_const_cmp4+0xc/0x70 kernel/kcov.c:283 Code: 00 00 00 48 89 7c 30 e8 48 89 4c 30 f0 4c 89 54 d8 20 48 89 10 5b c3 0f 1f 80 00 00 00 00 41 89 f8 bf 03 00 00 00 4c 8b 14 24 <89> f1 65 48 8b 34 25 00 f0 01 00 e8 54 f0 ff ff 84 c0 74 4b 48 8b RSP: 0018:ffffc90000edfc10 EFLAGS: 00000046 RAX: 00000000001adb20 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 RBP: ffff888012ba3140 R08: 0000000000000000 R09: ffff888012ba3007 R10: ffffffff817bcb33 R11: 0000000000000000 R12: ffff888012ba3130 R13: ffff888012ba3140 R14: dffffc0000000000 R15: 00000000ffffffea FS: 00007ff92d4128c0(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff92a994008 CR3: 000000001d62a000 CR4: 00000000001506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: trace_hardirqs_off+0x23/0x1b0 kernel/trace/trace_preemptirq.c:78 __raw_write_lock_irq include/linux/rwlock_api_smp.h:194 [inline] _raw_write_lock_irq+0x41/0x50 kernel/locking/spinlock.c:311 ep_start_scan+0x98/0x270 fs/eventpoll.c:614 ep_send_events fs/eventpoll.c:1647 [inline] ep_poll fs/eventpoll.c:1798 [inline] do_epoll_wait+0x5f6/0x1950 fs/eventpoll.c:2226 __do_sys_epoll_wait fs/eventpoll.c:2238 [inline] __se_sys_epoll_wait fs/eventpoll.c:2233 [inline] __x64_sys_epoll_wait+0x158/0x270 fs/eventpoll.c:2233 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7ff92c6db2e3 Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 83 3d 29 54 2b 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 0b c2 00 00 48 89 04 24 RSP: 002b:00007fffda7f0bc8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 RAX: ffffffffffffffda RBX: 000055ccc7a081e0 RCX: 00007ff92c6db2e3 RDX: 0000000000000013 RSI: 00007fffda7f0bd0 RDI: 0000000000000008 RBP: 00007fffda7f0dc0 R08: 000000006118f262 R09: 00007fffda7f4080 R10: 00000000ffffffff R11: 0000000000000246 R12: 00007fffda7f0bd0 R13: 0000000000000001 R14: ffffffffffffffff R15: 0005c996e883b5ed ---------------- Code disassembly (best guess): 0: 00 00 add %al,(%rax) 2: 00 48 89 add %cl,-0x77(%rax) 5: 7c 30 jl 0x37 7: e8 48 89 4c 30 callq 0x304c8954 c: f0 4c 89 54 d8 20 lock mov %r10,0x20(%rax,%rbx,8) 12: 48 89 10 mov %rdx,(%rax) 15: 5b pop %rbx 16: c3 retq 17: 0f 1f 80 00 00 00 00 nopl 0x0(%rax) 1e: 41 89 f8 mov %edi,%r8d 21: bf 03 00 00 00 mov $0x3,%edi 26: 4c 8b 14 24 mov (%rsp),%r10 2a: 89 f1 mov %esi,%ecx <-- trapping instruction 2c: 65 48 8b 34 25 00 f0 mov %gs:0x1f000,%rsi 33: 01 00 35: e8 54 f0 ff ff callq 0xfffff08e 3a: 84 c0 test %al,%al 3c: 74 4b je 0x89 3e: 48 rex.W 3f: 8b .byte 0x8b