Bluetooth: hci4 command 0x0406 tx timeout Bluetooth: hci0 command 0x0406 tx timeout Bluetooth: hci1 command 0x0406 tx timeout Bluetooth: hci5 command 0x0406 tx timeout Bluetooth: hci2 command 0x0406 tx timeout INFO: task systemd-udevd:9560 blocked for more than 140 seconds. Not tainted 4.14.286-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. systemd-udevd D28712 9560 4629 0x00000304 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3489 __mutex_lock_common kernel/locking/mutex.c:833 [inline] __mutex_lock+0x669/0x1310 kernel/locking/mutex.c:893 __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 blkdev_get+0x88/0x890 fs/block_dev.c:1611 blkdev_open+0x1cc/0x250 fs/block_dev.c:1772 do_dentry_open+0x44b/0xec0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:888 do_last fs/namei.c:3428 [inline] path_openat+0x628/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7fcf03cb9840 RSP: 002b:00007fff1fbbfb28 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 000055a04269ede0 RCX: 00007fcf03cb9840 RDX: 000055a040e50fe3 RSI: 00000000000a0800 RDI: 000055a0426a13f0 RBP: 00007fff1fbbfca0 R08: 000055a040e50670 R09: 0000000000000010 R10: 000055a040e50d0c R11: 0000000000000246 R12: 00007fff1fbbfbf0 R13: 000055a0426b96d0 R14: 0000000000000003 R15: 000000000000000e INFO: task syz-executor.0:9568 blocked for more than 140 seconds. Not tainted 4.14.286-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D26512 9568 7994 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3489 __mutex_lock_common kernel/locking/mutex.c:833 [inline] __mutex_lock+0x669/0x1310 kernel/locking/mutex.c:893 __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 blkdev_get+0x88/0x890 fs/block_dev.c:1611 blkdev_open+0x1cc/0x250 fs/block_dev.c:1772 do_dentry_open+0x44b/0xec0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:888 do_last fs/namei.c:3428 [inline] path_openat+0x628/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f140ed65109 RSP: 002b:00007f140d6da168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007f140ee77f60 RCX: 00007f140ed65109 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020004200 RBP: 00007f140edbf05d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffef7c6c0f R14: 00007f140d6da300 R15: 0000000000022000 INFO: task syz-executor.0:9575 blocked for more than 140 seconds. Not tainted 4.14.286-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.0 D29048 9575 7994 0x00000004 Call Trace: context_switch kernel/sched/core.c:2811 [inline] __schedule+0x88b/0x1de0 kernel/sched/core.c:3387 schedule+0x8d/0x1b0 kernel/sched/core.c:3431 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3489 __mutex_lock_common kernel/locking/mutex.c:833 [inline] __mutex_lock+0x669/0x1310 kernel/locking/mutex.c:893 __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 __blkdev_get+0x6a9/0x1090 fs/block_dev.c:1515 blkdev_get+0x88/0x890 fs/block_dev.c:1611 blkdev_open+0x1cc/0x250 fs/block_dev.c:1772 do_dentry_open+0x44b/0xec0 fs/open.c:777 vfs_open+0x105/0x220 fs/open.c:888 do_last fs/namei.c:3428 [inline] path_openat+0x628/0x2970 fs/namei.c:3569 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7f140ed65109 RSP: 002b:00007f140d6b9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 RAX: ffffffffffffffda RBX: 00007f140ee78030 RCX: 00007f140ed65109 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200044c0 RBP: 00007f140edbf05d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fffef7c6c0f R14: 00007f140d6b9300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1534: #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548 1 lock held by in:imklog/7691: #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0x1fb/0x2b0 fs/file.c:819 1 lock held by systemd-udevd/9560: #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 1 lock held by syz-executor.0/9568: #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 2 locks held by syz-executor.0/9575: #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 #1: (&bdev->bd_mutex/1){+.+.}, at: [] __blkdev_get+0x191/0x1090 fs/block_dev.c:1455 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1534 Comm: khungtaskd Not tainted 4.14.286-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline] watchdog+0x5b9/0xb40 kernel/hung_task.c:274 kthread+0x30d/0x420 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 4620 Comm: systemd-journal Not tainted 4.14.286-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 task: ffff8880a15a6040 task.stack: ffff8880a15a8000 RIP: 0010:compound_head include/linux/page-flags.h:150 [inline] RIP: 0010:virt_to_head_page include/linux/mm.h:614 [inline] RIP: 0010:qlink_to_cache mm/kasan/quarantine.c:127 [inline] RIP: 0010:qlist_free_all+0xd4/0x140 mm/kasan/quarantine.c:163 RSP: 0018:ffff8880a15afb40 EFLAGS: 00000282 RAX: ffffea0002cfc580 RBX: ffff8880b3f16540 RCX: ffffea0000000000 RDX: ffffea00025b07a0 RSI: ffff8880a15a68c8 RDI: ffff8880b3f16540 RBP: 0000000000000000 R08: ffffea00028da200 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880b3f16540 R13: ffff8880a15afb78 R14: 0000000000000000 R15: 0000000000000286 FS: 00007ff7495d58c0(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ff7469ee000 CR3: 00000000a1937000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: quarantine_reduce+0x185/0x200 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:536 slab_post_alloc_hook mm/slab.h:442 [inline] slab_alloc mm/slab.c:3390 [inline] kmem_cache_alloc+0x111/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 getname fs/namei.c:209 [inline] user_path_create fs/namei.c:3732 [inline] SYSC_mkdirat fs/namei.c:3864 [inline] SyS_mkdirat+0x83/0x270 fs/namei.c:3856 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x7ff748890687 RSP: 002b:00007ffd8fe10298 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007ffd8fe13300 RCX: 00007ff748890687 RDX: 0000000000000000 RSI: 00000000000001ed RDI: 0000558882b448a0 RBP: 00007ffd8fe102d0 R08: 00005588820063e5 R09: 0000000000000018 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000001 R14: 0000558882b448a0 R15: 00007ffd8fe10910 Code: e3 49 89 ee 0f 85 75 ff ff ff 48 89 df e8 15 09 a6 ff 48 b9 00 00 00 00 00 ea ff ff 48 c1 e8 0c 48 c1 e0 06 48 01 c8 48 8b 50 20 <48> 8d 4a ff 83 e2 01 48 0f 45 c1 4c 8b 70 30 e9 40 ff ff ff e8 ---------------- Code disassembly (best guess): 0: e3 49 jrcxz 0x4b 2: 89 ee mov %ebp,%esi 4: 0f 85 75 ff ff ff jne 0xffffff7f a: 48 89 df mov %rbx,%rdi d: e8 15 09 a6 ff callq 0xffa60927 12: 48 b9 00 00 00 00 00 movabs $0xffffea0000000000,%rcx 19: ea ff ff 1c: 48 c1 e8 0c shr $0xc,%rax 20: 48 c1 e0 06 shl $0x6,%rax 24: 48 01 c8 add %rcx,%rax 27: 48 8b 50 20 mov 0x20(%rax),%rdx * 2b: 48 8d 4a ff lea -0x1(%rdx),%rcx <-- trapping instruction 2f: 83 e2 01 and $0x1,%edx 32: 48 0f 45 c1 cmovne %rcx,%rax 36: 4c 8b 70 30 mov 0x30(%rax),%r14 3a: e9 40 ff ff ff jmpq 0xffffff7f 3f: e8 .byte 0xe8