INFO: task kworker/0:3:5817 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:3 state:D stack:26104 pid:5817 tgid:5817 ppid:2 task_flags:0x4208060 flags:0x00080000
Workqueue: usb_hub_wq hub_event
Call Trace:
context_switch kernel/sched/core.c:5256 [inline]
__schedule+0x1139/0x6150 kernel/sched/core.c:6863
__schedule_loop kernel/sched/core.c:6945 [inline]
schedule+0xe7/0x3a0 kernel/sched/core.c:6960
usb_kill_urb drivers/usb/core/urb.c:718 [inline]
usb_kill_urb+0x253/0x320 drivers/usb/core/urb.c:704
usb_start_wait_urb+0x250/0x4e0 drivers/usb/core/message.c:65
usb_internal_control_msg drivers/usb/core/message.c:103 [inline]
usb_control_msg+0x326/0x4a0 drivers/usb/core/message.c:154
get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 drivers/usb/core/hub.c:4851
hub_port_init+0xcc0/0x3a90 drivers/usb/core/hub.c:5112
hub_port_connect drivers/usb/core/hub.c:5496 [inline]
hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
port_event drivers/usb/core/hub.c:5871 [inline]
hub_event+0x2ee7/0x52f0 drivers/usb/core/hub.c:5953
process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257
process_scheduled_works kernel/workqueue.c:3340 [inline]
worker_thread+0x6c8/0xf10 kernel/workqueue.c:3421
kthread+0x3c5/0x780 kernel/kthread.c:463
ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
Showing all locks held in the system:
1 lock held by khungtaskd/31:
#0: ffffffff8e3c9620 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
#0: ffffffff8e3c9620 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
#0: ffffffff8e3c9620 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 kernel/locking/lockdep.c:6775
2 locks held by getty/5571:
#0: ffff88814d7b40a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243
#1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x1510 drivers/tty/n_tty.c:2211
5 locks held by kworker/0:3/5817:
#0: ffff88801e2b9548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 kernel/workqueue.c:3232
#1: ffffc90003417c90 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 kernel/workqueue.c:3233
#2: ffff888144b0e198 (&dev->mutex){....}-{4:4}, at: device_lock include/linux/device.h:895 [inline]
#2: ffff888144b0e198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1c0/0x52f0 drivers/usb/core/hub.c:5899
#3: ffff888144b21518 (&port_dev->status_lock){+.+.}-{4:4}, at: usb_lock_port drivers/usb/core/hub.c:3252 [inline]
#3: ffff888144b21518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_port_connect drivers/usb/core/hub.c:5464 [inline]
#3: ffff888144b21518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
#3: ffff888144b21518 (&port_dev->status_lock){+.+.}-{4:4}, at: port_event drivers/usb/core/hub.c:5871 [inline]
#3: ffff888144b21518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2b87/0x52f0 drivers/usb/core/hub.c:5953
#4: ffff88802ace6e68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_port_connect drivers/usb/core/hub.c:5465 [inline]
#4: ffff88802ace6e68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_port_connect_change drivers/usb/core/hub.c:5707 [inline]
#4: ffff88802ace6e68 (hcd->address0_mutex){+.+.}-{4:4}, at: port_event drivers/usb/core/hub.c:5871 [inline]
#4: ffff88802ace6e68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x2bb0/0x52f0 drivers/usb/core/hub.c:5953
1 lock held by syz.4.1396/9858:
=============================================
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Call Trace:
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113
nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline]
__sys_info lib/sys_info.c:157 [inline]
sys_info+0x133/0x180 lib/sys_info.c:165
check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline]
watchdog+0xe66/0x1180 kernel/hung_task.c:515
kthread+0x3c5/0x780 kernel/kthread.c:463
ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 5479 Comm: dhcpcd Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:stack_trace_consume_entry+0xd9/0x170 kernel/stacktrace.c:93
Code: 0f 85 9a 00 00 00 8d 45 01 89 43 10 48 8b 03 48 8d 2c e8 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 80 3c 02 00 75 64 <48> 89 75 00 8b 43 08 39 43 10 0f 92 c0 48 83 c4 08 5b 5d c3 cc cc
RSP: 0018:ffffc90002fe71e0 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: ffffc90002fe72c0 RCX: ffffc90002fe7154
RDX: 1ffff920005fce69 RSI: ffffffff82288daf RDI: ffffc90002fe72cc
RBP: ffffc90002fe7348 R08: ffffffff912fc57c R09: 00000000ffffffff
R10: 0000000000000002 R11: 00000000000128bf R12: ffffffff81a960d0
R13: ffffc90002fe72c0 R14: 0000000000000000 R15: ffff8880267bc980
FS: 00007f49cce7a740(0000) GS:ffff8881249f5000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000020000038f030 CR3: 0000000021b81000 CR4: 00000000003526f0
Call Trace:
arch_stack_walk+0x88/0x100 arch/x86/kernel/stacktrace.c:27
stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
kasan_save_track+0x14/0x30 mm/kasan/common.c:77
kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584
poison_slab_object mm/kasan/common.c:252 [inline]
__kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284
kasan_slab_free include/linux/kasan.h:234 [inline]
slab_free_hook mm/slub.c:2540 [inline]
slab_free mm/slub.c:6670 [inline]
kfree+0x2f8/0x6e0 mm/slub.c:6878
avc_audit_post_callback+0x381/0x8c0 security/selinux/avc.c:724
common_lsm_audit+0x24e/0x300 security/lsm_audit.c:454
slow_avc_audit+0x186/0x210 security/selinux/avc.c:779
avc_audit security/selinux/include/avc.h:131 [inline]
avc_has_perm+0x1b5/0x1f0 security/selinux/avc.c:1198
sock_has_perm+0x251/0x2f0 security/selinux/hooks.c:4815
security_socket_recvmsg+0x238/0x260 security/security.c:4227
sock_recvmsg+0x4a/0x250 net/socket.c:1098
____sys_recvmsg+0x218/0x6b0 net/socket.c:2812
___sys_recvmsg+0x114/0x1a0 net/socket.c:2854
__sys_recvmsg+0x16a/0x220 net/socket.c:2887
do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f49ccf04407
Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
RSP: 002b:00007ffcd4b79de0 EFLAGS: 00000202 ORIG_RAX: 000000000000002f
RAX: ffffffffffffffda RBX: 00007f49cce7a740 RCX: 00007f49ccf04407
RDX: 0000000000000000 RSI: 00007ffcd4b79e70 RDI: 0000000000000010
RBP: 00007ffcd4b7c2b0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000202 R12: 000055b8c6373870
R13: 00007ffcd4b79f30 R14: 00007ffcd4b79e7c R15: 00007ffcd4b7c060