Bluetooth: hci1 command 0x0406 tx timeout
Bluetooth: hci3 command 0x0406 tx timeout
Bluetooth: hci4 command 0x0406 tx timeout
Bluetooth: hci5 command 0x0406 tx timeout
Bluetooth: hci0 command 0x0406 tx timeout
INFO: task syz-executor.2:11970 blocked for more than 140 seconds.
      Not tainted 4.14.284-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
syz-executor.2  D30296 11970   7972 0x00000004
Call Trace:
 context_switch kernel/sched/core.c:2811 [inline]
 __schedule+0x88b/0x1de0 kernel/sched/core.c:3387
 schedule+0x8d/0x1b0 kernel/sched/core.c:3431
 __rwsem_down_read_failed_common kernel/locking/rwsem-xadd.c:292 [inline]
 rwsem_down_read_failed+0x1e6/0x350 kernel/locking/rwsem-xadd.c:309
 call_rwsem_down_read_failed+0x14/0x30 arch/x86/lib/rwsem.S:94
 __down_read arch/x86/include/asm/rwsem.h:66 [inline]
 down_read+0x44/0x80 kernel/locking/rwsem.c:26
 __get_super.part.0+0x271/0x390 fs/super.c:678
 __get_super include/linux/spinlock.h:317 [inline]
 get_super+0x2b/0x50 fs/super.c:707
 fsync_bdev+0x14/0xc0 fs/block_dev.c:495
 blkdev_flushbuf block/ioctl.c:430 [inline]
 blkdev_ioctl+0x883/0x1830 block/ioctl.c:514
 block_ioctl+0xd9/0x120 fs/block_dev.c:1893
 vfs_ioctl fs/ioctl.c:46 [inline]
 file_ioctl fs/ioctl.c:500 [inline]
 do_vfs_ioctl+0x75a/0xff0 fs/ioctl.c:684
 SYSC_ioctl fs/ioctl.c:701 [inline]
 SyS_ioctl+0x7f/0xb0 fs/ioctl.c:692
 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292
 entry_SYSCALL_64_after_hwframe+0x46/0xbb
RIP: 0033:0x7f8ecd918109
RSP: 002b:00007f8ecc26c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f8ecda2b030 RCX: 00007f8ecd918109
RDX: 0000000000000000 RSI: 0000000000001261 RDI: 0000000000000003
RBP: 00007f8ecd97205d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffecd7a8d5f R14: 00007f8ecc26c300 R15: 0000000000022000

Showing all locks held in the system:
1 lock held by khungtaskd/1532:
 #0:  (tasklist_lock){.+.+}, at: [<ffffffff87028029>] debug_show_all_locks+0x7c/0x21a kernel/locking/lockdep.c:4548
1 lock held by syz-executor.2/11970:
 #0:  (&type->s_umount_key#61){.+.+}, at: [<ffffffff81879051>] __get_super.part.0+0x271/0x390 fs/super.c:678

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 1532 Comm: khungtaskd Not tainted 4.14.284-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 __dump_stack lib/dump_stack.c:17 [inline]
 dump_stack+0x1b2/0x281 lib/dump_stack.c:58
 nmi_cpu_backtrace.cold+0x57/0x93 lib/nmi_backtrace.c:101
 nmi_trigger_cpumask_backtrace+0x13a/0x180 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:140 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:195 [inline]
 watchdog+0x5b9/0xb40 kernel/hung_task.c:274
 kthread+0x30d/0x420 kernel/kthread.c:232
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 2848 Comm: kworker/u4:3 Not tainted 4.14.284-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: bat_events batadv_purge_orig
task: ffff8880ac014540 task.stack: ffff8880ac030000
RIP: 0010:should_resched arch/x86/include/asm/preempt.h:99 [inline]
RIP: 0010:__local_bh_enable_ip+0xed/0x170 kernel/softirq.c:192
RSP: 0018:ffff8880ac037ca0 EFLAGS: 00000282
RAX: 1ffffffff11e1343 RBX: 0000000000000201 RCX: 1ffff110158029c2
RDX: dffffc0000000000 RSI: ffff8880ac014df0 RDI: ffff8880ac014dc4
RBP: ffffffff86ec5520 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: dffffc0000000000
R13: ffff8880ae6d9700 R14: ffff88813fe468c0 R15: ffff8880a4f1b400
FS:  0000000000000000(0000) GS:ffff8880ba500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4fbf912000 CR3: 00000000a1dc2000 CR4: 00000000003406e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 spin_unlock_bh include/linux/spinlock.h:362 [inline]
 _batadv_purge_orig+0x400/0xef0 net/batman-adv/originator.c:1325
 batadv_purge_orig+0x17/0x60 net/batman-adv/originator.c:1338
 process_one_work+0x793/0x14a0 kernel/workqueue.c:2117
 worker_thread+0x5cc/0xff0 kernel/workqueue.c:2251
 kthread+0x30d/0x420 kernel/kthread.c:232
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404
Code: c7 c0 18 9a f0 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 7a 48 83 3d d4 81 be 07 00 74 23 fb 66 0f 1f 44 00 00 <65> 8b 05 fc 66 d0 7e 85 c0 74 35 5b 5d c3 0f 0b 48 89 ef e8 cb 
----------------
Code disassembly (best guess):
   0:	c7 c0 18 9a f0 88    	mov    $0x88f09a18,%eax
   6:	48 ba 00 00 00 00 00 	movabs $0xdffffc0000000000,%rdx
   d:	fc ff df
  10:	48 c1 e8 03          	shr    $0x3,%rax
  14:	80 3c 10 00          	cmpb   $0x0,(%rax,%rdx,1)
  18:	75 7a                	jne    0x94
  1a:	48 83 3d d4 81 be 07 	cmpq   $0x0,0x7be81d4(%rip)        # 0x7be81f6
  21:	00
  22:	74 23                	je     0x47
  24:	fb                   	sti
  25:	66 0f 1f 44 00 00    	nopw   0x0(%rax,%rax,1)
* 2b:	65 8b 05 fc 66 d0 7e 	mov    %gs:0x7ed066fc(%rip),%eax        # 0x7ed0672e <-- trapping instruction
  32:	85 c0                	test   %eax,%eax
  34:	74 35                	je     0x6b
  36:	5b                   	pop    %rbx
  37:	5d                   	pop    %rbp
  38:	c3                   	retq
  39:	0f 0b                	ud2
  3b:	48 89 ef             	mov    %rbp,%rdi
  3e:	e8                   	.byte 0xe8
  3f:	cb                   	lret