protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 protocol 88fb is buggy, dev hsr_slave_0 protocol 88fb is buggy, dev hsr_slave_1 INFO: task syz-executor4:7978 blocked for more than 140 seconds. Not tainted 5.0.0-rc3+ #44 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor4 D20440 7978 1 0x80000004 Call Trace: context_switch kernel/sched/core.c:2831 [inline] __schedule+0x897/0x1e60 kernel/sched/core.c:3472 schedule+0xfe/0x350 kernel/sched/core.c:3516 schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3574 __mutex_lock_common kernel/locking/mutex.c:1002 [inline] __mutex_lock+0xa3b/0x1670 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 acct_get kernel/acct.c:161 [inline] slow_acct_process kernel/acct.c:577 [inline] acct_process+0x3e3/0x7f5 kernel/acct.c:605 do_exit+0x1a64/0x26e0 kernel/exit.c:857 do_group_exit+0x177/0x430 kernel/exit.c:971 get_signal+0x8b4/0x19b0 kernel/signal.c:2517 do_signal+0x91/0x1ea0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2f7/0x3b0 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x696/0x800 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4120ea Code: bf 52 37 44 00 ff 15 a5 75 24 00 b9 e0 96 65 00 31 d2 be d2 31 44 00 bf 52 37 44 00 ff 15 8e 75 24 00 48 8b 3d 87 b5 24 00 e8 <92> 8e ff ff 31 c0 48 83 c4 08 c3 66 66 2e 0f 1f 84 00 00 00 00 00 RSP: 002b:00007ffe5fd3c358 EFLAGS: 00000246 ORIG_RAX: 000000000000003d RAX: fffffffffffffe00 RBX: 000000000282f9b3 RCX: 00000000004120ea RDX: 0000000040000000 RSI: 00007ffe5fd3c390 RDI: ffffffffffffffff RBP: 00000000000015de R08: 0000000000000000 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000282f940 R13: 0000000000000004 R14: 0000000000000776 R15: 0000000000000004 Showing all locks held in the system: 1 lock held by khungtaskd/1040: #0: 000000005bb856f3 (rcu_read_lock){....}, at: debug_show_all_locks+0xc6/0x41d kernel/locking/lockdep.c:4389 1 lock held by rsyslogd/7840: #0: 00000000d262b008 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 fs/file.c:795 2 locks held by getty/7930: #0: 0000000096f7fa83 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000ce237fc0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 2 locks held by getty/7931: #0: 00000000e49f28a1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 00000000c7be8744 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 2 locks held by getty/7932: #0: 00000000d4b91921 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000004d6dbcdb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 2 locks held by getty/7933: #0: 00000000ae832a5e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000059ac3a50 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 2 locks held by getty/7934: #0: 000000007d84c399 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000007b16ba19 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 2 locks held by getty/7935: #0: 00000000e15c19df (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 0000000022f29edb (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 2 locks held by getty/7936: #0: 00000000d065023b (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:341 #1: 000000005355f13b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 drivers/tty/n_tty.c:2154 1 lock held by syz-executor4/7978: #0: 0000000060ed469a (&acct->lock#2){+.+.}, at: acct_get kernel/acct.c:161 [inline] #0: 0000000060ed469a (&acct->lock#2){+.+.}, at: slow_acct_process kernel/acct.c:577 [inline] #0: 0000000060ed469a (&acct->lock#2){+.+.}, at: acct_process+0x3e3/0x7f5 kernel/acct.c:605 1 lock held by syz-executor3/9057: #0: 00000000134a0643 (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds fs/exec.c:1407 [inline] #0: 00000000134a0643 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x45d/0x2700 fs/exec.c:1750 3 locks held by syz-executor4/25121: #0: 0000000060ed469a (&acct->lock#2){+.+.}, at: acct_get kernel/acct.c:161 [inline] #0: 0000000060ed469a (&acct->lock#2){+.+.}, at: slow_acct_process kernel/acct.c:577 [inline] #0: 0000000060ed469a (&acct->lock#2){+.+.}, at: acct_process+0x3e3/0x7f5 kernel/acct.c:605 #1: 00000000cb1d79ad (sb_writers#3){.+.+}, at: file_start_write_trylock include/linux/fs.h:2822 [inline] #1: 00000000cb1d79ad (sb_writers#3){.+.+}, at: do_acct_process+0x125c/0x1560 kernel/acct.c:517 #2: 00000000ddb889ed (&sb->s_type->i_mutex_key#10){++++}, at: inode_trylock include/linux/fs.h:777 [inline] #2: 00000000ddb889ed (&sb->s_type->i_mutex_key#10){++++}, at: ext4_file_write_iter+0x28b/0x1410 fs/ext4/file.c:232 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.0.0-rc3+ #44 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x63/0xa4 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1be/0x236 lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0xbbb/0x1170 kernel/hung_task.c:287 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 941 Comm: kworker/u4:0 Not tainted 5.0.0-rc3+ #44 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:check_preemption_disabled+0x6/0x290 lib/smp_processor_id.c:12 Code: fe e9 e1 fa ff ff 48 8b bd f0 fe ff ff e8 d2 ee 34 fe e9 f6 fa ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 57 <41> 56 49 89 f6 41 55 41 54 49 89 fc 53 48 83 ec 08 e8 14 f1 f0 fd RSP: 0018:ffff88802231f6d0 EFLAGS: 00000293 RAX: ffff8880878a44c0 RBX: 1ffff11004463ee0 RCX: ffffffff87d34868 RDX: 0000000000000000 RSI: ffffffff8881b9a0 RDI: ffffffff8881b9e0 RBP: ffff88802231f6d8 R08: ffff8880878a44c0 R09: ffffed1015ce5b90 R10: ffffed1015ce5b8f R11: ffff8880ae72dc7b R12: 000000000002dbc0 R13: ffff88802231f760 R14: dffffc0000000000 R15: ffff888058ba9d80 FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 0000000097411000 CR4: 00000000001426e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: debug_smp_processor_id+0x1c/0x20 lib/smp_processor_id.c:56 rcu_dynticks_curr_cpu_in_eqs+0x69/0x170 kernel/rcu/tree.c:303 rcu_is_watching+0x10/0x30 kernel/rcu/tree.c:932 rcu_read_unlock include/linux/rcupdate.h:657 [inline] batadv_nc_process_nc_paths.part.0+0x456/0x540 net/batman-adv/network-coding.c:710 batadv_nc_process_nc_paths net/batman-adv/network-coding.c:690 [inline] batadv_nc_worker+0x6c3/0x920 net/batman-adv/network-coding.c:739 process_one_work+0xd0c/0x1ce0 kernel/workqueue.c:2153 worker_thread+0x143/0x14a0 kernel/workqueue.c:2296 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352