INFO: task syz-executor.4:11549 blocked for more than 143 seconds. Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.4 state:D stack:23984 pid:11549 tgid:11547 ppid:6006 flags:0x00000006 Call Trace: context_switch kernel/sched/core.c:5409 [inline] __schedule+0x17d3/0x4a20 kernel/sched/core.c:6736 __schedule_loop kernel/sched/core.c:6813 [inline] schedule+0x14b/0x320 kernel/sched/core.c:6828 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6885 __mutex_lock_common kernel/locking/mutex.c:684 [inline] __mutex_lock+0x6a4/0xd70 kernel/locking/mutex.c:752 odev_open+0x59/0xa0 sound/core/seq/oss/seq_oss.c:127 chrdev_open+0x5b2/0x630 fs/char_dev.c:414 do_dentry_open+0x909/0x15a0 fs/open.c:955 do_open fs/namei.c:3642 [inline] path_openat+0x2860/0x3240 fs/namei.c:3799 do_filp_open+0x235/0x490 fs/namei.c:3826 do_sys_openat2+0x13e/0x1d0 fs/open.c:1406 do_sys_open fs/open.c:1421 [inline] __do_sys_openat fs/open.c:1437 [inline] __se_sys_openat fs/open.c:1432 [inline] __x64_sys_openat+0x247/0x2a0 fs/open.c:1432 do_syscall_64+0xfd/0x240 entry_SYSCALL_64_after_hwframe+0x6d/0x75 RIP: 0033:0x7f9e5087dda9 RSP: 002b:00007f9e5162a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007f9e509abf80 RCX: 00007f9e5087dda9 RDX: 0000000000101002 RSI: 0000000020000000 RDI: ffffffffffffff9c RBP: 00007f9e508ca47a R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 000000000000000b R14: 00007f9e509abf80 R15: 00007ffeca4c2908 Showing all locks held in the system: 2 locks held by kworker/u8:1/11: #0: ffff8880b953e358 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559 #1: ffff8880b9528988 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x441/0x770 kernel/sched/psi.c:988 1 lock held by khungtaskd/29: #0: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline] #0: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline] #0: ffffffff8e132020 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x2a0 kernel/locking/lockdep.c:6614 3 locks held by kworker/u8:5/957: 2 locks held by getty/4824: #0: ffff88802a91c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc900031332f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6b5/0x1e10 drivers/tty/n_tty.c:2201 2 locks held by syz-executor.0/10195: 1 lock held by syz-executor.4/11549: #0: ffffffff8f2e5728 (register_mutex#4){+.+.}-{3:3}, at: odev_open+0x59/0xa0 sound/core/seq/oss/seq_oss.c:127 1 lock held by syz-executor.0/11589: #0: ffff88801d0af0c0 (mapping.invalidate_lock#2){++++}-{3:3}, at: filemap_invalidate_lock include/linux/fs.h:838 [inline] #0: ffff88801d0af0c0 (mapping.invalidate_lock#2){++++}-{3:3}, at: blkdev_fallocate+0x233/0x550 block/fops.c:797 3 locks held by syz-executor.0/11734: ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114 nmi_cpu_backtrace+0x49c/0x4d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x198/0x320 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:222 [inline] watchdog+0xfb0/0xff0 kernel/hung_task.c:379 kthread+0x2f2/0x390 kernel/kthread.c:388 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 11 Comm: kworker/u8:1 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: bat_events batadv_nc_worker RIP: 0010:__lock_acquire+0x379/0x1fd0 kernel/locking/lockdep.c:5073 Code: 5c e8 10 48 89 d8 48 c1 e8 03 80 3c 30 00 74 17 48 89 df e8 09 a2 86 00 4c 8b 44 24 08 48 be 00 00 00 00 00 fc ff df 4c 89 23 <49> 8d 5c e8 18 48 89 d8 48 c1 e8 03 48 89 44 24 78 80 3c 30 00 74 RSP: 0018:ffffc90000107890 EFLAGS: 00000046 RAX: 1ffff11002dd58e7 RBX: ffff888016eac738 RCX: ffffffff944dd603 RDX: 0000000000000002 RSI: dffffc0000000000 RDI: 0000000000000021 RBP: 000000000000000a R08: ffff888016eac6d8 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1f0e74e R12: ffffffff8e132020 R13: 0000000000000021 R14: 000000000000000a R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f0def17b978 CR3: 000000000df32000 CR4: 0000000000350ef0 Call Trace: lock_acquire+0x1e4/0x530 kernel/locking/lockdep.c:5754 rcu_lock_acquire include/linux/rcupdate.h:298 [inline] rcu_read_lock include/linux/rcupdate.h:750 [inline] batadv_nc_process_nc_paths+0xd6/0x3a0 net/batman-adv/network-coding.c:687 batadv_nc_worker+0x52c/0x610 net/batman-adv/network-coding.c:735 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0xa02/0x1770 kernel/workqueue.c:3335 worker_thread+0x86d/0xd70 kernel/workqueue.c:3416 kthread+0x2f2/0x390 kernel/kthread.c:388 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243