INFO: task syz-executor.2:31656 can't die for more than 143 seconds. syz-executor.2 D27464 31656 8613 0x00004006 Call Trace: context_switch kernel/sched/core.c:3265 [inline] __schedule+0x76e/0x17a0 kernel/sched/core.c:3937 schedule+0xd9/0x260 kernel/sched/core.c:4004 exp_funnel_lock kernel/rcu/tree_exp.h:308 [inline] synchronize_rcu_expedited+0x57f/0x5f0 kernel/rcu/tree_exp.h:817 synchronize_net+0x3b/0x60 net/core/dev.c:9313 packet_release+0x9cf/0xcb0 net/packet/af_packet.c:3040 __sock_release+0xce/0x280 net/socket.c:590 sock_close+0x1e/0x30 net/socket.c:1268 __fput+0x2ff/0x890 fs/file_table.c:280 ____fput+0x16/0x20 fs/file_table.c:313 task_work_run+0x145/0x1c0 kernel/task_work.c:113 get_signal+0x2078/0x2500 kernel/signal.c:2528 do_signal+0x87/0x1700 arch/x86/kernel/signal.c:815 exit_to_usermode_loop+0x286/0x380 arch/x86/entry/common.c:159 prepare_exit_to_usermode arch/x86/entry/common.c:194 [inline] syscall_return_slowpath arch/x86/entry/common.c:274 [inline] do_syscall_64+0x65f/0x760 arch/x86/entry/common.c:300 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459879 Code: 30 48 c7 44 24 38 00 00 00 00 48 c7 44 24 40 00 00 00 00 48 c7 44 24 48 00 00 00 00 e8 b0 67 ff ff 48 8b 44 24 50 48 8b 4c 24 <58> 48 89 01 48 8b 6c 24 60 48 83 c4 68 c3 e8 14 06 fd ff 0f 0b e8 RSP: 002b:00007fb599ef1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000010e RAX: fffffffffffffdfe RBX: 0000000000000006 RCX: 0000000000459879 RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000040 RBP: 000000000075c070 R08: 0000000020000200 R09: 0000000000000000 R10: 0000000020000140 R11: 0000000000000246 R12: 00007fb599ef26d4 R13: 00000000004c6bcc R14: 00000000004dbde8 R15: 00000000ffffffff INFO: task syz-executor.2:31656 blocked for more than 143 seconds. Not tainted 5.3.0-rc6-next-20190827 #74 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D27464 31656 8613 0x00004006 Call Trace: context_switch kernel/sched/core.c:3265 [inline] __schedule+0x76e/0x17a0 kernel/sched/core.c:3937 schedule+0xd9/0x260 kernel/sched/core.c:4004 exp_funnel_lock kernel/rcu/tree_exp.h:308 [inline] synchronize_rcu_expedited+0x57f/0x5f0 kernel/rcu/tree_exp.h:817 synchronize_net+0x3b/0x60 net/core/dev.c:9313 packet_release+0x9cf/0xcb0 net/packet/af_packet.c:3040 __sock_release+0xce/0x280 net/socket.c:590 sock_close+0x1e/0x30 net/socket.c:1268 __fput+0x2ff/0x890 fs/file_table.c:280 ____fput+0x16/0x20 fs/file_table.c:313 task_work_run+0x145/0x1c0 kernel/task_work.c:113 get_signal+0x2078/0x2500 kernel/signal.c:2528 do_signal+0x87/0x1700 arch/x86/kernel/signal.c:815 exit_to_usermode_loop+0x286/0x380 arch/x86/entry/common.c:159 prepare_exit_to_usermode arch/x86/entry/common.c:194 [inline] syscall_return_slowpath arch/x86/entry/common.c:274 [inline] do_syscall_64+0x65f/0x760 arch/x86/entry/common.c:300 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x459879 Code: 30 48 c7 44 24 38 00 00 00 00 48 c7 44 24 40 00 00 00 00 48 c7 44 24 48 00 00 00 00 e8 b0 67 ff ff 48 8b 44 24 50 48 8b 4c 24 <58> 48 89 01 48 8b 6c 24 60 48 83 c4 68 c3 e8 14 06 fd ff 0f 0b e8 RSP: 002b:00007fb599ef1c78 EFLAGS: 00000246 ORIG_RAX: 000000000000010e RAX: fffffffffffffdfe RBX: 0000000000000006 RCX: 0000000000459879 RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000040 RBP: 000000000075c070 R08: 0000000020000200 R09: 0000000000000000 R10: 0000000020000140 R11: 0000000000000246 R12: 00007fb599ef26d4 R13: 00000000004c6bcc R14: 00000000004dbde8 R15: 00000000ffffffff Showing all locks held in the system: 1 lock held by khungtaskd/1028: #0: ffffffff88fa7f00 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e kernel/locking/lockdep.c:5337 1 lock held by rsyslogd/8477: #0: ffff8880a44073e0 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 fs/file.c:801 2 locks held by getty/8567: #0: ffff8880a94bd690 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8568: #0: ffff88809395a690 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f3f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8569: #0: ffff8880a94bce10 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f392e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8570: #0: ffff88809395af10 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f352e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8571: #0: ffff888096cbc510 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8572: #0: ffff88809257d7d0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 2 locks held by getty/8573: #0: ffff888093a02cd0 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:340 #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 drivers/tty/n_tty.c:2156 1 lock held by syz-executor.2/31656: #0: ffff888092b5bc40 (&sb->s_type->i_mutex_key#12){+.+.}, at: inode_lock include/linux/fs.h:789 [inline] #0: ffff888092b5bc40 (&sb->s_type->i_mutex_key#12){+.+.}, at: __sock_release+0x89/0x280 net/socket.c:589 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1028 Comm: khungtaskd Not tainted 5.3.0-rc6-next-20190827 #74 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x172/0x1f0 lib/dump_stack.c:113 nmi_cpu_backtrace.cold+0x70/0xb2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x23b/0x28b lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:269 [inline] watchdog+0xc99/0x1360 kernel/hung_task.c:353 kthread+0x361/0x430 kernel/kthread.c:255 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 882 Comm: kworker/u4:3 Not tainted 5.3.0-rc6-next-20190827 #74 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_nc_worker RIP: 0010:__lock_acquire+0x36c/0x4a00 kernel/locking/lockdep.c:3896 Code: d0 7c 08 84 d2 0f 85 9a 18 00 00 41 8b 93 8c 08 00 00 49 8d 7a 24 31 c0 45 89 c1 85 d2 48 89 fa 0f 95 c0 41 c1 e5 0f 44 01 f0 e1 10 45 0f b7 ed c1 e0 0d 81 e1 00 00 03 00 41 c1 e1 12 41 09 RSP: 0018:ffff8880a81a7b38 EFLAGS: 00000046 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000002 RDX: ffff8880a80dacd4 RSI: 0000000000000029 RDI: ffff8880a80dacd4 RBP: ffff8880a81a7c50 R08: 0000000000000000 R09: 0000000000000000 R10: ffff8880a80dacb0 R11: ffff8880a80da3c0 R12: 0000000000000029 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffffffffff600400 CR3: 00000000a7253000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x190/0x410 kernel/locking/lockdep.c:4487 rcu_lock_acquire include/linux/rcupdate.h:208 [inline] rcu_read_lock include/linux/rcupdate.h:599 [inline] batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:407 [inline] batadv_nc_worker+0x117/0x760 net/batman-adv/network-coding.c:718 process_one_work+0x9af/0x1740 kernel/workqueue.c:2269 worker_thread+0x98/0xe40 kernel/workqueue.c:2415 kthread+0x361/0x430 kernel/kthread.c:255 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:352