INFO: task jbd2/sda1-8:3078 blocked for more than 140 seconds. Not tainted 4.19.0-rc6+ #268 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. jbd2/sda1-8 D18256 3078 2 0x80000000 Call Trace: context_switch kernel/sched/core.c:2825 [inline] __schedule+0x86c/0x1ed0 kernel/sched/core.c:3473 schedule+0xfe/0x460 kernel/sched/core.c:3517 jbd2_journal_commit_transaction+0xd42/0x89f8 fs/jbd2/commit.c:435 kjournald2+0x26d/0xb30 fs/jbd2/journal.c:229 kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 INFO: lockdep is turned off. NMI backtrace for cpu 0 CPU: 0 PID: 982 Comm: khungtaskd Not tainted 4.19.0-rc6+ #268 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1c4/0x2b4 lib/dump_stack.c:113 nmi_cpu_backtrace.cold.3+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1b3/0x1ed lib/nmi_backtrace.c:62 arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:38 trigger_all_cpu_backtrace include/linux/nmi.h:144 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:204 [inline] watchdog+0xb3e/0x1050 kernel/hung_task.c:265 kthread+0x35a/0x420 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:413 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 5818 Comm: syz-executor523 Not tainted 4.19.0-rc6+ #268 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:ext4_ext_binsearch fs/ext4/extents.c:812 [inline] RIP: 0010:ext4_find_extent+0x59d/0x9b0 fs/ext4/extents.c:926 Code: 48 c1 e8 03 0f b6 14 30 4c 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 78 03 00 00 41 8b 1f 44 89 e7 89 de e8 e3 a3 6d ff <41> 39 dc 0f 82 76 ff ff ff e8 45 a3 6d ff 4d 8d 6f 0c e8 3c a3 6d RSP: 0018:ffff8801bbd57150 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 000000000001a000 RCX: ffffffff8211122d RDX: 000000000001a000 RSI: 0000000068024c66 RDI: 0000000000000004 RBP: ffff8801bbd571b0 R08: ffff8801bbc6c2c0 R09: ffffed00372690b4 R10: ffffed00372690b4 R11: ffff8801b93485a3 R12: 0000000068024c66 R13: ffff8801b87e4018 R14: ffff8801b87e4090 R15: ffff8801b87e4054 FS: 0000000001aab880(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00005571f2fc10d0 CR3: 00000001d7048000 CR4: 00000000001406e0 Call Trace: get_ext_path fs/ext4/move_extent.c:31 [inline] mext_check_coverage.constprop.13+0x2b0/0x510 fs/ext4/move_extent.c:98 move_extent_per_page fs/ext4/move_extent.c:323 [inline] ext4_move_extents+0x2784/0x3c20 fs/ext4/move_extent.c:669 ext4_ioctl+0x3154/0x4210 fs/ext4/ioctl.c:799 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:501 [inline] do_vfs_ioctl+0x1de/0x1720 fs/ioctl.c:685 ksys_ioctl+0xa9/0xd0 fs/ioctl.c:702 __do_sys_ioctl fs/ioctl.c:709 [inline] __se_sys_ioctl fs/ioctl.c:707 [inline] __x64_sys_ioctl+0x73/0xb0 fs/ioctl.c:707 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4402b9 Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 fb 13 fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007ffd5c5f8ce8 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004402b9 RDX: 0000000020000300 RSI: 00000000c028660f RDI: 0000000000000003 RBP: 00000000006ca018 R08: 00000000004002c8 R09: 00000000004002c8 R10: 00000000004002c8 R11: 0000000000000217 R12: 0000000000401b40 R13: 0000000000401bd0 R14: 0000000000000000 R15: 0000000000000000