INFO: task syz-executor.3:11827 blocked for more than 143 seconds. Not tainted 5.16.0-rc2-next-20211125-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor.3 state:D stack:26960 pid:11827 ppid: 11148 flags:0x00024004 Call Trace: context_switch kernel/sched/core.c:4983 [inline] __schedule+0xab2/0x4d90 kernel/sched/core.c:6293 schedule+0xd2/0x260 kernel/sched/core.c:6366 schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1857 do_wait_for_common kernel/sched/completion.c:85 [inline] __wait_for_common kernel/sched/completion.c:106 [inline] wait_for_common kernel/sched/completion.c:117 [inline] wait_for_completion+0x174/0x270 kernel/sched/completion.c:138 io_wq_exit_workers fs/io-wq.c:1217 [inline] io_wq_put_and_exit+0x33a/0xb70 fs/io-wq.c:1252 io_uring_clean_tctx fs/io_uring.c:9814 [inline] io_uring_cancel_generic+0x61d/0x690 fs/io_uring.c:9895 io_uring_files_cancel include/linux/io_uring.h:16 [inline] do_exit+0x60c/0x2c20 kernel/exit.c:787 do_group_exit+0x125/0x310 kernel/exit.c:929 get_signal+0x34c/0x28b0 kernel/signal.c:2859 arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868 handle_signal_work kernel/entry/common.c:148 [inline] exit_to_user_mode_loop kernel/entry/common.c:172 [inline] exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207 __syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline] syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f1d7468bae9 RSP: 002b:00007f1d71bbf188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa RAX: 000000000000000e RBX: 00007f1d7479f0e0 RCX: 00007f1d7468bae9 RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000003 RBP: 00007f1d746e5f6d R08: 0000000000000000 R09: 0000000000001800 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc4e470f9f R14: 00007f1d71bbf300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8bb83220 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458 1 lock held by systemd-journal/2957: #0: ffff8880b9d39d58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:489 1 lock held by in:imklog/6433: #0: ffff88807844caf0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc2-next-20211125-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:256 [inline] watchdog+0xcb7/0xed0 kernel/hung_task.c:413 kthread+0x405/0x4f0 kernel/kthread.c:345 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 1046 Comm: kworker/u4:4 Not tainted 5.16.0-rc2-next-20211125-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet RIP: 0010:batadv_nc_skb_store_for_decoding+0x0/0x440 net/batman-adv/network-coding.c:1556 Code: 24 08 89 14 24 e8 f0 93 d7 f8 8b 44 24 08 8b 14 24 e9 e0 fa ff ff e8 cf 93 d7 f8 e9 27 fb ff ff e8 c5 93 d7 f8 e9 49 fb ff ff <41> 57 41 56 41 55 41 54 55 48 89 f5 53 4c 8d bd c8 00 00 00 48 89 RSP: 0018:ffffc90004bd7c48 EFLAGS: 00000246 RAX: dffffc0000000000 RBX: ffff888038992000 RCX: 0000000000000001 RDX: 1ffff1101214ae7a RSI: ffff888090a573c0 RDI: ffff88801e1b8c80 RBP: ffff888090a573c0 R08: 0000000000000000 R09: ffff88803846b2e3 R10: ffffffff88ec1808 R11: 00000000ffffffff R12: 000000000000004e R13: ffff88803846b040 R14: 00000000ffffffff R15: ffff88801e1b8000 FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffcdb696dc0 CR3: 000000000b88e000 CR4: 00000000003506f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: batadv_send_skb_packet+0x4a1/0x5f0 net/batman-adv/send.c:102 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:393 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:421 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x6d7/0x8e0 net/batman-adv/bat_iv_ogm.c:1701 process_one_work+0x9b2/0x1690 kernel/workqueue.c:2299 worker_thread+0x658/0x11f0 kernel/workqueue.c:2446 kthread+0x405/0x4f0 kernel/kthread.c:345 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295 ---------------- Code disassembly (best guess): 0: 24 08 and $0x8,%al 2: 89 14 24 mov %edx,(%rsp) 5: e8 f0 93 d7 f8 callq 0xf8d793fa a: 8b 44 24 08 mov 0x8(%rsp),%eax e: 8b 14 24 mov (%rsp),%edx 11: e9 e0 fa ff ff jmpq 0xfffffaf6 16: e8 cf 93 d7 f8 callq 0xf8d793ea 1b: e9 27 fb ff ff jmpq 0xfffffb47 20: e8 c5 93 d7 f8 callq 0xf8d793ea 25: e9 49 fb ff ff jmpq 0xfffffb73 * 2a: 41 57 push %r15 <-- trapping instruction 2c: 41 56 push %r14 2e: 41 55 push %r13 30: 41 54 push %r12 32: 55 push %rbp 33: 48 89 f5 mov %rsi,%rbp 36: 53 push %rbx 37: 4c 8d bd c8 00 00 00 lea 0xc8(%rbp),%r15 3e: 48 rex.W 3f: 89 .byte 0x89