INFO: task syz-executor.3:11827 blocked for more than 143 seconds.
Not tainted 5.16.0-rc2-next-20211125-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.3 state:D stack:26960 pid:11827 ppid: 11148 flags:0x00024004
Call Trace:
context_switch kernel/sched/core.c:4983 [inline]
__schedule+0xab2/0x4d90 kernel/sched/core.c:6293
schedule+0xd2/0x260 kernel/sched/core.c:6366
schedule_timeout+0x1db/0x2a0 kernel/time/timer.c:1857
do_wait_for_common kernel/sched/completion.c:85 [inline]
__wait_for_common kernel/sched/completion.c:106 [inline]
wait_for_common kernel/sched/completion.c:117 [inline]
wait_for_completion+0x174/0x270 kernel/sched/completion.c:138
io_wq_exit_workers fs/io-wq.c:1217 [inline]
io_wq_put_and_exit+0x33a/0xb70 fs/io-wq.c:1252
io_uring_clean_tctx fs/io_uring.c:9814 [inline]
io_uring_cancel_generic+0x61d/0x690 fs/io_uring.c:9895
io_uring_files_cancel include/linux/io_uring.h:16 [inline]
do_exit+0x60c/0x2c20 kernel/exit.c:787
do_group_exit+0x125/0x310 kernel/exit.c:929
get_signal+0x34c/0x28b0 kernel/signal.c:2859
arch_do_signal_or_restart+0x2a9/0x1c40 arch/x86/kernel/signal.c:868
handle_signal_work kernel/entry/common.c:148 [inline]
exit_to_user_mode_loop kernel/entry/common.c:172 [inline]
exit_to_user_mode_prepare+0x17d/0x290 kernel/entry/common.c:207
__syscall_exit_to_user_mode_work kernel/entry/common.c:289 [inline]
syscall_exit_to_user_mode+0x19/0x60 kernel/entry/common.c:300
do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f1d7468bae9
RSP: 002b:00007f1d71bbf188 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa
RAX: 000000000000000e RBX: 00007f1d7479f0e0 RCX: 00007f1d7468bae9
RDX: 0000000000000000 RSI: 00000000000045f5 RDI: 0000000000000003
RBP: 00007f1d746e5f6d R08: 0000000000000000 R09: 0000000000001800
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc4e470f9f R14: 00007f1d71bbf300 R15: 0000000000022000
Showing all locks held in the system:
1 lock held by khungtaskd/27:
#0: ffffffff8bb83220 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6458
1 lock held by systemd-journal/2957:
#0: ffff8880b9d39d58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:489
1 lock held by in:imklog/6433:
#0: ffff88807844caf0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 fs/file.c:990
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.16.0-rc2-next-20211125-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x1b3/0x230 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:256 [inline]
watchdog+0xcb7/0xed0 kernel/hung_task.c:413
kthread+0x405/0x4f0 kernel/kthread.c:345
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 1046 Comm: kworker/u4:4 Not tainted 5.16.0-rc2-next-20211125-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet
RIP: 0010:batadv_nc_skb_store_for_decoding+0x0/0x440 net/batman-adv/network-coding.c:1556
Code: 24 08 89 14 24 e8 f0 93 d7 f8 8b 44 24 08 8b 14 24 e9 e0 fa ff ff e8 cf 93 d7 f8 e9 27 fb ff ff e8 c5 93 d7 f8 e9 49 fb ff ff <41> 57 41 56 41 55 41 54 55 48 89 f5 53 4c 8d bd c8 00 00 00 48 89
RSP: 0018:ffffc90004bd7c48 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: ffff888038992000 RCX: 0000000000000001
RDX: 1ffff1101214ae7a RSI: ffff888090a573c0 RDI: ffff88801e1b8c80
RBP: ffff888090a573c0 R08: 0000000000000000 R09: ffff88803846b2e3
R10: ffffffff88ec1808 R11: 00000000ffffffff R12: 000000000000004e
R13: ffff88803846b040 R14: 00000000ffffffff R15: ffff88801e1b8000
FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffcdb696dc0 CR3: 000000000b88e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
batadv_send_skb_packet+0x4a1/0x5f0 net/batman-adv/send.c:102
batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:393 [inline]
batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:421 [inline]
batadv_iv_send_outstanding_bat_ogm_packet+0x6d7/0x8e0 net/batman-adv/bat_iv_ogm.c:1701
process_one_work+0x9b2/0x1690 kernel/workqueue.c:2299
worker_thread+0x658/0x11f0 kernel/workqueue.c:2446
kthread+0x405/0x4f0 kernel/kthread.c:345
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295
----------------
Code disassembly (best guess):
0: 24 08 and $0x8,%al
2: 89 14 24 mov %edx,(%rsp)
5: e8 f0 93 d7 f8 callq 0xf8d793fa
a: 8b 44 24 08 mov 0x8(%rsp),%eax
e: 8b 14 24 mov (%rsp),%edx
11: e9 e0 fa ff ff jmpq 0xfffffaf6
16: e8 cf 93 d7 f8 callq 0xf8d793ea
1b: e9 27 fb ff ff jmpq 0xfffffb47
20: e8 c5 93 d7 f8 callq 0xf8d793ea
25: e9 49 fb ff ff jmpq 0xfffffb73
* 2a: 41 57 push %r15 <-- trapping instruction
2c: 41 56 push %r14
2e: 41 55 push %r13
30: 41 54 push %r12
32: 55 push %rbp
33: 48 89 f5 mov %rsi,%rbp
36: 53 push %rbx
37: 4c 8d bd c8 00 00 00 lea 0xc8(%rbp),%r15
3e: 48 rex.W
3f: 89 .byte 0x89