INFO: task syz-executor.5:10390 blocked for more than 143 seconds.
Not tainted 6.1.0-rc5-next-20221116-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.5 state:D stack:27976 pid:10390 ppid:5341 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5229 [inline]
__schedule+0xb8a/0x5450 kernel/sched/core.c:6541
schedule+0xde/0x1b0 kernel/sched/core.c:6617
io_schedule+0xbe/0x130 kernel/sched/core.c:8797
folio_wait_bit_common+0x394/0x9b0 mm/filemap.c:1296
folio_put_wait_locked mm/filemap.c:1465 [inline]
do_read_cache_folio+0x2c0/0x510 mm/filemap.c:3534
read_mapping_folio include/linux/pagemap.h:761 [inline]
read_part_sector+0xf4/0x440 block/partitions/core.c:717
adfspart_check_ICS+0x9e/0x890 block/partitions/acorn.c:360
check_partition block/partitions/core.c:146 [inline]
blk_add_partitions block/partitions/core.c:602 [inline]
bdev_disk_changed block/partitions/core.c:688 [inline]
bdev_disk_changed+0x663/0xfc0 block/partitions/core.c:655
blkdev_get_whole+0x18a/0x2d0 block/bdev.c:685
blkdev_get_by_dev.part.0+0x5ec/0xb90 block/bdev.c:822
blkdev_get_by_dev+0x6f/0x90 block/bdev.c:856
blkdev_open+0x140/0x2c0 block/fops.c:485
do_dentry_open+0x6cc/0x13f0 fs/open.c:882
do_open fs/namei.c:3557 [inline]
path_openat+0x1bbc/0x2a50 fs/namei.c:3713
do_filp_open+0x1ba/0x410 fs/namei.c:3740
do_sys_openat2+0x16d/0x4c0 fs/open.c:1310
do_sys_open fs/open.c:1326 [inline]
__do_sys_openat fs/open.c:1342 [inline]
__se_sys_openat fs/open.c:1337 [inline]
__x64_sys_openat+0x143/0x1f0 fs/open.c:1337
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f69c823e264
RSP: 002b:00007f69c909fca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f69c823e264
RDX: 0000000000000000 RSI: 00007f69c909fd40 RDI: 00000000ffffff9c
RBP: 00007f69c909fd40 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00007ffcb783d95f R14: 00007f69c90a0300 R15: 0000000000022000
INFO: task syz-executor.5:10391 blocked for more than 143 seconds.
Not tainted 6.1.0-rc5-next-20221116-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.5 state:D stack:28448 pid:10391 ppid:5341 flags:0x00000004
Call Trace:
context_switch kernel/sched/core.c:5229 [inline]
__schedule+0xb8a/0x5450 kernel/sched/core.c:6541
schedule+0xde/0x1b0 kernel/sched/core.c:6617
schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:6676
__mutex_lock_common kernel/locking/mutex.c:679 [inline]
__mutex_lock+0xa48/0x1360 kernel/locking/mutex.c:747
blkdev_get_by_dev.part.0+0x9b/0xb90 block/bdev.c:813
blkdev_get_by_dev+0x6f/0x90 block/bdev.c:856
blkdev_open+0x140/0x2c0 block/fops.c:485
do_dentry_open+0x6cc/0x13f0 fs/open.c:882
do_open fs/namei.c:3557 [inline]
path_openat+0x1bbc/0x2a50 fs/namei.c:3713
do_filp_open+0x1ba/0x410 fs/namei.c:3740
do_sys_openat2+0x16d/0x4c0 fs/open.c:1310
do_sys_open fs/open.c:1326 [inline]
__do_sys_openat fs/open.c:1342 [inline]
__se_sys_openat fs/open.c:1337 [inline]
__x64_sys_openat+0x143/0x1f0 fs/open.c:1337
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f69c823e264
RSP: 002b:00007f69c907eca0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00007f69c823e264
RDX: 0000000000000000 RSI: 00007f69c907ed40 RDI: 00000000ffffff9c
RBP: 00007f69c907ed40 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00007ffcb783d95f R14: 00007f69c907f300 R15: 0000000000022000
Showing all locks held in the system:
1 lock held by rcu_tasks_kthre/12:
#0: ffffffff8c78fb30 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc70 kernel/rcu/tasks.h:507
1 lock held by rcu_tasks_trace/13:
#0: ffffffff8c78f830 (rcu_tasks_trace.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc70 kernel/rcu/tasks.h:507
1 lock held by khungtaskd/28:
#0: ffffffff8c790680 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x57/0x264 kernel/locking/lockdep.c:6494
2 locks held by getty/4976:
#0: ffff88814a096098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x26/0x80 drivers/tty/tty_ldisc.c:244
#1: ffffc900015a52f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xef4/0x13e0 drivers/tty/n_tty.c:2177
2 locks held by kworker/u4:7/5449:
1 lock held by syz-executor.5/10390:
#0: ffff88801e1e54c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x9b/0xb90 block/bdev.c:813
1 lock held by syz-executor.5/10391:
#0: ffff88801e1e54c8 (&disk->open_mutex){+.+.}-{3:3}, at: blkdev_get_by_dev.part.0+0x9b/0xb90 block/bdev.c:813
=============================================
NMI backtrace for cpu 1
CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.0-rc5-next-20221116-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
nmi_cpu_backtrace.cold+0x24/0x18a lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x333/0x3c0 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:220 [inline]
watchdog+0xc75/0xfc0 kernel/hung_task.c:377
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 1044 Comm: kworker/u4:5 Not tainted 6.1.0-rc5-next-20221116-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Workqueue: bat_events batadv_nc_worker
RIP: 0010:check_preemption_disabled+0x31/0x170 lib/smp_processor_id.c:16
Code: 41 54 55 48 89 fd 53 0f 1f 44 00 00 65 44 8b 25 61 0a fb 75 65 8b 1d 56 0a fb 75 81 e3 ff ff ff 7f 31 ff 89 de 0f 1f 44 00 00 <85> db 74 11 0f 1f 44 00 00 44 89 e0 5b 5d 41 5c 41 5d 41 5e c3 0f
RSP: 0018:ffffc9000494fb40 EFLAGS: 00000046
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffffff8aa82d40 R08: 0000000000000000 R09: ffffffff8e74dc97
R10: fffffbfff1ce9b92 R11: 0000000000000000 R12: 0000000000000000
R13: ffffffff8a4c4780 R14: 00000000ffffffff R15: ffff88801f68c508
FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555555e22848 CR3: 000000000c48e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
lockdep_recursion_finish kernel/locking/lockdep.c:466 [inline]
lock_is_held_type+0xdb/0x140 kernel/locking/lockdep.c:5712
lock_is_held include/linux/lockdep.h:283 [inline]
rcu_read_lock_sched_held+0x3e/0x70 kernel/rcu/update.c:125
trace_lock_release include/trace/events/lock.h:69 [inline]
lock_release+0x5cf/0x810 kernel/locking/lockdep.c:5679
rcu_lock_release include/linux/rcupdate.h:330 [inline]
rcu_read_unlock include/linux/rcupdate.h:797 [inline]
batadv_nc_purge_orig_hash net/batman-adv/network-coding.c:412 [inline]
batadv_nc_worker+0x86d/0xfa0 net/batman-adv/network-coding.c:719
process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289
worker_thread+0x669/0x1090 kernel/workqueue.c:2436
kthread+0x2e8/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308