INFO: task jfsCommit:278 blocked for more than 143 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:jfsCommit state:D stack:26776 pid: 278 ppid: 2 flags:0x00004000
Call Trace:
context_switch kernel/sched/core.c:5049 [inline]
__schedule+0x11ef/0x43c0 kernel/sched/core.c:6395
schedule+0x11b/0x1e0 kernel/sched/core.c:6478
io_schedule+0x7c/0xd0 kernel/sched/core.c:8503
__lock_metapage+0x1b8/0x390 fs/jfs/jfs_metapage.c:49
lock_metapage fs/jfs/jfs_metapage.c:63 [inline]
__get_metapage+0x43e/0x1060 fs/jfs/jfs_metapage.c:640
diIAGRead+0xce/0x140 fs/jfs/jfs_imap.c:2672
diFree+0x8e1/0x2430 fs/jfs/jfs_imap.c:959
jfs_evict_inode+0x327/0x430 fs/jfs/inode.c:162
evict+0x4c9/0x8d0 fs/inode.c:647
txLazyCommit fs/jfs/jfs_txnmgr.c:2699 [inline]
jfs_lazycommit+0x435/0xb40 fs/jfs/jfs_txnmgr.c:2767
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
INFO: task syz-executor:12423 blocked for more than 144 seconds.
Not tainted syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor state:D stack:21392 pid:12423 ppid: 1 flags:0x00004004
Call Trace:
context_switch kernel/sched/core.c:5049 [inline]
__schedule+0x11ef/0x43c0 kernel/sched/core.c:6395
schedule+0x11b/0x1e0 kernel/sched/core.c:6478
io_schedule+0x7c/0xd0 kernel/sched/core.c:8503
__lock_metapage+0x1b8/0x390 fs/jfs/jfs_metapage.c:49
lock_metapage fs/jfs/jfs_metapage.c:63 [inline]
__get_metapage+0x43e/0x1060 fs/jfs/jfs_metapage.c:640
diIAGRead fs/jfs/jfs_imap.c:2672 [inline]
diRead+0x1fb/0xbb0 fs/jfs/jfs_imap.c:316
jfs_iget+0x89/0x3f0 fs/jfs/inode.c:35
jfs_lookup+0x21d/0x420 fs/jfs/namei.c:1469
__lookup_slow+0x29d/0x410 fs/namei.c:1671
lookup_slow+0x53/0x70 fs/namei.c:1688
walk_component+0x319/0x460 fs/namei.c:1984
lookup_last fs/namei.c:2439 [inline]
path_lookupat+0x169/0x440 fs/namei.c:2463
filename_lookup+0x214/0x540 fs/namei.c:2492
user_path_at_empty+0x40/0x190 fs/namei.c:2891
user_path_at include/linux/namei.h:57 [inline]
ksys_umount fs/namespace.c:1786 [inline]
__do_sys_umount fs/namespace.c:1794 [inline]
__se_sys_umount fs/namespace.c:1792 [inline]
__x64_sys_umount+0xf9/0x170 fs/namespace.c:1792
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x66/0xd0
RIP: 0033:0x7f95b902c9d7
RSP: 002b:00007ffd619683b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f95b902c9d7
RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffd61968470
RBP: 00007ffd61968470 R08: 00007ffd61969470 R09: 00000000ffffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd61969560
R13: 00007f95b90c1050 R14: 00000000000caa1a R15: 00007ffd6196a630
Showing all locks held in the system:
1 lock held by khungtaskd/27:
#0: ffffffff8c31eaa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30
3 locks held by kworker/u4:1/144:
2 locks held by jfsCommit/278:
#0: ffff88802b1c8920 (&(imap->im_aglock[index])){+.+.}-{3:3}, at: diFree+0x2d6/0x2430 fs/jfs/jfs_imap.c:889
#1: ffff888050627038 (&jfs_ip->rdwrlock/1){.+.+}-{3:3}, at: diFree+0x2f4/0x2430 fs/jfs/jfs_imap.c:894
2 locks held by getty/3947:
#0: ffff88807f002098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:252
#1: ffffc900025ce2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x5df/0x1a70 drivers/tty/n_tty.c:2158
2 locks held by syz-executor/12423:
#0: ffff888050621800 (&type->i_mutex_dir_key#12){++++}-{3:3}, at: inode_lock_shared include/linux/fs.h:797 [inline]
#0: ffff888050621800 (&type->i_mutex_dir_key#12){++++}-{3:3}, at: lookup_slow+0x46/0x70 fs/namei.c:1687
#1: ffff888050627038 (&jfs_ip->rdwrlock/1){.+.+}-{3:3}, at: diRead+0x136/0xbb0 fs/jfs/jfs_imap.c:315
=============================================
NMI backtrace for cpu 0
CPU: 0 PID: 27 Comm: khungtaskd Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Call Trace:
dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106
nmi_cpu_backtrace+0x3a2/0x3d0 lib/nmi_backtrace.c:111
nmi_trigger_cpumask_backtrace+0x163/0x280 lib/nmi_backtrace.c:62
trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline]
check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline]
watchdog+0xe0f/0xe50 kernel/hung_task.c:369
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 144 Comm: kworker/u4:1 Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026
Workqueue: bat_events batadv_nc_worker
RIP: 0010:__lock_acquire+0x6702/0x7d10 kernel/locking/lockdep.c:4915
Code: 5e 08 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c c2 9a ff ff 4c 89 f7 e8 5d c0 60 00 49 b8 00 00 00 00 00 fc ff df e9 ab 9a ff ff <48> c7 c1 80 af 2d 96 80 e1 07 80 c1 03 38 c1 0f 8c b1 9a ff ff 48
RSP: 0018:ffffc900010af780 EFLAGS: 00000002
RAX: 0000000000000004 RBX: ffff88807e875198 RCX: 1ffff92000215f14
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807e875198
RBP: ffffc900010af9d0 R08: dffffc0000000000 R09: 0000000000000000
R10: dffffc0000000000 R11: fffffbfff1b13c6e R12: 0000000000000002
R13: ffff8880187a0000 R14: ffff8880187a0ae8 R15: ffffffff8fbb5f80
FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c348a13 CR3: 000000002ac72000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
lock_acquire+0x19e/0x400 kernel/locking/lockdep.c:5623
__raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline]
_raw_spin_lock_bh+0x32/0x50 kernel/locking/spinlock.c:178
spin_lock_bh include/linux/spinlock.h:369 [inline]
batadv_nc_purge_paths+0xe7/0x3b0 net/batman-adv/network-coding.c:446
batadv_nc_worker+0x2e7/0x5c0 net/batman-adv/network-coding.c:724
process_one_work+0x85f/0x1010 kernel/workqueue.c:2310
worker_thread+0xaa6/0x1290 kernel/workqueue.c:2457
kthread+0x436/0x520 kernel/kthread.c:334
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287