INFO: task jfsCommit:278 blocked for more than 143 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:jfsCommit state:D stack:26776 pid: 278 ppid: 2 flags:0x00004000 Call Trace: context_switch kernel/sched/core.c:5049 [inline] __schedule+0x11ef/0x43c0 kernel/sched/core.c:6395 schedule+0x11b/0x1e0 kernel/sched/core.c:6478 io_schedule+0x7c/0xd0 kernel/sched/core.c:8503 __lock_metapage+0x1b8/0x390 fs/jfs/jfs_metapage.c:49 lock_metapage fs/jfs/jfs_metapage.c:63 [inline] __get_metapage+0x43e/0x1060 fs/jfs/jfs_metapage.c:640 diIAGRead+0xce/0x140 fs/jfs/jfs_imap.c:2672 diFree+0x8e1/0x2430 fs/jfs/jfs_imap.c:959 jfs_evict_inode+0x327/0x430 fs/jfs/inode.c:162 evict+0x4c9/0x8d0 fs/inode.c:647 txLazyCommit fs/jfs/jfs_txnmgr.c:2699 [inline] jfs_lazycommit+0x435/0xb40 fs/jfs/jfs_txnmgr.c:2767 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 INFO: task syz-executor:12423 blocked for more than 144 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz-executor state:D stack:21392 pid:12423 ppid: 1 flags:0x00004004 Call Trace: context_switch kernel/sched/core.c:5049 [inline] __schedule+0x11ef/0x43c0 kernel/sched/core.c:6395 schedule+0x11b/0x1e0 kernel/sched/core.c:6478 io_schedule+0x7c/0xd0 kernel/sched/core.c:8503 __lock_metapage+0x1b8/0x390 fs/jfs/jfs_metapage.c:49 lock_metapage fs/jfs/jfs_metapage.c:63 [inline] __get_metapage+0x43e/0x1060 fs/jfs/jfs_metapage.c:640 diIAGRead fs/jfs/jfs_imap.c:2672 [inline] diRead+0x1fb/0xbb0 fs/jfs/jfs_imap.c:316 jfs_iget+0x89/0x3f0 fs/jfs/inode.c:35 jfs_lookup+0x21d/0x420 fs/jfs/namei.c:1469 __lookup_slow+0x29d/0x410 fs/namei.c:1671 lookup_slow+0x53/0x70 fs/namei.c:1688 walk_component+0x319/0x460 fs/namei.c:1984 lookup_last fs/namei.c:2439 [inline] path_lookupat+0x169/0x440 fs/namei.c:2463 filename_lookup+0x214/0x540 fs/namei.c:2492 user_path_at_empty+0x40/0x190 fs/namei.c:2891 user_path_at include/linux/namei.h:57 [inline] ksys_umount fs/namespace.c:1786 [inline] __do_sys_umount fs/namespace.c:1794 [inline] __se_sys_umount fs/namespace.c:1792 [inline] __x64_sys_umount+0xf9/0x170 fs/namespace.c:1792 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x66/0xd0 RIP: 0033:0x7f95b902c9d7 RSP: 002b:00007ffd619683b8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f95b902c9d7 RDX: 0000000000000000 RSI: 0000000000000009 RDI: 00007ffd61968470 RBP: 00007ffd61968470 R08: 00007ffd61969470 R09: 00000000ffffffff R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd61969560 R13: 00007f95b90c1050 R14: 00000000000caa1a R15: 00007ffd6196a630 Showing all locks held in the system: 1 lock held by khungtaskd/27: #0: ffffffff8c31eaa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 3 locks held by kworker/u4:1/144: 2 locks held by jfsCommit/278: #0: ffff88802b1c8920 (&(imap->im_aglock[index])){+.+.}-{3:3}, at: diFree+0x2d6/0x2430 fs/jfs/jfs_imap.c:889 #1: ffff888050627038 (&jfs_ip->rdwrlock/1){.+.+}-{3:3}, at: diFree+0x2f4/0x2430 fs/jfs/jfs_imap.c:894 2 locks held by getty/3947: #0: ffff88807f002098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 drivers/tty/tty_ldisc.c:252 #1: ffffc900025ce2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x5df/0x1a70 drivers/tty/n_tty.c:2158 2 locks held by syz-executor/12423: #0: ffff888050621800 (&type->i_mutex_dir_key#12){++++}-{3:3}, at: inode_lock_shared include/linux/fs.h:797 [inline] #0: ffff888050621800 (&type->i_mutex_dir_key#12){++++}-{3:3}, at: lookup_slow+0x46/0x70 fs/namei.c:1687 #1: ffff888050627038 (&jfs_ip->rdwrlock/1){.+.+}-{3:3}, at: diRead+0x136/0xbb0 fs/jfs/jfs_imap.c:315 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 27 Comm: khungtaskd Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0x188/0x250 lib/dump_stack.c:106 nmi_cpu_backtrace+0x3a2/0x3d0 lib/nmi_backtrace.c:111 nmi_trigger_cpumask_backtrace+0x163/0x280 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:148 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline] watchdog+0xe0f/0xe50 kernel/hung_task.c:369 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 144 Comm: kworker/u4:1 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: bat_events batadv_nc_worker RIP: 0010:__lock_acquire+0x6702/0x7d10 kernel/locking/lockdep.c:4915 Code: 5e 08 44 89 f1 80 e1 07 80 c1 03 38 c1 0f 8c c2 9a ff ff 4c 89 f7 e8 5d c0 60 00 49 b8 00 00 00 00 00 fc ff df e9 ab 9a ff ff <48> c7 c1 80 af 2d 96 80 e1 07 80 c1 03 38 c1 0f 8c b1 9a ff ff 48 RSP: 0018:ffffc900010af780 EFLAGS: 00000002 RAX: 0000000000000004 RBX: ffff88807e875198 RCX: 1ffff92000215f14 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807e875198 RBP: ffffc900010af9d0 R08: dffffc0000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffffbfff1b13c6e R12: 0000000000000002 R13: ffff8880187a0000 R14: ffff8880187a0ae8 R15: ffffffff8fbb5f80 FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000110c348a13 CR3: 000000002ac72000 CR4: 00000000003506e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: lock_acquire+0x19e/0x400 kernel/locking/lockdep.c:5623 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:135 [inline] _raw_spin_lock_bh+0x32/0x50 kernel/locking/spinlock.c:178 spin_lock_bh include/linux/spinlock.h:369 [inline] batadv_nc_purge_paths+0xe7/0x3b0 net/batman-adv/network-coding.c:446 batadv_nc_worker+0x2e7/0x5c0 net/batman-adv/network-coding.c:724 process_one_work+0x85f/0x1010 kernel/workqueue.c:2310 worker_thread+0xaa6/0x1290 kernel/workqueue.c:2457 kthread+0x436/0x520 kernel/kthread.c:334 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:287