INFO: task syz-executor.3:25234 blocked for more than 143 seconds.
      Not tainted 5.18.0-rc6-syzkaller-00161-gbc403203d65a #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-executor.3  state:D stack:28112 pid:25234 ppid: 23272 flags:0x00004004
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5073 [inline]
 __schedule+0xa9a/0x4cc0 kernel/sched/core.c:6388
 schedule+0xd2/0x1f0 kernel/sched/core.c:6460
 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:6519
 __mutex_lock_common kernel/locking/mutex.c:673 [inline]
 __mutex_lock+0xa32/0x12f0 kernel/locking/mutex.c:733
 odev_open+0x5b/0x90 sound/core/seq/oss/seq_oss.c:127
 soundcore_open+0x44e/0x620 sound/sound_core.c:593
 chrdev_open+0x266/0x770 fs/char_dev.c:414
 do_dentry_open+0x4a1/0x11e0 fs/open.c:824
 do_open fs/namei.c:3476 [inline]
 path_openat+0x1c71/0x2910 fs/namei.c:3609
 do_filp_open+0x1aa/0x400 fs/namei.c:3636
 do_sys_openat2+0x16d/0x4c0 fs/open.c:1213
 do_sys_open fs/open.c:1229 [inline]
 __do_sys_openat fs/open.c:1245 [inline]
 __se_sys_openat fs/open.c:1240 [inline]
 __x64_sys_openat+0x13f/0x1f0 fs/open.c:1240
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f671b0890e9
RSP: 002b:00007f6719ffe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 00007f671b19c100 RCX: 00007f671b0890e9
RDX: 0000000000101042 RSI: 0000000020000000 RDI: ffffffffffffff9c
RBP: 00007f671b0e308d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000006000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f671b6cfb1f R14: 00007f6719ffe300 R15: 0000000000022000
 </TASK>

Showing all locks held in the system:
1 lock held by khungtaskd/28:
 #0: ffffffff8bd820e0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 kernel/locking/lockdep.c:6467
3 locks held by kworker/u4:4/981:
 #0: ffff8880b9c3a018 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:554
 #1: ffff8880b9c27888 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x176/0x4e0 kernel/sched/psi.c:880
 #2: ffff8880b9c3a018 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x120 kernel/sched/core.c:554
2 locks held by getty/3277:
 #0: ffff88801d8da098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x80 drivers/tty/tty_ldisc.c:244
 #1: ffffc90002ce62e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xcea/0x1230 drivers/tty/n_tty.c:2075
1 lock held by syz-executor.3/25192:
 #0: ffffffff8d48ce68 (register_mutex#4){+.+.}-{3:3}, at: odev_open+0x5b/0x90 sound/core/seq/oss/seq_oss.c:127
1 lock held by syz-executor.3/25234:
 #0: ffffffff8d48ce68 (register_mutex#4){+.+.}-{3:3}, at: odev_open+0x5b/0x90 sound/core/seq/oss/seq_oss.c:127
2 locks held by syz-executor.0/25231:
 #0: ffffffff8d48ce68 (register_mutex#4){+.+.}-{3:3}, at: odev_release+0x47/0x70 sound/core/seq/oss/seq_oss.c:143
 #1: ffff88801b3bd9f0 (&grp->list_mutex#2){++++}-{3:3}, at: snd_seq_port_disconnect+0x4f/0x5d0 sound/core/seq/seq_ports.c:612

=============================================

NMI backtrace for cpu 0
CPU: 0 PID: 28 Comm: khungtaskd Not tainted 5.18.0-rc6-syzkaller-00161-gbc403203d65a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/12/2022
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 nmi_cpu_backtrace.cold+0x47/0x144 lib/nmi_backtrace.c:111
 nmi_trigger_cpumask_backtrace+0x1e6/0x230 lib/nmi_backtrace.c:62
 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline]
 check_hung_uninterruptible_tasks kernel/hung_task.c:212 [inline]
 watchdog+0xc1d/0xf50 kernel/hung_task.c:369
 kthread+0x2e9/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 PID: 981 Comm: kworker/u4:4 Not tainted 5.18.0-rc6-syzkaller-00161-gbc403203d65a #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/12/2022
Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet
RIP: 0010:native_save_fl arch/x86/include/asm/irqflags.h:29 [inline]
RIP: 0010:arch_local_save_flags arch/x86/include/asm/irqflags.h:70 [inline]
RIP: 0010:check_preemption_disabled+0x46/0x170 lib/smp_processor_id.c:19
Code: 8b 1d ae 01 95 76 81 e3 ff ff ff 7f 31 ff 89 de 0f 1f 44 00 00 85 db 74 11 0f 1f 44 00 00 44 89 e0 5b 5d 41 5c 41 5d 41 5e c3 <0f> 1f 44 00 00 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de 0f 1f 44 00
RSP: 0018:ffffc9000457fa70 EFLAGS: 00000046
RAX: 0000000000000001 RBX: 0000000000000000 RCX: 7a58e0b25d8f1306
RDX: 1ffff110039a58ab RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffffff8a2731a0 R08: 0000000000000000 R09: ffffffff9006e907
R10: fffffbfff200dd20 R11: 0000000000000001 R12: 0000000000000001
R13: ffffffff89cc5d20 R14: ffffffff8bd820e0 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f7d00a9028 CR3: 000000007f685000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 00000000e08e0077 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 lockdep_recursion_finish kernel/locking/lockdep.c:436 [inline]
 lock_acquire kernel/locking/lockdep.c:5643 [inline]
 lock_acquire+0x1bb/0x510 kernel/locking/lockdep.c:5606
 rcu_lock_acquire include/linux/rcupdate.h:268 [inline]
 rcu_read_lock include/linux/rcupdate.h:694 [inline]
 batadv_iv_ogm_slide_own_bcast_window net/batman-adv/bat_iv_ogm.c:755 [inline]
 batadv_iv_ogm_schedule_buff+0x5d2/0x1430 net/batman-adv/bat_iv_ogm.c:826
 batadv_iv_ogm_schedule net/batman-adv/bat_iv_ogm.c:869 [inline]
 batadv_iv_ogm_schedule net/batman-adv/bat_iv_ogm.c:862 [inline]
 batadv_iv_send_outstanding_bat_ogm_packet+0x740/0x910 net/batman-adv/bat_iv_ogm.c:1713
 process_one_work+0x996/0x1610 kernel/workqueue.c:2289
 worker_thread+0x665/0x1080 kernel/workqueue.c:2436
 kthread+0x2e9/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
 </TASK>
----------------
Code disassembly (best guess):
   0:	8b 1d ae 01 95 76    	mov    0x769501ae(%rip),%ebx        # 0x769501b4
   6:	81 e3 ff ff ff 7f    	and    $0x7fffffff,%ebx
   c:	31 ff                	xor    %edi,%edi
   e:	89 de                	mov    %ebx,%esi
  10:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  15:	85 db                	test   %ebx,%ebx
  17:	74 11                	je     0x2a
  19:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  1e:	44 89 e0             	mov    %r12d,%eax
  21:	5b                   	pop    %rbx
  22:	5d                   	pop    %rbp
  23:	41 5c                	pop    %r12
  25:	41 5d                	pop    %r13
  27:	41 5e                	pop    %r14
  29:	c3                   	retq
* 2a:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1) <-- trapping instruction
  2f:	9c                   	pushfq
  30:	5b                   	pop    %rbx
  31:	81 e3 00 02 00 00    	and    $0x200,%ebx
  37:	31 ff                	xor    %edi,%edi
  39:	48 89 de             	mov    %rbx,%rsi
  3c:	0f                   	.byte 0xf
  3d:	1f                   	(bad)
  3e:	44                   	rex.R