./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor2603516359 <...> Warning: Permanently added '10.128.0.156' (ED25519) to the list of known hosts. execve("./syz-executor2603516359", ["./syz-executor2603516359"], 0x7fffbe204cd0 /* 10 vars */) = 0 brk(NULL) = 0x555564bc4000 brk(0x555564bc4e00) = 0x555564bc4e00 arch_prctl(ARCH_SET_FS, 0x555564bc4480) = 0 [ 66.676263][ T30] audit: type=1400 audit(1753589474.219:62): avc: denied { write } for pid=5826 comm="strace-static-x" path="pipe:[4195]" dev="pipefs" ino=4195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 set_tid_address(0x555564bc4750) = 5829 set_robust_list(0x555564bc4760, 24) = 0 rseq(0x555564bc4da0, 0x20, 0, 0x53053053) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor2603516359", 4096) = 28 getrandom("\xb0\x0c\x9a\x91\xfc\x85\x3c\x92", 8, GRND_NONBLOCK) = 8 brk(NULL) = 0x555564bc4e00 brk(0x555564be5e00) = 0x555564be5e00 brk(0x555564be6000) = 0x555564be6000 mprotect(0x7f11bb787000, 16384, PROT_READ) = 0 mmap(0x1ffffffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffffffff000 mmap(0x200000000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200000000000 mmap(0x200001000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x200001000000 socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 3 socket(AF_NETLINK, SOCK_RAW, NETLINK_GENERIC) = 4 sendto(4, [{nlmsg_len=36, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x03\x00\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 [ 66.868164][ T30] audit: type=1400 audit(1753589474.409:63): avc: denied { execmem } for pid=5829 comm="syz-executor260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 66.890594][ T30] audit: type=1400 audit(1753589474.429:64): avc: denied { create } for pid=5829 comm="syz-executor260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 recvfrom(4, [{nlmsg_len=864, nlmsg_type=nlctrl, nlmsg_flags=0, nlmsg_seq=0, nlmsg_pid=5829}, "\x01\x02\x00\x00\x0d\x00\x02\x00\x6e\x6c\x38\x30\x32\x31\x35\x34\x00\x00\x00\x00\x06\x00\x01\x00\x1d\x00\x00\x00\x08\x00\x03\x00\x01\x00\x00\x00\x08\x00\x04\x00\x00\x00\x00\x00\x08\x00\x05\x00\x30\x00\x00\x00\xe8\x02\x06\x00\x14\x00\x01\x00\x08\x00\x01\x00\x01\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x02\x00\x08\x00\x01\x00\x05\x00\x00\x00\x08\x00\x02\x00\x0e\x00\x00\x00\x14\x00\x03\x00"...], 4096, 0, NULL, NULL) = 864 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5829}, {error=0, msg={nlmsg_len=36, nlmsg_type=nlctrl, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0b\x00\x00\x00\x06\x00\x0a\x00\xa0\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5829}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 [ 66.913594][ T30] audit: type=1400 audit(1753589474.449:65): avc: denied { write } for pid=5829 comm="syz-executor260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 66.934368][ T30] audit: type=1400 audit(1753589474.459:66): avc: denied { read } for pid=5829 comm="syz-executor260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan0", ifr_ifindex=11}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=0x10 /* NLMSG_??? */, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x00\x00\x00\x00\x0b\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00\x0c\x00\x01\x00\x02\x00\xaa\xaa\xaa\xaa\xaa\xaa"], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5829}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 sendto(3, [{nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=0, ifi_flags=0, ifi_change=0}, [[{nla_len=11, nla_type=IFLA_IFNAME}, "lowpan0"...], [{nla_len=16, nla_type=IFLA_LINKINFO}, [{nla_len=10, nla_type=IFLA_INFO_KIND}, "lowpan"...]], [{nla_len=8, nla_type=IFLA_LINK}, 11]]], 68, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 68 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5829}, {error=0, msg={nlmsg_len=68, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK|NLM_F_EXCL|NLM_F_CREATE, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 [ 67.055259][ T30] audit: type=1400 audit(1753589474.599:67): avc: denied { read } for pid=5496 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 close(5) = 0 sendto(4, [{nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, "\x0b\x00\x00\x00\x08\x00\x03\x00\x0c\x00\x00\x00\x06\x00\x0a\x00\xa1\xaa\x00\x00"], 36, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 36 recvfrom(4, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5829}, {error=0, msg={nlmsg_len=36, nlmsg_type=nl802154, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 socket(AF_UNIX, SOCK_DGRAM|SOCK_CLOEXEC, 0) = 5 ioctl(5, SIOCGIFINDEX, {ifr_name="wpan1", ifr_ifindex=12}) = 0 close(5) = 0 sendto(3, [{nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}, {ifi_family=AF_UNSPEC, ifi_type=ARPHRD_NETROM, ifi_index=if_nametoindex("wpan1"), ifi_flags=IFF_UP, ifi_change=0x1}, [{nla_len=12, nla_type=IFLA_ADDRESS}, 02:01:aa:aa:aa:aa:aa]], 44, 0, {sa_family=AF_NETLINK, nl_pid=0, nl_groups=00000000}, 12) = 44 recvfrom(3, [{nlmsg_len=36, nlmsg_type=NLMSG_ERROR, nlmsg_flags=NLM_F_CAPPED, nlmsg_seq=0, nlmsg_pid=5829}, {error=0, msg={nlmsg_len=44, nlmsg_type=RTM_NEWLINK, nlmsg_flags=NLM_F_REQUEST|NLM_F_ACK, nlmsg_seq=0, nlmsg_pid=0}}], 4096, 0, NULL, NULL) = 36 close(3) = 0 close(4) = 0 rt_sigaction(SIGRTMIN, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=SIG_IGN, sa_mask=[], sa_flags=0}, NULL, 8) = 0 rt_sigaction(SIGSEGV, {sa_handler=0x7f11bb6df210, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f11bb6e6640}, NULL, 8) = 0 rt_sigaction(SIGBUS, {sa_handler=0x7f11bb6df210, sa_mask=[], sa_flags=SA_RESTORER|SA_NODEFER|SA_SIGINFO, sa_restorer=0x7f11bb6e6640}, NULL, 8) = 0 write(1, "executing program\n", 18executing program ) = 18 openat(AT_FDCWD, "/dev/uinput", O_RDONLY) = 3 ioctl(3, UI_DEV_SETUP, 0x200000000180) = 0 ioctl(3, UI_SET_FFBIT, 0x51) = 0 [ 67.310766][ T30] audit: type=1400 audit(1753589474.849:68): avc: denied { read } for pid=5829 comm="syz-executor260" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 67.334402][ T30] audit: type=1400 audit(1753589474.849:69): avc: denied { open } for pid=5829 comm="syz-executor260" path="/dev/uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 ioctl(3, UI_DEV_CREATE or USB_RAW_IOCTL_RUN, 0) = 0 openat(AT_FDCWD, "/dev/input/event4", O_RDONLY) = 4 [ 67.355347][ T5829] input: syz1 as /devices/virtual/input/input5 [ 67.365245][ T30] audit: type=1400 audit(1753589474.869:70): avc: denied { ioctl } for pid=5829 comm="syz-executor260" path="/dev/uinput" dev="devtmpfs" ino=920 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 67.380745][ T5829] [ 67.391075][ T30] audit: type=1400 audit(1753589474.909:71): avc: denied { read } for pid=5829 comm="syz-executor260" name="event4" dev="devtmpfs" ino=2787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.392895][ T5829] ====================================================== [ 67.392902][ T5829] WARNING: possible circular locking dependency detected [ 67.429764][ T5829] 6.16.0-rc7-syzkaller-00140-gec2df4364666 #0 Not tainted [ 67.436869][ T5829] ------------------------------------------------------ [ 67.443854][ T5829] syz-executor260/5829 is trying to acquire lock: [ 67.450233][ T5829] ffff88801ea9b870 (&newdev->mutex){+.+.}-{4:4}, at: uinput_request_submit.part.0+0x25/0x2e0 [ 67.460400][ T5829] [ 67.460400][ T5829] but task is already holding lock: [ 67.467732][ T5829] ffff888031fd58b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0x1dd/0xc10 [ 67.476574][ T5829] [ 67.476574][ T5829] which lock already depends on the new lock. [ 67.476574][ T5829] [ 67.487032][ T5829] [ 67.487032][ T5829] the existing dependency chain (in reverse order) is: [ 67.496021][ T5829] [ 67.496021][ T5829] -> #3 (&ff->mutex){+.+.}-{4:4}: [ 67.503202][ T5829] __mutex_lock+0x199/0xb90 [ 67.508292][ T5829] input_ff_flush+0x63/0x180 [ 67.513375][ T5829] uinput_dev_flush+0x2a/0x40 [ 67.518543][ T5829] input_flush_device+0xa1/0x110 [ 67.523976][ T5829] evdev_release+0x344/0x420 [ 67.529061][ T5829] __fput+0x3ff/0xb70 [ 67.533538][ T5829] fput_close_sync+0x118/0x260 [ 67.538791][ T5829] __x64_sys_close+0x8b/0x120 [ 67.544053][ T5829] do_syscall_64+0xcd/0x4c0 [ 67.549047][ T5829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.555432][ T5829] [ 67.555432][ T5829] -> #2 (&dev->mutex#2){+.+.}-{4:4}: [ 67.562875][ T5829] __mutex_lock+0x199/0xb90 [ 67.567869][ T5829] input_register_handle+0xdc/0x620 [ 67.573563][ T5829] kbd_connect+0xca/0x160 [ 67.578837][ T5829] input_attach_handler.isra.0+0x184/0x260 [ 67.585148][ T5829] input_register_device+0xa84/0x1130 [ 67.591022][ T5829] acpi_button_add+0x582/0xb70 [ 67.596275][ T5829] acpi_device_probe+0xc6/0x330 [ 67.601623][ T5829] really_probe+0x23e/0xa90 [ 67.606614][ T5829] __driver_probe_device+0x1de/0x440 [ 67.612395][ T5829] driver_probe_device+0x4c/0x1b0 [ 67.617909][ T5829] __driver_attach+0x283/0x580 [ 67.623161][ T5829] bus_for_each_dev+0x13e/0x1d0 [ 67.628514][ T5829] bus_add_driver+0x2e9/0x690 [ 67.633689][ T5829] driver_register+0x15c/0x4b0 [ 67.638956][ T5829] __acpi_bus_register_driver+0xdf/0x130 [ 67.645096][ T5829] acpi_button_driver_init+0x82/0x110 [ 67.651008][ T5829] do_one_initcall+0x120/0x6e0 [ 67.656275][ T5829] kernel_init_freeable+0x5c2/0x900 [ 67.661978][ T5829] kernel_init+0x1c/0x2b0 [ 67.666806][ T5829] ret_from_fork+0x5d4/0x6f0 [ 67.671899][ T5829] ret_from_fork_asm+0x1a/0x30 [ 67.677162][ T5829] [ 67.677162][ T5829] -> #1 (input_mutex){+.+.}-{4:4}: [ 67.684425][ T5829] __mutex_lock+0x199/0xb90 [ 67.689453][ T5829] input_register_device+0x98a/0x1130 [ 67.695337][ T5829] uinput_ioctl_handler.isra.0+0x1357/0x1df0 [ 67.701820][ T5829] __x64_sys_ioctl+0x18e/0x210 [ 67.707082][ T5829] do_syscall_64+0xcd/0x4c0 [ 67.712086][ T5829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.718474][ T5829] [ 67.718474][ T5829] -> #0 (&newdev->mutex){+.+.}-{4:4}: [ 67.726007][ T5829] __lock_acquire+0x126f/0x1c90 [ 67.731353][ T5829] lock_acquire+0x179/0x350 [ 67.736358][ T5829] __mutex_lock+0x199/0xb90 [ 67.741356][ T5829] uinput_request_submit.part.0+0x25/0x2e0 [ 67.747680][ T5829] uinput_dev_upload_effect+0x174/0x1f0 [ 67.753983][ T5829] input_ff_upload+0x568/0xc10 [ 67.759239][ T5829] evdev_do_ioctl+0xf40/0x1b30 [ 67.764594][ T5829] evdev_ioctl+0x16f/0x1a0 [ 67.769505][ T5829] __x64_sys_ioctl+0x18e/0x210 [ 67.774764][ T5829] do_syscall_64+0xcd/0x4c0 [ 67.779757][ T5829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.786167][ T5829] [ 67.786167][ T5829] other info that might help us debug this: [ 67.786167][ T5829] [ 67.796364][ T5829] Chain exists of: [ 67.796364][ T5829] &newdev->mutex --> &dev->mutex#2 --> &ff->mutex [ 67.796364][ T5829] [ 67.808676][ T5829] Possible unsafe locking scenario: [ 67.808676][ T5829] [ 67.816101][ T5829] CPU0 CPU1 [ 67.821440][ T5829] ---- ---- [ 67.826773][ T5829] lock(&ff->mutex); [ 67.830733][ T5829] lock(&dev->mutex#2); [ 67.837476][ T5829] lock(&ff->mutex); [ 67.844094][ T5829] lock(&newdev->mutex); [ 67.848407][ T5829] [ 67.848407][ T5829] *** DEADLOCK *** [ 67.848407][ T5829] [ 67.856532][ T5829] 2 locks held by syz-executor260/5829: [ 67.862057][ T5829] #0: ffff8880257c9118 (&evdev->mutex){+.+.}-{4:4}, at: evdev_ioctl+0x7f/0x1a0 [ 67.871084][ T5829] #1: ffff888031fd58b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0x1dd/0xc10 [ 67.880269][ T5829] [ 67.880269][ T5829] stack backtrace: [ 67.886139][ T5829] CPU: 0 UID: 0 PID: 5829 Comm: syz-executor260 Not tainted 6.16.0-rc7-syzkaller-00140-gec2df4364666 #0 PREEMPT(full) [ 67.886152][ T5829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 67.886158][ T5829] Call Trace: [ 67.886163][ T5829] [ 67.886167][ T5829] dump_stack_lvl+0x116/0x1f0 [ 67.886185][ T5829] print_circular_bug+0x275/0x350 [ 67.886202][ T5829] check_noncircular+0x14c/0x170 [ 67.886223][ T5829] __lock_acquire+0x126f/0x1c90 [ 67.886233][ T5829] lock_acquire+0x179/0x350 [ 67.886242][ T5829] ? uinput_request_submit.part.0+0x25/0x2e0 [ 67.886254][ T5829] ? __pfx___might_resched+0x10/0x10 [ 67.886268][ T5829] __mutex_lock+0x199/0xb90 [ 67.886278][ T5829] ? uinput_request_submit.part.0+0x25/0x2e0 [ 67.886289][ T5829] ? uinput_request_reserve_slot+0x3ca/0x4d0 [ 67.886300][ T5829] ? uinput_request_submit.part.0+0x25/0x2e0 [ 67.886312][ T5829] ? __pfx___mutex_lock+0x10/0x10 [ 67.886320][ T5829] ? _raw_spin_unlock+0x28/0x50 [ 67.886334][ T5829] ? __mutex_trylock_common+0xe9/0x250 [ 67.886344][ T5829] ? __pfx_uinput_request_reserve_slot+0x10/0x10 [ 67.886355][ T5829] ? __pfx___might_resched+0x10/0x10 [ 67.886369][ T5829] ? uinput_request_submit.part.0+0x25/0x2e0 [ 67.886379][ T5829] uinput_request_submit.part.0+0x25/0x2e0 [ 67.886391][ T5829] uinput_dev_upload_effect+0x174/0x1f0 [ 67.886402][ T5829] ? __pfx_uinput_dev_upload_effect+0x10/0x10 [ 67.886414][ T5829] ? __might_fault+0x13b/0x190 [ 67.886431][ T5829] input_ff_upload+0x568/0xc10 [ 67.886442][ T5829] evdev_do_ioctl+0xf40/0x1b30 [ 67.886457][ T5829] ? __pfx_evdev_do_ioctl+0x10/0x10 [ 67.886476][ T5829] evdev_ioctl+0x16f/0x1a0 [ 67.886490][ T5829] ? __pfx_evdev_ioctl+0x10/0x10 [ 67.886505][ T5829] __x64_sys_ioctl+0x18e/0x210 [ 67.886519][ T5829] do_syscall_64+0xcd/0x4c0 [ 67.886529][ T5829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 67.886540][ T5829] RIP: 0033:0x7f11bb719c29 [ 67.886549][ T5829] Code: 48 83 c4 28 c3 e8 c7 1b 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 67.886559][ T5829] RSP: 002b:00007ffef79567c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 67.886568][ T5829] RAX: ffffffffffffffda RBX: 6e69752f7665642f RCX: 00007f11bb719c29 [ 67.886574][ T5829] RDX: 0000200000000300 RSI: 0000000040304580 RDI: 0000000000000004 [ 67.886580][ T5829] RBP: 00007ffef7956828 R08: 0000555564bc5478 R09: 0000555564bc5478 [ 67.886586][ T5829] R10: 000000000000000f R11: 0000000000000246 R12: 0000000000000000 [ 67.886592][ T5829] R13: 0000000000000000 R14: 000000000000001d R15: 00007f11bb78d2e0 [ 67.886600][ T5829] [ 71.084457][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.090734][ T1297] ieee802154 phy1 wpan1: encryption failed: -22