EXT4-fs (loop3): Unrecognized mount option "ÿÿ00000000000000000003" or missing value ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 INFO: task systemd-udevd:7832 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. systemd-udevd D28000 7832 4696 0x00000100 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 blkdev_get+0xb0/0x940 fs/block_dev.c:1627 blkdev_open+0x202/0x290 fs/block_dev.c:1788 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f673e0f0840 Code: Bad RIP value. RSP: 002b:00007fff37008048 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00005585b25456e0 RCX: 00007f673e0f0840 RDX: 00005585b12b5fe3 RSI: 00000000000a0800 RDI: 00005585b254d850 RBP: 00007fff370081c0 R08: 00005585b12b5670 R09: 0000000000000010 R10: 00005585b12b5d0c R11: 0000000000000246 R12: 00007fff37008110 R13: 00005585b2543380 R14: 0000000000000003 R15: 000000000000000e INFO: task syz-executor.1:8128 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D25480 8128 8119 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 blkdev_get+0xb0/0x940 fs/block_dev.c:1627 blkdev_open+0x202/0x290 fs/block_dev.c:1788 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fc295ad0109 Code: Bad RIP value. RSP: 002b:00007fc294424168 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007fc295be3030 RCX: 00007fc295ad0109 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020004200 RBP: 00007fc295b2a05d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd5ef9630f R14: 00007fc294424300 R15: 0000000000022000 INFO: task syz-executor.1:8129 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28648 8129 8119 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 __blkdev_get+0x84d/0x1480 fs/block_dev.c:1535 blkdev_get+0xb0/0x940 fs/block_dev.c:1627 blkdev_open+0x202/0x290 fs/block_dev.c:1788 do_dentry_open+0x4aa/0x1160 fs/open.c:796 do_last fs/namei.c:3421 [inline] path_openat+0x793/0x2df0 fs/namei.c:3537 do_filp_open+0x18c/0x3f0 fs/namei.c:3567 do_sys_open+0x3b3/0x520 fs/open.c:1085 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fc295ad0109 Code: Bad RIP value. RSP: 002b:00007fc294403168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00007fc295be3100 RCX: 00007fc295ad0109 RDX: 0000000000000000 RSI: 0000000020002040 RDI: ffffffffffffff9c RBP: 00007fc295b2a05d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd5ef9630f R14: 00007fc294403300 R15: 0000000000022000 Showing all locks held in the system: 2 locks held by ksoftirqd/1/18: #0: 0000000054f930ad (&rq->lock){-.-.}, at: rq_lock kernel/sched/sched.h:1826 [inline] #0: 0000000054f930ad (&rq->lock){-.-.}, at: __schedule+0x1f9/0x2040 kernel/sched/core.c:3455 #1: 000000003d357ddf (rcu_read_lock){....}, at: trace_sched_stat_runtime include/trace/events/sched.h:428 [inline] #1: 000000003d357ddf (rcu_read_lock){....}, at: update_curr+0x2c3/0x870 kernel/sched/fair.c:857 1 lock held by khungtaskd/1570: #0: 000000003d357ddf (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7790: #0: 00000000afe7ffd8 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 1 lock held by systemd-udevd/7832: #0: 0000000088d9f512 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 1 lock held by syz-executor.1/8128: #0: 0000000088d9f512 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 2 locks held by syz-executor.1/8129: #0: 0000000088d9f512 (&bdev->bd_mutex){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 #1: 0000000088d9f512 (&bdev->bd_mutex/1){+.+.}, at: __blkdev_get+0x1d0/0x1480 fs/block_dev.c:1478 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4681 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:memset_erms+0xe/0x10 arch/x86/lib/memset_64.S:68 Code: b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 f3 aa 4c 89 c8 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01 01 01 48 0f af RSP: 0018:ffff8880a141fa10 EFLAGS: 00000006 RAX: ffffed1005905800 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000400 RSI: 00000000000000ff RDI: ffffed1005905c00 RBP: ffff88802c82c000 R08: ffffed1005905800 R09: ffffed1005905800 R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000001 R13: 0000000000000005 R14: ffffea0000b20b00 R15: 000000000002c82c FS: 00007fb5b99b08c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f39340276c0 CR3: 00000000a146f000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: free_pages_prepare mm/page_alloc.c:1062 [inline] __free_pages_ok+0x24d/0xd30 mm/page_alloc.c:1279 slab_destroy mm/slab.c:1713 [inline] slabs_destroy+0x90/0xd0 mm/slab.c:1729 cache_flusharray mm/slab.c:3490 [inline] ___cache_free+0x295/0x3a0 mm/slab.c:3532 qlink_free mm/kasan/quarantine.c:147 [inline] qlist_free_all+0x79/0x140 mm/kasan/quarantine.c:166 quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x110/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 do_sys_open+0x26c/0x520 fs/open.c:1079 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fb5b8f3f85d Code: bb 20 00 00 75 10 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 67 f6 ff ff 48 89 d0 48 83 c4 08 48 3d 01 RSP: 002b:00007ffcc967b7b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 RAX: ffffffffffffffda RBX: 00007ffcc967bac0 RCX: 00007fb5b8f3f85d RDX: 00000000000001a0 RSI: 0000000000080042 RDI: 00005617ce442cf0 RBP: 000000000000000d R08: 000000000000ffc0 R09: 00000000ffffffff R10: 0000000000000069 R11: 0000000000000293 R12: 00000000ffffffff R13: 00005617ce437040 R14: 00007ffcc967ba80 R15: 00005617ce443c30 ---------------- Code disassembly (best guess): 0: b6 f6 mov $0xf6,%dh 2: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax 9: 01 01 01 c: 48 0f af c6 imul %rsi,%rax 10: f3 48 ab rep stos %rax,%es:(%rdi) 13: 89 d1 mov %edx,%ecx 15: f3 aa rep stos %al,%es:(%rdi) 17: 4c 89 c8 mov %r9,%rax 1a: c3 retq 1b: 90 nop 1c: 49 89 f9 mov %rdi,%r9 1f: 40 88 f0 mov %sil,%al 22: 48 89 d1 mov %rdx,%rcx 25: f3 aa rep stos %al,%es:(%rdi) 27: 4c 89 c8 mov %r9,%rax * 2a: c3 retq <-- trapping instruction 2b: 90 nop 2c: 49 89 fa mov %rdi,%r10 2f: 40 0f b6 ce movzbl %sil,%ecx 33: 48 b8 01 01 01 01 01 movabs $0x101010101010101,%rax 3a: 01 01 01 3d: 48 rex.W 3e: 0f .byte 0xf 3f: af scas %es:(%rdi),%eax