device erspan0 left promiscuous mode ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 INFO: task syz-executor.1:17085 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28336 17085 8125 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 request_wait_answer+0x3dc/0x750 fs/fuse/dev.c:485 __fuse_request_send+0x123/0x1c0 fs/fuse/dev.c:505 fuse_simple_request+0x2e6/0x820 fs/fuse/dev.c:576 fuse_do_setattr+0x87e/0x14f0 fs/fuse/dir.c:1712 fuse_setattr+0x239/0x560 fs/fuse/dir.c:1813 notify_change+0x70b/0xfc0 fs/attr.c:334 chmod_common+0x1d9/0x3f0 fs/open.c:560 do_fchmodat+0xb5/0x140 fs/open.c:598 __do_sys_chmod fs/open.c:616 [inline] __se_sys_chmod fs/open.c:614 [inline] __x64_sys_chmod+0x58/0x80 fs/open.c:614 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f65b9329059 Code: Bad RIP value. RSP: 002b:00007f65b7bf9168 EFLAGS: 00000246 ORIG_RAX: 000000000000005a RAX: ffffffffffffffda RBX: 00007f65b943c370 RCX: 00007f65b9329059 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 RBP: 00007f65b938308d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd4e9497ff R14: 00007f65b7bf9300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1571: #0: 00000000b8047004 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7768: #0: 00000000c7106fb2 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by syz-executor.1/17085: #0: 000000009ee79d30 (sb_writers#23){.+.+}, at: sb_start_write include/linux/fs.h:1579 [inline] #0: 000000009ee79d30 (sb_writers#23){.+.+}, at: mnt_want_write+0x3a/0xb0 fs/namespace.c:360 #1: 0000000066f1bf42 (&type->i_mutex_dir_key#12){+.+.}, at: inode_lock include/linux/fs.h:748 [inline] #1: 0000000066f1bf42 (&type->i_mutex_dir_key#12){+.+.}, at: chmod_common+0x14b/0x3f0 fs/open.c:554 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 3157 Comm: kworker/u4:5 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_tt_purge RIP: 0010:__preempt_count_sub arch/x86/include/asm/preempt.h:81 [inline] RIP: 0010:preempt_count_sub+0x5a/0x150 kernel/sched/core.c:3273 Code: 00 8b 0d 59 ca e2 0b 85 c9 75 18 65 8b 05 3e 72 c0 7e 25 ff ff ff 7f 39 c3 7f 1a 81 fb fe 00 00 00 76 6a 65 8b 05 26 72 c0 7e db 65 01 1d 1d 72 c0 7e 5b c3 e8 b6 e4 31 02 85 c0 74 f5 48 c7 RSP: 0018:ffff8880ab29fc10 EFLAGS: 00000012 RAX: 0000000080000201 RBX: 0000000000000200 RCX: 0000000000000000 RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000200 RBP: ffffffff87dbdb48 R08: 0000000000000001 R09: 0000000000000000 R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880ab1ec000 R13: ffff888090614698 R14: 00000000000927c0 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f33d4791020 CR3: 00000000a854c000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Call Trace: __local_bh_enable_ip+0x138/0x270 kernel/softirq.c:182 spin_unlock_bh include/linux/spinlock.h:374 [inline] batadv_tt_local_purge+0x278/0x370 net/batman-adv/translation-table.c:1456 batadv_tt_purge+0x2c/0xa00 net/batman-adv/translation-table.c:3811 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 ---------------- Code disassembly (best guess): 0: 00 8b 0d 59 ca e2 add %cl,-0x1d35a6f3(%rbx) 6: 0b 85 c9 75 18 65 or 0x651875c9(%rbp),%eax c: 8b 05 3e 72 c0 7e mov 0x7ec0723e(%rip),%eax # 0x7ec07250 12: 25 ff ff ff 7f and $0x7fffffff,%eax 17: 39 c3 cmp %eax,%ebx 19: 7f 1a jg 0x35 1b: 81 fb fe 00 00 00 cmp $0xfe,%ebx 21: 76 6a jbe 0x8d 23: 65 8b 05 26 72 c0 7e mov %gs:0x7ec07226(%rip),%eax # 0x7ec07250 * 2a: f7 db neg %ebx <-- trapping instruction 2c: 65 01 1d 1d 72 c0 7e add %ebx,%gs:0x7ec0721d(%rip) # 0x7ec07250 33: 5b pop %rbx 34: c3 retq 35: e8 b6 e4 31 02 callq 0x231e4f0 3a: 85 c0 test %eax,%eax 3c: 74 f5 je 0x33 3e: 48 rex.W 3f: c7 .byte 0xc7