ieee802154 phy1 wpan1: encryption failed: -22 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 INFO: task syz-executor.1:7895 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D28728 7895 9069 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 request_wait_answer+0x3dc/0x750 fs/fuse/dev.c:485 __fuse_request_send+0x123/0x1c0 fs/fuse/dev.c:505 fuse_simple_request+0x2e6/0x820 fs/fuse/dev.c:576 fuse_dentry_revalidate+0x477/0x9f0 fs/fuse/dir.c:219 d_revalidate fs/namei.c:767 [inline] lookup_fast+0xe0e/0x1080 fs/namei.c:1616 walk_component+0xde/0xda0 fs/namei.c:1807 lookup_last fs/namei.c:2274 [inline] path_lookupat+0x1ff/0x8d0 fs/namei.c:2319 filename_lookup+0x1ac/0x5a0 fs/namei.c:2349 user_path_at include/linux/namei.h:57 [inline] path_setxattr+0x95/0x190 fs/xattr.c:534 __do_sys_setxattr fs/xattr.c:554 [inline] __se_sys_setxattr fs/xattr.c:550 [inline] __x64_sys_setxattr+0xc0/0x160 fs/xattr.c:550 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fe549b9b0e9 Code: Bad RIP value. RSP: 002b:00007fe5484ce168 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc RAX: ffffffffffffffda RBX: 00007fe549cae100 RCX: 00007fe549b9b0e9 RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000020000040 RBP: 00007fe549bf508d R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd1417a1df R14: 00007fe5484ce300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1570: #0: 00000000363e780a (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 2 locks held by in:imklog/7798: #0: 000000004a44b59c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 #1: 00000000d35684f0 (logbuf_lock){-...}, at: is_bpf_text_address+0x0/0x1b0 kernel/bpf/core.c:533 3 locks held by kworker/u4:6/28671: #0: 000000005c1062de ((wq_completion)"writeback"){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 00000000d4b249c4 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000008a366910 (&type->s_umount_key#56){++++}, at: trylock_super+0x1d/0x100 fs/super.c:412 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 1570 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 4689 Comm: systemd-journal Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__sanitizer_cov_trace_pc+0x22/0x50 kernel/kcov.c:101 Code: 90 90 90 90 90 90 90 90 48 8b 34 24 65 48 8b 04 25 c0 df 01 00 65 8b 15 cc 59 9f 7e 81 e2 00 01 1f 00 75 2b 8b 90 60 13 00 00 <83> fa 02 75 20 48 8b 88 68 13 00 00 8b 80 64 13 00 00 48 8b 11 48 RSP: 0018:ffff8880a13efaa8 EFLAGS: 00000046 RAX: ffff8880a13e44c0 RBX: ffff888058e7cd00 RCX: ffffffff812b5e78 RDX: 0000000000000000 RSI: ffffffff812b5e82 RDI: 0000000000000006 RBP: ffff8880d8e7cd00 R08: 0000000000000000 R09: ffff8880d8e7cd00 R10: 0000000000000006 R11: 0000000000000000 R12: 0000000058e7cd00 R13: ffff8880a13efb70 R14: ffff88823b843380 R15: 0000000000000286 FS: 00007f3a287c58c0(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3a240cd000 CR3: 00000000a17c0000 CR4: 00000000003406e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: phys_addr_valid arch/x86/mm/physaddr.h:7 [inline] __phys_addr+0x52/0x110 arch/x86/mm/physaddr.c:27 cache_free_alien mm/slab.c:828 [inline] ___cache_free+0x14f/0x3a0 mm/slab.c:3525 qlink_free mm/kasan/quarantine.c:147 [inline] qlist_free_all+0x79/0x140 mm/kasan/quarantine.c:166 quarantine_reduce+0x1a9/0x230 mm/kasan/quarantine.c:259 kasan_kmalloc+0xa2/0x160 mm/kasan/kasan.c:538 slab_post_alloc_hook mm/slab.h:445 [inline] slab_alloc mm/slab.c:3397 [inline] kmem_cache_alloc+0x110/0x370 mm/slab.c:3557 getname_flags+0xce/0x590 fs/namei.c:140 getname fs/namei.c:211 [inline] user_path_create fs/namei.c:3696 [inline] do_mkdirat+0x8d/0x2d0 fs/namei.c:3834 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f3a27a80687 Code: 00 b8 ff ff ff ff c3 0f 1f 40 00 48 8b 05 09 d8 2b 00 64 c7 00 5f 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d e1 d7 2b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff150e5478 EFLAGS: 00000293 ORIG_RAX: 0000000000000053 RAX: ffffffffffffffda RBX: 00007fff150e8390 RCX: 00007f3a27a80687 RDX: 00007f3a284f1a00 RSI: 00000000000001ed RDI: 00005570d42118a0 RBP: 00007fff150e54b0 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000069 R11: 0000000000000293 R12: 0000000000000000 R13: 0000000000000000 R14: 00007fff150e8390 R15: 00007fff150e59a0 ---------------- Code disassembly (best guess): 0: 90 nop 1: 90 nop 2: 90 nop 3: 90 nop 4: 90 nop 5: 90 nop 6: 90 nop 7: 90 nop 8: 48 8b 34 24 mov (%rsp),%rsi c: 65 48 8b 04 25 c0 df mov %gs:0x1dfc0,%rax 13: 01 00 15: 65 8b 15 cc 59 9f 7e mov %gs:0x7e9f59cc(%rip),%edx # 0x7e9f59e8 1c: 81 e2 00 01 1f 00 and $0x1f0100,%edx 22: 75 2b jne 0x4f 24: 8b 90 60 13 00 00 mov 0x1360(%rax),%edx * 2a: 83 fa 02 cmp $0x2,%edx <-- trapping instruction 2d: 75 20 jne 0x4f 2f: 48 8b 88 68 13 00 00 mov 0x1368(%rax),%rcx 36: 8b 80 64 13 00 00 mov 0x1364(%rax),%eax 3c: 48 8b 11 mov (%rcx),%rdx 3f: 48 rex.W