ieee802154 phy1 wpan1: encryption failed: -22 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 INFO: task syz-executor.4:31060 blocked for more than 140 seconds. Not tainted 4.19.186-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D24120 31060 1 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 request_wait_answer+0x3dc/0x750 fs/fuse/dev.c:485 __fuse_request_send+0x123/0x1c0 fs/fuse/dev.c:505 fuse_send_destroy fs/fuse/inode.c:391 [inline] fuse_sb_destroy.isra.0+0x154/0x190 fs/fuse/inode.c:1222 fuse_kill_sb_blk+0x33/0x50 fs/fuse/inode.c:1258 deactivate_locked_super+0x94/0x160 fs/super.c:329 deactivate_super+0x174/0x1a0 fs/super.c:360 cleanup_mnt+0x1a8/0x290 fs/namespace.c:1098 task_work_run+0x148/0x1c0 kernel/task_work.c:113 tracehook_notify_resume include/linux/tracehook.h:193 [inline] exit_to_usermode_loop+0x251/0x2a0 arch/x86/entry/common.c:167 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x4678b7 Code: Bad RIP value. RSP: 002b:00007ffffa9eb188 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000004678b7 RDX: 00007ffffa9eb25b RSI: 0000000000000002 RDI: 00007ffffa9eb250 RBP: 00007ffffa9eb250 R08: 00000000ffffffff R09: 00007ffffa9eb020 R10: 0000000002d9f8e3 R11: 0000000000000202 R12: 00000000004bebb2 R13: 00007ffffa9ec320 R14: 0000000002d9f810 R15: 00007ffffa9ec360 Showing all locks held in the system: 1 lock held by khungtaskd/1569: #0: 00000000308085bd (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4440 1 lock held by in:imklog/7780: #0: 00000000448be288 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 2 locks held by rs:main Q:Reg/7783: #0: 00000000699d8412 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 #1: 00000000e6956385 (sb_writers#3){.+.+}, at: file_start_write include/linux/fs.h:2779 [inline] #1: 00000000e6956385 (sb_writers#3){.+.+}, at: vfs_write+0x463/0x540 fs/read_write.c:548 1 lock held by syz-executor.4/31060: #0: 0000000049f37db0 (&type->s_umount_key#99){+.+.}, at: deactivate_super+0x16c/0x1a0 fs/super.c:359 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1569 Comm: khungtaskd Not tainted 4.19.186-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 341 Comm: kworker/u4:3 Not tainted 4.19.186-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet RIP: 0010:enqueue_to_backlog+0x20/0xe00 net/core/dev.c:4228 Code: 0f 1f 84 00 00 00 00 00 66 90 41 57 41 56 41 55 41 54 4c 63 e6 55 48 89 fd 53 48 c7 c3 80 c2 02 00 48 83 ec 38 48 89 54 24 08 7b 7c ee fa 4a 8d 3c e5 00 3f cf 89 48 b8 00 00 00 00 00 fc ff RSP: 0018:ffff8880b49e78f8 EFLAGS: 00000292 RAX: 0000000000000000 RBX: 000000000002c280 RCX: ffffffff8376d373 RDX: ffff8880b49e7998 RSI: 0000000000000000 RDI: ffff88808f7d5580 RBP: ffff88808f7d5580 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000005 R11: ffffffff8c66301b R12: 0000000000000000 R13: ffff88808f7d5580 R14: 0000000000000001 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f12148b8000 CR3: 00000000b0211000 CR4: 00000000001406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: netif_rx_internal+0xfd/0x670 net/core/dev.c:4491 veth_forward_skb drivers/net/veth.c:176 [inline] veth_xmit+0x1eb/0x800 drivers/net/veth.c:203 __netdev_start_xmit include/linux/netdevice.h:4345 [inline] netdev_start_xmit include/linux/netdevice.h:4359 [inline] xmit_one net/core/dev.c:3256 [inline] dev_hard_start_xmit+0x1a8/0x920 net/core/dev.c:3272 __dev_queue_xmit+0x269d/0x2e00 net/core/dev.c:3838 batadv_send_skb_packet+0x4b1/0x600 net/batman-adv/send.c:120 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:578 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:604 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x6b1/0x7a0 net/batman-adv/bat_iv_ogm.c:1857 process_one_work+0x864/0x1570 kernel/workqueue.c:2152 worker_thread+0x64c/0x1130 kernel/workqueue.c:2295 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415