Bluetooth: hci13: command 0x0419 tx timeout Bluetooth: hci12: command 0x0419 tx timeout Bluetooth: hci11: command 0x0419 tx timeout ieee802154 phy0 wpan0: encryption failed: -22 ieee802154 phy1 wpan1: encryption failed: -22 INFO: task syz-executor.1:17836 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.1 D24152 17836 8136 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 netdev_run_todo+0x719/0xab0 net/core/dev.c:9005 rtnl_unlock net/core/rtnetlink.c:117 [inline] rtnetlink_rcv_msg+0x460/0xb80 net/core/rtnetlink.c:4783 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2463 netlink_unicast_kernel net/netlink/af_netlink.c:1325 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1351 netlink_sendmsg+0x6c3/0xc50 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x3b3/0x8e0 net/socket.c:2227 __sys_sendmmsg+0x195/0x470 net/socket.c:2322 __do_sys_sendmmsg net/socket.c:2351 [inline] __se_sys_sendmmsg net/socket.c:2348 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2348 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fe7d75d2279 Code: Bad RIP value. RSP: 002b:00007fe7d5f47168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fe7d76e4f80 RCX: 00007fe7d75d2279 RDX: 0492492492492627 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00007fe7d762c2e9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffde893296f R14: 00007fe7d5f47300 R15: 0000000000022000 INFO: task syz-executor.3:17841 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.3 D25240 17841 8140 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 load_metaops_and_vet net/sched/act_ife.c:281 [inline] populate_metalist net/sched/act_ife.c:456 [inline] tcf_ife_init+0x105b/0x1730 net/sched/act_ife.c:580 tcf_action_init_1+0xa06/0xcd0 net/sched/act_api.c:870 tcf_action_init+0x26e/0x3b0 net/sched/act_api.c:936 tcf_action_add+0xd9/0x360 net/sched/act_api.c:1317 tc_ctl_action+0x327/0x410 net/sched/act_api.c:1372 rtnetlink_rcv_msg+0x453/0xb80 net/core/rtnetlink.c:4782 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2463 netlink_unicast_kernel net/netlink/af_netlink.c:1325 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1351 netlink_sendmsg+0x6c3/0xc50 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2227 __sys_sendmsg net/socket.c:2265 [inline] __do_sys_sendmsg net/socket.c:2274 [inline] __se_sys_sendmsg net/socket.c:2272 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2272 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7f0fbdaaa279 Code: Bad RIP value. RSP: 002b:00007f0fbc41f168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007f0fbdbbcf80 RCX: 00007f0fbdaaa279 RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000004 RBP: 00007f0fbdb042e9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffe695ec00f R14: 00007f0fbc41f300 R15: 0000000000022000 INFO: task syz-executor.5:17837 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.5 D25968 17837 8137 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 load_metaops_and_vet net/sched/act_ife.c:281 [inline] populate_metalist net/sched/act_ife.c:456 [inline] tcf_ife_init+0x105b/0x1730 net/sched/act_ife.c:580 tcf_action_init_1+0xa06/0xcd0 net/sched/act_api.c:870 tcf_action_init+0x26e/0x3b0 net/sched/act_api.c:936 tcf_action_add+0xd9/0x360 net/sched/act_api.c:1317 tc_ctl_action+0x327/0x410 net/sched/act_api.c:1372 rtnetlink_rcv_msg+0x453/0xb80 net/core/rtnetlink.c:4782 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2463 netlink_unicast_kernel net/netlink/af_netlink.c:1325 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1351 netlink_sendmsg+0x6c3/0xc50 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x7bb/0x8e0 net/socket.c:2227 __sys_sendmsg net/socket.c:2265 [inline] __do_sys_sendmsg net/socket.c:2274 [inline] __se_sys_sendmsg net/socket.c:2272 [inline] __x64_sys_sendmsg+0x132/0x220 net/socket.c:2272 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fb92aa80279 Code: Bad RIP value. RSP: 002b:00007fb9293f5168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00007fb92ab92f80 RCX: 00007fb92aa80279 RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 RBP: 00007fb92aada2e9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc4061f75f R14: 00007fb9293f5300 R15: 0000000000022000 INFO: task syz-executor.2:17857 blocked for more than 140 seconds. Not tainted 4.19.211-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.2 D28632 17857 8138 0x00000004 Call Trace: context_switch kernel/sched/core.c:2828 [inline] __schedule+0x887/0x2040 kernel/sched/core.c:3517 schedule+0x8d/0x1b0 kernel/sched/core.c:3561 schedule_preempt_disabled+0xf/0x20 kernel/sched/core.c:3619 __mutex_lock_common kernel/locking/mutex.c:1016 [inline] __mutex_lock+0x5f0/0x1190 kernel/locking/mutex.c:1078 rtnl_lock net/core/rtnetlink.c:77 [inline] rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 netlink_rcv_skb+0x160/0x440 net/netlink/af_netlink.c:2463 netlink_unicast_kernel net/netlink/af_netlink.c:1325 [inline] netlink_unicast+0x4d5/0x690 net/netlink/af_netlink.c:1351 netlink_sendmsg+0x6c3/0xc50 net/netlink/af_netlink.c:1917 sock_sendmsg_nosec net/socket.c:651 [inline] sock_sendmsg+0xc3/0x120 net/socket.c:661 ___sys_sendmsg+0x3b3/0x8e0 net/socket.c:2227 __sys_sendmmsg+0x195/0x470 net/socket.c:2322 __do_sys_sendmmsg net/socket.c:2351 [inline] __se_sys_sendmmsg net/socket.c:2348 [inline] __x64_sys_sendmmsg+0x99/0x100 net/socket.c:2348 do_syscall_64+0xf9/0x620 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x7fbd687cb279 Code: Bad RIP value. RSP: 002b:00007fbd67140168 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 RAX: ffffffffffffffda RBX: 00007fbd688ddf80 RCX: 00007fbd687cb279 RDX: 0492492492492627 RSI: 00000000200000c0 RDI: 0000000000000003 RBP: 00007fbd688252e9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc8832600f R14: 00007fbd67140300 R15: 0000000000022000 Showing all locks held in the system: 1 lock held by khungtaskd/1571: #0: 00000000ff69d2a4 (rcu_read_lock){....}, at: debug_show_all_locks+0x53/0x265 kernel/locking/lockdep.c:4441 1 lock held by in:imklog/7810: #0: 00000000c549916c (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x26f/0x310 fs/file.c:767 3 locks held by kworker/0:0/22318: #0: 00000000b4fadfba ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x767/0x1570 kernel/workqueue.c:2124 #1: 000000004a33d924 ((addr_chk_work).work){+.+.}, at: process_one_work+0x79c/0x1570 kernel/workqueue.c:2128 #2: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: addrconf_verify_work+0xa/0x20 net/ipv6/addrconf.c:4476 1 lock held by syz-executor.1/17836: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: netdev_run_todo+0x719/0xab0 net/core/dev.c:9005 1 lock held by syz-executor.3/17841: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: load_metaops_and_vet net/sched/act_ife.c:281 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: populate_metalist net/sched/act_ife.c:456 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: tcf_ife_init+0x105b/0x1730 net/sched/act_ife.c:580 1 lock held by syz-executor.5/17837: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: load_metaops_and_vet net/sched/act_ife.c:281 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: populate_metalist net/sched/act_ife.c:456 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: tcf_ife_init+0x105b/0x1730 net/sched/act_ife.c:580 1 lock held by syz-executor.5/17846: 1 lock held by syz-executor.2/17857: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.5/17896: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.3/17897: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.2/17900: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.1/17901: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.5/17937: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.2/17941: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.3/17942: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 1 lock held by syz-executor.1/17943: #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnl_lock net/core/rtnetlink.c:77 [inline] #0: 000000009e6a4f1b (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x3fe/0xb80 net/core/rtnetlink.c:4779 ============================================= NMI backtrace for cpu 1 CPU: 1 PID: 1571 Comm: khungtaskd Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2ef lib/dump_stack.c:118 nmi_cpu_backtrace.cold+0x63/0xa2 lib/nmi_backtrace.c:101 nmi_trigger_cpumask_backtrace+0x1a6/0x1f0 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:146 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:203 [inline] watchdog+0x991/0xe60 kernel/hung_task.c:287 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 22986 Comm: kworker/u4:9 Not tainted 4.19.211-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 Workqueue: bat_events batadv_nc_worker RIP: 0010:write_comp_data+0x0/0x70 kernel/kcov.c:116 Code: 20 48 8b 88 68 13 00 00 8b 80 64 13 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 c3 0f 1f 84 00 00 00 00 00 <49> 89 f1 49 89 fa 65 48 8b 34 25 c0 df 01 00 65 8b 05 7a 59 9f 7e RSP: 0018:ffff888052abfc38 EFLAGS: 00000246 RAX: 0000000000000001 RBX: ffff88809b93b500 RCX: ffffffff87d8c616 RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffed101740455a R10: ffff8880ba022ad3 R11: 0000000000000000 R12: dffffc0000000000 R13: ffff88808be8a8e8 R14: ffff88808be89ec0 R15: 0000000000000060 FS: 0000000000000000(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3c60811000 CR3: 00000000a11d7000 CR4: 00000000003406f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: rcu_read_lock include/linux/rcupdate.h:628 [inline] batadv_nc_process_nc_paths.part.0+0x2e6/0x3d0 net/batman-adv/network-coding.c:698 batadv_nc_process_nc_paths net/batman-adv/network-coding.c:690 [inline] batadv_nc_worker+0x9bb/0xd50 net/batman-adv/network-coding.c:739 process_one_work+0x864/0x1570 kernel/workqueue.c:2153 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296 kthread+0x33f/0x460 kernel/kthread.c:259 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415