[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 90.008157][ T26] audit: type=1800 audit(1580649450.273:25): pid=9591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 90.028434][ T26] audit: type=1800 audit(1580649450.273:26): pid=9591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 90.064428][ T26] audit: type=1800 audit(1580649450.283:27): pid=9591 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.57' (ECDSA) to the list of known hosts. syzkaller login: [ 100.360000][ T9743] IPVS: ftp: loaded support on port[0] = 21 [ 100.406561][ T9743] chnl_net:caif_netlink_parms(): no params data found [ 100.439229][ T9743] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.446793][ T9743] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.454522][ T9743] device bridge_slave_0 entered promiscuous mode [ 100.464167][ T9743] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.471478][ T9743] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.479609][ T9743] device bridge_slave_1 entered promiscuous mode [ 100.497671][ T9743] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 100.508499][ T9743] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 100.527920][ T9743] team0: Port device team_slave_0 added [ 100.535069][ T9743] team0: Port device team_slave_1 added [ 100.550847][ T9743] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 100.557910][ T9743] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.584056][ T9743] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 100.597065][ T9743] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 100.604050][ T9743] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 100.630724][ T9743] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 100.688464][ T9743] device hsr_slave_0 entered promiscuous mode [ 100.726212][ T9743] device hsr_slave_1 entered promiscuous mode [ 100.826565][ T9743] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 100.878582][ T9743] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 100.928689][ T9743] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 100.968278][ T9743] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 101.048768][ T9743] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.056038][ T9743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.063835][ T9743] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.071146][ T9743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.112585][ T9743] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.125214][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.136926][ T2701] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.144790][ T2701] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.153557][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 101.167329][ T9743] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.178856][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 101.187871][ T3168] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.195127][ T3168] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.216362][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 101.224714][ T2701] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.231902][ T2701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.239912][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 101.249100][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 101.266437][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 101.274855][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 101.284312][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 101.295582][ T9743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 101.313591][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 101.321150][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 101.333839][ T9743] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 101.351497][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 101.370279][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 101.379319][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 101.387434][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 101.399891][ T9743] device veth0_vlan entered promiscuous mode [ 101.412444][ T9743] device veth1_vlan entered promiscuous mode [ 101.433130][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 101.441956][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 101.453282][ T9743] device veth0_macvtap entered promiscuous mode [ 101.469304][ T9743] device veth1_macvtap entered promiscuous mode [ 101.486584][ T9743] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 101.494000][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 101.502719][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 101.511197][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 101.520305][ T2701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 101.532615][ T9743] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 101.540035][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 101.548776][ T3168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 101.697546][ T9743] [ 101.699936][ T9743] ====================================================== [ 101.706934][ T9743] WARNING: possible circular locking dependency detected [ 101.713939][ T9743] 5.5.0-syzkaller #0 Not tainted [ 101.718849][ T9743] ------------------------------------------------------ [ 101.725937][ T9743] syz-executor103/9743 is trying to acquire lock: [ 101.732377][ T9743] ffff8880996c1128 ((wq_completion)wg-kex-wireguard0){+.+.}, at: flush_workqueue+0xf7/0x14c0 [ 101.743706][ T9743] [ 101.743706][ T9743] but task is already holding lock: [ 101.751060][ T9743] ffff88809ead8e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 101.760505][ T9743] [ 101.760505][ T9743] which lock already depends on the new lock. [ 101.760505][ T9743] [ 101.770922][ T9743] [ 101.770922][ T9743] the existing dependency chain (in reverse order) is: [ 101.779923][ T9743] [ 101.779923][ T9743] -> #2 (&wg->static_identity.lock){++++}: [ 101.787889][ T9743] down_read+0x95/0x430 [ 101.792556][ T9743] wg_noise_handshake_create_initiation+0xc0/0x670 [ 101.799732][ T9743] wg_packet_send_handshake_initiation+0x185/0x250 [ 101.806738][ T9743] wg_packet_handshake_send_worker+0x1d/0x30 [ 101.813262][ T9743] process_one_work+0xa05/0x17a0 [ 101.818756][ T9743] worker_thread+0x98/0xe40 [ 101.823759][ T9743] kthread+0x361/0x430 [ 101.828339][ T9743] ret_from_fork+0x24/0x30 [ 101.833300][ T9743] [ 101.833300][ T9743] -> #1 ((work_completion)(&peer->transmit_handshake_work)){+.+.}: [ 101.843464][ T9743] process_one_work+0x972/0x17a0 [ 101.849088][ T9743] worker_thread+0x98/0xe40 [ 101.854095][ T9743] kthread+0x361/0x430 [ 101.858672][ T9743] ret_from_fork+0x24/0x30 [ 101.863581][ T9743] [ 101.863581][ T9743] -> #0 ((wq_completion)wg-kex-wireguard0){+.+.}: [ 101.872268][ T9743] __lock_acquire+0x2596/0x4a00 [ 101.877700][ T9743] lock_acquire+0x190/0x410 [ 101.882845][ T9743] flush_workqueue+0x126/0x14c0 [ 101.888243][ T9743] peer_remove_after_dead+0x16b/0x230 [ 101.894164][ T9743] wg_peer_remove+0x244/0x340 [ 101.899345][ T9743] wg_set_device+0xf76/0x1350 [ 101.904529][ T9743] genl_rcv_msg+0x67d/0xea0 [ 101.909542][ T9743] netlink_rcv_skb+0x177/0x450 [ 101.914815][ T9743] genl_rcv+0x29/0x40 [ 101.919301][ T9743] netlink_unicast+0x59e/0x7e0 [ 101.924559][ T9743] netlink_sendmsg+0x91c/0xea0 [ 101.929915][ T9743] sock_sendmsg+0xd7/0x130 [ 101.934831][ T9743] ____sys_sendmsg+0x753/0x880 [ 101.940101][ T9743] ___sys_sendmsg+0x100/0x170 [ 101.945339][ T9743] __sys_sendmsg+0x105/0x1d0 [ 101.950443][ T9743] __x64_sys_sendmsg+0x78/0xb0 [ 101.955705][ T9743] do_syscall_64+0xfa/0x790 [ 101.960746][ T9743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 101.967129][ T9743] [ 101.967129][ T9743] other info that might help us debug this: [ 101.967129][ T9743] [ 101.977378][ T9743] Chain exists of: [ 101.977378][ T9743] (wq_completion)wg-kex-wireguard0 --> (work_completion)(&peer->transmit_handshake_work) --> &wg->static_identity.lock [ 101.977378][ T9743] [ 101.995676][ T9743] Possible unsafe locking scenario: [ 101.995676][ T9743] [ 102.003217][ T9743] CPU0 CPU1 [ 102.008570][ T9743] ---- ---- [ 102.013911][ T9743] lock(&wg->static_identity.lock); [ 102.019175][ T9743] lock((work_completion)(&peer->transmit_handshake_work)); [ 102.029039][ T9743] lock(&wg->static_identity.lock); [ 102.036827][ T9743] lock((wq_completion)wg-kex-wireguard0); [ 102.042694][ T9743] [ 102.042694][ T9743] *** DEADLOCK *** [ 102.042694][ T9743] [ 102.050825][ T9743] 5 locks held by syz-executor103/9743: [ 102.056348][ T9743] #0: ffffffff8a796128 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 102.064071][ T9743] #1: ffffffff8a7961e0 (genl_mutex){+.+.}, at: genl_rcv_msg+0x7de/0xea0 [ 102.072617][ T9743] #2: ffffffff8a7403c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 102.080853][ T9743] #3: ffff88809ead90a0 (&wg->device_update_lock){+.+.}, at: wg_set_device+0x2be/0x1350 [ 102.090613][ T9743] #4: ffff88809ead8e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 102.100495][ T9743] [ 102.100495][ T9743] stack backtrace: [ 102.106374][ T9743] CPU: 1 PID: 9743 Comm: syz-executor103 Not tainted 5.5.0-syzkaller #0 [ 102.114673][ T9743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.124765][ T9743] Call Trace: [ 102.128057][ T9743] dump_stack+0x197/0x210 [ 102.132423][ T9743] print_circular_bug.isra.0.cold+0x163/0x172 [ 102.138484][ T9743] check_noncircular+0x32e/0x3e0 [ 102.143450][ T9743] ? print_circular_bug.isra.0+0x230/0x230 [ 102.149249][ T9743] ? alloc_list_entry+0xc0/0xc0 [ 102.154091][ T9743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.160329][ T9743] ? find_first_zero_bit+0x9a/0xc0 [ 102.165424][ T9743] __lock_acquire+0x2596/0x4a00 [ 102.170265][ T9743] ? mark_held_locks+0xf0/0xf0 [ 102.175154][ T9743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.181387][ T9743] ? find_first_zero_bit+0x9a/0xc0 [ 102.186482][ T9743] lock_acquire+0x190/0x410 [ 102.191008][ T9743] ? flush_workqueue+0xf7/0x14c0 [ 102.195943][ T9743] flush_workqueue+0x126/0x14c0 [ 102.200831][ T9743] ? flush_workqueue+0xf7/0x14c0 [ 102.205755][ T9743] ? napi_hash_del+0x125/0x170 [ 102.210535][ T9743] ? lock_downgrade+0x920/0x920 [ 102.215368][ T9743] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 102.221258][ T9743] ? _raw_spin_unlock+0x28/0x40 [ 102.226099][ T9743] ? kfree_skb+0x10e/0x420 [ 102.230504][ T9743] peer_remove_after_dead+0x16b/0x230 [ 102.235870][ T9743] ? peer_remove_after_dead+0x16b/0x230 [ 102.241415][ T9743] wg_peer_remove+0x244/0x340 [ 102.246073][ T9743] wg_set_device+0xf76/0x1350 [ 102.250848][ T9743] ? set_peer+0x1150/0x1150 [ 102.255370][ T9743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.261598][ T9743] ? __nla_parse+0x43/0x60 [ 102.266001][ T9743] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 102.272353][ T9743] genl_rcv_msg+0x67d/0xea0 [ 102.276862][ T9743] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 102.283188][ T9743] ? find_held_lock+0x35/0x130 [ 102.287945][ T9743] netlink_rcv_skb+0x177/0x450 [ 102.292698][ T9743] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 102.299013][ T9743] ? netlink_ack+0xb50/0xb50 [ 102.303594][ T9743] ? __kasan_check_write+0x14/0x20 [ 102.308722][ T9743] ? netlink_deliver_tap+0x248/0xbf0 [ 102.314044][ T9743] genl_rcv+0x29/0x40 [ 102.318021][ T9743] netlink_unicast+0x59e/0x7e0 [ 102.322777][ T9743] ? netlink_attachskb+0x870/0x870 [ 102.327905][ T9743] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 102.333609][ T9743] ? __check_object_size+0x3d/0x437 [ 102.338852][ T9743] netlink_sendmsg+0x91c/0xea0 [ 102.343605][ T9743] ? netlink_unicast+0x7e0/0x7e0 [ 102.348532][ T9743] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 102.354068][ T9743] ? apparmor_socket_sendmsg+0x2a/0x30 [ 102.359514][ T9743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.365798][ T9743] ? security_socket_sendmsg+0x8d/0xc0 [ 102.371262][ T9743] ? netlink_unicast+0x7e0/0x7e0 [ 102.376188][ T9743] sock_sendmsg+0xd7/0x130 [ 102.380605][ T9743] ____sys_sendmsg+0x753/0x880 [ 102.385395][ T9743] ? kernel_sendmsg+0x50/0x50 [ 102.390061][ T9743] ? debug_object_active_state+0x28a/0x350 [ 102.395852][ T9743] ? find_held_lock+0x35/0x130 [ 102.400613][ T9743] ___sys_sendmsg+0x100/0x170 [ 102.405276][ T9743] ? sendmsg_copy_msghdr+0x70/0x70 [ 102.410421][ T9743] ? lockdep_hardirqs_on+0x421/0x5e0 [ 102.415682][ T9743] ? __kasan_check_read+0x11/0x20 [ 102.420691][ T9743] ? mark_lock+0xc2/0x1220 [ 102.425090][ T9743] ? __kasan_check_read+0x11/0x20 [ 102.430106][ T9743] ? __lock_acquire+0x16f2/0x4a00 [ 102.435121][ T9743] ? debug_object_deactivate+0x320/0x320 [ 102.440735][ T9743] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 102.446876][ T9743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.453106][ T9743] ? __fget_light+0x1ad/0x270 [ 102.457791][ T9743] ? __fdget+0x1b/0x20 [ 102.461840][ T9743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.468090][ T9743] __sys_sendmsg+0x105/0x1d0 [ 102.472685][ T9743] ? __sys_sendmsg_sock+0xc0/0xc0 [ 102.478305][ T9743] ? lockdep_hardirqs_on+0x421/0x5e0 [ 102.483572][ T9743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 102.489014][ T9743] ? do_syscall_64+0x26/0x790 [ 102.493679][ T9743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.499735][ T9743] ? do_syscall_64+0x26/0x790 [ 102.504501][ T9743] __x64_sys_sendmsg+0x78/0xb0 [ 102.509253][ T9743] do_syscall_64+0xfa/0x790 [ 102.513845][ T9743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.519843][ T9743] RIP: 0033:0x446909 [ 102.523726][ T9743] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 9b d4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 102.543367][ T9743] RSP: 002b:00007ffde39ca2e8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.551770][ T9743] RAX: ffffffffffffffda RBX: 0000000000003064 RCX: 0000000000446909 [ 102.559867][ T9743] RDX: 0000000000000000 RSI: 0000000020001340 RDI: 0000000000000004 [ 102.567827][ T9743] RBP: 7261756765726977 R08: 0000000000000000 R09: 0000000001bbbbbb [ 102.575811][ T9743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 102.585341][ T9743] R13: 00000000004042c0 R14: 0000000000000000 R15: 0000000000000000