[ 88.210761][ T27] audit: type=1800 audit(1580521112.341:26): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 89.103094][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 89.103106][ T27] audit: type=1800 audit(1580521113.251:29): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 89.129791][ T27] audit: type=1800 audit(1580521113.251:30): pid=9662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. syzkaller login: [ 98.285251][ T9815] IPVS: ftp: loaded support on port[0] = 21 [ 98.336504][ T9815] chnl_net:caif_netlink_parms(): no params data found [ 98.371964][ T9815] bridge0: port 1(bridge_slave_0) entered blocking state [ 98.379490][ T9815] bridge0: port 1(bridge_slave_0) entered disabled state [ 98.387696][ T9815] device bridge_slave_0 entered promiscuous mode [ 98.396198][ T9815] bridge0: port 2(bridge_slave_1) entered blocking state [ 98.403324][ T9815] bridge0: port 2(bridge_slave_1) entered disabled state [ 98.411448][ T9815] device bridge_slave_1 entered promiscuous mode [ 98.429220][ T9815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 98.439938][ T9815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 98.459722][ T9815] team0: Port device team_slave_0 added [ 98.467583][ T9815] team0: Port device team_slave_1 added [ 98.482904][ T9815] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 98.489994][ T9815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.516009][ T9815] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 98.528439][ T9815] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 98.535397][ T9815] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 98.562383][ T9815] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 98.667537][ T9815] device hsr_slave_0 entered promiscuous mode [ 98.716230][ T9815] device hsr_slave_1 entered promiscuous mode [ 98.849342][ T9815] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 98.908591][ T9815] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 98.977711][ T9815] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 99.017935][ T9815] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 99.078547][ T9815] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.086264][ T9815] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.093833][ T9815] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.100954][ T9815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.144895][ T9815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.158799][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 99.169499][ T2828] bridge0: port 1(bridge_slave_0) entered disabled state [ 99.177969][ T2828] bridge0: port 2(bridge_slave_1) entered disabled state [ 99.186781][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 99.199967][ T9815] 8021q: adding VLAN 0 to HW filter on device team0 [ 99.211496][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 99.220222][ T2872] bridge0: port 1(bridge_slave_0) entered blocking state [ 99.227330][ T2872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 99.238369][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 99.247833][ T2828] bridge0: port 2(bridge_slave_1) entered blocking state [ 99.254873][ T2828] bridge0: port 2(bridge_slave_1) entered forwarding state [ 99.278488][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 99.287649][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 99.296469][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 99.308668][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 99.321080][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 99.332795][ T9815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 99.352204][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 99.360204][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 99.372423][ T9815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 99.397908][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 99.407038][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 99.426654][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 99.435141][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 99.446167][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 99.453962][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 99.463466][ T9815] device veth0_vlan entered promiscuous mode [ 99.475436][ T9815] device veth1_vlan entered promiscuous mode [ 99.497228][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 99.505269][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 99.513824][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 99.522514][ T2904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 99.534591][ T9815] device veth0_macvtap entered promiscuous mode [ 99.544660][ T9815] device veth1_macvtap entered promiscuous mode [ 99.563103][ T9815] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 99.570675][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 99.579641][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 99.588031][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 99.596973][ T2828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 99.609641][ T9815] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 99.617534][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 99.626410][ T2872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 99.806599][ T9815] [ 99.808980][ T9815] ====================================================== [ 99.816029][ T9815] WARNING: possible circular locking dependency detected [ 99.823100][ T9815] 5.5.0-syzkaller #0 Not tainted [ 99.828120][ T9815] ------------------------------------------------------ [ 99.835117][ T9815] syz-executor681/9815 is trying to acquire lock: [ 99.841554][ T9815] ffff8880a35e8d28 ((wq_completion)wg-kex-wireguard0){+.+.}, at: flush_workqueue+0xf7/0x14c0 [ 99.851705][ T9815] [ 99.851705][ T9815] but task is already holding lock: [ 99.859052][ T9815] ffff8880a81f8e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 99.868501][ T9815] [ 99.868501][ T9815] which lock already depends on the new lock. [ 99.868501][ T9815] [ 99.878933][ T9815] [ 99.878933][ T9815] the existing dependency chain (in reverse order) is: [ 99.888517][ T9815] [ 99.888517][ T9815] -> #2 (&wg->static_identity.lock){++++}: [ 99.896497][ T9815] down_read+0x95/0x430 [ 99.901170][ T9815] wg_noise_handshake_create_initiation+0xc0/0x670 [ 99.908179][ T9815] wg_packet_send_handshake_initiation+0x185/0x250 [ 99.915223][ T9815] wg_packet_handshake_send_worker+0x1d/0x30 [ 99.921709][ T9815] process_one_work+0xa05/0x17a0 [ 99.927147][ T9815] worker_thread+0x98/0xe40 [ 99.932148][ T9815] kthread+0x361/0x430 [ 99.936716][ T9815] ret_from_fork+0x24/0x30 [ 99.941624][ T9815] [ 99.941624][ T9815] -> #1 ((work_completion)(&peer->transmit_handshake_work)){+.+.}: [ 99.951681][ T9815] process_one_work+0x972/0x17a0 [ 99.957134][ T9815] worker_thread+0x98/0xe40 [ 99.962177][ T9815] kthread+0x361/0x430 [ 99.966755][ T9815] ret_from_fork+0x24/0x30 [ 99.971674][ T9815] [ 99.971674][ T9815] -> #0 ((wq_completion)wg-kex-wireguard0){+.+.}: [ 99.980238][ T9815] __lock_acquire+0x2596/0x4a00 [ 99.985594][ T9815] lock_acquire+0x190/0x410 [ 99.990615][ T9815] flush_workqueue+0x126/0x14c0 [ 99.996666][ T9815] peer_remove_after_dead+0x16b/0x230 [ 100.002663][ T9815] wg_peer_remove+0x244/0x340 [ 100.007842][ T9815] wg_set_device+0xf76/0x1350 [ 100.013075][ T9815] genl_rcv_msg+0x67d/0xea0 [ 100.018084][ T9815] netlink_rcv_skb+0x177/0x450 [ 100.023355][ T9815] genl_rcv+0x29/0x40 [ 100.027843][ T9815] netlink_unicast+0x59e/0x7e0 [ 100.033113][ T9815] netlink_sendmsg+0x91c/0xea0 [ 100.038427][ T9815] sock_sendmsg+0xd7/0x130 [ 100.043351][ T9815] ____sys_sendmsg+0x753/0x880 [ 100.048624][ T9815] ___sys_sendmsg+0x100/0x170 [ 100.053796][ T9815] __sys_sendmsg+0x105/0x1d0 [ 100.058889][ T9815] __x64_sys_sendmsg+0x78/0xb0 [ 100.064238][ T9815] do_syscall_64+0xfa/0x790 [ 100.069245][ T9815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.075629][ T9815] [ 100.075629][ T9815] other info that might help us debug this: [ 100.075629][ T9815] [ 100.085840][ T9815] Chain exists of: [ 100.085840][ T9815] (wq_completion)wg-kex-wireguard0 --> (work_completion)(&peer->transmit_handshake_work) --> &wg->static_identity.lock [ 100.085840][ T9815] [ 100.104151][ T9815] Possible unsafe locking scenario: [ 100.104151][ T9815] [ 100.111583][ T9815] CPU0 CPU1 [ 100.116928][ T9815] ---- ---- [ 100.122273][ T9815] lock(&wg->static_identity.lock); [ 100.127533][ T9815] lock((work_completion)(&peer->transmit_handshake_work)); [ 100.137439][ T9815] lock(&wg->static_identity.lock); [ 100.145222][ T9815] lock((wq_completion)wg-kex-wireguard0); [ 100.151094][ T9815] [ 100.151094][ T9815] *** DEADLOCK *** [ 100.151094][ T9815] [ 100.159227][ T9815] 5 locks held by syz-executor681/9815: [ 100.164793][ T9815] #0: ffffffff8a78c128 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 100.172446][ T9815] #1: ffffffff8a78c1e0 (genl_mutex){+.+.}, at: genl_rcv_msg+0x7de/0xea0 [ 100.180847][ T9815] #2: ffffffff8a7363c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 100.189979][ T9815] #3: ffff8880a81f90a0 (&wg->device_update_lock){+.+.}, at: wg_set_device+0x2be/0x1350 [ 100.199686][ T9815] #4: ffff8880a81f8e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 100.210431][ T9815] [ 100.210431][ T9815] stack backtrace: [ 100.216301][ T9815] CPU: 1 PID: 9815 Comm: syz-executor681 Not tainted 5.5.0-syzkaller #0 [ 100.224602][ T9815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.234673][ T9815] Call Trace: [ 100.237944][ T9815] dump_stack+0x197/0x210 [ 100.242249][ T9815] print_circular_bug.isra.0.cold+0x163/0x172 [ 100.248295][ T9815] check_noncircular+0x32e/0x3e0 [ 100.253223][ T9815] ? print_circular_bug.isra.0+0x230/0x230 [ 100.259013][ T9815] ? profile_setup.cold+0xbb/0xbb [ 100.264073][ T9815] ? alloc_list_entry+0xc0/0xc0 [ 100.268902][ T9815] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 100.275118][ T9815] ? find_first_zero_bit+0x9a/0xc0 [ 100.280406][ T9815] __lock_acquire+0x2596/0x4a00 [ 100.285234][ T9815] ? check_noncircular+0x16d/0x3e0 [ 100.290350][ T9815] ? mark_held_locks+0xf0/0xf0 [ 100.295130][ T9815] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 100.301347][ T9815] ? find_first_zero_bit+0x9a/0xc0 [ 100.306434][ T9815] lock_acquire+0x190/0x410 [ 100.310963][ T9815] ? flush_workqueue+0xf7/0x14c0 [ 100.315876][ T9815] flush_workqueue+0x126/0x14c0 [ 100.320699][ T9815] ? flush_workqueue+0xf7/0x14c0 [ 100.325620][ T9815] ? napi_hash_del+0x125/0x170 [ 100.330407][ T9815] ? lock_downgrade+0x920/0x920 [ 100.335233][ T9815] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 100.341130][ T9815] ? _raw_spin_unlock+0x28/0x40 [ 100.345993][ T9815] ? kfree_skb+0x10e/0x420 [ 100.350389][ T9815] peer_remove_after_dead+0x16b/0x230 [ 100.355735][ T9815] ? peer_remove_after_dead+0x16b/0x230 [ 100.361254][ T9815] wg_peer_remove+0x244/0x340 [ 100.365909][ T9815] wg_set_device+0xf76/0x1350 [ 100.370565][ T9815] ? set_peer+0x1150/0x1150 [ 100.375045][ T9815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.381263][ T9815] ? __nla_parse+0x43/0x60 [ 100.385667][ T9815] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 100.391979][ T9815] genl_rcv_msg+0x67d/0xea0 [ 100.396475][ T9815] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 100.402774][ T9815] ? __kasan_check_read+0x11/0x20 [ 100.407777][ T9815] ? find_held_lock+0x35/0x130 [ 100.412545][ T9815] netlink_rcv_skb+0x177/0x450 [ 100.417362][ T9815] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 100.423663][ T9815] ? netlink_ack+0xb50/0xb50 [ 100.428236][ T9815] ? __kasan_check_write+0x14/0x20 [ 100.433326][ T9815] ? netlink_deliver_tap+0x248/0xbf0 [ 100.438599][ T9815] genl_rcv+0x29/0x40 [ 100.442569][ T9815] netlink_unicast+0x59e/0x7e0 [ 100.447315][ T9815] ? netlink_attachskb+0x870/0x870 [ 100.452475][ T9815] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 100.458180][ T9815] ? __check_object_size+0x3d/0x437 [ 100.463356][ T9815] netlink_sendmsg+0x91c/0xea0 [ 100.468102][ T9815] ? netlink_unicast+0x7e0/0x7e0 [ 100.473028][ T9815] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 100.478558][ T9815] ? apparmor_socket_sendmsg+0x2a/0x30 [ 100.483999][ T9815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.490218][ T9815] ? security_socket_sendmsg+0x8d/0xc0 [ 100.495661][ T9815] ? netlink_unicast+0x7e0/0x7e0 [ 100.500582][ T9815] sock_sendmsg+0xd7/0x130 [ 100.504973][ T9815] ____sys_sendmsg+0x753/0x880 [ 100.509712][ T9815] ? kernel_sendmsg+0x50/0x50 [ 100.514384][ T9815] ? debug_object_active_state+0x28a/0x350 [ 100.520178][ T9815] ? find_held_lock+0x35/0x130 [ 100.524926][ T9815] ___sys_sendmsg+0x100/0x170 [ 100.529577][ T9815] ? sendmsg_copy_msghdr+0x70/0x70 [ 100.534672][ T9815] ? lockdep_hardirqs_on+0x421/0x5e0 [ 100.539932][ T9815] ? __kasan_check_read+0x11/0x20 [ 100.544929][ T9815] ? mark_lock+0xc2/0x1220 [ 100.549323][ T9815] ? __kasan_check_read+0x11/0x20 [ 100.554494][ T9815] ? __lock_acquire+0x16f2/0x4a00 [ 100.559496][ T9815] ? debug_object_deactivate+0x320/0x320 [ 100.565100][ T9815] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 100.571232][ T9815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.577452][ T9815] ? __fget_light+0x1ad/0x270 [ 100.582105][ T9815] ? __fdget+0x1b/0x20 [ 100.586160][ T9815] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 100.592374][ T9815] __sys_sendmsg+0x105/0x1d0 [ 100.596948][ T9815] ? __sys_sendmsg_sock+0xc0/0xc0 [ 100.601947][ T9815] ? lockdep_hardirqs_on+0x421/0x5e0 [ 100.607213][ T9815] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 100.612657][ T9815] ? do_syscall_64+0x26/0x790 [ 100.617313][ T9815] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.623367][ T9815] ? do_syscall_64+0x26/0x790 [ 100.628031][ T9815] __x64_sys_sendmsg+0x78/0xb0 [ 100.632777][ T9815] do_syscall_64+0xfa/0x790 [ 100.637266][ T9815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 100.643134][ T9815] RIP: 0033:0x446909 [ 100.647019][ T9815] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 9b d4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 100.666602][ T9815] RSP: 002b:00007ffe79e37e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.674997][ T9815] RAX: ffffffffffffffda RBX: 0000000000003064 RCX: 0000000000446909 [ 100.682953][ T9815] RDX: 0000000000000000 RSI: 0000000020001340 RDI: 0000000000000004 [ 100.690910][ T9815] RBP: 7261756765726977 R08: 0000000000000000 R09: 0000000001bbbbbb [ 100.699058][ T9815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 100.707013][ T9815] R13: 00000000004042c0 R14: 0000000000000000 R15: 0000000000000000