Warning: Permanently added '10.128.0.89' (ECDSA) to the list of known hosts. 2020/02/02 16:51:00 parsed 1 programs 2020/02/02 16:51:02 executed programs: 0 syzkaller login: [ 120.562248][ T9906] IPVS: ftp: loaded support on port[0] = 21 [ 120.622195][ T9906] chnl_net:caif_netlink_parms(): no params data found [ 120.659489][ T9906] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.667149][ T9906] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.675318][ T9906] device bridge_slave_0 entered promiscuous mode [ 120.684034][ T9906] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.691500][ T9906] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.699440][ T9906] device bridge_slave_1 entered promiscuous mode [ 120.716993][ T9906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 120.728098][ T9906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 120.748501][ T9906] team0: Port device team_slave_0 added [ 120.756854][ T9906] team0: Port device team_slave_1 added [ 120.772814][ T9906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 120.780796][ T9906] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 120.807205][ T9906] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 120.820065][ T9906] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 120.827127][ T9906] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 120.853371][ T9906] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 120.960663][ T9906] device hsr_slave_0 entered promiscuous mode [ 121.018993][ T9906] device hsr_slave_1 entered promiscuous mode [ 121.131600][ T9906] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 121.201929][ T9906] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 121.270985][ T9906] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 121.321571][ T9906] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 121.381180][ T9906] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.388380][ T9906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.396429][ T9906] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.403588][ T9906] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.447904][ T9906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.462214][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.473282][ T2973] bridge0: port 1(bridge_slave_0) entered disabled state [ 121.481606][ T2973] bridge0: port 2(bridge_slave_1) entered disabled state [ 121.490395][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 121.504913][ T9906] 8021q: adding VLAN 0 to HW filter on device team0 [ 121.515807][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.525613][ T2702] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.533058][ T2702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.544912][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.554440][ T2973] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.562020][ T2973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.580512][ T2939] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.599756][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 121.608409][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.617998][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.626474][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.647923][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 121.656340][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 121.672556][ T9906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 121.690798][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 121.700106][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 121.724791][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 121.734969][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 121.744987][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 121.753033][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 121.762472][ T9906] device veth0_vlan entered promiscuous mode [ 121.775175][ T9906] device veth1_vlan entered promiscuous mode [ 121.796122][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 121.805280][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 121.813876][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 121.822725][ T2973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 121.833557][ T9906] device veth0_macvtap entered promiscuous mode [ 121.844425][ T9906] device veth1_macvtap entered promiscuous mode [ 121.862673][ T9906] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 121.871402][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 121.880883][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 121.889416][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 121.898091][ T2702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 121.911297][ T9906] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 121.919857][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 121.928539][ T2690] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2020/02/02 16:51:07 executed programs: 113 2020/02/02 16:51:12 executed programs: 281 2020/02/02 16:51:17 executed programs: 451 [ 136.570484][T11771] [ 136.572961][T11771] ====================================================== [ 136.580202][T11771] WARNING: possible circular locking dependency detected [ 136.587216][T11771] 5.5.0-syzkaller #0 Not tainted [ 136.592188][T11771] ------------------------------------------------------ [ 136.599193][T11771] syz-executor.0/11771 is trying to acquire lock: [ 136.605649][T11771] ffff8880a7c57928 ((wq_completion)wg-kex-wireguard0){+.+.}, at: flush_workqueue+0xf7/0x14c0 [ 136.615886][T11771] [ 136.615886][T11771] but task is already holding lock: [ 136.623242][T11771] ffff88808bc38e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 136.632764][T11771] [ 136.632764][T11771] which lock already depends on the new lock. [ 136.632764][T11771] [ 136.643150][T11771] [ 136.643150][T11771] the existing dependency chain (in reverse order) is: [ 136.652355][T11771] [ 136.652355][T11771] -> #2 (&wg->static_identity.lock){++++}: [ 136.660336][T11771] down_read+0x95/0x430 [ 136.665060][T11771] wg_noise_handshake_create_initiation+0xc0/0x670 [ 136.672188][T11771] wg_packet_send_handshake_initiation+0x185/0x250 [ 136.679210][T11771] wg_packet_handshake_send_worker+0x1d/0x30 [ 136.685705][T11771] process_one_work+0xa05/0x17a0 [ 136.691159][T11771] worker_thread+0x98/0xe40 [ 136.696360][T11771] kthread+0x361/0x430 [ 136.701084][T11771] ret_from_fork+0x24/0x30 [ 136.706005][T11771] [ 136.706005][T11771] -> #1 ((work_completion)(&peer->transmit_handshake_work)){+.+.}: [ 136.716166][T11771] process_one_work+0x972/0x17a0 [ 136.721718][T11771] worker_thread+0x98/0xe40 [ 136.727436][T11771] kthread+0x361/0x430 [ 136.732051][T11771] ret_from_fork+0x24/0x30 [ 136.737116][T11771] [ 136.737116][T11771] -> #0 ((wq_completion)wg-kex-wireguard0){+.+.}: [ 136.745837][T11771] __lock_acquire+0x2596/0x4a00 [ 136.751220][T11771] lock_acquire+0x190/0x410 [ 136.756222][T11771] flush_workqueue+0x126/0x14c0 [ 136.761585][T11771] peer_remove_after_dead+0x16b/0x230 [ 136.767467][T11771] wg_peer_remove+0x244/0x340 [ 136.772658][T11771] wg_set_device+0xf76/0x1350 [ 136.777836][T11771] genl_rcv_msg+0x67d/0xea0 [ 136.782930][T11771] netlink_rcv_skb+0x177/0x450 [ 136.788324][T11771] genl_rcv+0x29/0x40 [ 136.792866][T11771] netlink_unicast+0x59e/0x7e0 [ 136.798135][T11771] netlink_sendmsg+0x91c/0xea0 [ 136.803467][T11771] sock_sendmsg+0xd7/0x130 [ 136.808390][T11771] ____sys_sendmsg+0x753/0x880 [ 136.813712][T11771] ___sys_sendmsg+0x100/0x170 [ 136.818904][T11771] __sys_sendmsg+0x105/0x1d0 [ 136.824006][T11771] __x64_sys_sendmsg+0x78/0xb0 [ 136.829273][T11771] do_syscall_64+0xfa/0x790 [ 136.834289][T11771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 136.840705][T11771] [ 136.840705][T11771] other info that might help us debug this: [ 136.840705][T11771] [ 136.850921][T11771] Chain exists of: [ 136.850921][T11771] (wq_completion)wg-kex-wireguard0 --> (work_completion)(&peer->transmit_handshake_work) --> &wg->static_identity.lock [ 136.850921][T11771] [ 136.869380][T11771] Possible unsafe locking scenario: [ 136.869380][T11771] [ 136.876830][T11771] CPU0 CPU1 [ 136.882186][T11771] ---- ---- [ 136.887543][T11771] lock(&wg->static_identity.lock); [ 136.892964][T11771] lock((work_completion)(&peer->transmit_handshake_work)); [ 136.902927][T11771] lock(&wg->static_identity.lock); [ 136.910860][T11771] lock((wq_completion)wg-kex-wireguard0); [ 136.916755][T11771] [ 136.916755][T11771] *** DEADLOCK *** [ 136.916755][T11771] [ 136.924958][T11771] 5 locks held by syz-executor.0/11771: [ 136.930486][T11771] #0: ffffffff8a796128 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 136.938229][T11771] #1: ffffffff8a7961e0 (genl_mutex){+.+.}, at: genl_rcv_msg+0x7de/0xea0 [ 136.946744][T11771] #2: ffffffff8a7403c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 136.954759][T11771] #3: ffff88808bc390a0 (&wg->device_update_lock){+.+.}, at: wg_set_device+0x2be/0x1350 [ 136.964473][T11771] #4: ffff88808bc38e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 136.974360][T11771] [ 136.974360][T11771] stack backtrace: [ 136.980245][T11771] CPU: 1 PID: 11771 Comm: syz-executor.0 Not tainted 5.5.0-syzkaller #0 [ 136.988655][T11771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.998708][T11771] Call Trace: [ 137.002025][T11771] dump_stack+0x197/0x210 [ 137.006354][T11771] print_circular_bug.isra.0.cold+0x163/0x172 [ 137.012550][T11771] check_noncircular+0x32e/0x3e0 [ 137.017518][T11771] ? print_circular_bug.isra.0+0x230/0x230 [ 137.023324][T11771] ? alloc_list_entry+0xc0/0xc0 [ 137.028172][T11771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 137.034493][T11771] ? find_first_zero_bit+0x9a/0xc0 [ 137.039600][T11771] __lock_acquire+0x2596/0x4a00 [ 137.044450][T11771] ? mark_held_locks+0xf0/0xf0 [ 137.049377][T11771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 137.055668][T11771] ? find_first_zero_bit+0x9a/0xc0 [ 137.060854][T11771] lock_acquire+0x190/0x410 [ 137.065474][T11771] ? flush_workqueue+0xf7/0x14c0 [ 137.070402][T11771] flush_workqueue+0x126/0x14c0 [ 137.075508][T11771] ? flush_workqueue+0xf7/0x14c0 [ 137.080665][T11771] ? napi_hash_del+0x125/0x170 [ 137.085413][T11771] ? lock_downgrade+0x920/0x920 [ 137.090255][T11771] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 137.096135][T11771] ? _raw_spin_unlock+0x28/0x40 [ 137.100988][T11771] ? kfree_skb+0x10e/0x420 [ 137.105452][T11771] peer_remove_after_dead+0x16b/0x230 [ 137.110816][T11771] ? peer_remove_after_dead+0x16b/0x230 [ 137.116342][T11771] wg_peer_remove+0x244/0x340 [ 137.121119][T11771] wg_set_device+0xf76/0x1350 [ 137.125864][T11771] ? set_peer+0x1150/0x1150 [ 137.130376][T11771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.136609][T11771] ? __nla_parse+0x43/0x60 [ 137.141020][T11771] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 137.147344][T11771] genl_rcv_msg+0x67d/0xea0 [ 137.151832][T11771] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 137.158400][T11771] ? kmem_cache_alloc+0x58e/0x710 [ 137.163524][T11771] ? find_held_lock+0x35/0x130 [ 137.168331][T11771] netlink_rcv_skb+0x177/0x450 [ 137.173105][T11771] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 137.179421][T11771] ? netlink_ack+0xb50/0xb50 [ 137.184011][T11771] ? __kasan_check_write+0x14/0x20 [ 137.189114][T11771] ? netlink_deliver_tap+0x248/0xbf0 [ 137.194483][T11771] genl_rcv+0x29/0x40 [ 137.198450][T11771] netlink_unicast+0x59e/0x7e0 [ 137.203219][T11771] ? netlink_attachskb+0x870/0x870 [ 137.208327][T11771] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 137.214045][T11771] ? __check_object_size+0x3d/0x437 [ 137.219444][T11771] netlink_sendmsg+0x91c/0xea0 [ 137.224199][T11771] ? netlink_unicast+0x7e0/0x7e0 [ 137.229130][T11771] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 137.234673][T11771] ? apparmor_socket_sendmsg+0x2a/0x30 [ 137.240117][T11771] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 137.246363][T11771] ? security_socket_sendmsg+0x8d/0xc0 [ 137.251940][T11771] ? netlink_unicast+0x7e0/0x7e0 [ 137.256895][T11771] sock_sendmsg+0xd7/0x130 [ 137.261305][T11771] ____sys_sendmsg+0x753/0x880 [ 137.266084][T11771] ? kernel_sendmsg+0x50/0x50 [ 137.270763][T11771] ? __fget_files+0x337/0x520 [ 137.275431][T11771] ? find_held_lock+0x35/0x130 [ 137.280204][T11771] ___sys_sendmsg+0x100/0x170 [ 137.284877][T11771] ? sendmsg_copy_msghdr+0x70/0x70 [ 137.289982][T11771] ? __kasan_check_read+0x11/0x20 [ 137.295050][T11771] ? __fget_files+0x359/0x520 [ 137.299748][T11771] ? ksys_dup3+0x3e0/0x3e0 [ 137.304296][T11771] ? __fget_light+0x1ad/0x270 [ 137.309127][T11771] ? __fdget+0x1b/0x20 [ 137.313179][T11771] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 137.319404][T11771] __sys_sendmsg+0x105/0x1d0 [ 137.324148][T11771] ? __sys_sendmsg_sock+0xc0/0xc0 [ 137.329332][T11771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 137.334936][T11771] ? do_syscall_64+0x26/0x790 [ 137.339761][T11771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.345824][T11771] ? do_syscall_64+0x26/0x790 [ 137.350495][T11771] __x64_sys_sendmsg+0x78/0xb0 [ 137.355244][T11771] do_syscall_64+0xfa/0x790 [ 137.359744][T11771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 137.365640][T11771] RIP: 0033:0x45b399 [ 137.369535][T11771] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.389136][T11771] RSP: 002b:00007f2d283d2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.397542][T11771] RAX: ffffffffffffffda RBX: 00007f2d283d36d4 RCX: 000000000045b399 [ 137.405508][T11771] RDX: 0000000000000000 RSI: 0000000020001340 RDI: 0000000000000004 [ 137.413481][T11771] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 137.421563][T11771] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 137.429522][T11771] R13: 00000000000009ba R14: 00000000004cb2b8 R15: 000000000075bf2c