Warning: Permanently added '10.128.0.210' (ECDSA) to the list of known hosts. 2020/02/01 07:22:36 parsed 1 programs 2020/02/01 07:22:38 executed programs: 0 syzkaller login: [ 105.413783][ T9920] IPVS: ftp: loaded support on port[0] = 21 [ 105.474692][ T9920] chnl_net:caif_netlink_parms(): no params data found [ 105.512452][ T9920] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.520203][ T9920] bridge0: port 1(bridge_slave_0) entered disabled state [ 105.528053][ T9920] device bridge_slave_0 entered promiscuous mode [ 105.536763][ T9920] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.544024][ T9920] bridge0: port 2(bridge_slave_1) entered disabled state [ 105.552012][ T9920] device bridge_slave_1 entered promiscuous mode [ 105.570605][ T9920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 105.581624][ T9920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.602921][ T9920] team0: Port device team_slave_0 added [ 105.610781][ T9920] team0: Port device team_slave_1 added [ 105.626236][ T9920] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 105.633332][ T9920] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.660273][ T9920] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 105.672687][ T9920] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 105.679816][ T9920] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 105.705817][ T9920] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 105.761087][ T9920] device hsr_slave_0 entered promiscuous mode [ 105.799177][ T9920] device hsr_slave_1 entered promiscuous mode [ 105.903885][ T9920] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 105.962052][ T9920] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 106.031126][ T9920] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 106.071294][ T9920] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 106.142290][ T9920] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.150038][ T9920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.157783][ T9920] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.164940][ T9920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.211835][ T9920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.225257][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.236013][ T2779] bridge0: port 1(bridge_slave_0) entered disabled state [ 106.244856][ T2779] bridge0: port 2(bridge_slave_1) entered disabled state [ 106.253544][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 106.266953][ T9920] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.278285][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.287434][ T2695] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.294764][ T2695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.307141][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.315686][ T2786] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.323001][ T2786] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.349003][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.357712][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.367238][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.377558][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.389865][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 106.402275][ T9920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 106.421625][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 106.429214][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 106.442906][ T9920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 106.463272][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 106.483159][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 106.492820][ T2779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.505088][ T9920] device veth0_vlan entered promiscuous mode [ 106.519926][ T9920] device veth1_vlan entered promiscuous mode [ 106.527849][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 106.536136][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 106.544042][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 106.567509][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 106.576162][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 106.585014][ T2695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 106.596181][ T9920] device veth0_macvtap entered promiscuous mode [ 106.606390][ T9920] device veth1_macvtap entered promiscuous mode [ 106.624498][ T9920] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 106.632342][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 106.641230][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 106.649534][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 106.658167][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 106.671440][ T9920] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 106.680815][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 106.689992][ T2786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 110.189952][T10338] [ 110.192628][T10338] ====================================================== [ 110.200059][T10338] WARNING: possible circular locking dependency detected [ 110.207167][T10338] 5.5.0-syzkaller #0 Not tainted [ 110.212177][T10338] ------------------------------------------------------ [ 110.219195][T10338] syz-executor.0/10338 is trying to acquire lock: [ 110.225639][T10338] ffff8880a8673928 ((wq_completion)wg-kex-wireguard0){+.+.}, at: flush_workqueue+0xf7/0x14c0 [ 110.236002][T10338] [ 110.236002][T10338] but task is already holding lock: [ 110.243361][T10338] ffff8880a7614e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 110.252944][T10338] [ 110.252944][T10338] which lock already depends on the new lock. [ 110.252944][T10338] [ 110.263694][T10338] [ 110.263694][T10338] the existing dependency chain (in reverse order) is: [ 110.273038][T10338] [ 110.273038][T10338] -> #2 (&wg->static_identity.lock){++++}: [ 110.281314][T10338] down_read+0x95/0x430 [ 110.286127][T10338] wg_noise_handshake_create_initiation+0xc0/0x670 [ 110.293388][T10338] wg_packet_send_handshake_initiation+0x185/0x250 [ 110.300566][T10338] wg_packet_handshake_send_worker+0x1d/0x30 [ 110.307372][T10338] process_one_work+0xa05/0x17a0 [ 110.313019][T10338] worker_thread+0x98/0xe40 [ 110.318225][T10338] kthread+0x361/0x430 [ 110.323263][T10338] ret_from_fork+0x24/0x30 [ 110.329003][T10338] [ 110.329003][T10338] -> #1 ((work_completion)(&peer->transmit_handshake_work)){+.+.}: [ 110.339233][T10338] process_one_work+0x972/0x17a0 [ 110.344885][T10338] worker_thread+0x98/0xe40 [ 110.350215][T10338] kthread+0x361/0x430 [ 110.354910][T10338] ret_from_fork+0x24/0x30 [ 110.359948][T10338] [ 110.359948][T10338] -> #0 ((wq_completion)wg-kex-wireguard0){+.+.}: [ 110.368859][T10338] __lock_acquire+0x2596/0x4a00 [ 110.374853][T10338] lock_acquire+0x190/0x410 [ 110.379961][T10338] flush_workqueue+0x126/0x14c0 [ 110.385464][T10338] peer_remove_after_dead+0x16b/0x230 [ 110.391447][T10338] wg_peer_remove+0x244/0x340 [ 110.396797][T10338] wg_set_device+0xf76/0x1350 [ 110.401995][T10338] genl_rcv_msg+0x67d/0xea0 [ 110.407419][T10338] netlink_rcv_skb+0x177/0x450 [ 110.413036][T10338] genl_rcv+0x29/0x40 [ 110.417839][T10338] netlink_unicast+0x59e/0x7e0 [ 110.423197][T10338] netlink_sendmsg+0x91c/0xea0 [ 110.428648][T10338] sock_sendmsg+0xd7/0x130 [ 110.433891][T10338] ____sys_sendmsg+0x753/0x880 [ 110.439482][T10338] ___sys_sendmsg+0x100/0x170 [ 110.444792][T10338] __sys_sendmsg+0x105/0x1d0 [ 110.450044][T10338] __x64_sys_sendmsg+0x78/0xb0 [ 110.455588][T10338] do_syscall_64+0xfa/0x790 [ 110.460606][T10338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.467042][T10338] [ 110.467042][T10338] other info that might help us debug this: [ 110.467042][T10338] [ 110.477532][T10338] Chain exists of: [ 110.477532][T10338] (wq_completion)wg-kex-wireguard0 --> (work_completion)(&peer->transmit_handshake_work) --> &wg->static_identity.lock [ 110.477532][T10338] [ 110.496234][T10338] Possible unsafe locking scenario: [ 110.496234][T10338] [ 110.503842][T10338] CPU0 CPU1 [ 110.509400][T10338] ---- ---- [ 110.514787][T10338] lock(&wg->static_identity.lock); [ 110.520076][T10338] lock((work_completion)(&peer->transmit_handshake_work)); [ 110.530297][T10338] lock(&wg->static_identity.lock); [ 110.538245][T10338] lock((wq_completion)wg-kex-wireguard0); [ 110.544131][T10338] [ 110.544131][T10338] *** DEADLOCK *** [ 110.544131][T10338] [ 110.552279][T10338] 5 locks held by syz-executor.0/10338: [ 110.557852][T10338] #0: ffffffff8a78c128 (cb_lock){++++}, at: genl_rcv+0x1a/0x40 [ 110.565665][T10338] #1: ffffffff8a78c1e0 (genl_mutex){+.+.}, at: genl_rcv_msg+0x7de/0xea0 [ 110.574177][T10338] #2: ffffffff8a7363c0 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 110.582543][T10338] #3: ffff8880a76150a0 (&wg->device_update_lock){+.+.}, at: wg_set_device+0x2be/0x1350 [ 110.592379][T10338] #4: ffff8880a7614e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350 [ 110.602570][T10338] [ 110.602570][T10338] stack backtrace: [ 110.608463][T10338] CPU: 0 PID: 10338 Comm: syz-executor.0 Not tainted 5.5.0-syzkaller #0 [ 110.617303][T10338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.627597][T10338] Call Trace: [ 110.631032][T10338] dump_stack+0x197/0x210 [ 110.635531][T10338] print_circular_bug.isra.0.cold+0x163/0x172 [ 110.642249][T10338] check_noncircular+0x32e/0x3e0 [ 110.647708][T10338] ? print_circular_bug.isra.0+0x230/0x230 [ 110.653583][T10338] ? profile_setup.cold+0xbb/0xbb [ 110.659017][T10338] ? alloc_list_entry+0xc0/0xc0 [ 110.664091][T10338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.670519][T10338] ? find_first_zero_bit+0x9a/0xc0 [ 110.676038][T10338] __lock_acquire+0x2596/0x4a00 [ 110.680896][T10338] ? check_noncircular+0x16d/0x3e0 [ 110.686009][T10338] ? mark_held_locks+0xf0/0xf0 [ 110.690941][T10338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.697188][T10338] ? find_first_zero_bit+0x9a/0xc0 [ 110.702626][T10338] lock_acquire+0x190/0x410 [ 110.707136][T10338] ? flush_workqueue+0xf7/0x14c0 [ 110.712201][T10338] flush_workqueue+0x126/0x14c0 [ 110.717219][T10338] ? flush_workqueue+0xf7/0x14c0 [ 110.722161][T10338] ? napi_hash_del+0x125/0x170 [ 110.727055][T10338] ? lock_downgrade+0x920/0x920 [ 110.732193][T10338] ? pwq_unbound_release_workfn+0x2f0/0x2f0 [ 110.738227][T10338] ? _raw_spin_unlock+0x28/0x40 [ 110.743194][T10338] ? kfree_skb+0x10e/0x420 [ 110.747715][T10338] peer_remove_after_dead+0x16b/0x230 [ 110.753216][T10338] ? peer_remove_after_dead+0x16b/0x230 [ 110.758925][T10338] wg_peer_remove+0x244/0x340 [ 110.763720][T10338] wg_set_device+0xf76/0x1350 [ 110.768427][T10338] ? set_peer+0x1150/0x1150 [ 110.773210][T10338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.779454][T10338] ? __nla_parse+0x43/0x60 [ 110.784203][T10338] ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300 [ 110.790722][T10338] genl_rcv_msg+0x67d/0xea0 [ 110.795394][T10338] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 110.801939][T10338] ? __kasan_check_read+0x11/0x20 [ 110.806974][T10338] ? find_held_lock+0x35/0x130 [ 110.811928][T10338] netlink_rcv_skb+0x177/0x450 [ 110.816976][T10338] ? genl_family_rcv_msg_attrs_parse+0x300/0x300 [ 110.823498][T10338] ? netlink_ack+0xb50/0xb50 [ 110.828236][T10338] ? __kasan_check_write+0x14/0x20 [ 110.833394][T10338] ? netlink_deliver_tap+0x248/0xbf0 [ 110.838998][T10338] genl_rcv+0x29/0x40 [ 110.843186][T10338] netlink_unicast+0x59e/0x7e0 [ 110.847958][T10338] ? netlink_attachskb+0x870/0x870 [ 110.853156][T10338] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 110.859093][T10338] ? __check_object_size+0x3d/0x437 [ 110.864548][T10338] netlink_sendmsg+0x91c/0xea0 [ 110.869315][T10338] ? netlink_unicast+0x7e0/0x7e0 [ 110.874433][T10338] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 110.879979][T10338] ? apparmor_socket_sendmsg+0x2a/0x30 [ 110.885738][T10338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.892296][T10338] ? security_socket_sendmsg+0x8d/0xc0 [ 110.897980][T10338] ? netlink_unicast+0x7e0/0x7e0 [ 110.902923][T10338] sock_sendmsg+0xd7/0x130 [ 110.907658][T10338] ____sys_sendmsg+0x753/0x880 [ 110.912505][T10338] ? kernel_sendmsg+0x50/0x50 [ 110.917226][T10338] ? __fget_files+0x337/0x520 [ 110.922026][T10338] ? find_held_lock+0x35/0x130 [ 110.926866][T10338] ___sys_sendmsg+0x100/0x170 [ 110.931660][T10338] ? sendmsg_copy_msghdr+0x70/0x70 [ 110.936850][T10338] ? __kasan_check_read+0x11/0x20 [ 110.941883][T10338] ? __fget_files+0x359/0x520 [ 110.946554][T10338] ? ksys_dup3+0x3e0/0x3e0 [ 110.951227][T10338] ? __fget_light+0x1ad/0x270 [ 110.956050][T10338] ? __fdget+0x1b/0x20 [ 110.960190][T10338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.966653][T10338] __sys_sendmsg+0x105/0x1d0 [ 110.971552][T10338] ? __sys_sendmsg_sock+0xc0/0xc0 [ 110.976794][T10338] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 110.982347][T10338] ? do_syscall_64+0x26/0x790 [ 110.987240][T10338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 110.993926][T10338] ? do_syscall_64+0x26/0x790 [ 110.998904][T10338] __x64_sys_sendmsg+0x78/0xb0 [ 111.003749][T10338] do_syscall_64+0xfa/0x790 [ 111.008285][T10338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 111.014356][T10338] RIP: 0033:0x45b399 [ 111.018335][T10338] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 2020/02/01 07:22:44 executed programs: 107 [ 111.038393][T10338] RSP: 002b:00007fbe4c02fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 111.046941][T10338] RAX: ffffffffffffffda RBX: 00007fbe4c0306d4 RCX: 000000000045b399 [ 111.055315][T10338] RDX: 0000000000000000 RSI: 0000000020001340 RDI: 0000000000000004 [ 111.063535][T10338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 111.071691][T10338] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 111.079980][T10338] R13: 00000000000009ba R14: 00000000004cb2b8 R15: 000000000075bf2c 2020/02/01 07:22:49 executed programs: 332