------------[ cut here ]------------ DEBUG_LOCKS_WARN_ON(1) WARNING: CPU: 1 PID: 48 at kernel/locking/lockdep.c:231 hlock_class kernel/locking/lockdep.c:231 [inline] WARNING: CPU: 1 PID: 48 at kernel/locking/lockdep.c:231 check_wait_context kernel/locking/lockdep.c:4772 [inline] WARNING: CPU: 1 PID: 48 at kernel/locking/lockdep.c:231 __lock_acquire+0x58c/0x2040 kernel/locking/lockdep.c:5092 Modules linked in: CPU: 1 UID: 0 PID: 48 Comm: kworker/1:1 Not tainted 6.11.0-rc2-syzkaller-00111-gee9a43b7cfe2 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker RIP: 0010:hlock_class kernel/locking/lockdep.c:231 [inline] RIP: 0010:check_wait_context kernel/locking/lockdep.c:4772 [inline] RIP: 0010:__lock_acquire+0x58c/0x2040 kernel/locking/lockdep.c:5092 Code: 00 00 83 3d 65 30 a8 0e 00 75 23 90 48 c7 c7 00 d4 0a 8c 48 c7 c6 a0 d6 0a 8c e8 ff d8 e5 ff 48 ba 00 00 00 00 00 fc ff df 90 <0f> 0b 90 90 90 31 db 48 81 c3 c4 00 00 00 48 89 d8 48 c1 e8 03 0f RSP: 0018:ffffc90000b86c90 EFLAGS: 00010046 RAX: 2a26541ea1e26100 RBX: 0000000000001420 RCX: ffff88801c285a00 RDX: dffffc0000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 000000000000000a R08: ffffffff8155a2d2 R09: 1ffff1101726519a R10: dffffc0000000000 R11: ffffed101726519b R12: ffff88801c285a00 R13: 0000000000001420 R14: 1ffff11003850caa R15: ffff88801c286550 FS: 0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007eff39a76f98 CR3: 0000000059704000 CR4: 0000000000350ef0 Call Trace: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5759 _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0xb0/0x140 kernel/sched/core.c:568 raw_spin_rq_lock kernel/sched/sched.h:1415 [inline] rq_lock kernel/sched/sched.h:1714 [inline] __schedule+0x357/0x4a60 kernel/sched/core.c:6436 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6851 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707 RIP: 0010:chacha_crypt_generic+0x4/0xad0 lib/crypto/libchacha.c:17 Code: 41 5f 5d e9 19 cb 3e 07 e8 49 63 04 07 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa <55> 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 e4 e0 48 81 ec 00 01 RSP: 0018:ffffc90000b872b8 EFLAGS: 00000293 RAX: ffffffff814bb698 RBX: ffffc90000b875c0 RCX: 0000000000000020 RDX: ffff8880130fe000 RSI: ffffc90000b875c0 RDI: ffffc90000b874f0 RBP: ffffc90000b87670 R08: 0000000000000014 R09: ffffc90000b875f0 R10: dffffc0000000000 R11: fffff52000170ec0 R12: dffffc0000000000 R13: ffffc90000b87550 R14: ffffc90000b874f0 R15: ffffc90000b875e0 chacha_crypt include/crypto/chacha.h:100 [inline] chacha20_crypt include/crypto/chacha.h:108 [inline] chacha20poly1305_crypt_sg_inplace+0x491/0xee0 lib/crypto/chacha20poly1305.c:245 chacha20poly1305_decrypt_sg_inplace+0x5a/0x80 lib/crypto/chacha20poly1305.c:351 decrypt_packet drivers/net/wireguard/receive.c:278 [inline] wg_packet_decrypt_worker+0x5e0/0xd80 drivers/net/wireguard/receive.c:501 process_one_work kernel/workqueue.c:3231 [inline] process_scheduled_works+0xa2e/0x1830 kernel/workqueue.c:3312 worker_thread+0x86d/0xd40 kernel/workqueue.c:3390 kthread+0x2f2/0x390 kernel/kthread.c:389 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ---------------- Code disassembly (best guess): 0: 41 5f pop %r15 2: 5d pop %rbp 3: e9 19 cb 3e 07 jmp 0x73ecb21 8: e8 49 63 04 07 call 0x7046356 d: 66 0f 1f 84 00 00 00 nopw 0x0(%rax,%rax,1) 14: 00 00 16: 90 nop 17: 90 nop 18: 90 nop 19: 90 nop 1a: 90 nop 1b: 90 nop 1c: 90 nop 1d: 90 nop 1e: 90 nop 1f: 90 nop 20: 90 nop 21: 90 nop 22: 90 nop 23: 90 nop 24: 90 nop 25: 90 nop 26: f3 0f 1e fa endbr64 * 2a: 55 push %rbp <-- trapping instruction 2b: 48 89 e5 mov %rsp,%rbp 2e: 41 57 push %r15 30: 41 56 push %r14 32: 41 55 push %r13 34: 41 54 push %r12 36: 53 push %rbx 37: 48 83 e4 e0 and $0xffffffffffffffe0,%rsp 3b: 48 rex.W 3c: 81 .byte 0x81 3d: ec in (%dx),%al 3e: 00 01 add %al,(%rcx)