Warning: Permanently added '10.128.10.12' (ED25519) to the list of known hosts. [ 415.301599][T19219] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 415.309782][T19219] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 415.318203][T19219] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 415.326109][T19219] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 418.260502][ T53] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 418.268863][ T53] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 418.277248][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 418.278015][T19095] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 418.285364][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 418.300611][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 418.318622][T19822] netlink: 60 bytes leftover after parsing attributes in process `syz-executor197'. [ 418.332683][T19822] device wlan1 entered promiscuous mode [ 418.341017][T19822] team0: Port device wlan1 added [ 418.350157][T19822] [ 418.352523][T19822] ====================================================== [ 418.359538][T19822] WARNING: possible circular locking dependency detected [ 418.366645][T19822] syzkaller #0 Not tainted [ 418.371172][T19822] ------------------------------------------------------ [ 418.378200][T19822] syz-executor197/19822 is trying to acquire lock: [ 418.384829][T19822] ffff8881029d9c80 (team->team_lock_key){+.+.}-{3:3}, at: team_del_slave+0x29/0xe0 [ 418.394148][T19822] [ 418.394148][T19822] but task is already holding lock: [ 418.401766][T19822] ffff8881104e0628 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: nl80211_del_interface+0x65/0x200 [ 418.411516][T19822] [ 418.411516][T19822] which lock already depends on the new lock. [ 418.411516][T19822] [ 418.422086][T19822] [ 418.422086][T19822] the existing dependency chain (in reverse order) is: [ 418.431210][T19822] [ 418.431210][T19822] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 418.438946][T19822] __mutex_lock+0x60/0x660 [ 418.443900][T19822] ieee80211_open+0x92/0xd0 [ 418.448949][T19822] __dev_open+0x1b1/0x260 [ 418.453802][T19822] dev_open+0x75/0x120 [ 418.458441][T19822] team_add_slave+0x4d4/0xc40 [ 418.463655][T19822] do_set_master+0xe8/0x100 [ 418.468799][T19822] do_setlink+0x43e/0x1b90 [ 418.473736][T19822] __rtnl_newlink+0x82d/0xe60 [ 418.478998][T19822] rtnl_newlink+0x49/0x70 [ 418.483847][T19822] rtnetlink_rcv_msg+0x24f/0x8b0 [ 418.489307][T19822] netlink_rcv_skb+0x87/0x1d0 [ 418.494520][T19822] netlink_unicast+0x305/0x440 [ 418.499829][T19822] netlink_sendmsg+0x3b7/0x740 [ 418.505282][T19822] __sock_sendmsg+0x56/0x80 [ 418.510308][T19822] ____sys_sendmsg+0x36f/0x390 [ 418.515684][T19822] ___sys_sendmsg+0x8b/0xd0 [ 418.520907][T19822] __sys_sendmsg+0x88/0x100 [ 418.525954][T19822] do_syscall_64+0x33/0xb0 [ 418.530910][T19822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 418.537329][T19822] [ 418.537329][T19822] -> #0 (team->team_lock_key){+.+.}-{3:3}: [ 418.545505][T19822] __lock_acquire+0x10b6/0x1a40 [ 418.551004][T19822] lock_acquire+0xbb/0x290 [ 418.556039][T19822] __mutex_lock+0x60/0x660 [ 418.560981][T19822] team_del_slave+0x29/0xe0 [ 418.566010][T19822] team_device_event+0x5c/0x420 [ 418.571517][T19822] notifier_call_chain+0x5d/0x110 [ 418.577065][T19822] unregister_netdevice_many+0x501/0x8e0 [ 418.583278][T19822] unregister_netdevice_queue+0x116/0x120 [ 418.589609][T19822] _cfg80211_unregister_wdev+0x1e9/0x250 [ 418.595797][T19822] ieee80211_if_remove+0xac/0x120 [ 418.601352][T19822] ieee80211_del_iface+0x12/0x20 [ 418.606904][T19822] nl80211_del_interface+0xab/0x200 [ 418.612632][T19822] genl_family_rcv_msg_doit+0x113/0x180 [ 418.618712][T19822] genl_rcv_msg+0x178/0x2c0 [ 418.623842][T19822] netlink_rcv_skb+0x87/0x1d0 [ 418.629161][T19822] genl_rcv+0x24/0x40 [ 418.633674][T19822] netlink_unicast+0x305/0x440 [ 418.638972][T19822] netlink_sendmsg+0x3b7/0x740 [ 418.644352][T19822] __sock_sendmsg+0x56/0x80 [ 418.649376][T19822] ____sys_sendmsg+0x36f/0x390 [ 418.654664][T19822] ___sys_sendmsg+0x8b/0xd0 [ 418.659791][T19822] __sys_sendmsg+0x88/0x100 [ 418.664924][T19822] do_syscall_64+0x33/0xb0 [ 418.670092][T19822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 418.676510][T19822] [ 418.676510][T19822] other info that might help us debug this: [ 418.676510][T19822] [ 418.686729][T19822] Possible unsafe locking scenario: [ 418.686729][T19822] [ 418.694898][T19822] CPU0 CPU1 [ 418.700389][T19822] ---- ---- [ 418.706268][T19822] lock(&rdev->wiphy.mtx); [ 418.710794][T19822] lock(team->team_lock_key); [ 418.718101][T19822] lock(&rdev->wiphy.mtx); [ 418.725254][T19822] lock(team->team_lock_key); [ 418.730011][T19822] [ 418.730011][T19822] *** DEADLOCK *** [ 418.730011][T19822] [ 418.738186][T19822] 3 locks held by syz-executor197/19822: [ 418.743814][T19822] #0: ffffffff83acecb0 (cb_lock){++++}-{3:3}, at: genl_rcv+0x15/0x40 [ 418.752100][T19822] #1: ffffffff83abf028 (rtnl_mutex){+.+.}-{3:3}, at: nl80211_pre_doit+0x1a/0x2f0 [ 418.761322][T19822] #2: ffff8881104e0628 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: nl80211_del_interface+0x65/0x200 [ 418.771933][T19822] [ 418.771933][T19822] stack backtrace: [ 418.777898][T19822] CPU: 1 PID: 19822 Comm: syz-executor197 Not tainted syzkaller #0 [ 418.785798][T19822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 418.796357][T19822] Call Trace: [ 418.799836][T19822] [ 418.803092][T19822] dump_stack_lvl+0xcd/0x134 [ 418.807821][T19822] check_noncircular+0xcc/0xe0 [ 418.812589][T19822] __lock_acquire+0x10b6/0x1a40 [ 418.817571][T19822] lock_acquire+0xbb/0x290 [ 418.822072][T19822] ? team_del_slave+0x29/0xe0 [ 418.826757][T19822] __mutex_lock+0x60/0x660 [ 418.831205][T19822] ? team_del_slave+0x29/0xe0 [ 418.835891][T19822] ? team_del_slave+0x29/0xe0 [ 418.840582][T19822] ? lockdep_hardirqs_on_prepare+0xcd/0xf0 [ 418.846522][T19822] ? __local_bh_enable_ip+0x5d/0x90 [ 418.851716][T19822] ? trace_hardirqs_on+0x56/0x110 [ 418.856755][T19822] team_del_slave+0x29/0xe0 [ 418.861262][T19822] team_device_event+0x5c/0x420 [ 418.866152][T19822] notifier_call_chain+0x5d/0x110 [ 418.871281][T19822] unregister_netdevice_many+0x501/0x8e0 [ 418.876929][T19822] unregister_netdevice_queue+0x116/0x120 [ 418.882737][T19822] _cfg80211_unregister_wdev+0x1e9/0x250 [ 418.888376][T19822] ieee80211_if_remove+0xac/0x120 [ 418.893410][T19822] ieee80211_del_iface+0x12/0x20 [ 418.898347][T19822] nl80211_del_interface+0xab/0x200 [ 418.903554][T19822] ? cfg80211_off_channel_oper_allowed+0xb0/0xb0 [ 418.910087][T19822] genl_family_rcv_msg_doit+0x113/0x180 [ 418.915690][T19822] genl_rcv_msg+0x178/0x2c0 [ 418.920225][T19822] ? nl80211_flush_pmksa+0x200/0x200 [ 418.925532][T19822] netlink_rcv_skb+0x87/0x1d0 [ 418.930227][T19822] ? genl_get_cmd+0x1a0/0x1a0 [ 418.934997][T19822] genl_rcv+0x24/0x40 [ 418.939205][T19822] netlink_unicast+0x305/0x440 [ 418.943975][T19822] netlink_sendmsg+0x3b7/0x740 [ 418.948875][T19822] __sock_sendmsg+0x56/0x80 [ 418.953402][T19822] ____sys_sendmsg+0x36f/0x390 [ 418.958198][T19822] ? sendmsg_copy_msghdr+0x70/0xf0 [ 418.963312][T19822] ___sys_sendmsg+0x8b/0xd0 [ 418.967817][T19822] ? __lock_acquire+0x3b6/0x1a40 [ 418.972753][T19822] ? __fget_light+0x69/0xe0 [ 418.977261][T19822] __sys_sendmsg+0x88/0x100 [ 418.981766][T19822] ? lockdep_hardirqs_on_prepare+0xcd/0xf0 [ 418.987580][T19822] do_syscall_64+0x33/0xb0 [ 418.992007][T19822] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 418.997905][T19822] RIP: 0033:0x7fb8cb8c2469 [ 419.002351][T19822] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 419.022310][T19822] RSP: 002b:00007ffd5632f078 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 419.030727][T19822] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fb8cb8c2469 [ 419.038811][T19822] RDX: 0000000000000000 RSI: 0000000020000280 RDI: 0000000000000007 [ 419.046784][T19822] RBP: 0000000000000000 R08: 0000000000000000 R09: 00007ffd5632f100 [ 419.054870][T19822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 419.062937][T19822] R13: 0000000000000011 R14: 0000000000050012 R15: 0000000000000003 [ 419.071183][T19822] [ 419.075337][T19822] team0: Port device wlan1 removed [ 419.117659][T19822] syz-executor197 (19822) used greatest stack depth: 10992 bytes left