Warning: Permanently added '10.128.0.233' (ECDSA) to the list of known hosts.
syzkaller login: [  105.678093][ T9739] IPVS: ftp: loaded support on port[0] = 21
[  105.728731][ T9739] chnl_net:caif_netlink_parms(): no params data found
[  105.763048][ T9739] bridge0: port 1(bridge_slave_0) entered blocking state
[  105.770451][ T9739] bridge0: port 1(bridge_slave_0) entered disabled state
[  105.778757][ T9739] device bridge_slave_0 entered promiscuous mode
[  105.786982][ T9739] bridge0: port 2(bridge_slave_1) entered blocking state
[  105.794450][ T9739] bridge0: port 2(bridge_slave_1) entered disabled state
[  105.802032][ T9739] device bridge_slave_1 entered promiscuous mode
[  105.820311][ T9739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  105.831086][ T9739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  105.851419][ T9739] team0: Port device team_slave_0 added
[  105.858994][ T9739] team0: Port device team_slave_1 added
[  105.873892][ T9739] batman_adv: batadv0: Adding interface: batadv_slave_0
[  105.880853][ T9739] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  105.906961][ T9739] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  105.919859][ T9739] batman_adv: batadv0: Adding interface: batadv_slave_1
[  105.926922][ T9739] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  105.952892][ T9739] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  106.025873][ T9739] device hsr_slave_0 entered promiscuous mode
[  106.093487][ T9739] device hsr_slave_1 entered promiscuous mode
[  106.229473][ T9739] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  106.306208][ T9739] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  106.346213][ T9739] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  106.386052][ T9739] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  106.446873][ T9739] bridge0: port 2(bridge_slave_1) entered blocking state
[  106.454058][ T9739] bridge0: port 2(bridge_slave_1) entered forwarding state
[  106.461604][ T9739] bridge0: port 1(bridge_slave_0) entered blocking state
[  106.468726][ T9739] bridge0: port 1(bridge_slave_0) entered forwarding state
[  106.514269][ T9739] 8021q: adding VLAN 0 to HW filter on device bond0
[  106.527157][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  106.537285][ T2859] bridge0: port 1(bridge_slave_0) entered disabled state
[  106.545340][ T2859] bridge0: port 2(bridge_slave_1) entered disabled state
[  106.553504][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  106.566130][ T9739] 8021q: adding VLAN 0 to HW filter on device team0
[  106.577124][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  106.585589][ T2856] bridge0: port 1(bridge_slave_0) entered blocking state
[  106.592639][ T2856] bridge0: port 1(bridge_slave_0) entered forwarding state
[  106.604036][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  106.612429][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state
[  106.619788][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state
[  106.647272][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  106.657787][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  106.666465][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  106.674688][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  106.682977][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  106.693918][ T9739] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  106.711805][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  106.719320][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  106.731929][ T9739] 8021q: adding VLAN 0 to HW filter on device batadv0
[  106.749490][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  106.759802][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  106.784264][ T9739] device veth0_vlan entered promiscuous mode
[  106.793303][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  106.802017][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  106.811230][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  106.820200][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  106.829755][ T9739] device veth1_vlan entered promiscuous mode
[  106.849914][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  106.858025][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  106.866076][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready
[  106.874611][ T2856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[  106.886159][ T9739] device veth0_macvtap entered promiscuous mode
[  106.896168][ T9739] device veth1_macvtap entered promiscuous mode
[  106.912483][ T9739] batman_adv: batadv0: Interface activated: batadv_slave_0
[  106.920296][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[  106.929163][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready
[  106.937372][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready
[  106.946096][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[  106.957606][ T9739] batman_adv: batadv0: Interface activated: batadv_slave_1
[  106.965693][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready
[  106.974281][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[  107.124339][ T9739] 
[  107.126707][ T9739] ======================================================
[  107.133705][ T9739] WARNING: possible circular locking dependency detected
[  107.140753][ T9739] 5.5.0-syzkaller #0 Not tainted
[  107.145668][ T9739] ------------------------------------------------------
[  107.152669][ T9739] syz-executor284/9739 is trying to acquire lock:
[  107.159206][ T9739] ffff8880a92a6128 ((wq_completion)wg-kex-wireguard0){+.+.}, at: flush_workqueue+0xf7/0x14c0
[  107.169341][ T9739] 
[  107.169341][ T9739] but task is already holding lock:
[  107.176733][ T9739] ffff8880a2c50e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350
[  107.186177][ T9739] 
[  107.186177][ T9739] which lock already depends on the new lock.
[  107.186177][ T9739] 
[  107.196568][ T9739] 
[  107.196568][ T9739] the existing dependency chain (in reverse order) is:
[  107.205563][ T9739] 
[  107.205563][ T9739] -> #2 (&wg->static_identity.lock){++++}:
[  107.213623][ T9739]        down_read+0x95/0x430
[  107.218322][ T9739]        wg_noise_handshake_create_initiation+0xc0/0x670
[  107.225808][ T9739]        wg_packet_send_handshake_initiation+0x185/0x250
[  107.232815][ T9739]        wg_packet_handshake_send_worker+0x1d/0x30
[  107.239296][ T9739]        process_one_work+0xa05/0x17a0
[  107.244744][ T9739]        worker_thread+0x98/0xe40
[  107.249761][ T9739]        kthread+0x361/0x430
[  107.254336][ T9739]        ret_from_fork+0x24/0x30
[  107.259275][ T9739] 
[  107.259275][ T9739] -> #1 ((work_completion)(&peer->transmit_handshake_work)){+.+.}:
[  107.269326][ T9739]        process_one_work+0x972/0x17a0
[  107.274806][ T9739]        worker_thread+0x98/0xe40
[  107.279817][ T9739]        kthread+0x361/0x430
[  107.284388][ T9739]        ret_from_fork+0x24/0x30
[  107.289300][ T9739] 
[  107.289300][ T9739] -> #0 ((wq_completion)wg-kex-wireguard0){+.+.}:
[  107.297876][ T9739]        __lock_acquire+0x2596/0x4a00
[  107.303236][ T9739]        lock_acquire+0x190/0x410
[  107.308271][ T9739]        flush_workqueue+0x126/0x14c0
[  107.313651][ T9739]        peer_remove_after_dead+0x16b/0x230
[  107.319542][ T9739]        wg_peer_remove+0x244/0x340
[  107.324731][ T9739]        wg_set_device+0xf76/0x1350
[  107.329907][ T9739]        genl_rcv_msg+0x67d/0xea0
[  107.334905][ T9739]        netlink_rcv_skb+0x177/0x450
[  107.340169][ T9739]        genl_rcv+0x29/0x40
[  107.344651][ T9739]        netlink_unicast+0x59e/0x7e0
[  107.350015][ T9739]        netlink_sendmsg+0x91c/0xea0
[  107.355279][ T9739]        sock_sendmsg+0xd7/0x130
[  107.360195][ T9739]        ____sys_sendmsg+0x753/0x880
[  107.365477][ T9739]        ___sys_sendmsg+0x100/0x170
[  107.370666][ T9739]        __sys_sendmsg+0x105/0x1d0
[  107.375752][ T9739]        __x64_sys_sendmsg+0x78/0xb0
[  107.381021][ T9739]        do_syscall_64+0xfa/0x790
[  107.386030][ T9739]        entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  107.392416][ T9739] 
[  107.392416][ T9739] other info that might help us debug this:
[  107.392416][ T9739] 
[  107.402664][ T9739] Chain exists of:
[  107.402664][ T9739]   (wq_completion)wg-kex-wireguard0 --> (work_completion)(&peer->transmit_handshake_work) --> &wg->static_identity.lock
[  107.402664][ T9739] 
[  107.420975][ T9739]  Possible unsafe locking scenario:
[  107.420975][ T9739] 
[  107.428406][ T9739]        CPU0                    CPU1
[  107.433752][ T9739]        ----                    ----
[  107.439097][ T9739]   lock(&wg->static_identity.lock);
[  107.444354][ T9739]                                lock((work_completion)(&peer->transmit_handshake_work));
[  107.454216][ T9739]                                lock(&wg->static_identity.lock);
[  107.462003][ T9739]   lock((wq_completion)wg-kex-wireguard0);
[  107.467872][ T9739] 
[  107.467872][ T9739]  *** DEADLOCK ***
[  107.467872][ T9739] 
[  107.476014][ T9739] 5 locks held by syz-executor284/9739:
[  107.481537][ T9739]  #0: ffffffff8a7899e8 (cb_lock){++++}, at: genl_rcv+0x1a/0x40
[  107.489158][ T9739]  #1: ffffffff8a789aa0 (genl_mutex){+.+.}, at: genl_rcv_msg+0x7de/0xea0
[  107.497560][ T9739]  #2: ffffffff8a733c80 (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20
[  107.505561][ T9739]  #3: ffff8880a2c510a0 (&wg->device_update_lock){+.+.}, at: wg_set_device+0x2be/0x1350
[  107.515291][ T9739]  #4: ffff8880a2c50e80 (&wg->static_identity.lock){++++}, at: wg_set_device+0xe8b/0x1350
[  107.525256][ T9739] 
[  107.525256][ T9739] stack backtrace:
[  107.531152][ T9739] CPU: 0 PID: 9739 Comm: syz-executor284 Not tainted 5.5.0-syzkaller #0
[  107.539484][ T9739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  107.549576][ T9739] Call Trace:
[  107.552849][ T9739]  dump_stack+0x197/0x210
[  107.557169][ T9739]  print_circular_bug.isra.0.cold+0x163/0x172
[  107.563227][ T9739]  check_noncircular+0x32e/0x3e0
[  107.568176][ T9739]  ? print_circular_bug.isra.0+0x230/0x230
[  107.573970][ T9739]  ? profile_setup.cold+0xbb/0xbb
[  107.578978][ T9739]  ? alloc_list_entry+0xc0/0xc0
[  107.583857][ T9739]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  107.590121][ T9739]  ? find_first_zero_bit+0x9a/0xc0
[  107.595222][ T9739]  __lock_acquire+0x2596/0x4a00
[  107.600061][ T9739]  ? check_noncircular+0x16d/0x3e0
[  107.605156][ T9739]  ? mark_held_locks+0xf0/0xf0
[  107.609907][ T9739]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  107.616258][ T9739]  ? find_first_zero_bit+0x9a/0xc0
[  107.621478][ T9739]  lock_acquire+0x190/0x410
[  107.626006][ T9739]  ? flush_workqueue+0xf7/0x14c0
[  107.630946][ T9739]  flush_workqueue+0x126/0x14c0
[  107.635815][ T9739]  ? flush_workqueue+0xf7/0x14c0
[  107.640779][ T9739]  ? napi_hash_del+0x125/0x170
[  107.645542][ T9739]  ? lock_downgrade+0x920/0x920
[  107.650369][ T9739]  ? pwq_unbound_release_workfn+0x2f0/0x2f0
[  107.656246][ T9739]  ? _raw_spin_unlock+0x28/0x40
[  107.661072][ T9739]  ? kfree_skb+0x10e/0x420
[  107.665498][ T9739]  peer_remove_after_dead+0x16b/0x230
[  107.670844][ T9739]  ? peer_remove_after_dead+0x16b/0x230
[  107.676373][ T9739]  wg_peer_remove+0x244/0x340
[  107.681045][ T9739]  wg_set_device+0xf76/0x1350
[  107.685712][ T9739]  ? set_peer+0x1150/0x1150
[  107.690221][ T9739]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  107.696442][ T9739]  ? __nla_parse+0x43/0x60
[  107.700841][ T9739]  ? genl_family_rcv_msg_attrs_parse+0x1c6/0x300
[  107.707154][ T9739]  genl_rcv_msg+0x67d/0xea0
[  107.711689][ T9739]  ? genl_family_rcv_msg_attrs_parse+0x300/0x300
[  107.717995][ T9739]  ? __kasan_check_read+0x11/0x20
[  107.723000][ T9739]  ? find_held_lock+0x35/0x130
[  107.727743][ T9739]  netlink_rcv_skb+0x177/0x450
[  107.732491][ T9739]  ? genl_family_rcv_msg_attrs_parse+0x300/0x300
[  107.738809][ T9739]  ? netlink_ack+0xb50/0xb50
[  107.743395][ T9739]  ? __kasan_check_write+0x14/0x20
[  107.748563][ T9739]  ? netlink_deliver_tap+0x248/0xbf0
[  107.753873][ T9739]  genl_rcv+0x29/0x40
[  107.757895][ T9739]  netlink_unicast+0x59e/0x7e0
[  107.762649][ T9739]  ? netlink_attachskb+0x870/0x870
[  107.767743][ T9739]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  107.773466][ T9739]  ? __check_object_size+0x3d/0x437
[  107.778645][ T9739]  netlink_sendmsg+0x91c/0xea0
[  107.783411][ T9739]  ? netlink_unicast+0x7e0/0x7e0
[  107.788350][ T9739]  ? aa_sock_msg_perm.isra.0+0xba/0x170
[  107.793889][ T9739]  ? apparmor_socket_sendmsg+0x2a/0x30
[  107.799330][ T9739]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  107.805552][ T9739]  ? security_socket_sendmsg+0x8d/0xc0
[  107.810988][ T9739]  ? netlink_unicast+0x7e0/0x7e0
[  107.815946][ T9739]  sock_sendmsg+0xd7/0x130
[  107.820357][ T9739]  ____sys_sendmsg+0x753/0x880
[  107.825104][ T9739]  ? kernel_sendmsg+0x50/0x50
[  107.829761][ T9739]  ? debug_object_active_state+0x28a/0x350
[  107.835597][ T9739]  ? find_held_lock+0x35/0x130
[  107.840351][ T9739]  ___sys_sendmsg+0x100/0x170
[  107.845020][ T9739]  ? sendmsg_copy_msghdr+0x70/0x70
[  107.850112][ T9739]  ? lockdep_hardirqs_on+0x421/0x5e0
[  107.855390][ T9739]  ? __kasan_check_read+0x11/0x20
[  107.860406][ T9739]  ? mark_lock+0xc2/0x1220
[  107.864814][ T9739]  ? __kasan_check_read+0x11/0x20
[  107.869820][ T9739]  ? __lock_acquire+0x16f2/0x4a00
[  107.874828][ T9739]  ? debug_object_deactivate+0x320/0x320
[  107.880464][ T9739]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  107.886605][ T9739]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  107.892873][ T9739]  ? __fget_light+0x1ad/0x270
[  107.897533][ T9739]  ? __fdget+0x1b/0x20
[  107.901582][ T9739]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  107.907806][ T9739]  __sys_sendmsg+0x105/0x1d0
[  107.912374][ T9739]  ? __sys_sendmsg_sock+0xc0/0xc0
[  107.917472][ T9739]  ? lockdep_hardirqs_on+0x421/0x5e0
[  107.922794][ T9739]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  107.928346][ T9739]  ? do_syscall_64+0x26/0x790
[  107.933015][ T9739]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  107.939085][ T9739]  ? do_syscall_64+0x26/0x790
[  107.943756][ T9739]  __x64_sys_sendmsg+0x78/0xb0
[  107.948687][ T9739]  do_syscall_64+0xfa/0x790
[  107.953234][ T9739]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  107.959131][ T9739] RIP: 0033:0x446909
[  107.963005][ T9739] Code: 18 89 d0 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 9b d4 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  107.982936][ T9739] RSP: 002b:00007fff2cc3c8f8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  107.991353][ T9739] RAX: ffffffffffffffda RBX: 0000000000003064 RCX: 0000000000446909
[  107.999305][ T9739] RDX: 0000000000000000 RSI: 0000000020001340 RDI: 0000000000000004
[  108.007255][ T9739] RBP: 7261756765726977 R08: 0000000000000000 R09: 0000000001bbbbbb
[  108.015383][ T9739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[  108.023347][ T9739] R13: 00000000004042c0 R14: 0000000000000000 R15: 0000000000000000