Warning: Permanently added '10.128.1.26' (ECDSA) to the list of known hosts.
executing program
syzkaller login: [ 66.071645][ T3566] syz-executor358 (3566): drop_caches: 1
[ 66.127584][ T3566] syz-executor358 (3566): drop_caches: 1
[ 66.135924][ T3566] loop0: detected capacity change from 0 to 2048
[ 66.173064][ T3566] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none.
[ 66.181754][ T3566] ext4 filesystem being mounted at /root/file0 supports timestamps until 2038 (0x7fffffff)
[ 66.215968][ T3566] Please do not flush events WQ.
[ 66.220946][ T3566] CPU: 1 PID: 3566 Comm: syz-executor358 Not tainted 5.17.0-next-20220401-syzkaller #0
[ 66.230677][ T3566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 66.240721][ T3566] Call Trace:
[ 66.243999][ T3566]
[ 66.247014][ T3566] dump_stack_lvl+0xcd/0x134
[ 66.251607][ T3566] flush_workqueue.cold+0x24/0x29
[ 66.256640][ T3566] ? lock_downgrade+0x6e0/0x6e0
[ 66.261492][ T3566] ? check_flush_dependency+0x400/0x400
[ 66.267036][ T3566] ? __fsnotify_vfsmount_delete+0x20/0x20
[ 66.272775][ T3566] ext4_put_super+0x99/0x1150
[ 66.277459][ T3566] ? ext4_quota_write+0x620/0x620
[ 66.282512][ T3566] generic_shutdown_super+0x14c/0x400
[ 66.287889][ T3566] kill_block_super+0x97/0xf0
[ 66.292564][ T3566] deactivate_locked_super+0x94/0x160
[ 66.297940][ T3566] deactivate_super+0xad/0xd0
[ 66.302656][ T3566] cleanup_mnt+0x3a2/0x540
[ 66.307111][ T3566] task_work_run+0xdd/0x1a0
[ 66.311623][ T3566] do_exit+0xaff/0x2a00
[ 66.315875][ T3566] ? lock_downgrade+0x6e0/0x6e0
[ 66.320745][ T3566] ? mm_update_next_owner+0x7a0/0x7a0
[ 66.326235][ T3566] do_group_exit+0xd2/0x2f0
[ 66.333008][ T3566] __x64_sys_exit_group+0x3a/0x50
[ 66.338035][ T3566] do_syscall_64+0x35/0x80
[ 66.342453][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 66.348374][ T3566] RIP: 0033:0x7f25115f8819
[ 66.352782][ T3566] Code: Unable to access opcode bytes at RIP 0x7f25115f87ef.
[ 66.360134][ T3566] RSP: 002b:00007ffcaf8cf478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 66.368542][ T3566] RAX: ffffffffffffffda RBX: 00007f251166d410 RCX: 00007f25115f8819
[ 66.376512][ T3566] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
[ 66.384482][ T3566] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f2511667e40
[ 66.392455][ T3566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f251166d410
[ 66.400508][ T3566] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 66.408488][ T3566]
[ 66.412637][ T3566]
[ 66.414976][ T3566] ======================================================
[ 66.421975][ T3566] WARNING: possible circular locking dependency detected
[ 66.428974][ T3566] 5.17.0-next-20220401-syzkaller #0 Not tainted
[ 66.435198][ T3566] ------------------------------------------------------
[ 66.442203][ T3566] syz-executor358/3566 is trying to acquire lock:
[ 66.448601][ T3566] ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: flush_workqueue+0x135/0x1440
[ 66.458430][ T3566]
[ 66.458430][ T3566] but task is already holding lock:
[ 66.465787][ T3566] ffff88801d9640e0 (&type->s_umount_key#32){++++}-{3:3}, at: deactivate_super+0xa5/0xd0
[ 66.475545][ T3566]
[ 66.475545][ T3566] which lock already depends on the new lock.
[ 66.475545][ T3566]
[ 66.485935][ T3566]
[ 66.485935][ T3566] the existing dependency chain (in reverse order) is:
[ 66.494934][ T3566]
[ 66.494934][ T3566] -> #3 (&type->s_umount_key#32){++++}-{3:3}:
[ 66.503180][ T3566] down_read+0x98/0x440
[ 66.507857][ T3566] iterate_supers+0xdb/0x290
[ 66.513057][ T3566] drop_caches_sysctl_handler+0xdb/0x110
[ 66.519205][ T3566] proc_sys_call_handler+0x4a1/0x6e0
[ 66.525003][ T3566] do_iter_readv_writev+0x3d1/0x640
[ 66.530730][ T3566] do_iter_write+0x182/0x700
[ 66.535848][ T3566] vfs_iter_write+0x70/0xa0
[ 66.540885][ T3566] iter_file_splice_write+0x723/0xc70
[ 66.546819][ T3566] direct_splice_actor+0x110/0x180
[ 66.552448][ T3566] splice_direct_to_actor+0x34b/0x8c0
[ 66.558336][ T3566] do_splice_direct+0x1a7/0x270
[ 66.563705][ T3566] do_sendfile+0xae0/0x1240
[ 66.568743][ T3566] __x64_sys_sendfile64+0x149/0x210
[ 66.574464][ T3566] do_syscall_64+0x35/0x80
[ 66.579394][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 66.585845][ T3566]
[ 66.585845][ T3566] -> #2 (sb_writers#3){.+.+}-{0:0}:
[ 66.593227][ T3566] kernel_write+0x2ac/0x540
[ 66.598248][ T3566] p9_write_work+0x25e/0xca0
[ 66.603442][ T3566] process_one_work+0x996/0x1610
[ 66.608902][ T3566] worker_thread+0x665/0x1080
[ 66.614092][ T3566] kthread+0x2e9/0x3a0
[ 66.618679][ T3566] ret_from_fork+0x1f/0x30
[ 66.623619][ T3566]
[ 66.623619][ T3566] -> #1 ((work_completion)(&m->wq)){+.+.}-{0:0}:
[ 66.632115][ T3566] process_one_work+0x905/0x1610
[ 66.637562][ T3566] worker_thread+0x665/0x1080
[ 66.642747][ T3566] kthread+0x2e9/0x3a0
[ 66.647333][ T3566] ret_from_fork+0x1f/0x30
[ 66.652269][ T3566]
[ 66.652269][ T3566] -> #0 ((wq_completion)events){+.+.}-{0:0}:
[ 66.660417][ T3566] __lock_acquire+0x2abe/0x5660
[ 66.665786][ T3566] lock_acquire+0x1ab/0x510
[ 66.670806][ T3566] flush_workqueue+0x164/0x1440
[ 66.676168][ T3566] ext4_put_super+0x99/0x1150
[ 66.681365][ T3566] generic_shutdown_super+0x14c/0x400
[ 66.687252][ T3566] kill_block_super+0x97/0xf0
[ 66.692438][ T3566] deactivate_locked_super+0x94/0x160
[ 66.698321][ T3566] deactivate_super+0xad/0xd0
[ 66.703697][ T3566] cleanup_mnt+0x3a2/0x540
[ 66.708635][ T3566] task_work_run+0xdd/0x1a0
[ 66.713661][ T3566] do_exit+0xaff/0x2a00
[ 66.718348][ T3566] do_group_exit+0xd2/0x2f0
[ 66.723376][ T3566] __x64_sys_exit_group+0x3a/0x50
[ 66.728928][ T3566] do_syscall_64+0x35/0x80
[ 66.733867][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 66.740286][ T3566]
[ 66.740286][ T3566] other info that might help us debug this:
[ 66.740286][ T3566]
[ 66.750498][ T3566] Chain exists of:
[ 66.750498][ T3566] (wq_completion)events --> sb_writers#3 --> &type->s_umount_key#32
[ 66.750498][ T3566]
[ 66.764491][ T3566] Possible unsafe locking scenario:
[ 66.764491][ T3566]
[ 66.771934][ T3566] CPU0 CPU1
[ 66.777290][ T3566] ---- ----
[ 66.782641][ T3566] lock(&type->s_umount_key#32);
[ 66.787657][ T3566] lock(sb_writers#3);
[ 66.794322][ T3566] lock(&type->s_umount_key#32);
[ 66.801855][ T3566] lock((wq_completion)events);
[ 66.806781][ T3566]
[ 66.806781][ T3566] *** DEADLOCK ***
[ 66.806781][ T3566]
[ 66.814906][ T3566] 1 lock held by syz-executor358/3566:
[ 66.820347][ T3566] #0: ffff88801d9640e0 (&type->s_umount_key#32){++++}-{3:3}, at: deactivate_super+0xa5/0xd0
[ 66.830530][ T3566]
[ 66.830530][ T3566] stack backtrace:
[ 66.836402][ T3566] CPU: 1 PID: 3566 Comm: syz-executor358 Not tainted 5.17.0-next-20220401-syzkaller #0
[ 66.846017][ T3566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 66.856057][ T3566] Call Trace:
[ 66.859328][ T3566]
[ 66.862685][ T3566] dump_stack_lvl+0xcd/0x134
[ 66.867280][ T3566] check_noncircular+0x25f/0x2e0
[ 66.872215][ T3566] ? print_circular_bug+0x1e0/0x1e0
[ 66.877415][ T3566] ? mark_lock.part.0+0xee/0x1910
[ 66.882437][ T3566] __lock_acquire+0x2abe/0x5660
[ 66.887291][ T3566] ? lockdep_hardirqs_on_prepare+0x400/0x400
[ 66.893276][ T3566] lock_acquire+0x1ab/0x510
[ 66.897780][ T3566] ? flush_workqueue+0x135/0x1440
[ 66.902797][ T3566] ? lock_release+0x720/0x720
[ 66.907471][ T3566] ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 66.913619][ T3566] ? dump_stack_lvl+0x120/0x134
[ 66.918467][ T3566] ? dump_stack_lvl+0x12a/0x134
[ 66.923315][ T3566] flush_workqueue+0x164/0x1440
[ 66.928161][ T3566] ? flush_workqueue+0x135/0x1440
[ 66.933180][ T3566] ? lock_downgrade+0x6e0/0x6e0
[ 66.938036][ T3566] ? check_flush_dependency+0x400/0x400
[ 66.943584][ T3566] ? __fsnotify_vfsmount_delete+0x20/0x20
[ 66.949317][ T3566] ext4_put_super+0x99/0x1150
[ 66.954001][ T3566] ? ext4_quota_write+0x620/0x620
[ 66.959026][ T3566] generic_shutdown_super+0x14c/0x400
[ 66.964396][ T3566] kill_block_super+0x97/0xf0
[ 66.969069][ T3566] deactivate_locked_super+0x94/0x160
[ 66.974435][ T3566] deactivate_super+0xad/0xd0
[ 66.979104][ T3566] cleanup_mnt+0x3a2/0x540
[ 66.983523][ T3566] task_work_run+0xdd/0x1a0
[ 66.988026][ T3566] do_exit+0xaff/0x2a00
[ 66.992181][ T3566] ? lock_downgrade+0x6e0/0x6e0
[ 66.997031][ T3566] ? mm_update_next_owner+0x7a0/0x7a0
[ 67.002406][ T3566] do_group_exit+0xd2/0x2f0
[ 67.006911][ T3566] __x64_sys_exit_group+0x3a/0x50
[ 67.011934][ T3566] do_syscall_64+0x35/0x80
[ 67.016343][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 67.022239][ T3566] RIP: 0033:0x7f25115f8819
[ 67.026642][ T3566] Code: Unable to access opcode bytes at RIP 0x7f25115f87ef.
[ 67.033989][ T3566] RSP: 002b:00007ffcaf8cf478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
[ 67.042393][ T3566] RAX: ffffffffffffffda RBX: 00007f251166d410 RCX: 00007f25115f8819
[ 67.050354][ T3566] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
[ 67.058416][ T3566] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f2511667e40
[ 67.066561][ T3566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f251166d410
[ 67.074531][ T3566] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
[ 67.082503][ T3566]
[ 76.194628][ T14] cfg80211: failed to load regulatory.db