Warning: Permanently added '10.128.1.26' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 66.071645][ T3566] syz-executor358 (3566): drop_caches: 1 [ 66.127584][ T3566] syz-executor358 (3566): drop_caches: 1 [ 66.135924][ T3566] loop0: detected capacity change from 0 to 2048 [ 66.173064][ T3566] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 66.181754][ T3566] ext4 filesystem being mounted at /root/file0 supports timestamps until 2038 (0x7fffffff) [ 66.215968][ T3566] Please do not flush events WQ. [ 66.220946][ T3566] CPU: 1 PID: 3566 Comm: syz-executor358 Not tainted 5.17.0-next-20220401-syzkaller #0 [ 66.230677][ T3566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.240721][ T3566] Call Trace: [ 66.243999][ T3566] [ 66.247014][ T3566] dump_stack_lvl+0xcd/0x134 [ 66.251607][ T3566] flush_workqueue.cold+0x24/0x29 [ 66.256640][ T3566] ? lock_downgrade+0x6e0/0x6e0 [ 66.261492][ T3566] ? check_flush_dependency+0x400/0x400 [ 66.267036][ T3566] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 66.272775][ T3566] ext4_put_super+0x99/0x1150 [ 66.277459][ T3566] ? ext4_quota_write+0x620/0x620 [ 66.282512][ T3566] generic_shutdown_super+0x14c/0x400 [ 66.287889][ T3566] kill_block_super+0x97/0xf0 [ 66.292564][ T3566] deactivate_locked_super+0x94/0x160 [ 66.297940][ T3566] deactivate_super+0xad/0xd0 [ 66.302656][ T3566] cleanup_mnt+0x3a2/0x540 [ 66.307111][ T3566] task_work_run+0xdd/0x1a0 [ 66.311623][ T3566] do_exit+0xaff/0x2a00 [ 66.315875][ T3566] ? lock_downgrade+0x6e0/0x6e0 [ 66.320745][ T3566] ? mm_update_next_owner+0x7a0/0x7a0 [ 66.326235][ T3566] do_group_exit+0xd2/0x2f0 [ 66.333008][ T3566] __x64_sys_exit_group+0x3a/0x50 [ 66.338035][ T3566] do_syscall_64+0x35/0x80 [ 66.342453][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 66.348374][ T3566] RIP: 0033:0x7f25115f8819 [ 66.352782][ T3566] Code: Unable to access opcode bytes at RIP 0x7f25115f87ef. [ 66.360134][ T3566] RSP: 002b:00007ffcaf8cf478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 66.368542][ T3566] RAX: ffffffffffffffda RBX: 00007f251166d410 RCX: 00007f25115f8819 [ 66.376512][ T3566] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 66.384482][ T3566] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f2511667e40 [ 66.392455][ T3566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f251166d410 [ 66.400508][ T3566] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 66.408488][ T3566] [ 66.412637][ T3566] [ 66.414976][ T3566] ====================================================== [ 66.421975][ T3566] WARNING: possible circular locking dependency detected [ 66.428974][ T3566] 5.17.0-next-20220401-syzkaller #0 Not tainted [ 66.435198][ T3566] ------------------------------------------------------ [ 66.442203][ T3566] syz-executor358/3566 is trying to acquire lock: [ 66.448601][ T3566] ffff888010c64d38 ((wq_completion)events){+.+.}-{0:0}, at: flush_workqueue+0x135/0x1440 [ 66.458430][ T3566] [ 66.458430][ T3566] but task is already holding lock: [ 66.465787][ T3566] ffff88801d9640e0 (&type->s_umount_key#32){++++}-{3:3}, at: deactivate_super+0xa5/0xd0 [ 66.475545][ T3566] [ 66.475545][ T3566] which lock already depends on the new lock. [ 66.475545][ T3566] [ 66.485935][ T3566] [ 66.485935][ T3566] the existing dependency chain (in reverse order) is: [ 66.494934][ T3566] [ 66.494934][ T3566] -> #3 (&type->s_umount_key#32){++++}-{3:3}: [ 66.503180][ T3566] down_read+0x98/0x440 [ 66.507857][ T3566] iterate_supers+0xdb/0x290 [ 66.513057][ T3566] drop_caches_sysctl_handler+0xdb/0x110 [ 66.519205][ T3566] proc_sys_call_handler+0x4a1/0x6e0 [ 66.525003][ T3566] do_iter_readv_writev+0x3d1/0x640 [ 66.530730][ T3566] do_iter_write+0x182/0x700 [ 66.535848][ T3566] vfs_iter_write+0x70/0xa0 [ 66.540885][ T3566] iter_file_splice_write+0x723/0xc70 [ 66.546819][ T3566] direct_splice_actor+0x110/0x180 [ 66.552448][ T3566] splice_direct_to_actor+0x34b/0x8c0 [ 66.558336][ T3566] do_splice_direct+0x1a7/0x270 [ 66.563705][ T3566] do_sendfile+0xae0/0x1240 [ 66.568743][ T3566] __x64_sys_sendfile64+0x149/0x210 [ 66.574464][ T3566] do_syscall_64+0x35/0x80 [ 66.579394][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 66.585845][ T3566] [ 66.585845][ T3566] -> #2 (sb_writers#3){.+.+}-{0:0}: [ 66.593227][ T3566] kernel_write+0x2ac/0x540 [ 66.598248][ T3566] p9_write_work+0x25e/0xca0 [ 66.603442][ T3566] process_one_work+0x996/0x1610 [ 66.608902][ T3566] worker_thread+0x665/0x1080 [ 66.614092][ T3566] kthread+0x2e9/0x3a0 [ 66.618679][ T3566] ret_from_fork+0x1f/0x30 [ 66.623619][ T3566] [ 66.623619][ T3566] -> #1 ((work_completion)(&m->wq)){+.+.}-{0:0}: [ 66.632115][ T3566] process_one_work+0x905/0x1610 [ 66.637562][ T3566] worker_thread+0x665/0x1080 [ 66.642747][ T3566] kthread+0x2e9/0x3a0 [ 66.647333][ T3566] ret_from_fork+0x1f/0x30 [ 66.652269][ T3566] [ 66.652269][ T3566] -> #0 ((wq_completion)events){+.+.}-{0:0}: [ 66.660417][ T3566] __lock_acquire+0x2abe/0x5660 [ 66.665786][ T3566] lock_acquire+0x1ab/0x510 [ 66.670806][ T3566] flush_workqueue+0x164/0x1440 [ 66.676168][ T3566] ext4_put_super+0x99/0x1150 [ 66.681365][ T3566] generic_shutdown_super+0x14c/0x400 [ 66.687252][ T3566] kill_block_super+0x97/0xf0 [ 66.692438][ T3566] deactivate_locked_super+0x94/0x160 [ 66.698321][ T3566] deactivate_super+0xad/0xd0 [ 66.703697][ T3566] cleanup_mnt+0x3a2/0x540 [ 66.708635][ T3566] task_work_run+0xdd/0x1a0 [ 66.713661][ T3566] do_exit+0xaff/0x2a00 [ 66.718348][ T3566] do_group_exit+0xd2/0x2f0 [ 66.723376][ T3566] __x64_sys_exit_group+0x3a/0x50 [ 66.728928][ T3566] do_syscall_64+0x35/0x80 [ 66.733867][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 66.740286][ T3566] [ 66.740286][ T3566] other info that might help us debug this: [ 66.740286][ T3566] [ 66.750498][ T3566] Chain exists of: [ 66.750498][ T3566] (wq_completion)events --> sb_writers#3 --> &type->s_umount_key#32 [ 66.750498][ T3566] [ 66.764491][ T3566] Possible unsafe locking scenario: [ 66.764491][ T3566] [ 66.771934][ T3566] CPU0 CPU1 [ 66.777290][ T3566] ---- ---- [ 66.782641][ T3566] lock(&type->s_umount_key#32); [ 66.787657][ T3566] lock(sb_writers#3); [ 66.794322][ T3566] lock(&type->s_umount_key#32); [ 66.801855][ T3566] lock((wq_completion)events); [ 66.806781][ T3566] [ 66.806781][ T3566] *** DEADLOCK *** [ 66.806781][ T3566] [ 66.814906][ T3566] 1 lock held by syz-executor358/3566: [ 66.820347][ T3566] #0: ffff88801d9640e0 (&type->s_umount_key#32){++++}-{3:3}, at: deactivate_super+0xa5/0xd0 [ 66.830530][ T3566] [ 66.830530][ T3566] stack backtrace: [ 66.836402][ T3566] CPU: 1 PID: 3566 Comm: syz-executor358 Not tainted 5.17.0-next-20220401-syzkaller #0 [ 66.846017][ T3566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 66.856057][ T3566] Call Trace: [ 66.859328][ T3566] [ 66.862685][ T3566] dump_stack_lvl+0xcd/0x134 [ 66.867280][ T3566] check_noncircular+0x25f/0x2e0 [ 66.872215][ T3566] ? print_circular_bug+0x1e0/0x1e0 [ 66.877415][ T3566] ? mark_lock.part.0+0xee/0x1910 [ 66.882437][ T3566] __lock_acquire+0x2abe/0x5660 [ 66.887291][ T3566] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 66.893276][ T3566] lock_acquire+0x1ab/0x510 [ 66.897780][ T3566] ? flush_workqueue+0x135/0x1440 [ 66.902797][ T3566] ? lock_release+0x720/0x720 [ 66.907471][ T3566] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 66.913619][ T3566] ? dump_stack_lvl+0x120/0x134 [ 66.918467][ T3566] ? dump_stack_lvl+0x12a/0x134 [ 66.923315][ T3566] flush_workqueue+0x164/0x1440 [ 66.928161][ T3566] ? flush_workqueue+0x135/0x1440 [ 66.933180][ T3566] ? lock_downgrade+0x6e0/0x6e0 [ 66.938036][ T3566] ? check_flush_dependency+0x400/0x400 [ 66.943584][ T3566] ? __fsnotify_vfsmount_delete+0x20/0x20 [ 66.949317][ T3566] ext4_put_super+0x99/0x1150 [ 66.954001][ T3566] ? ext4_quota_write+0x620/0x620 [ 66.959026][ T3566] generic_shutdown_super+0x14c/0x400 [ 66.964396][ T3566] kill_block_super+0x97/0xf0 [ 66.969069][ T3566] deactivate_locked_super+0x94/0x160 [ 66.974435][ T3566] deactivate_super+0xad/0xd0 [ 66.979104][ T3566] cleanup_mnt+0x3a2/0x540 [ 66.983523][ T3566] task_work_run+0xdd/0x1a0 [ 66.988026][ T3566] do_exit+0xaff/0x2a00 [ 66.992181][ T3566] ? lock_downgrade+0x6e0/0x6e0 [ 66.997031][ T3566] ? mm_update_next_owner+0x7a0/0x7a0 [ 67.002406][ T3566] do_group_exit+0xd2/0x2f0 [ 67.006911][ T3566] __x64_sys_exit_group+0x3a/0x50 [ 67.011934][ T3566] do_syscall_64+0x35/0x80 [ 67.016343][ T3566] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 67.022239][ T3566] RIP: 0033:0x7f25115f8819 [ 67.026642][ T3566] Code: Unable to access opcode bytes at RIP 0x7f25115f87ef. [ 67.033989][ T3566] RSP: 002b:00007ffcaf8cf478 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 67.042393][ T3566] RAX: ffffffffffffffda RBX: 00007f251166d410 RCX: 00007f25115f8819 [ 67.050354][ T3566] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 67.058416][ T3566] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f2511667e40 [ 67.066561][ T3566] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f251166d410 [ 67.074531][ T3566] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 67.082503][ T3566] [ 76.194628][ T14] cfg80211: failed to load regulatory.db