audit: type=1400 audit(1663241818.364:8): avc:  denied  { kernel } for  pid=3763 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
------------[ cut here ]------------
======================================================
WARNING: possible circular locking dependency detected
6.0.0-rc5-next-20220915 #1 Not tainted
------------------------------------------------------
syz-executor.3/3765 is trying to acquire lock:
ffffffff853fa878 ((console_sem).lock){-...}-{2:2}, at: down_trylock+0xe/0x70
but task is already holding lock:
ffff88800e69a820 (&ctx->lock){-...}-{2:2}, at: event_function+0x182/0x3d0
which lock already depends on the new lock.
the existing dependency chain (in reverse order) is:
-> #3 (&ctx->lock){-...}-{2:2}:
       _raw_spin_lock+0x2a/0x40
       __perf_event_task_sched_out+0x53b/0x18d0
       __schedule+0xedd/0x2470
       schedule+0xda/0x1b0
       futex_wait_queue+0xf5/0x1e0
       futex_wait+0x28e/0x690
       do_futex+0x2ff/0x380
       __x64_sys_futex+0x1c6/0x4d0
       do_syscall_64+0x3b/0x90
       entry_SYSCALL_64_after_hwframe+0x63/0xcd
-> #2 (&rq->__lock){-.-.}-{2:2}:
       _raw_spin_lock_nested+0x30/0x40
       raw_spin_rq_lock_nested+0x1e/0x30
       task_fork_fair+0x63/0x4d0
       sched_cgroup_fork+0x3d0/0x540
       copy_process+0x4183/0x6e20
       kernel_clone+0xe7/0x890
       user_mode_thread+0xad/0xf0
       rest_init+0x24/0x250
       arch_call_rest_init+0xf/0x14
       start_kernel+0x4c1/0x4e6
       secondary_startup_64_no_verify+0xe0/0xeb
-> #1 (&p->pi_lock){-.-.}-{2:2}:
       _raw_spin_lock_irqsave+0x39/0x60
       try_to_wake_up+0xab/0x1920
       up+0x75/0xb0
       __up_console_sem+0x6e/0x80
       console_unlock+0x46a/0x590
       vprintk_emit+0x1bd/0x560
       vprintk+0x84/0xa0
       _printk+0xba/0xf1
       kauditd_hold_skb.cold+0x3f/0x4e
       kauditd_send_queue+0x233/0x290
       kauditd_thread+0x5da/0x9a0
       kthread+0x2ed/0x3a0
       ret_from_fork+0x22/0x30
-> #0 ((console_sem).lock){-...}-{2:2}:
       __lock_acquire+0x2a02/0x5e70
       lock_acquire+0x1a2/0x530
       _raw_spin_lock_irqsave+0x39/0x60
       down_trylock+0xe/0x70
       __down_trylock_console_sem+0x3b/0xd0
       vprintk_emit+0x16b/0x560
       vprintk+0x84/0xa0
       _printk+0xba/0xf1
       report_bug.cold+0x72/0xab
       handle_bug+0x3c/0x70
       exc_invalid_op+0x14/0x50
       asm_exc_invalid_op+0x16/0x20
       perf_group_detach+0x99e/0x12f0
       __perf_remove_from_context+0x71e/0xb20
       event_function+0x297/0x3d0
       remote_function+0x125/0x1b0
       __flush_smp_call_function_queue+0x1df/0x5a0
       __sysvec_call_function_single+0x92/0x3a0
       sysvec_call_function_single+0x89/0xc0
       asm_sysvec_call_function_single+0x16/0x20
       unwind_next_frame+0xe12/0x20b0
       arch_stack_walk+0x83/0xf0
       stack_trace_save+0x8c/0xc0
       kasan_save_stack+0x1e/0x40
       kasan_set_track+0x21/0x30
       __kasan_slab_alloc+0x58/0x70
       kmem_cache_alloc+0x1b1/0x3e0
       getname_flags.part.0+0x50/0x4f0
       getname_flags+0x9a/0xe0
       user_path_at_empty+0x2b/0x60
       __x64_sys_mount+0x1e9/0x300
       do_syscall_64+0x3b/0x90
       entry_SYSCALL_64_after_hwframe+0x63/0xcd
other info that might help us debug this:
Chain exists of:
  (console_sem).lock --> &rq->__lock --> &ctx->lock
 Possible unsafe locking scenario:
       CPU0                    CPU1
       ----                    ----
  lock(&ctx->lock);
                               lock(&rq->__lock);
                               lock(&ctx->lock);
  lock((console_sem).lock);
 *** DEADLOCK ***
2 locks held by syz-executor.3/3765:
 #0: ffff88806cf3d120 (&cpuctx_lock){-...}-{2:2}, at: event_function+0x16f/0x3d0
 #1: ffff88800e69a820 (&ctx->lock){-...}-{2:2}, at: event_function+0x182/0x3d0
stack backtrace:
CPU: 1 PID: 3765 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220915 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Call Trace:
 
 dump_stack_lvl+0x8b/0xb3
 check_noncircular+0x263/0x2e0
 __lock_acquire+0x2a02/0x5e70
 lock_acquire+0x1a2/0x530
 _raw_spin_lock_irqsave+0x39/0x60
 down_trylock+0xe/0x70
 __down_trylock_console_sem+0x3b/0xd0
 vprintk_emit+0x16b/0x560
 vprintk+0x84/0xa0
 _printk+0xba/0xf1
 report_bug.cold+0x72/0xab
 handle_bug+0x3c/0x70
 exc_invalid_op+0x14/0x50
 asm_exc_invalid_op+0x16/0x20
RIP: 0010:perf_group_detach+0x99e/0x12f0
Code: 85 d5 f8 ff ff e8 22 57 ee ff 65 44 8b 25 96 b5 aa 7e 31 ff 44 89 e6 e8 c0 53 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 02 57 ee ff <0f> 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 6b b5 aa 7e 31 ff 89
RSP: 0018:ffff88806cf09e60 EFLAGS: 00010046
RAX: 0000000080010002 RBX: ffff88800d5585c8 RCX: 0000000000000000
RDX: ffff88801d825040 RSI: ffffffff8157c03e RDI: 0000000000000005
RBP: ffff88800d5585c8 R08: 0000000000000005 R09: 0000000000000001
R10: 0000000000000000 R11: ffffffff865ac05b R12: 0000000000000000
R13: ffff88800d558658 R14: ffff88800e69a800 R15: ffff88800d5585c8
 __perf_remove_from_context+0x71e/0xb20
 event_function+0x297/0x3d0
 remote_function+0x125/0x1b0
 __flush_smp_call_function_queue+0x1df/0x5a0
 __sysvec_call_function_single+0x92/0x3a0
 sysvec_call_function_single+0x89/0xc0
 
 
 asm_sysvec_call_function_single+0x16/0x20
RIP: 0010:unwind_next_frame+0xe12/0x20b0
Code: c0 74 08 3c 03 0f 8e aa 0e 00 00 41 3b 1e 0f 84 6a 07 00 00 bf 01 00 00 00 e8 7a 77 0e 00 b8 01 00 00 00 65 8b 15 9e ad f0 7e <85> d2 0f 85 21 f2 ff ff 0f 1f 44 00 00 e9 17 f2 ff ff 48 8b 74 24
RSP: 0018:ffff88803ce7f9a8 EFLAGS: 00000297
RAX: 0000000000000001 RBX: ffff88803ce7fb60 RCX: 0000000000000000
RDX: 0000000080000000 RSI: ffff88803ce7fb58 RDI: 0000000000000001
RBP: ffff88803ce78000 R08: ffffffff85e7ac74 R09: ffffffff85e7ac78
R10: ffffed10079cff52 R11: ffff88803ce7fa68 R12: ffff88803ce7fa69
R13: ffff88803ce7fa88 R14: ffff88803ce7fa28 R15: 0000000000000001
 arch_stack_walk+0x83/0xf0
 stack_trace_save+0x8c/0xc0
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_slab_alloc+0x58/0x70
 kmem_cache_alloc+0x1b1/0x3e0
 getname_flags.part.0+0x50/0x4f0
 getname_flags+0x9a/0xe0
 user_path_at_empty+0x2b/0x60
 __x64_sys_mount+0x1e9/0x300
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f60f32a004a
Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f60f0813fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f60f32a004a
RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000000
RBP: 00007f60f0814040 R08: 00007f60f0814040 R09: 0000000020000200
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200
R13: 0000000020000000 R14: 00007f60f0814000 R15: 0000000020000400
 
WARNING: CPU: 1 PID: 3765 at kernel/events/core.c:2047 perf_group_detach+0x99e/0x12f0
Modules linked in:
CPU: 1 PID: 3765 Comm: syz-executor.3 Not tainted 6.0.0-rc5-next-20220915 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
RIP: 0010:perf_group_detach+0x99e/0x12f0
Code: 85 d5 f8 ff ff e8 22 57 ee ff 65 44 8b 25 96 b5 aa 7e 31 ff 44 89 e6 e8 c0 53 ee ff 45 85 e4 0f 84 0a 05 00 00 e8 02 57 ee ff <0f> 0b e9 a9 f8 ff ff e8 f6 56 ee ff 65 8b 1d 6b b5 aa 7e 31 ff 89
RSP: 0018:ffff88806cf09e60 EFLAGS: 00010046
RAX: 0000000080010002 RBX: ffff88800d5585c8 RCX: 0000000000000000
RDX: ffff88801d825040 RSI: ffffffff8157c03e RDI: 0000000000000005
RBP: ffff88800d5585c8 R08: 0000000000000005 R09: 0000000000000001
R10: 0000000000000000 R11: ffffffff865ac05b R12: 0000000000000000
R13: ffff88800d558658 R14: ffff88800e69a800 R15: ffff88800d5585c8
FS:  00007f60f0814700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f60f0815000 CR3: 000000003d664000 CR4: 0000000000350ee0
Call Trace:
 
 __perf_remove_from_context+0x71e/0xb20
 event_function+0x297/0x3d0
 remote_function+0x125/0x1b0
 __flush_smp_call_function_queue+0x1df/0x5a0
 __sysvec_call_function_single+0x92/0x3a0
 sysvec_call_function_single+0x89/0xc0
 
 
 asm_sysvec_call_function_single+0x16/0x20
RIP: 0010:unwind_next_frame+0xe12/0x20b0
Code: c0 74 08 3c 03 0f 8e aa 0e 00 00 41 3b 1e 0f 84 6a 07 00 00 bf 01 00 00 00 e8 7a 77 0e 00 b8 01 00 00 00 65 8b 15 9e ad f0 7e <85> d2 0f 85 21 f2 ff ff 0f 1f 44 00 00 e9 17 f2 ff ff 48 8b 74 24
RSP: 0018:ffff88803ce7f9a8 EFLAGS: 00000297
RAX: 0000000000000001 RBX: ffff88803ce7fb60 RCX: 0000000000000000
RDX: 0000000080000000 RSI: ffff88803ce7fb58 RDI: 0000000000000001
RBP: ffff88803ce78000 R08: ffffffff85e7ac74 R09: ffffffff85e7ac78
R10: ffffed10079cff52 R11: ffff88803ce7fa68 R12: ffff88803ce7fa69
R13: ffff88803ce7fa88 R14: ffff88803ce7fa28 R15: 0000000000000001
 arch_stack_walk+0x83/0xf0
 stack_trace_save+0x8c/0xc0
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_slab_alloc+0x58/0x70
 kmem_cache_alloc+0x1b1/0x3e0
 getname_flags.part.0+0x50/0x4f0
 getname_flags+0x9a/0xe0
 user_path_at_empty+0x2b/0x60
 __x64_sys_mount+0x1e9/0x300
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f60f32a004a
Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f60f0813fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f60f32a004a
RDX: 0000000020000200 RSI: 0000000020000000 RDI: 0000000000000000
RBP: 00007f60f0814040 R08: 00007f60f0814040 R09: 0000000020000200
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000200
R13: 0000000020000000 R14: 00007f60f0814000 R15: 0000000020000400
 
irq event stamp: 1704
hardirqs last  enabled at (1703): [] exc_page_fault+0xc4/0x1a0
hardirqs last disabled at (1704): [] sysvec_call_function_single+0xb/0xc0
softirqs last  enabled at (1106): [] __irq_exit_rcu+0x11b/0x180
softirqs last disabled at (1101): [] __irq_exit_rcu+0x11b/0x180
---[ end trace 0000000000000000 ]---
ALSA: seq fatal error: cannot create timer (-22)
ALSA: seq fatal error: cannot create timer (-22)
FAT-fs (loop7): bogus number of reserved sectors
FAT-fs (loop7): Can't find a valid FAT filesystem
FAT-fs (loop7): bogus number of reserved sectors
FAT-fs (loop7): Can't find a valid FAT filesystem
hrtimer: interrupt took 19326 ns
ALSA: seq fatal error: cannot create timer (-22)
FAT-fs (loop7): bogus number of reserved sectors
FAT-fs (loop7): Can't find a valid FAT filesystem
ALSA: seq fatal error: cannot create timer (-22)
FAT-fs (loop7): bogus number of reserved sectors
FAT-fs (loop7): Can't find a valid FAT filesystem
ALSA: seq fatal error: cannot create timer (-22)
FAT-fs (loop4): bogus number of reserved sectors
FAT-fs (loop4): Can't find a valid FAT filesystem
FAT-fs (loop1): bogus number of reserved sectors
FAT-fs (loop1): Can't find a valid FAT filesystem
ALSA: seq fatal error: cannot create timer (-22)
ALSA: seq fatal error: cannot create timer (-22)
ALSA: seq fatal error: cannot create timer (-22)
FAT-fs (loop4): bogus number of reserved sectors
FAT-fs (loop4): Can't find a valid FAT filesystem
FAT-fs (loop1): bogus number of reserved sectors
FAT-fs (loop1): Can't find a valid FAT filesystem
FAT-fs (loop7): bogus number of reserved sectors
FAT-fs (loop7): Can't find a valid FAT filesystem
FAT-fs (loop4): bogus number of reserved sectors
FAT-fs (loop4): Can't find a valid FAT filesystem
FAT-fs (loop1): bogus number of reserved sectors
FAT-fs (loop1): Can't find a valid FAT filesystem
loop4: detected capacity change from 0 to 344
loop3: detected capacity change from 0 to 352
loop7: detected capacity change from 0 to 320
ISO 9660 Extensions: Microsoft Joliet Level 3
ISO 9660 Extensions: RRIP_1991A
loop5: detected capacity change from 0 to 3520
loop6: detected capacity change from 0 to 264192
loop6: detected capacity change from 0 to 264192
device syz_tun entered promiscuous mode
device syz_tun left promiscuous mode
device syz_tun entered promiscuous mode
device syz_tun left promiscuous mode
device syz_tun entered promiscuous mode
device syz_tun left promiscuous mode
----------------
Code disassembly (best guess):
   0:	c0 74 08 3c 03       	shlb   $0x3,0x3c(%rax,%rcx,1)
   5:	0f 8e aa 0e 00 00    	jle    0xeb5
   b:	41 3b 1e             	cmp    (%r14),%ebx
   e:	0f 84 6a 07 00 00    	je     0x77e
  14:	bf 01 00 00 00       	mov    $0x1,%edi
  19:	e8 7a 77 0e 00       	callq  0xe7798
  1e:	b8 01 00 00 00       	mov    $0x1,%eax
  23:	65 8b 15 9e ad f0 7e 	mov    %gs:0x7ef0ad9e(%rip),%edx        # 0x7ef0adc8
* 2a:	85 d2                	test   %edx,%edx <-- trapping instruction
  2c:	0f 85 21 f2 ff ff    	jne    0xfffff253
  32:	0f 1f 44 00 00       	nopl   0x0(%rax,%rax,1)
  37:	e9 17 f2 ff ff       	jmpq   0xfffff253
  3c:	48                   	rex.W
  3d:	8b                   	.byte 0x8b
  3e:	74 24                	je     0x64