audit: type=1400 audit(1663332985.256:8): avc: denied { kernel } for pid=3907 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 ------------[ cut here ]------------ ====================================================== WARNING: possible circular locking dependency detected 6.0.0-rc5-next-20220916 #1 Not tainted ------------------------------------------------------ syz-executor.2/3908 is trying to acquire lock: ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 but task is already holding lock: ffff888040123820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&ctx->lock){....}-{2:2}: _raw_spin_lock+0x2a/0x40 __perf_event_task_sched_out+0x53b/0x18d0 __schedule+0xedd/0x2470 schedule+0xda/0x1b0 exit_to_user_mode_prepare+0x114/0x1a0 syscall_exit_to_user_mode+0x19/0x40 do_syscall_64+0x48/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #2 (&rq->__lock){-.-.}-{2:2}: _raw_spin_lock_nested+0x30/0x40 raw_spin_rq_lock_nested+0x1e/0x30 task_fork_fair+0x63/0x4d0 sched_cgroup_fork+0x3d0/0x540 copy_process+0x4183/0x6e20 kernel_clone+0xe7/0x890 user_mode_thread+0xad/0xf0 rest_init+0x24/0x250 arch_call_rest_init+0xf/0x14 start_kernel+0x4c1/0x4e6 secondary_startup_64_no_verify+0xe0/0xeb -> #1 (&p->pi_lock){-.-.}-{2:2}: _raw_spin_lock_irqsave+0x39/0x60 try_to_wake_up+0xab/0x1920 up+0x75/0xb0 __up_console_sem+0x6e/0x80 console_unlock+0x46a/0x590 vt_ioctl+0x2822/0x2ca0 tty_ioctl+0x7c4/0x1700 __x64_sys_ioctl+0x19a/0x210 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #0 ((console_sem).lock){....}-{2:2}: __lock_acquire+0x2a02/0x5e70 lock_acquire+0x1a2/0x530 _raw_spin_lock_irqsave+0x39/0x60 down_trylock+0xe/0x70 __down_trylock_console_sem+0x3b/0xd0 vprintk_emit+0x16b/0x560 vprintk+0x84/0xa0 _printk+0xba/0xf1 report_bug.cold+0x72/0xab handle_bug+0x3c/0x70 exc_invalid_op+0x14/0x50 asm_exc_invalid_op+0x16/0x20 group_sched_out.part.0+0x2c7/0x460 ctx_sched_out+0x8f1/0xc10 __perf_event_task_sched_out+0x6d0/0x18d0 __schedule+0xedd/0x2470 schedule+0xda/0x1b0 exit_to_user_mode_prepare+0x114/0x1a0 syscall_exit_to_user_mode+0x19/0x40 do_syscall_64+0x48/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that might help us debug this: Chain exists of: (console_sem).lock --> &rq->__lock --> &ctx->lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ctx->lock); lock(&rq->__lock); lock(&ctx->lock); lock((console_sem).lock); *** DEADLOCK *** 2 locks held by syz-executor.2/3908: #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 #1: ffff888040123820 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 stack backtrace: CPU: 0 PID: 3908 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220916 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x8b/0xb3 check_noncircular+0x263/0x2e0 __lock_acquire+0x2a02/0x5e70 lock_acquire+0x1a2/0x530 _raw_spin_lock_irqsave+0x39/0x60 down_trylock+0xe/0x70 __down_trylock_console_sem+0x3b/0xd0 vprintk_emit+0x16b/0x560 vprintk+0x84/0xa0 _printk+0xba/0xf1 report_bug.cold+0x72/0xab handle_bug+0x3c/0x70 exc_invalid_op+0x14/0x50 asm_exc_invalid_op+0x16/0x20 RIP: 0010:group_sched_out.part.0+0x2c7/0x460 Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 RSP: 0018:ffff8880407bfc48 EFLAGS: 00010006 RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88803d03b580 RSI: ffffffff81566027 RDI: 0000000000000005 RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888040123800 R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 ctx_sched_out+0x8f1/0xc10 __perf_event_task_sched_out+0x6d0/0x18d0 __schedule+0xedd/0x2470 schedule+0xda/0x1b0 exit_to_user_mode_prepare+0x114/0x1a0 syscall_exit_to_user_mode+0x19/0x40 do_syscall_64+0x48/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ff1dfa86b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff1dcffc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007ff1dfb99f68 RCX: 00007ff1dfa86b19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff1dfb99f6c RBP: 00007ff1dfb99f60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007ff1dfb99f6c R13: 00007ffeb7cf79ff R14: 00007ff1dcffc300 R15: 0000000000022000 WARNING: CPU: 0 PID: 3908 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 Modules linked in: CPU: 0 PID: 3908 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220916 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 RIP: 0010:group_sched_out.part.0+0x2c7/0x460 Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 RSP: 0018:ffff8880407bfc48 EFLAGS: 00010006 RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88803d03b580 RSI: ffffffff81566027 RDI: 0000000000000005 RBP: ffff8880086605c8 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888040123800 R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 FS: 00007ff1dcffc700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f955878c300 CR3: 000000003c334000 CR4: 0000000000350ef0 Call Trace: ctx_sched_out+0x8f1/0xc10 __perf_event_task_sched_out+0x6d0/0x18d0 __schedule+0xedd/0x2470 schedule+0xda/0x1b0 exit_to_user_mode_prepare+0x114/0x1a0 syscall_exit_to_user_mode+0x19/0x40 do_syscall_64+0x48/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ff1dfa86b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff1dcffc218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: 0000000000000001 RBX: 00007ff1dfb99f68 RCX: 00007ff1dfa86b19 RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff1dfb99f6c RBP: 00007ff1dfb99f60 R08: 000000000000000e R09: 0000000000000000 R10: 0000000000000003 R11: 0000000000000246 R12: 00007ff1dfb99f6c R13: 00007ffeb7cf79ff R14: 00007ff1dcffc300 R15: 0000000000022000 irq event stamp: 652 hardirqs last enabled at (651): [] exit_to_user_mode_prepare+0x109/0x1a0 hardirqs last disabled at (652): [] __schedule+0x1225/0x2470 softirqs last enabled at (480): [] __irq_exit_rcu+0x11b/0x180 softirqs last disabled at (471): [] __irq_exit_rcu+0x11b/0x180 ---[ end trace 0000000000000000 ]--- loop3: detected capacity change from 0 to 3 ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= loop3: detected capacity change from 0 to 3 sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 loop0: detected capacity change from 0 to 3 sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 loop3: detected capacity change from 0 to 3 sit: Src spoofed 0.0.0.156/2002:0:29c:0:9cdf:3f09:: -> 172.20.20.170/5171::2200 loop0: detected capacity change from 0 to 3 loop3: detected capacity change from 0 to 3 loop0: detected capacity change from 0 to 3 hrtimer: interrupt took 16952 ns loop3: detected capacity change from 0 to 3 loop6: detected capacity change from 0 to 40 syz-executor.6: attempt to access beyond end of device loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 Buffer I/O error on dev loop6, logical block 10, lost async page write syz-executor.6 (4056) used greatest stack depth: 24472 bytes left device lo entered promiscuous mode device lo left promiscuous mode loop6: detected capacity change from 0 to 40 syz-executor.6: attempt to access beyond end of device loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 Buffer I/O error on dev loop6, logical block 10, lost async page write device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode loop6: detected capacity change from 0 to 40 device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode syz-executor.6: attempt to access beyond end of device loop6: rw=2049, sector=40, nr_sectors = 4 limit=40 Buffer I/O error on dev loop6, logical block 10, lost async page write device lo entered promiscuous mode device lo left promiscuous mode device lo entered promiscuous mode device lo left promiscuous mode loop6: detected capacity change from 0 to 40 device lo entered promiscuous mode device lo left promiscuous mode audit: type=1400 audit(1663332992.180:9): avc: denied { write } for pid=4370 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 perf: interrupt took too long (5491 > 5415), lowering kernel.perf_event_max_sample_rate to 36000 perf: interrupt took too long (10823 > 10760), lowering kernel.perf_event_max_sample_rate to 18000 perf: interrupt took too long (13548 > 13528), lowering kernel.perf_event_max_sample_rate to 14000 perf: interrupt took too long (16948 > 16935), lowering kernel.perf_event_max_sample_rate to 11000 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4396 comm=syz-executor.6 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4396 comm=syz-executor.6 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4435 comm=syz-executor.1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4445 comm=syz-executor.1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4438 comm=syz-executor.6 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4456 comm=syz-executor.1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4458 comm=syz-executor.6 ISOFS: Unable to identify CD-ROM format. FAT-fs (loop0): Unrecognized mount option "subj_role=/dev/full" or missing value FAT-fs (loop0): Unrecognized mount option "subj_role=/dev/full" or missing value ISOFS: Unable to identify CD-ROM format. SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4485 comm=syz-executor.6 capability: warning: `syz-executor.7' uses deprecated v2 capabilities in a way that may be insecure FAT-fs (loop0): Unrecognized mount option "subj_role=/dev/full" or missing value 9pnet_fd: p9_fd_create_tcp (4500): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4500): problem connecting socket to 127.0.0.1 autofs4:pid:4516:validate_dev_ioctl: path string terminator missing for cmd(0xc0189376) autofs4:pid:4516:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1768304430.3237228), cmd(0xc0189376) autofs4:pid:4516:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189376) FAT-fs (loop0): Unrecognized mount option "subj_role=/dev/full" or missing value ISOFS: Unable to identify CD-ROM format. 9pnet_fd: p9_fd_create_tcp (4526): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4528): problem connecting socket to 127.0.0.1 FAT-fs (loop0): Unrecognized mount option "subj_role=/dev/full" or missing value 9pnet_fd: p9_fd_create_tcp (4538): problem connecting socket to 127.0.0.1 ISOFS: Unable to identify CD-ROM format. 9pnet_fd: p9_fd_create_tcp (4534): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4550): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4539): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4556): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4564): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4557): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4559): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4553): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4574): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4579): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4567): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4580): problem connecting socket to 127.0.0.1 loop7: detected capacity change from 0 to 264192 tmpfs: Bad value for 'mpol' tmpfs: Unknown parameter 'euid>00000000000000000000' loop7: detected capacity change from 0 to 264192 tmpfs: Bad value for 'mpol' tmpfs: Unknown parameter 'euid>00000000000000000000' 9pnet_fd: p9_fd_create_tcp (4596): problem connecting socket to 127.0.0.1 loop7: detected capacity change from 0 to 264192 9pnet_fd: p9_fd_create_tcp (4585): problem connecting socket to 127.0.0.1 9pnet_fd: p9_fd_create_tcp (4586): problem connecting socket to 127.0.0.1 tmpfs: Bad value for 'mpol' 9pnet_fd: p9_fd_create_tcp (4599): problem connecting socket to 127.0.0.1 tmpfs: Unknown parameter 'euid>00000000000000000000' 9pnet_fd: p9_fd_create_tcp (4598): problem connecting socket to 127.0.0.1 loop7: detected capacity change from 0 to 264192 tmpfs: Bad value for 'mpol' tmpfs: Unknown parameter 'euid>00000000000000000000' 9pnet_fd: p9_fd_create_tcp (4626): problem connecting socket to 127.0.0.1 loop7: detected capacity change from 0 to 264192 tmpfs: Bad value for 'mpol' tmpfs: Unknown parameter 'euid>00000000000000000000'