audit: type=1400 audit(1663767485.755:8): avc: denied { kernel } for pid=3967 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 hrtimer: interrupt took 31970 ns ------------[ cut here ]------------ ====================================================== WARNING: possible circular locking dependency detected 6.0.0-rc6-next-20220921 #1 Not tainted ------------------------------------------------------ syz-executor.1/3969 is trying to acquire lock: ffffffff853faab8 ((console_sem).lock){-.-.}-{2:2}, at: down_trylock+0xe/0x70 but task is already holding lock: ffff88800d981420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&ctx->lock){....}-{2:2}: _raw_spin_lock+0x2a/0x40 __perf_event_task_sched_out+0x53b/0x18d0 __schedule+0xedd/0x2470 schedule+0xda/0x1b0 futex_wait_queue+0xf5/0x1e0 futex_wait+0x28e/0x690 do_futex+0x2ff/0x380 __x64_sys_futex+0x1c6/0x4d0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #2 (&rq->__lock){-.-.}-{2:2}: _raw_spin_lock_nested+0x30/0x40 raw_spin_rq_lock_nested+0x1e/0x30 task_fork_fair+0x63/0x4d0 sched_cgroup_fork+0x3d0/0x540 copy_process+0x4183/0x6e20 kernel_clone+0xe7/0x890 user_mode_thread+0xad/0xf0 rest_init+0x24/0x250 arch_call_rest_init+0xf/0x14 start_kernel+0x4c1/0x4e6 secondary_startup_64_no_verify+0xe0/0xeb -> #1 (&p->pi_lock){-.-.}-{2:2}: _raw_spin_lock_irqsave+0x39/0x60 try_to_wake_up+0xab/0x1930 up+0x75/0xb0 __up_console_sem+0x6e/0x80 console_unlock+0x46a/0x590 con_install+0x14e/0x5d0 tty_init_dev.part.0+0xa0/0x610 tty_open+0xbc0/0x1370 chrdev_open+0x268/0x6e0 do_dentry_open+0x6ca/0x12b0 path_openat+0x19e1/0x2800 do_filp_open+0x1b6/0x410 do_sys_openat2+0x171/0x4c0 __x64_sys_openat+0x13f/0x1f0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #0 ((console_sem).lock){-.-.}-{2:2}: __lock_acquire+0x2a02/0x5e70 lock_acquire+0x1a2/0x530 _raw_spin_lock_irqsave+0x39/0x60 down_trylock+0xe/0x70 __down_trylock_console_sem+0x3b/0xd0 vprintk_emit+0x16b/0x560 vprintk+0x84/0xa0 _printk+0xba/0xf1 report_bug.cold+0x72/0xab handle_bug+0x3c/0x70 exc_invalid_op+0x14/0x50 asm_exc_invalid_op+0x16/0x20 group_sched_out.part.0+0x2c7/0x460 ctx_sched_out+0x8f1/0xc10 __perf_event_task_sched_out+0x6d0/0x18d0 __schedule+0xedd/0x2470 preempt_schedule_common+0x45/0xc0 __cond_resched+0x17/0x30 __mutex_lock+0xa3/0x14d0 __do_sys_perf_event_open+0x1eec/0x32c0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that might help us debug this: Chain exists of: (console_sem).lock --> &rq->__lock --> &ctx->lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ctx->lock); lock(&rq->__lock); lock(&ctx->lock); lock((console_sem).lock); *** DEADLOCK *** 2 locks held by syz-executor.1/3969: #0: ffff88806cf37d18 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 #1: ffff88800d981420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 stack backtrace: CPU: 1 PID: 3969 Comm: syz-executor.1 Not tainted 6.0.0-rc6-next-20220921 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 Call Trace: dump_stack_lvl+0x8b/0xb3 check_noncircular+0x263/0x2e0 __lock_acquire+0x2a02/0x5e70 lock_acquire+0x1a2/0x530 _raw_spin_lock_irqsave+0x39/0x60 down_trylock+0xe/0x70 __down_trylock_console_sem+0x3b/0xd0 vprintk_emit+0x16b/0x560 vprintk+0x84/0xa0 _printk+0xba/0xf1 report_bug.cold+0x72/0xab handle_bug+0x3c/0x70 exc_invalid_op+0x14/0x50 asm_exc_invalid_op+0x16/0x20 RIP: 0010:group_sched_out.part.0+0x2c7/0x460 Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 2b 12 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 RSP: 0018:ffff88802d137978 EFLAGS: 00010006 RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff888018573580 RSI: ffffffff815663a7 RDI: 0000000000000005 RBP: ffff88803fe485c8 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d981400 R13: ffff88806cf3d140 R14: ffffffff8547c8e0 R15: 0000000000000002 ctx_sched_out+0x8f1/0xc10 __perf_event_task_sched_out+0x6d0/0x18d0 __schedule+0xedd/0x2470 preempt_schedule_common+0x45/0xc0 __cond_resched+0x17/0x30 __mutex_lock+0xa3/0x14d0 __do_sys_perf_event_open+0x1eec/0x32c0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f0544117b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f054166c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f054422b020 RCX: 00007f0544117b19 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000280 RBP: 00007f0544171f6d R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd59ec044f R14: 00007f054166c300 R15: 0000000000022000 WARNING: CPU: 1 PID: 3969 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 Modules linked in: CPU: 1 PID: 3969 Comm: syz-executor.1 Not tainted 6.0.0-rc6-next-20220921 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 RIP: 0010:group_sched_out.part.0+0x2c7/0x460 Code: 5e 41 5f e9 9b b9 ef ff e8 96 b9 ef ff 65 8b 1d 2b 12 ac 7e 31 ff 89 de e8 36 b6 ef ff 85 db 0f 84 8a 00 00 00 e8 79 b9 ef ff <0f> 0b e9 a5 fe ff ff e8 6d b9 ef ff 48 8d 7d 10 48 b8 00 00 00 00 RSP: 0018:ffff88802d137978 EFLAGS: 00010006 RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff888018573580 RSI: ffffffff815663a7 RDI: 0000000000000005 RBP: ffff88803fe485c8 R08: 0000000000000005 R09: 0000000000000001 R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800d981400 R13: ffff88806cf3d140 R14: ffffffff8547c8e0 R15: 0000000000000002 FS: 00007f054166c700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f054164b718 CR3: 000000000ea36000 CR4: 0000000000350ee0 Call Trace: ctx_sched_out+0x8f1/0xc10 __perf_event_task_sched_out+0x6d0/0x18d0 __schedule+0xedd/0x2470 preempt_schedule_common+0x45/0xc0 __cond_resched+0x17/0x30 __mutex_lock+0xa3/0x14d0 __do_sys_perf_event_open+0x1eec/0x32c0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f0544117b19 Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f054166c188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 00007f054422b020 RCX: 00007f0544117b19 RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000280 RBP: 00007f0544171f6d R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd59ec044f R14: 00007f054166c300 R15: 0000000000022000 irq event stamp: 158 hardirqs last enabled at (157): [] _raw_spin_unlock_irqrestore+0x28/0x60 hardirqs last disabled at (158): [] __schedule+0x1225/0x2470 softirqs last enabled at (148): [] __irq_exit_rcu+0x11b/0x180 softirqs last disabled at (119): [] __irq_exit_rcu+0x11b/0x180 ---[ end trace 0000000000000000 ]--- syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed Process accounting resumed tmpfs: Bad value for 'uid' Process accounting resumed tmpfs: Bad value for 'uid' Process accounting resumed Process accounting resumed tmpfs: Bad value for 'uid' loop3: detected capacity change from 0 to 128 tmpfs: Bad value for 'uid' tmpfs: Bad value for 'uid' loop3: detected capacity change from 0 to 128 loop3: detected capacity change from 0 to 128 loop3: detected capacity change from 0 to 128 loop4: detected capacity change from 0 to 2 loop4: detected capacity change from 0 to 2 loop4: detected capacity change from 0 to 2 rtc_cmos 00:05: Alarms can be up to one day in the future loop4: detected capacity change from 0 to 2 rtc_cmos 00:05: Alarms can be up to one day in the future rtc_cmos 00:05: Alarms can be up to one day in the future rtc_cmos 00:05: Alarms can be up to one day in the future loop4: detected capacity change from 0 to 2 loop4: detected capacity change from 0 to 608 cgroup: Invalid name cgroup: Invalid name loop4: detected capacity change from 0 to 608 loop4: detected capacity change from 0 to 608 No source specified No source specified cgroup: Invalid name loop4: detected capacity change from 0 to 608 cgroup: Invalid name No source specified No source specified No source specified sg_write: process 91 (syz-executor.6) changed security contexts after opening file descriptor, this is not allowed.