====================================================== WARNING: possible circular locking dependency detected 4.14.136+ #27 Not tainted ------------------------------------------------------ syz-executor.5/17709 is trying to acquire lock: (&cpuctx_mutex/1){+.+.}, at: [<000000004049c426>] mutex_lock_double kernel/events/core.c:9909 [inline] (&cpuctx_mutex/1){+.+.}, at: [<000000004049c426>] __perf_event_ctx_lock_double kernel/events/core.c:9968 [inline] (&cpuctx_mutex/1){+.+.}, at: [<000000004049c426>] SYSC_perf_event_open kernel/events/core.c:10233 [inline] (&cpuctx_mutex/1){+.+.}, at: [<000000004049c426>] SyS_perf_event_open+0x12cf/0x2560 kernel/events/core.c:9988 but task is already holding lock: (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] mutex_lock_double kernel/events/core.c:9908 [inline] (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] __perf_event_ctx_lock_double kernel/events/core.c:9968 [inline] (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] SYSC_perf_event_open kernel/events/core.c:10233 [inline] (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] SyS_perf_event_open+0x12c2/0x2560 kernel/events/core.c:9988 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&cpuctx_mutex){+.+.}: -> #1 (pmus_lock){+.+.}: -> #0 (&cpuctx_mutex/1){+.+.}: other info that might help us debug this: Chain exists of: &cpuctx_mutex/1 --> pmus_lock --> &cpuctx_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&cpuctx_mutex); lock(pmus_lock); lock(&cpuctx_mutex); lock(&cpuctx_mutex/1); *** DEADLOCK *** 1 lock held by syz-executor.5/17709: #0: (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] mutex_lock_double kernel/events/core.c:9908 [inline] #0: (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] __perf_event_ctx_lock_double kernel/events/core.c:9968 [inline] #0: (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] SYSC_perf_event_open kernel/events/core.c:10233 [inline] #0: (&cpuctx_mutex){+.+.}, at: [<000000004bec4176>] SyS_perf_event_open+0x12c2/0x2560 kernel/events/core.c:9988 stack backtrace: CPU: 1 PID: 17709 Comm: syz-executor.5 Not tainted 4.14.136+ #27 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xca/0x134 lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x2dc/0x425 kernel/locking/lockdep.c:1258 EXT4-fs (loop1): Unrecognized mount option "aØ­KF"¡l" or missing value EXT4-fs (loop1): Unrecognized mount option "aØ­KF"¡l" or missing value EXT4-fs (loop1): Unrecognized mount option "aØ­KF"¡l" or missing value EXT4-fs (loop1): Unrecognized mount option "aØ­KF"¡l" or missing value EXT4-fs (loop1): Unrecognized mount option "aØ­KF"¡l" or missing value kauditd_printk_skb: 437 callbacks suppressed audit: type=1400 audit(1564969322.476:37296): avc: denied { map } for pid=17816 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.506:37297): avc: denied { map } for pid=17816 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.516:37298): avc: denied { map } for pid=17816 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 EXT4-fs (loop1): Unrecognized mount option "aØ­KF"¡l" or missing value audit: type=1400 audit(1564969322.526:37299): avc: denied { map } for pid=17806 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.526:37300): avc: denied { map } for pid=17806 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.526:37301): avc: denied { map } for pid=17816 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.546:37302): avc: denied { map } for pid=17816 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.546:37303): avc: denied { map } for pid=17816 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.566:37304): avc: denied { map } for pid=17818 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969322.576:37305): avc: denied { map } for pid=17816 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 kauditd_printk_skb: 233 callbacks suppressed audit: type=1400 audit(1564969328.816:37539): avc: denied { map } for pid=17926 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.816:37540): avc: denied { map } for pid=17926 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37541): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37542): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37543): avc: denied { map } for pid=17926 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37544): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37545): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37546): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.826:37547): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(1564969328.886:37548): avc: denied { map } for pid=17926 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1