SELinux: unknown mount option SELinux: unknown mount option ====================================================== WARNING: possible circular locking dependency detected 4.14.134+ #22 Not tainted ------------------------------------------------------ syz-executor.4/20440 is trying to acquire lock: (&cpuctx_mutex/1){+.+.}, at: [<00000000bc32cced>] mutex_lock_double kernel/events/core.c:9909 [inline] (&cpuctx_mutex/1){+.+.}, at: [<00000000bc32cced>] __perf_event_ctx_lock_double kernel/events/core.c:9968 [inline] (&cpuctx_mutex/1){+.+.}, at: [<00000000bc32cced>] SYSC_perf_event_open kernel/events/core.c:10233 [inline] (&cpuctx_mutex/1){+.+.}, at: [<00000000bc32cced>] SyS_perf_event_open+0x12cf/0x2560 kernel/events/core.c:9988 but task is already holding lock: (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] mutex_lock_double kernel/events/core.c:9908 [inline] (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] __perf_event_ctx_lock_double kernel/events/core.c:9968 [inline] (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] SYSC_perf_event_open kernel/events/core.c:10233 [inline] (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] SyS_perf_event_open+0x12c2/0x2560 kernel/events/core.c:9988 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #2 (&cpuctx_mutex){+.+.}: -> #1 (pmus_lock){+.+.}: -> #0 (&cpuctx_mutex/1){+.+.}: other info that might help us debug this: Chain exists of: &cpuctx_mutex/1 --> pmus_lock --> &cpuctx_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&cpuctx_mutex); lock(pmus_lock); lock(&cpuctx_mutex); lock(&cpuctx_mutex/1); *** DEADLOCK *** 1 lock held by syz-executor.4/20440: #0: (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] mutex_lock_double kernel/events/core.c:9908 [inline] #0: (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] __perf_event_ctx_lock_double kernel/events/core.c:9968 [inline] #0: (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] SYSC_perf_event_open kernel/events/core.c:10233 [inline] #0: (&cpuctx_mutex){+.+.}, at: [<00000000fed68495>] SyS_perf_event_open+0x12c2/0x2560 kernel/events/core.c:9988 stack backtrace: CPU: 1 PID: 20440 Comm: syz-executor.4 Not tainted 4.14.134+ #22 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xca/0x134 lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x2dc/0x425 kernel/locking/lockdep.c:1258 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. SELinux: Context sys is not valid (left unmapped). kauditd_printk_skb: 61 callbacks suppressed audit: type=1400 audit(2000000205.260:158): avc: denied { relabelto } for pid=20470 comm="syz-executor.4" name="UDP-Lite" dev="sockfs" ino=47592 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:unlabeled_t:s0 tclass=rawip_socket permissive=1 netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. nla_parse: 4 callbacks suppressed netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'.