netlink: 'syz-executor2': attribute type 1 has an invalid length. netlink: 'syz-executor2': attribute type 1 has an invalid length. WARNING: CPU: 0 PID: 8353 at kernel/fork.c:718 __put_task_struct+0x3ef/0x620 kernel/fork.c:718 Kernel panic - not syncing: panic_on_warn set ... CPU: 0 PID: 8353 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 panic+0x2ad/0x55c kernel/panic.c:188 __warn.cold.8+0x20/0x45 kernel/panic.c:540 report_bug+0x254/0x2d0 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:178 [inline] do_error_trap+0x11b/0x200 arch/x86/kernel/traps.c:271 do_invalid_op+0x36/0x40 arch/x86/kernel/traps.c:290 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:969 RIP: 0010:__put_task_struct+0x3ef/0x620 kernel/fork.c:718 Code: 4c 89 ee e8 b3 49 7a 00 e9 a1 fe ff ff e8 79 3a 37 00 0f 0b e9 7c fd ff ff e8 6d 3a 37 00 0f 0b e9 87 fd ff ff e8 61 3a 37 00 <0f> 0b e9 d0 fc ff ff e8 55 3a 37 00 49 8d 87 90 05 00 00 31 f6 48 RSP: 0018:ffff880187e8efb0 EFLAGS: 00010093 RAX: ffff8801bb4ca0c0 RBX: ffff8801bb4ca0c0 RCX: ffffffff8146e5ad RDX: 0000000000000000 RSI: ffffffff8146e8df RDI: 0000000000000005 RBP: ffff880187e8f090 R08: ffff8801bb4ca0c0 R09: ffffed003769941c R10: ffffed003769941c R11: ffff8801bb4ca0e3 R12: 1ffff10030fd1df9 R13: 0000000000000000 R14: ffff880187e8f068 R15: ffff8801c475c280 put_task_struct include/linux/sched/task.h:96 [inline] perf_event_exit_task_context kernel/events/core.c:11108 [inline] perf_event_exit_task+0xca6/0x1070 kernel/events/core.c:11157 do_exit+0x1ae1/0x26d0 kernel/exit.c:876 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21c0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457569 Code: Bad RIP value. RSP: 002b:00007f27e9948c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffe7 RBX: 0000000000000003 RCX: 0000000000457569 RDX: 00000000200005c0 RSI: 000000008040450a RDI: 000000000000000a RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f27e99496d4 R13: 00000000004bf3dd R14: 00000000004cf1f0 R15: 00000000ffffffff ====================================================== WARNING: possible circular locking dependency detected 4.19.0-rc8-next-20181016+ #95 Not tainted ------------------------------------------------------ syz-executor3/8353 is trying to acquire lock: 00000000c8febd18 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 kernel/locking/semaphore.c:136 but task is already holding lock: 00000000347a61bf (&ctx->lock){-.-.}, at: perf_event_exit_task_context kernel/events/core.c:11098 [inline] 00000000347a61bf (&ctx->lock){-.-.}, at: perf_event_exit_task+0x420/0x1070 kernel/events/core.c:11157 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (&ctx->lock){-.-.}: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2d/0x40 kernel/locking/spinlock.c:144 perf_event_context_sched_out kernel/events/core.c:3124 [inline] __perf_event_task_sched_out+0xd5c/0x1bf0 kernel/events/core.c:3216 perf_event_task_sched_out include/linux/perf_event.h:1112 [inline] prepare_task_switch kernel/sched/core.c:2615 [inline] context_switch kernel/sched/core.c:2796 [inline] __schedule+0x103b/0x21d0 kernel/sched/core.c:3480 preempt_schedule_common+0x1f/0xe0 kernel/sched/core.c:3604 preempt_schedule+0x4d/0x60 kernel/sched/core.c:3630 ___preempt_schedule+0x16/0x18 smp_call_function_single+0x596/0x660 kernel/smp.c:304 task_function_call+0x189/0x280 kernel/events/core.c:115 perf_install_in_context+0x2a8/0x510 kernel/events/core.c:2609 __do_sys_perf_event_open+0x1fa5/0x3020 kernel/events/core.c:10791 __se_sys_perf_event_open kernel/events/core.c:10420 [inline] __x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #2 (&rq->lock){-.-.}: __raw_spin_lock include/linux/spinlock_api_smp.h:142 [inline] _raw_spin_lock+0x2d/0x40 kernel/locking/spinlock.c:144 rq_lock kernel/sched/sched.h:1127 [inline] task_fork_fair+0xb0/0x6d0 kernel/sched/fair.c:9768 sched_fork+0x443/0xba0 kernel/sched/core.c:2359 copy_process+0x2585/0x8770 kernel/fork.c:1887 _do_fork+0x1cb/0x11c0 kernel/fork.c:2216 kernel_thread+0x34/0x40 kernel/fork.c:2275 rest_init+0x28/0x372 init/main.c:409 arch_call_rest_init+0xe/0x1b start_kernel+0x9f0/0xa2b init/main.c:745 x86_64_start_reservations+0x2e/0x30 arch/x86/kernel/head64.c:472 x86_64_start_kernel+0x76/0x79 arch/x86/kernel/head64.c:451 secondary_startup_64+0xa4/0xb0 arch/x86/kernel/head_64.S:243 -> #1 (&p->pi_lock){-.-.}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x99/0xd0 kernel/locking/spinlock.c:152 try_to_wake_up+0xd2/0x12e0 kernel/sched/core.c:1965 wake_up_process+0x10/0x20 kernel/sched/core.c:2129 __up.isra.1+0x1c0/0x2a0 kernel/locking/semaphore.c:262 up+0x13c/0x1c0 kernel/locking/semaphore.c:187 __up_console_sem+0xbe/0x1b0 kernel/printk/printk.c:236 console_unlock+0x80c/0x1190 kernel/printk/printk.c:2432 con_install+0x34e/0x420 drivers/tty/vt/vt.c:3238 tty_driver_install_tty drivers/tty/tty_io.c:1225 [inline] tty_init_dev+0xfd/0x460 drivers/tty/tty_io.c:1330 tty_open_by_driver drivers/tty/tty_io.c:1965 [inline] tty_open+0x692/0xb30 drivers/tty/tty_io.c:2013 chrdev_open+0x25a/0x710 fs/char_dev.c:417 do_dentry_open+0x499/0x1250 fs/open.c:771 vfs_open+0xa0/0xd0 fs/open.c:880 do_last fs/namei.c:3418 [inline] path_openat+0x12bc/0x5150 fs/namei.c:3534 do_filp_open+0x255/0x380 fs/namei.c:3564 do_sys_open+0x568/0x700 fs/open.c:1063 __do_sys_open fs/open.c:1081 [inline] __se_sys_open fs/open.c:1076 [inline] __x64_sys_open+0x7e/0xc0 fs/open.c:1076 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe -> #0 ((console_sem).lock){-.-.}: lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3845 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x99/0xd0 kernel/locking/spinlock.c:152 down_trylock+0x13/0x70 kernel/locking/semaphore.c:136 __down_trylock_console_sem+0xae/0x1f0 kernel/printk/printk.c:219 console_trylock+0x15/0xa0 kernel/printk/printk.c:2247 console_trylock_spinning kernel/printk/printk.c:1653 [inline] vprintk_emit+0x372/0x990 kernel/printk/printk.c:1921 vprintk_default+0x28/0x30 kernel/printk/printk.c:1964 vprintk_func+0x7e/0x181 kernel/printk/printk_safe.c:398 printk+0xa7/0xcf kernel/printk/printk.c:1997 __warn+0x9e/0x1d0 kernel/panic.c:522 report_bug+0x254/0x2d0 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:178 [inline] do_error_trap+0x11b/0x200 arch/x86/kernel/traps.c:271 do_invalid_op+0x36/0x40 arch/x86/kernel/traps.c:290 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:969 __put_task_struct+0x3ef/0x620 kernel/fork.c:718 put_task_struct include/linux/sched/task.h:96 [inline] perf_event_exit_task_context kernel/events/core.c:11108 [inline] perf_event_exit_task+0xca6/0x1070 kernel/events/core.c:11157 do_exit+0x1ae1/0x26d0 kernel/exit.c:876 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 do_signal+0x9c/0x21c0 arch/x86/kernel/signal.c:816 exit_to_usermode_loop+0x2e5/0x380 arch/x86/entry/common.c:162 prepare_exit_to_usermode arch/x86/entry/common.c:197 [inline] syscall_return_slowpath arch/x86/entry/common.c:268 [inline] do_syscall_64+0x6be/0x820 arch/x86/entry/common.c:293 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Chain exists of: (console_sem).lock --> &rq->lock --> &ctx->lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ctx->lock); lock(&rq->lock); lock(&ctx->lock); lock((console_sem).lock); *** DEADLOCK *** 2 locks held by syz-executor3/8353: #0: 0000000077f85239 (&ctx->mutex){+.+.}, at: perf_event_exit_task_context kernel/events/core.c:11091 [inline] #0: 0000000077f85239 (&ctx->mutex){+.+.}, at: perf_event_exit_task+0x40d/0x1070 kernel/events/core.c:11157 #1: 00000000347a61bf (&ctx->lock){-.-.}, at: perf_event_exit_task_context kernel/events/core.c:11098 [inline] #1: 00000000347a61bf (&ctx->lock){-.-.}, at: perf_event_exit_task+0x420/0x1070 kernel/events/core.c:11157 stack backtrace: CPU: 0 PID: 8353 Comm: syz-executor3 Not tainted 4.19.0-rc8-next-20181016+ #95 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 print_circular_bug.isra.35.cold.54+0x1bd/0x27d kernel/locking/lockdep.c:1222 check_prev_add kernel/locking/lockdep.c:1864 [inline] check_prevs_add kernel/locking/lockdep.c:1977 [inline] validate_chain kernel/locking/lockdep.c:2348 [inline] __lock_acquire+0x3399/0x4c20 kernel/locking/lockdep.c:3342 lock_acquire+0x1ed/0x520 kernel/locking/lockdep.c:3845 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x99/0xd0 kernel/locking/spinlock.c:152 down_trylock+0x13/0x70 kernel/locking/semaphore.c:136 __down_trylock_console_sem+0xae/0x1f0 kernel/printk/printk.c:219 console_trylock+0x15/0xa0 kernel/printk/printk.c:2247 console_trylock_spinning kernel/printk/printk.c:1653 [inline] vprintk_emit+0x372/0x990 kernel/printk/printk.c:1921 vprintk_default+0x28/0x30 kernel/printk/printk.c:1964 vprintk_func+0x7e/0x181 kernel/printk/printk_safe.c:398 printk+0xa7/0xcf kernel/printk/printk.c:1997 __warn+0x9e/0x1d0 kernel/panic.c:522 report_bug+0x254/0x2d0 lib/bug.c:186 fixup_bug arch/x86/kernel/traps.c:178 [inline] do_error_trap+0x11b/0x200 arch/x86/kernel/traps.c:271 do_invalid_op+0x36/0x40 arch/x86/kernel/traps.c:290 invalid_op+0x14/0x20 arch/x86/entry/entry_64.S:969 RIP: 0010:__put_task_struct+0x3ef/0x620 kernel/fork.c:718 Code: 4c 89 ee e8 b3 49 7a 00 e9 a1 fe ff ff e8 79 3a 37 00 0f 0b e9 7c fd ff ff e8 6d 3a 37 00 0f 0b e9 87 fd ff ff e8 61 3a 37 00 <0f> 0b e9 d0 fc ff ff e8 55 3a 37 00 49 8d 87 90 05 00 00 31 f6 48 RSP: 0018:ffff880187e8efb0 EFLAGS: 00010093 RAX: ffff8801bb4ca0c0 RBX: ffff8801bb4ca0c0 RCX: ffffffff8146e5ad RDX: 0000000000000000 RSI: ffffffff8146e8df RDI: 0000000000000005 RBP: ffff880187e8f090 R08: ffff8801bb4ca0c0 R09: ffffed003769941c R10: ffffed003769941c R11: ffff8801bb4ca0e3 R12: 1ffff10030fd1df9 R13: 0000000000000000 R14: ffff880187e8f068 R15: ffff8801c475c280 put_task_struct include/linux/sched/task.h:96 [inline] perf_event_exit_task_context kernel/events/core.c:11108 [inline] perf_event_exit_task+0xca6/0x1070 kernel/events/core.c:11157 do_exit+0x1ae1/0x26d0 kernel/exit.c:876 do_group_exit+0x177/0x440 kernel/exit.c:970 get_signal+0x8a8/0x1970 kernel/signal.c:2517 ? ptrace_notify+0x Lost 38 message(s)! Kernel Offset: disabled Rebooting in 86400 seconds..