===================================== WARNING: bad unlock balance detected! 4.14.102+ #17 Not tainted ------------------------------------- migration/0/11 is trying to release lock (&rq->lock) at: [] migration_cpu_stop+0x2dd/0x430 kernel/sched/core.c:1036 but there are no more locks to release! other info that might help us debug this: 1 lock held by migration/0/11: #0: (&p->pi_lock){-.-.}, at: [] migration_cpu_stop+0xe1/0x430 kernel/sched/core.c:1027 stack backtrace: CPU: 0 PID: 11 Comm: migration/0 Not tainted 4.14.102+ #17 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x10e lib/dump_stack.c:53 print_unlock_imbalance_bug kernel/locking/lockdep.c:3548 [inline] print_unlock_imbalance_bug.cold+0x110/0x11f kernel/locking/lockdep.c:3525 input: syz1 as /devices/virtual/input/input197 input: syz1 as /devices/virtual/input/input198 kauditd_printk_skb: 252 callbacks suppressed audit: type=1400 audit(3026795057.673:64134): avc: denied { map } for pid=3250 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.673:64135): avc: denied { map } for pid=3250 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.673:64136): avc: denied { map } for pid=3250 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.693:64137): avc: denied { map } for pid=3250 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.693:64138): avc: denied { map } for pid=3252 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.693:64139): avc: denied { map } for pid=3252 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.693:64140): avc: denied { map } for pid=3250 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 input: syz1 as /devices/virtual/input/input199 input: syz1 as /devices/virtual/input/input200 audit: type=1400 audit(3026795057.693:64141): avc: denied { map } for pid=3252 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795057.693:64142): avc: denied { map } for pid=3252 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: audit_backlog=65 > audit_backlog_limit=64 input: syz1 as /devices/virtual/input/input201 input: syz1 as /devices/virtual/input/input202 input: syz1 as /devices/virtual/input/input203 uinput: write device info first uinput: write device info first uinput: write device info first input: syz1 as /devices/virtual/input/input207 input: syz1 as /devices/virtual/input/input208 kauditd_printk_skb: 341 callbacks suppressed audit: type=1400 audit(3026795065.033:64482): avc: denied { map } for pid=3392 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 input: syz1 as /devices/virtual/input/input209 input: syz1 as /devices/virtual/input/input210 audit: type=1400 audit(3026795065.083:64483): avc: denied { map } for pid=3392 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795065.083:64484): avc: denied { map } for pid=3386 comm="syz-executor.3" path=2F6D656D66643A2D42D54E49C56ABA707070F00884A26D202864656C6574656429 dev="tmpfs" ino=80120 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 audit: type=1400 audit(3026795065.083:64485): avc: denied { map } for pid=3392 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=981 audit_rate_limit=0 audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: type=1400 audit(3026795065.093:64486): avc: denied { map } for pid=3392 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: audit_lost=982 audit_rate_limit=0 audit_backlog_limit=64 input: syz1 as /devices/virtual/input/input211 uinput: write device info first