------------[ cut here ]------------ ====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Tainted: G L ------------------------------------------------------ syz.3.1622/12960 is trying to acquire lock: ffffffff8e6f3800 (console_owner){-.-.}-{0:0}, at: console_lock_spinning_enable+0x61/0x80 kernel/printk/printk.c:1902 but task is already holding lock: ffff8880b843b2e0 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:655 [inline] ffff8880b843b2e0 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x88/0x140 kernel/sched/core.c:639 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #4 (&rq->__lock){-.-.}-{2:2}: _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378 raw_spin_rq_lock_nested+0x2c/0x140 kernel/sched/core.c:647 raw_spin_rq_lock kernel/sched/sched.h:1615 [inline] _task_rq_lock+0xcf/0x490 kernel/sched/core.c:747 cgroup_move_task+0x81/0x2b0 kernel/sched/psi.c:1170 css_set_move_task+0x285/0x600 kernel/cgroup/cgroup.c:948 cgroup_post_fork+0x202/0x9b0 kernel/cgroup/cgroup.c:6917 copy_process+0x5717/0x7a40 kernel/fork.c:2467 kernel_clone+0xfc/0x9a0 kernel/fork.c:2653 user_mode_thread+0xcc/0x110 kernel/fork.c:2729 rest_init+0x21/0x260 init/main.c:725 start_kernel+0x47f/0x480 init/main.c:1210 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310 x86_64_start_kernel+0x12b/0x130 arch/x86/kernel/head64.c:291 common_startup_64+0x13e/0x148 -> #3 (&p->pi_lock){-.-.}-{2:2}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline] _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162 class_raw_spinlock_irqsave_constructor include/linux/spinlock.h:570 [inline] try_to_wake_up+0xb2/0x1a80 kernel/sched/core.c:4130 create_worker+0x346/0x750 kernel/workqueue.c:2847 workqueue_init+0x768/0x930 kernel/workqueue.c:8043 kernel_init_freeable+0x3d4/0x7a0 init/main.c:1677 kernel_init+0x1f/0x1e0 init/main.c:1582 ret_from_fork+0x754/0xd80 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 -> #2 (&pool->lock){-.-.}-{2:2}: __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 __queue_work+0x270/0x1150 kernel/workqueue.c:2314 queue_work_on+0x1a9/0x1e0 kernel/workqueue.c:2405 tty_wakeup+0xe8/0x120 drivers/tty/tty_io.c:515 tty_port_default_wakeup+0x47/0x60 drivers/tty/tty_port.c:67 serial8250_tx_chars+0x68f/0x860 drivers/tty/serial/8250/8250_port.c:1719 serial8250_handle_irq+0x73e/0xcb0 drivers/tty/serial/8250/8250_port.c:1827 serial8250_default_handle_irq+0x9e/0x270 drivers/tty/serial/8250/8250_port.c:1846 serial8250_interrupt+0xf8/0x1d0 drivers/tty/serial/8250/8250_core.c:86 __handle_irq_event_percpu+0x232/0x8e0 kernel/irq/handle.c:209 handle_irq_event_percpu kernel/irq/handle.c:246 [inline] handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:263 handle_edge_irq+0x375/0x970 kernel/irq/chip.c:855 generic_handle_irq_desc include/linux/irqdesc.h:186 [inline] handle_irq arch/x86/kernel/irq.c:262 [inline] call_irq_handler arch/x86/kernel/irq.c:318 [inline] __common_interrupt+0xd8/0x2f0 arch/x86/kernel/irq.c:333 common_interrupt+0xb9/0xe0 arch/x86/kernel/irq.c:326 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:688 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:178 [inline] _raw_spin_unlock_irqrestore+0x31/0x80 kernel/locking/spinlock.c:194 spin_unlock_irqrestore include/linux/spinlock.h:407 [inline] uart_port_unlock_irqrestore include/linux/serial_core.h:788 [inline] uart_port_unlock_deref drivers/tty/serial/serial_core.c:91 [inline] uart_port_unlock_deref drivers/tty/serial/serial_core.c:88 [inline] uart_write+0x29d/0xb20 drivers/tty/serial/serial_core.c:634 n_hdlc_send_frames+0x233/0x590 drivers/tty/n_hdlc.c:287 n_hdlc_tty_write+0x373/0x5a0 drivers/tty/n_hdlc.c:565 iterate_tty_write drivers/tty/tty_io.c:1006 [inline] file_tty_write.isra.0+0x4d2/0x890 drivers/tty/tty_io.c:1081 new_sync_write fs/read_write.c:595 [inline] vfs_write+0x6ac/0x1070 fs/read_write.c:688 ksys_write+0x12a/0x250 fs/read_write.c:740 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #1 (&port_lock_key){-.-.}-{3:3}: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline] _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162 uart_port_lock_irqsave include/linux/serial_core.h:717 [inline] serial8250_console_write+0x17e/0x1900 drivers/tty/serial/8250/8250_port.c:3301 console_emit_next_record kernel/printk/printk.c:3183 [inline] console_flush_one_record+0x790/0xe50 kernel/printk/printk.c:3269 console_flush_all kernel/printk/printk.c:3343 [inline] __console_flush_and_unlock kernel/printk/printk.c:3373 [inline] console_unlock+0x103/0x260 kernel/printk/printk.c:3413 vprintk_emit+0x407/0x6b0 kernel/printk/printk.c:2479 _printk+0xcf/0x110 kernel/printk/printk.c:2504 register_console.cold+0xc0/0x248 kernel/printk/printk.c:4208 univ8250_console_init+0x6f/0x80 drivers/tty/serial/8250/8250_core.c:515 console_init+0x423/0x620 kernel/printk/printk.c:4407 start_kernel+0x305/0x480 init/main.c:1147 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310 x86_64_start_kernel+0x12b/0x130 arch/x86/kernel/head64.c:291 common_startup_64+0x13e/0x148 -> #0 (console_owner){-.-.}-{0:0}: check_prev_add kernel/locking/lockdep.c:3165 [inline] check_prevs_add kernel/locking/lockdep.c:3284 [inline] validate_chain kernel/locking/lockdep.c:3908 [inline] __lock_acquire+0x14b8/0x2630 kernel/locking/lockdep.c:5237 lock_acquire kernel/locking/lockdep.c:5868 [inline] lock_acquire+0x1cf/0x380 kernel/locking/lockdep.c:5825 console_lock_spinning_enable+0x72/0x80 kernel/printk/printk.c:1902 console_emit_next_record kernel/printk/printk.c:3177 [inline] console_flush_one_record+0x739/0xe50 kernel/printk/printk.c:3269 console_flush_all kernel/printk/printk.c:3343 [inline] __console_flush_and_unlock kernel/printk/printk.c:3373 [inline] console_unlock+0x103/0x260 kernel/printk/printk.c:3413 vprintk_emit+0x407/0x6b0 kernel/printk/printk.c:2479 _printk+0xcf/0x110 kernel/printk/printk.c:2504 __report_bug.cold+0x15/0x137 lib/bug.c:243 report_bug+0xb2/0x220 lib/bug.c:281 handle_bug+0x16a/0x2a0 arch/x86/kernel/traps.c:435 exc_invalid_op+0x17/0x50 arch/x86/kernel/traps.c:489 asm_exc_invalid_op+0x1a/0x20 arch/x86/include/asm/idtentry.h:616 lockdep_assert_rq_held kernel/sched/sched.h:1600 [inline] lockdep_assert_rq_held kernel/sched/sched.h:1597 [inline] update_rq_clock+0x40a/0xd20 kernel/sched/core.c:850 pick_next_task kernel/sched/core.c:6132 [inline] __schedule+0x1b7d/0x6120 kernel/sched/core.c:6852 preempt_schedule_irq+0x50/0x90 kernel/sched/core.c:7238 irqentry_exit+0x17b/0x670 kernel/entry/common.c:239 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 stack_trace_consume_entry+0x9a/0x170 kernel/stacktrace.c:89 arch_stack_walk+0x88/0xf0 arch/x86/kernel/stacktrace.c:27 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x30/0x50 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 poison_kmalloc_redzone mm/kasan/common.c:398 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:415 kasan_kmalloc include/linux/kasan.h:263 [inline] __do_kmalloc_node mm/slub.c:5260 [inline] __kmalloc_noprof+0x301/0x850 mm/slub.c:5272 kmalloc_noprof include/linux/slab.h:954 [inline] tomoyo_realpath_from_path+0xb6/0x690 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_number_perm+0x23c/0x580 security/tomoyo/file.c:728 security_file_ioctl+0xd3/0x230 security/security.c:2435 __do_sys_ioctl fs/ioctl.c:591 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0xb7/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Chain exists of: console_owner --> &p->pi_lock --> &rq->__lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rq->__lock); lock(&p->pi_lock); lock(&rq->__lock); lock(console_owner); *** DEADLOCK *** 4 locks held by syz.3.1622/12960: #0: ffffffff8f235318 (tomoyo_ss){.+.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:187 [inline] #0: ffffffff8f235318 (tomoyo_ss){.+.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:294 [inline] #0: ffffffff8f235318 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_read_lock security/tomoyo/common.h:1112 [inline] #0: ffffffff8f235318 (tomoyo_ss){.+.+}-{0:0}, at: tomoyo_path_number_perm+0x22e/0x580 security/tomoyo/file.c:727 #1: ffff8880b843b2e0 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested kernel/sched/core.c:655 [inline] #1: ffff8880b843b2e0 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x88/0x140 kernel/sched/core.c:639 #2: ffffffff8e7d3c40 (console_lock){+.+.}-{0:0}, at: _printk+0xcf/0x110 kernel/printk/printk.c:2504 #3: ffffffff8e7d3cb8 (console_srcu){....}-{0:0}, at: rcu_try_lock_acquire include/linux/rcupdate.h:317 [inline] #3: ffffffff8e7d3cb8 (console_srcu){....}-{0:0}, at: srcu_read_lock_nmisafe include/linux/srcu.h:428 [inline] #3: ffffffff8e7d3cb8 (console_srcu){....}-{0:0}, at: console_srcu_read_lock kernel/printk/printk.c:291 [inline] #3: ffffffff8e7d3cb8 (console_srcu){....}-{0:0}, at: console_flush_one_record+0xfd/0xe50 kernel/printk/printk.c:3246 stack backtrace: CPU: 0 UID: 0 PID: 12960 Comm: syz.3.1622 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 print_circular_bug.cold+0x178/0x1c7 kernel/locking/lockdep.c:2043 check_noncircular+0x146/0x160 kernel/locking/lockdep.c:2175 check_prev_add kernel/locking/lockdep.c:3165 [inline] check_prevs_add kernel/locking/lockdep.c:3284 [inline] validate_chain kernel/locking/lockdep.c:3908 [inline] __lock_acquire+0x14b8/0x2630 kernel/locking/lockdep.c:5237 lock_acquire kernel/locking/lockdep.c:5868 [inline] lock_acquire+0x1cf/0x380 kernel/locking/lockdep.c:5825 console_lock_spinning_enable+0x72/0x80 kernel/printk/printk.c:1902 console_emit_next_record kernel/printk/printk.c:3177 [inline] console_flush_one_record+0x739/0xe50 kernel/printk/printk.c:3269 console_flush_all kernel/printk/printk.c:3343 [inline] __console_flush_and_unlock kernel/printk/printk.c:3373 [inline] console_unlock+0x103/0x260 kernel/printk/printk.c:3413 vprintk_emit+0x407/0x6b0 kernel/printk/printk.c:2479 _printk+0xcf/0x110 kernel/printk/printk.c:2504 __report_bug.cold+0x15/0x137 lib/bug.c:243 report_bug+0xb2/0x220 lib/bug.c:281 handle_bug+0x16a/0x2a0 arch/x86/kernel/traps.c:435 exc_invalid_op+0x17/0x50 arch/x86/kernel/traps.c:489 asm_exc_invalid_op+0x1a/0x20 arch/x86/include/asm/idtentry.h:616 RIP: 0010:lockdep_assert_rq_held kernel/sched/sched.h:1600 [inline] RIP: 0010:lockdep_assert_rq_held kernel/sched/sched.h:1597 [inline] RIP: 0010:update_rq_clock+0x40a/0xd20 kernel/sched/core.c:850 Code: ab 48 0b 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc a8 04 0f 84 df fc ff ff 90 0f 0b 90 e9 d6 fc ff ff 90 <0f> 0b 90 e9 92 fc ff ff 4c 8d 83 40 0b 00 00 48 b8 00 00 00 00 00 RSP: 0018:ffffc90004eef510 EFLAGS: 00010046 RAX: 0000000000000000 RBX: ffff8880b853b280 RCX: 0000000000000001 RDX: 0000000000000046 RSI: ffffffff8de5a083 RDI: ffffffff8c1b0aa0 RBP: ffffc90004eef6b8 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff90d9cc17 R11: 0000000000000000 R12: ffffffff90d9ffe4 R13: ffff8880b853c0c0 R14: ffff88801e6a1e80 R15: ffff8880b853b280 pick_next_task kernel/sched/core.c:6132 [inline] __schedule+0x1b7d/0x6120 kernel/sched/core.c:6852 preempt_schedule_irq+0x50/0x90 kernel/sched/core.c:7238 irqentry_exit+0x17b/0x670 kernel/entry/common.c:239 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:stack_trace_consume_entry+0x9a/0x170 kernel/stacktrace.c:93 Code: 8d 7b 0c 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 98 00 00 00 8b 43 0c 85 c0 75 57 <48> b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 80 3c 02 00 0f RSP: 0018:ffffc90004eef7c8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffc90004eef8a8 RCX: ffffc90004eef73c RDX: 0000000000000000 RSI: ffffffff82737f30 RDI: ffffc90004eef8b4 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000007 R10: 0000000000000200 R11: 000000000000f2c6 R12: ffffffff81f2c390 R13: ffffc90004eef8a8 R14: 0000000000000000 R15: ffff888033c01e80 arch_stack_walk+0x88/0xf0 arch/x86/kernel/stacktrace.c:27 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x30/0x50 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 poison_kmalloc_redzone mm/kasan/common.c:398 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:415 kasan_kmalloc include/linux/kasan.h:263 [inline] __do_kmalloc_node mm/slub.c:5260 [inline] __kmalloc_noprof+0x301/0x850 mm/slub.c:5272 kmalloc_noprof include/linux/slab.h:954 [inline] tomoyo_realpath_from_path+0xb6/0x690 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_number_perm+0x23c/0x580 security/tomoyo/file.c:728 security_file_ioctl+0xd3/0x230 security/security.c:2435 __do_sys_ioctl fs/ioctl.c:591 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0xb7/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f092b19c42b Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 RSP: 002b:00007f092c089050 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f092b416308 RCX: 00007f092b19c42b RDX: 0000000000000000 RSI: 0000000000006364 RDI: 00000000000000db RBP: 0000000000000000 R08: 00007f092c0896c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007f092b416308 R14: 00007ffc6b3233f0 R15: 00007ffc6b3234d8 debug_locks && !(lock_is_held(&(__rq_lockp(rq))->dep_map) != 0) WARNING: kernel/sched/sched.h:1600 at lockdep_assert_rq_held kernel/sched/sched.h:1600 [inline], CPU#0: syz.3.1622/12960 WARNING: kernel/sched/sched.h:1600 at lockdep_assert_rq_held kernel/sched/sched.h:1597 [inline], CPU#0: syz.3.1622/12960 WARNING: kernel/sched/sched.h:1600 at update_rq_clock+0x40a/0xd20 kernel/sched/core.c:850, CPU#0: syz.3.1622/12960 Modules linked in: CPU: 0 UID: 0 PID: 12960 Comm: syz.3.1622 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:lockdep_assert_rq_held kernel/sched/sched.h:1600 [inline] RIP: 0010:lockdep_assert_rq_held kernel/sched/sched.h:1597 [inline] RIP: 0010:update_rq_clock+0x40a/0xd20 kernel/sched/core.c:850 Code: ab 48 0b 00 00 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc a8 04 0f 84 df fc ff ff 90 0f 0b 90 e9 d6 fc ff ff 90 <0f> 0b 90 e9 92 fc ff ff 4c 8d 83 40 0b 00 00 48 b8 00 00 00 00 00 RSP: 0018:ffffc90004eef510 EFLAGS: 00010046 RAX: 0000000000000000 RBX: ffff8880b853b280 RCX: 0000000000000001 RDX: 0000000000000046 RSI: ffffffff8de5a083 RDI: ffffffff8c1b0aa0 RBP: ffffc90004eef6b8 R08: 0000000000000001 R09: 0000000000000001 R10: ffffffff90d9cc17 R11: 0000000000000000 R12: ffffffff90d9ffe4 R13: ffff8880b853c0c0 R14: ffff88801e6a1e80 R15: ffff8880b853b280 FS: 00007f092c0896c0(0000) GS:ffff888124349000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000003c3000 CR3: 0000000020718000 CR4: 00000000003526f0 Call Trace: pick_next_task kernel/sched/core.c:6132 [inline] __schedule+0x1b7d/0x6120 kernel/sched/core.c:6852 preempt_schedule_irq+0x50/0x90 kernel/sched/core.c:7238 irqentry_exit+0x17b/0x670 kernel/entry/common.c:239 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0010:stack_trace_consume_entry+0x9a/0x170 kernel/stacktrace.c:93 Code: 8d 7b 0c 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 98 00 00 00 8b 43 0c 85 c0 75 57 <48> b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 80 3c 02 00 0f RSP: 0018:ffffc90004eef7c8 EFLAGS: 00000246 RAX: 0000000000000000 RBX: ffffc90004eef8a8 RCX: ffffc90004eef73c RDX: 0000000000000000 RSI: ffffffff82737f30 RDI: ffffc90004eef8b4 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000007 R10: 0000000000000200 R11: 000000000000f2c6 R12: ffffffff81f2c390 R13: ffffc90004eef8a8 R14: 0000000000000000 R15: ffff888033c01e80 arch_stack_walk+0x88/0xf0 arch/x86/kernel/stacktrace.c:27 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122 kasan_save_stack+0x30/0x50 mm/kasan/common.c:57 kasan_save_track+0x14/0x30 mm/kasan/common.c:78 poison_kmalloc_redzone mm/kasan/common.c:398 [inline] __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:415 kasan_kmalloc include/linux/kasan.h:263 [inline] __do_kmalloc_node mm/slub.c:5260 [inline] __kmalloc_noprof+0x301/0x850 mm/slub.c:5272 kmalloc_noprof include/linux/slab.h:954 [inline] tomoyo_realpath_from_path+0xb6/0x690 security/tomoyo/realpath.c:251 tomoyo_get_realpath security/tomoyo/file.c:151 [inline] tomoyo_path_number_perm+0x23c/0x580 security/tomoyo/file.c:728 security_file_ioctl+0xd3/0x230 security/security.c:2435 __do_sys_ioctl fs/ioctl.c:591 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0xb7/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x106/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f092b19c42b Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00 RSP: 002b:00007f092c089050 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007f092b416308 RCX: 00007f092b19c42b RDX: 0000000000000000 RSI: 0000000000006364 RDI: 00000000000000db RBP: 0000000000000000 R08: 00007f092c0896c0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 R13: 00007f092b416308 R14: 00007ffc6b3233f0 R15: 00007ffc6b3234d8 ---------------- Code disassembly (best guess): 0: 8d 7b 0c lea 0xc(%rbx),%edi 3: 48 89 fa mov %rdi,%rdx 6: 48 c1 ea 03 shr $0x3,%rdx a: 0f b6 14 02 movzbl (%rdx,%rax,1),%edx e: 48 89 f8 mov %rdi,%rax 11: 83 e0 07 and $0x7,%eax 14: 83 c0 03 add $0x3,%eax 17: 38 d0 cmp %dl,%al 19: 7c 08 jl 0x23 1b: 84 d2 test %dl,%dl 1d: 0f 85 98 00 00 00 jne 0xbb 23: 8b 43 0c mov 0xc(%rbx),%eax 26: 85 c0 test %eax,%eax 28: 75 57 jne 0x81 * 2a: 48 b8 00 00 00 00 00 movabs $0xdffffc0000000000,%rax <-- trapping instruction 31: fc ff df 34: 48 89 da mov %rbx,%rdx 37: 48 c1 ea 03 shr $0x3,%rdx 3b: 80 3c 02 00 cmpb $0x0,(%rdx,%rax,1) 3f: 0f .byte 0xf