[ 108.804411][T10330] restorecond (10330) used greatest stack depth: 22776 bytes left [ 108.814972][ T23] audit: type=1400 audit(1581178127.248:38): avc: denied { watch } for pid=10330 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [[ 109.058998][ T23] audit: type=1800 audit(1581178127.518:39): pid=10237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 ....] Starting O[ 109.081272][ T23] audit: type=1800 audit(1581178127.518:40): pid=10237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 penBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 113.302816][ T23] audit: type=1400 audit(1581178131.758:41): avc: denied { map } for pid=10414 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.1.33' (ECDSA) to the list of known hosts. executing program [ 119.992422][ T23] audit: type=1400 audit(1581178138.448:42): avc: denied { map } for pid=10426 comm="syz-executor740" path="/root/syz-executor740493162" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 120.007922][T10427] IPVS: ftp: loaded support on port[0] = 21 [ 120.083958][ C1] [ 120.086480][ C1] ================================ [ 120.091569][ C1] WARNING: inconsistent lock state [ 120.096690][ C1] 5.5.0-syzkaller #0 Not tainted [ 120.101593][ C1] -------------------------------- [ 120.106671][ C1] inconsistent {SOFTIRQ-ON-W} -> {IN-SOFTIRQ-W} usage. [ 120.113518][ C1] ksoftirqd/1/16 [HC0[0]:SC1[1]:HE1:SE0] takes: [ 120.119733][ C1] ffff888097a2d1c8 (&(&local->client_conns_lock)->rlock){+.?.}, at: rxrpc_put_client_conn+0x6ed/0xc90 [ 120.130679][ C1] {SOFTIRQ-ON-W} state was registered at: [ 120.136457][ C1] lock_acquire+0x190/0x410 [ 120.141152][ C1] _raw_spin_lock+0x2f/0x40 [ 120.145710][ C1] rxrpc_connect_call+0x358/0x4e30 [ 120.150881][ C1] rxrpc_new_client_call+0x9c0/0x1ad0 [ 120.156396][ C1] rxrpc_do_sendmsg+0xffa/0x1d5f [ 120.161408][ C1] rxrpc_sendmsg+0x4d6/0x5f0 [ 120.166056][ C1] sock_sendmsg+0xd7/0x130 [ 120.170562][ C1] ____sys_sendmsg+0x358/0x880 [ 120.175411][ C1] ___sys_sendmsg+0x100/0x170 [ 120.180144][ C1] __sys_sendmmsg+0x1bf/0x4d0 [ 120.184875][ C1] __x64_sys_sendmmsg+0x9d/0x100 [ 120.189869][ C1] do_syscall_64+0xfa/0x790 [ 120.194432][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 120.200379][ C1] irq event stamp: 794138 [ 120.204679][ C1] hardirqs last enabled at (794138): [] _raw_spin_unlock_irqrestore+0x66/0xe0 [ 120.215144][ C1] hardirqs last disabled at (794137): [] _raw_spin_lock_irqsave+0x6f/0xcd [ 120.225174][ C1] softirqs last enabled at (794122): [] __do_softirq+0x6cd/0x98c [ 120.234517][ C1] softirqs last disabled at (794127): [] run_ksoftirqd+0x8e/0x110 [ 120.243994][ C1] [ 120.243994][ C1] other info that might help us debug this: [ 120.252031][ C1] Possible unsafe locking scenario: [ 120.252031][ C1] [ 120.259496][ C1] CPU0 [ 120.262754][ C1] ---- [ 120.266010][ C1] lock(&(&local->client_conns_lock)->rlock); [ 120.272165][ C1] [ 120.275591][ C1] lock(&(&local->client_conns_lock)->rlock); [ 120.281906][ C1] [ 120.281906][ C1] *** DEADLOCK *** [ 120.281906][ C1] [ 120.290039][ C1] 1 lock held by ksoftirqd/1/16: [ 120.294944][ C1] #0: ffffffff89bac140 (rcu_callback){....}, at: rcu_core+0x562/0x1390 [ 120.303253][ C1] [ 120.303253][ C1] stack backtrace: [ 120.309121][ C1] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.5.0-syzkaller #0 [ 120.316902][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.326931][ C1] Call Trace: [ 120.330194][ C1] dump_stack+0x197/0x210 [ 120.334508][ C1] print_usage_bug.cold+0x327/0x378 [ 120.339708][ C1] mark_lock+0xbb4/0x1220 [ 120.344008][ C1] ? check_usage_backwards+0x330/0x330 [ 120.349437][ C1] __lock_acquire+0x1e8e/0x4a00 [ 120.354259][ C1] ? find_held_lock+0x35/0x130 [ 120.358996][ C1] ? __kasan_check_read+0x11/0x20 [ 120.363996][ C1] ? mark_lock+0xc2/0x1220 [ 120.368385][ C1] ? mark_held_locks+0xf0/0xf0 [ 120.373117][ C1] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 120.378897][ C1] lock_acquire+0x190/0x410 [ 120.383372][ C1] ? rxrpc_put_client_conn+0x6ed/0xc90 [ 120.388803][ C1] _raw_spin_lock+0x2f/0x40 [ 120.393289][ C1] ? rxrpc_put_client_conn+0x6ed/0xc90 [ 120.398728][ C1] rxrpc_put_client_conn+0x6ed/0xc90 [ 120.404073][ C1] ? rxrpc_rcu_destroy_call+0xbd/0x200 [ 120.409505][ C1] rxrpc_rcu_destroy_call+0xbd/0x200 [ 120.414767][ C1] rcu_core+0x5e1/0x1390 [ 120.418984][ C1] ? __rcu_read_unlock+0x700/0x700 [ 120.424068][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 120.429581][ C1] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 120.435534][ C1] rcu_core_si+0x9/0x10 [ 120.439660][ C1] __do_softirq+0x262/0x98c [ 120.444139][ C1] ? takeover_tasklets+0x820/0x820 [ 120.449220][ C1] run_ksoftirqd+0x8e/0x110 [ 120.453703][ C1] smpboot_thread_fn+0x6a3/0xa40 [ 120.458618][ C1] ? __smpboot_create_thread.part.0+0x340/0x340 [ 120.464831][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 120.471039][ C1] ? __kthread_parkme+0x108/0x1c0 [ 120.476045][ C1] ? __kasan_check_read+0x11/0x20 [ 120.481041][ C1] kthread+0x361/0x430 [ 120.485