INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes [ 171.007569] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.103' (ECDSA) to the list of known hosts. [ 176.639920] random: sshd: uninitialized urandom read (32 bytes read) [ 176.732292] audit: type=1400 audit(1537689443.175:7): avc: denied { map } for pid=1822 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/09/23 07:57:23 parsed 1 programs [ 177.235455] audit: type=1400 audit(1537689443.675:8): avc: denied { map } for pid=1822 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 177.790451] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/23 07:57:25 executed programs: 0 [ 179.023663] audit: type=1400 audit(1537689445.465:9): avc: denied { map } for pid=1822 comm="syz-execprog" path="/root/syzkaller-shm146923566" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2018/09/23 07:57:31 executed programs: 6 [ 188.206138] [ 188.207806] ====================================================== [ 188.214120] WARNING: possible circular locking dependency detected [ 188.220428] 4.14.71+ #8 Not tainted [ 188.224041] ------------------------------------------------------ [ 188.230346] syz-executor4/4831 is trying to acquire lock: [ 188.235871] (&sig->cred_guard_mutex){+.+.}, at: [] lock_trace+0x3f/0xc0 [ 188.244259] [ 188.244259] but task is already holding lock: [ 188.250201] (&p->lock){+.+.}, at: [] seq_read+0xd4/0x11d0 [ 188.257367] [ 188.257367] which lock already depends on the new lock. [ 188.257367] [ 188.265675] [ 188.265675] the existing dependency chain (in reverse order) is: [ 188.273267] [ 188.273267] -> #2 (&p->lock){+.+.}: [ 188.278354] __mutex_lock+0xf5/0x1480 [ 188.282650] seq_read+0xd4/0x11d0 [ 188.286598] proc_reg_read+0xef/0x170 [ 188.290893] do_iter_read+0x3cc/0x580 [ 188.295190] vfs_readv+0xe6/0x150 [ 188.299141] default_file_splice_read+0x495/0x860 [ 188.304478] do_splice_to+0x102/0x150 [ 188.308775] SyS_splice+0xf4d/0x12a0 [ 188.312983] do_syscall_64+0x19b/0x4b0 [ 188.317366] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.323046] [ 188.323046] -> #1 (&pipe->mutex/1){+.+.}: [ 188.328657] __mutex_lock+0xf5/0x1480 [ 188.332960] fifo_open+0x156/0x9d0 [ 188.337021] do_dentry_open+0x426/0xda0 [ 188.341489] vfs_open+0x11c/0x210 [ 188.345439] path_openat+0x4eb/0x23a0 [ 188.349733] do_filp_open+0x197/0x270 [ 188.354033] do_open_execat+0x10d/0x5b0 [ 188.358510] do_execveat_common.isra.14+0x6cb/0x1d60 [ 188.364108] SyS_execve+0x34/0x40 [ 188.368074] do_syscall_64+0x19b/0x4b0 [ 188.372460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.378158] [ 188.378158] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 188.384460] lock_acquire+0x10f/0x380 [ 188.388756] __mutex_lock+0xf5/0x1480 [ 188.393053] lock_trace+0x3f/0xc0 [ 188.397001] proc_pid_stack+0xcd/0x200 [ 188.401383] proc_single_show+0xf1/0x160 [ 188.405942] seq_read+0x4e0/0x11d0 [ 188.409996] do_iter_read+0x3cc/0x580 [ 188.414308] vfs_readv+0xe6/0x150 [ 188.418255] do_preadv+0x187/0x230 [ 188.422290] do_syscall_64+0x19b/0x4b0 [ 188.426671] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.432354] [ 188.432354] other info that might help us debug this: [ 188.432354] [ 188.440488] Chain exists of: [ 188.440488] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 188.440488] [ 188.451331] Possible unsafe locking scenario: [ 188.451331] [ 188.457373] CPU0 CPU1 [ 188.462012] ---- ---- [ 188.466657] lock(&p->lock); [ 188.469746] lock(&pipe->mutex/1); [ 188.475869] lock(&p->lock); [ 188.481467] lock(&sig->cred_guard_mutex); [ 188.485759] [ 188.485759] *** DEADLOCK *** [ 188.485759] [ 188.491798] 1 lock held by syz-executor4/4831: [ 188.496367] #0: (&p->lock){+.+.}, at: [] seq_read+0xd4/0x11d0 [ 188.503987] [ 188.503987] stack backtrace: [ 188.508461] CPU: 1 PID: 4831 Comm: syz-executor4 Not tainted 4.14.71+ #8 [ 188.515270] Call Trace: [ 188.517843] dump_stack+0xb9/0x11b [ 188.521368] print_circular_bug.isra.18.cold.43+0x2d3/0x40c [ 188.527072] ? save_trace+0xd6/0x250 [ 188.530762] __lock_acquire+0x2ff9/0x4320 [ 188.534886] ? __is_insn_slot_addr+0x112/0x1f0 [ 188.539446] ? trace_hardirqs_on+0x10/0x10 [ 188.543655] ? mark_held_locks+0xc2/0x130 [ 188.547793] ? trace_hardirqs_on_caller+0x381/0x520 [ 188.552974] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 188.558064] lock_acquire+0x10f/0x380 [ 188.561850] ? lock_trace+0x3f/0xc0 [ 188.565453] ? lock_trace+0x3f/0xc0 [ 188.569056] __mutex_lock+0xf5/0x1480 [ 188.572841] ? lock_trace+0x3f/0xc0 [ 188.576448] ? kasan_kmalloc.part.1+0xa9/0xd0 [ 188.580921] ? lock_trace+0x3f/0xc0 [ 188.584522] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 188.588993] ? kvmalloc_node+0x42/0xd0 [ 188.592868] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 188.598293] ? trace_hardirqs_on+0x10/0x10 [ 188.602502] ? seq_read+0xd4/0x11d0 [ 188.606105] ? fs_reclaim_acquire+0x10/0x10 [ 188.610427] ? kasan_unpoison_shadow+0x30/0x40 [ 188.614998] ? kasan_kmalloc+0x76/0xc0 [ 188.618865] ? lock_trace+0x3f/0xc0 [ 188.622465] lock_trace+0x3f/0xc0 [ 188.625895] proc_pid_stack+0xcd/0x200 [ 188.629757] ? lock_trace+0xc0/0xc0 [ 188.633362] proc_single_show+0xf1/0x160 [ 188.637398] seq_read+0x4e0/0x11d0 [ 188.640923] ? seq_lseek+0x3d0/0x3d0 [ 188.644634] ? avc_policy_seqno+0x5/0x10 [ 188.648678] ? security_file_permission+0x88/0x1e0 [ 188.653590] do_iter_read+0x3cc/0x580 [ 188.657377] ? debug_check_no_obj_freed+0x150/0x77c [ 188.662375] vfs_readv+0xe6/0x150 [ 188.665812] ? compat_rw_copy_check_uvector+0x320/0x320 [ 188.671172] ? debug_check_no_obj_freed+0x2b2/0x77c [ 188.676174] ? __fget+0x204/0x3a0 [ 188.679609] ? lock_downgrade+0x560/0x560 [ 188.683744] ? lock_acquire+0x10f/0x380 [ 188.687712] ? check_preemption_disabled+0x34/0x160 [ 188.692715] ? __fget+0x22b/0x3a0 [ 188.696158] do_preadv+0x187/0x230 [ 188.699681] ? do_readv+0x240/0x240 [ 188.703295] ? do_syscall_64+0x43/0x4b0 [ 188.707255] ? SyS_writev+0x30/0x30 [ 188.710872] do_syscall_64+0x19b/0x4b0 [ 188.714745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.719916] RIP: 0033:0x457679 [ 188.723087] RSP: 002b:00007fe6c03c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 188.730774] RAX: ffffffffffffffda RBX: 00007fe6c03ca6d4 RCX: 0000000000457679 [ 188.738025] RDX: 0000000000000001 RSI: 00000000200023c0 RDI: 0000000000000006 [ 188.745276] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 188.752526] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 188.759780] R13: 00000000004d4878 R14: 00000000004c30ca R15: 0000000000000000 2018/09/23 07:57:36 executed programs: 225 2018/09/23 07:57:41 executed programs: 671