[ 42.152042] audit: type=1800 audit(1560793727.760:30): pid=7802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 47.313637] kauditd_printk_skb: 4 callbacks suppressed [ 47.313652] audit: type=1400 audit(1560793732.960:35): avc: denied { map } for pid=7976 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.54' (ECDSA) to the list of known hosts. [ 70.023456] audit: type=1400 audit(1560793755.670:36): avc: denied { map } for pid=7988 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/17 17:49:16 parsed 1 programs [ 70.889430] audit: type=1400 audit(1560793756.540:37): avc: denied { map } for pid=7988 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14979 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2019/06/17 17:49:18 executed programs: 0 [ 72.970592] IPVS: ftp: loaded support on port[0] = 21 [ 73.038164] chnl_net:caif_netlink_parms(): no params data found [ 73.071776] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.082830] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.090291] device bridge_slave_0 entered promiscuous mode [ 73.098101] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.104534] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.111903] device bridge_slave_1 entered promiscuous mode [ 73.128373] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 73.137463] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 73.153566] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 73.161479] team0: Port device team_slave_0 added [ 73.167166] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.174709] team0: Port device team_slave_1 added [ 73.180345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.187814] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 73.237481] device hsr_slave_0 entered promiscuous mode [ 73.305267] device hsr_slave_1 entered promiscuous mode [ 73.345493] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 73.352403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 73.366878] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.373375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.380506] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.386922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.420209] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 73.427064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.435902] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 73.444659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 73.464735] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.472658] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.481404] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 73.491804] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 73.498449] 8021q: adding VLAN 0 to HW filter on device team0 [ 73.507925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.516049] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.522406] bridge0: port 1(bridge_slave_0) entered forwarding state [ 73.545718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.553404] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.559907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 73.576329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.584185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.592405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 73.600554] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 73.609699] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 73.616425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 73.623919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 73.639319] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 73.649776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 73.661452] audit: type=1400 audit(1560793759.310:38): avc: denied { associate } for pid=8007 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 73.723926] [ 73.725594] ====================================================== [ 73.731946] WARNING: possible circular locking dependency detected [ 73.738261] 4.19.51 #23 Not tainted [ 73.741870] ------------------------------------------------------ [ 73.748177] syz-executor.0/8013 is trying to acquire lock: [ 73.753788] 0000000071e4fa6a (sb_writers#4){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 73.761265] [ 73.761265] but task is already holding lock: [ 73.767223] 00000000f8f2361d (&iint->mutex){+.+.}, at: process_measurement+0x354/0x1560 [ 73.775368] [ 73.775368] which lock already depends on the new lock. [ 73.775368] [ 73.783681] [ 73.783681] the existing dependency chain (in reverse order) is: [ 73.791297] [ 73.791297] -> #1 (&iint->mutex){+.+.}: [ 73.796760] __mutex_lock+0xf7/0x1300 [ 73.801064] mutex_lock_nested+0x16/0x20 [ 73.805660] process_measurement+0x354/0x1560 [ 73.810683] ima_file_check+0xc5/0x110 [ 73.815094] path_openat+0x1130/0x4690 [ 73.819500] do_filp_open+0x1a1/0x280 [ 73.823842] do_sys_open+0x3fe/0x550 [ 73.828072] __x64_sys_open+0x7e/0xc0 [ 73.832393] do_syscall_64+0xfd/0x620 [ 73.836713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 73.842414] [ 73.842414] -> #0 (sb_writers#4){.+.+}: [ 73.847883] lock_acquire+0x16f/0x3f0 [ 73.852191] __sb_start_write+0x20b/0x360 [ 73.857036] mnt_want_write+0x3f/0xc0 [ 73.861430] ovl_want_write+0x76/0xa0 [ 73.865740] ovl_maybe_copy_up+0x122/0x180 [ 73.870476] ovl_open+0xb8/0x270 [ 73.874351] do_dentry_open+0x4c3/0x1200 [ 73.878944] dentry_open+0x132/0x1d0 [ 73.883175] ima_calc_file_hash+0x684/0x970 [ 73.888092] ima_collect_measurement+0x50f/0x5c0 [ 73.893350] process_measurement+0xeca/0x1560 [ 73.898368] ima_file_check+0xc5/0x110 [ 73.902766] path_openat+0x1130/0x4690 [ 73.907166] do_filp_open+0x1a1/0x280 [ 73.911488] do_sys_open+0x3fe/0x550 [ 73.915742] __x64_sys_open+0x7e/0xc0 [ 73.920051] do_syscall_64+0xfd/0x620 [ 73.924357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 73.930065] [ 73.930065] other info that might help us debug this: [ 73.930065] [ 73.938206] Possible unsafe locking scenario: [ 73.938206] [ 73.944244] CPU0 CPU1 [ 73.948893] ---- ---- [ 73.953540] lock(&iint->mutex); [ 73.956998] lock(sb_writers#4); [ 73.962958] lock(&iint->mutex); [ 73.968913] lock(sb_writers#4); [ 73.972352] [ 73.972352] *** DEADLOCK *** [ 73.972352] [ 73.978499] 1 lock held by syz-executor.0/8013: [ 73.983248] #0: 00000000f8f2361d (&iint->mutex){+.+.}, at: process_measurement+0x354/0x1560 [ 73.991835] [ 73.991835] stack backtrace: [ 73.996331] CPU: 1 PID: 8013 Comm: syz-executor.0 Not tainted 4.19.51 #23 [ 74.003242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.012586] Call Trace: [ 74.015175] dump_stack+0x172/0x1f0 [ 74.018822] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 74.024194] __lock_acquire+0x2e6d/0x48f0 [ 74.028335] ? mark_held_locks+0x100/0x100 [ 74.032560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 74.038110] ? avc_has_perm+0x404/0x610 [ 74.042080] ? avc_has_perm_noaudit+0x570/0x570 [ 74.046859] lock_acquire+0x16f/0x3f0 [ 74.050674] ? mnt_want_write+0x3f/0xc0 [ 74.054637] __sb_start_write+0x20b/0x360 [ 74.058776] ? mnt_want_write+0x3f/0xc0 [ 74.062740] mnt_want_write+0x3f/0xc0 [ 74.066557] ovl_want_write+0x76/0xa0 [ 74.070355] ovl_maybe_copy_up+0x122/0x180 [ 74.074591] ovl_open+0xb8/0x270 [ 74.077969] do_dentry_open+0x4c3/0x1200 [ 74.082020] ? check_preemption_disabled+0x48/0x290 [ 74.087029] ? ovl_llseek+0x3b0/0x3b0 [ 74.091574] ? chown_common+0x5c0/0x5c0 [ 74.095550] dentry_open+0x132/0x1d0 [ 74.099266] ima_calc_file_hash+0x684/0x970 [ 74.103580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 74.109111] ima_collect_measurement+0x50f/0x5c0 [ 74.113857] ? ima_get_action+0xa0/0xa0 [ 74.117821] process_measurement+0xeca/0x1560 [ 74.122306] ? ima_add_template_entry.cold+0x48/0x48 [ 74.127399] ? mark_held_locks+0x100/0x100 [ 74.131644] ? chown_common+0x5c0/0x5c0 [ 74.135603] ? selinux_task_getsecid+0x16f/0x2d0 [ 74.140342] ? find_held_lock+0x35/0x130 [ 74.144388] ? selinux_task_getsecid+0x16f/0x2d0 [ 74.149132] ? lock_downgrade+0x810/0x810 [ 74.153706] ? kasan_check_read+0x11/0x20 [ 74.157847] ? selinux_task_getsecid+0x196/0x2d0 [ 74.162591] ima_file_check+0xc5/0x110 [ 74.166465] ? process_measurement+0x1560/0x1560 [ 74.171225] ? inode_permission+0xb4/0x560 [ 74.175458] path_openat+0x1130/0x4690 [ 74.179337] ? __lock_acquire+0x6eb/0x48f0 [ 74.183565] ? getname+0x1a/0x20 [ 74.186927] ? do_sys_open+0x2c9/0x550 [ 74.190820] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 74.195500] ? __alloc_fd+0x44d/0x560 [ 74.199388] do_filp_open+0x1a1/0x280 [ 74.203193] ? may_open_dev+0x100/0x100 [ 74.207170] ? kasan_check_read+0x11/0x20 [ 74.211317] ? do_raw_spin_unlock+0x57/0x270 [ 74.215745] ? _raw_spin_unlock+0x2d/0x50 [ 74.220006] ? __alloc_fd+0x44d/0x560 [ 74.223803] do_sys_open+0x3fe/0x550 [ 74.227534] ? filp_open+0x80/0x80 [ 74.232059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 74.236888] ? do_syscall_64+0x26/0x620 [ 74.240846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 74.246215] ? do_syscall_64+0x26/0x620 [ 74.250183] __x64_sys_open+0x7e/0xc0 [ 74.253970] do_syscall_64+0xfd/0x620 [ 74.257761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 74.262937] RIP: 0033:0x4592c9 [ 74.266117] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 74.285022] RSP: 002b:00007ffd16ddff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 74.292842] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 74.300108] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000020000800 [ 74.307380] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 74.314635] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000013ab914 [ 74.321894] R13: 00000000004f80bf R14: 00000000004d9