[ 21.333139] random: sshd: uninitialized urandom read (32 bytes read, 34 bits of entropy available) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 24.910260] random: sshd: uninitialized urandom read (32 bytes read, 39 bits of entropy available) [ 25.396065] random: sshd: uninitialized urandom read (32 bytes read, 39 bits of entropy available) [ 26.385681] random: sshd: uninitialized urandom read (32 bytes read, 117 bits of entropy available) [ 26.546753] random: sshd: uninitialized urandom read (32 bytes read, 121 bits of entropy available) Warning: Permanently added '10.128.0.22' (ECDSA) to the list of known hosts. [ 32.077710] random: sshd: uninitialized urandom read (32 bytes read, 126 bits of entropy available) 2018/03/23 00:26:07 parsed 1 programs 2018/03/23 00:26:07 executed programs: 0 [ 32.415609] IPVS: Creating netns size=2552 id=1 [ 32.446586] [ 32.448226] ====================================================== [ 32.454510] [ INFO: possible circular locking dependency detected ] [ 32.460880] 4.4.120-gd63fdf6 #29 Not tainted [ 32.465253] ------------------------------------------------------- [ 32.471625] syz-executor0/3815 is trying to acquire lock: [ 32.477128] (&mm->mmap_sem){++++++}, at: [] __might_fault+0xe4/0x1d0 [ 32.485709] [ 32.485709] but task is already holding lock: [ 32.491643] (ashmem_mutex){+.+.+.}, at: [] ashmem_ioctl+0x367/0xfa0 [ 32.500132] [ 32.500132] which lock already depends on the new lock. [ 32.500132] [ 32.508414] [ 32.508414] the existing dependency chain (in reverse order) is: [ 32.515999] -> #1 (ashmem_mutex){+.+.+.}: [ 32.520752] [] lock_acquire+0x15e/0x460 [ 32.526986] [] mutex_lock_nested+0xbb/0x850 [ 32.533566] [] ashmem_mmap+0x53/0x400 [ 32.539623] [] mmap_region+0x94f/0x1250 [ 32.545848] [] do_mmap+0x4fd/0x9d0 [ 32.551639] [] vm_mmap_pgoff+0x16e/0x1c0 [ 32.557953] [] SyS_mmap_pgoff+0x33f/0x560 [ 32.564354] [] do_fast_syscall_32+0x321/0x8a0 [ 32.571104] [] sysenter_flags_fixed+0xd/0x17 [ 32.577770] -> #0 (&mm->mmap_sem){++++++}: [ 32.582610] [] __lock_acquire+0x371f/0x4b50 [ 32.589185] [] lock_acquire+0x15e/0x460 [ 32.595411] [] __might_fault+0x14a/0x1d0 [ 32.601726] [] ashmem_ioctl+0x3b4/0xfa0 [ 32.607953] [] compat_ashmem_ioctl+0x3e/0x50 [ 32.614614] [] compat_SyS_ioctl+0x28a/0x2540 [ 32.621279] [] do_fast_syscall_32+0x321/0x8a0 [ 32.628024] [] sysenter_flags_fixed+0xd/0x17 [ 32.634692] [ 32.634692] other info that might help us debug this: [ 32.634692] [ 32.642810] Possible unsafe locking scenario: [ 32.642810] [ 32.648832] CPU0 CPU1 [ 32.653467] ---- ---- [ 32.658099] lock(ashmem_mutex); [ 32.661746] lock(&mm->mmap_sem); [ 32.668000] lock(ashmem_mutex); [ 32.674169] lock(&mm->mmap_sem); [ 32.677910] [ 32.677910] *** DEADLOCK *** [ 32.677910] [ 32.683936] 1 lock held by syz-executor0/3815: [ 32.688482] #0: (ashmem_mutex){+.+.+.}, at: [] ashmem_ioctl+0x367/0xfa0 [ 32.697516] [ 32.697516] stack backtrace: [ 32.701980] CPU: 1 PID: 3815 Comm: syz-executor0 Not tainted 4.4.120-gd63fdf6 #29 [ 32.709563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.718886] 0000000000000000 8053dedec103b434 ffff8801c49af8a8 ffffffff81d0408d [ 32.726857] ffffffff851a0010 ffffffff851a0010 ffffffff851bee80 ffff8801c48138f8 [ 32.734823] ffff8801c4813000 ffff8801c49af8f0 ffffffff81233ba1 ffff8801c48138f8 [ 32.742785] Call Trace: [ 32.745340] [] dump_stack+0xc1/0x124 [ 32.750670] [] print_circular_bug+0x271/0x310 [ 32.756782] [] __lock_acquire+0x371f/0x4b50 [ 32.762723] [] ? avc_has_extended_perms+0xe2/0xf30 [ 32.769267] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 32.776257] [] ? mark_held_locks+0xaf/0x100 [ 32.782196] [] ? __lock_is_held+0xa1/0xf0 [ 32.787959] [] lock_acquire+0x15e/0x460 [ 32.793551] [] ? __might_fault+0xe4/0x1d0 [ 32.799315] [] __might_fault+0x14a/0x1d0 [ 32.804993] [] ? __might_fault+0xe4/0x1d0 [ 32.810757] [] ashmem_ioctl+0x3b4/0xfa0 [ 32.816347] [] ? selinux_file_ioctl+0x363/0x570 [ 32.822631] [] ? selinux_capable+0x30/0x30 [ 32.828490] [] ? ashmem_shrink_scan+0x390/0x390 [ 32.834776] [] ? vma_set_page_prot+0x10b/0x150 [ 32.840976] [] ? exit_robust_list+0x240/0x240 [ 32.847088] [] compat_ashmem_ioctl+0x3e/0x50 [ 32.853113] [] compat_SyS_ioctl+0x28a/0x2540 [ 32.859137] [] ? vm_mmap_pgoff+0x180/0x1c0 [ 32.864988] [] ? ashmem_ioctl+0xfa0/0xfa0 [ 32.870754] [] ? compat_SyS_ppoll+0x420/0x420 [ 32.876873] [] ? vm_mmap_pgoff+0xdf/0x1c0 [ 32.882636] [] ? compat_SyS_futex+0x1f9/0x2a0 [ 32.888753] [] ? compat_SyS_get_robust_list+0x300/0x300 [ 32.895732] [