INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes [ 151.831867] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.118' (ECDSA) to the list of known hosts. [ 157.334578] random: sshd: uninitialized urandom read (32 bytes read) [ 157.429885] audit: type=1400 audit(1537575060.915:7): avc: denied { map } for pid=1824 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/09/22 00:11:01 parsed 1 programs [ 157.891854] audit: type=1400 audit(1537575061.385:8): avc: denied { map } for pid=1824 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 158.558922] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/22 00:11:03 executed programs: 0 [ 159.765208] audit: type=1400 audit(1537575063.255:9): avc: denied { map } for pid=1824 comm="syz-execprog" path="/root/syzkaller-shm758194402" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2018/09/22 00:11:09 executed programs: 6 2018/09/22 00:11:14 executed programs: 244 2018/09/22 00:11:19 executed programs: 601 2018/09/22 00:11:24 executed programs: 973 2018/09/22 00:11:29 executed programs: 1347 2018/09/22 00:11:34 executed programs: 1712 2018/09/22 00:11:39 executed programs: 2062 2018/09/22 00:11:44 executed programs: 2433 2018/09/22 00:11:49 executed programs: 2784 2018/09/22 00:11:54 executed programs: 3147 2018/09/22 00:11:59 executed programs: 3513 [ 219.613218] [ 219.614861] ====================================================== [ 219.621157] WARNING: possible circular locking dependency detected [ 219.627448] 4.14.71+ #8 Not tainted [ 219.631042] ------------------------------------------------------ [ 219.637332] syz-executor0/15734 is trying to acquire lock: [ 219.642930] (&sig->cred_guard_mutex){+.+.}, at: [] do_io_accounting+0x1d7/0x770 [ 219.652009] [ 219.652009] but task is already holding lock: [ 219.657947] (&p->lock){+.+.}, at: [] seq_read+0xd4/0x11d0 [ 219.665109] [ 219.665109] which lock already depends on the new lock. [ 219.665109] [ 219.673393] [ 219.673393] the existing dependency chain (in reverse order) is: [ 219.681001] [ 219.681001] -> #2 (&p->lock){+.+.}: [ 219.686087] __mutex_lock+0xf5/0x1480 [ 219.690385] seq_read+0xd4/0x11d0 [ 219.694342] proc_reg_read+0xef/0x170 [ 219.698649] do_iter_read+0x3cc/0x580 [ 219.702945] vfs_readv+0xe6/0x150 [ 219.706890] default_file_splice_read+0x495/0x860 [ 219.712223] do_splice_to+0x102/0x150 [ 219.716516] SyS_splice+0xf4d/0x12a0 [ 219.720720] do_syscall_64+0x19b/0x4b0 [ 219.725114] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.730795] [ 219.730795] -> #1 (&pipe->mutex/1){+.+.}: [ 219.736397] __mutex_lock+0xf5/0x1480 [ 219.740690] fifo_open+0x156/0x9d0 [ 219.744726] do_dentry_open+0x426/0xda0 [ 219.749188] vfs_open+0x11c/0x210 [ 219.753134] path_openat+0x4eb/0x23a0 [ 219.757427] do_filp_open+0x197/0x270 [ 219.761724] do_open_execat+0x10d/0x5b0 [ 219.766192] do_execveat_common.isra.14+0x6cb/0x1d60 [ 219.771785] SyS_execve+0x34/0x40 [ 219.775730] do_syscall_64+0x19b/0x4b0 [ 219.780128] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.785806] [ 219.785806] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 219.792103] lock_acquire+0x10f/0x380 [ 219.796396] __mutex_lock+0xf5/0x1480 [ 219.800694] do_io_accounting+0x1d7/0x770 [ 219.805332] proc_single_show+0xf1/0x160 [ 219.809902] seq_read+0x4e0/0x11d0 [ 219.813940] __vfs_read+0xf4/0x5b0 [ 219.817970] vfs_read+0x11e/0x330 [ 219.821916] SyS_pread64+0x136/0x160 [ 219.826122] do_syscall_64+0x19b/0x4b0 [ 219.830517] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.836196] [ 219.836196] other info that might help us debug this: [ 219.836196] [ 219.844305] Chain exists of: [ 219.844305] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 219.844305] [ 219.855130] Possible unsafe locking scenario: [ 219.855130] [ 219.861157] CPU0 CPU1 [ 219.865794] ---- ---- [ 219.870427] lock(&p->lock); [ 219.873503] lock(&pipe->mutex/1); [ 219.879616] lock(&p->lock); [ 219.885206] lock(&sig->cred_guard_mutex); [ 219.889499] [ 219.889499] *** DEADLOCK *** [ 219.889499] [ 219.895528] 1 lock held by syz-executor0/15734: [ 219.900167] #0: (&p->lock){+.+.}, at: [] seq_read+0xd4/0x11d0 [ 219.907766] [ 219.907766] stack backtrace: [ 219.912235] CPU: 0 PID: 15734 Comm: syz-executor0 Not tainted 4.14.71+ #8 [ 219.919130] Call Trace: [ 219.921694] dump_stack+0xb9/0x11b [ 219.925211] print_circular_bug.isra.18.cold.43+0x2d3/0x40c [ 219.930894] ? save_trace+0xd6/0x250 [ 219.934578] __lock_acquire+0x2ff9/0x4320 [ 219.938699] ? trace_hardirqs_on+0x10/0x10 [ 219.942906] ? __is_insn_slot_addr+0x112/0x1f0 [ 219.947461] ? lock_downgrade+0x560/0x560 [ 219.951582] ? check_preemption_disabled+0x34/0x160 [ 219.956574] ? depot_save_stack+0x20a/0x428 [ 219.960870] ? mark_held_locks+0xc2/0x130 [ 219.964990] lock_acquire+0x10f/0x380 [ 219.968763] ? do_io_accounting+0x1d7/0x770 [ 219.973059] ? do_io_accounting+0x1d7/0x770 [ 219.977355] __mutex_lock+0xf5/0x1480 [ 219.981127] ? do_io_accounting+0x1d7/0x770 [ 219.985419] ? do_io_accounting+0x1d7/0x770 [ 219.989715] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 219.994179] ? __kmalloc+0x153/0x340 [ 219.997886] ? kvmalloc_node+0x42/0xd0 [ 220.001751] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 220.007175] ? trace_hardirqs_on+0x10/0x10 [ 220.011383] ? seq_read+0xd4/0x11d0 [ 220.014983] ? __mutex_lock+0x6f4/0x1480 [ 220.019015] ? seq_read+0xd4/0x11d0 [ 220.022618] ? do_io_accounting+0x1d7/0x770 [ 220.026910] do_io_accounting+0x1d7/0x770 [ 220.031032] ? proc_uid_map_open+0x30/0x30 [ 220.035237] ? check_preemption_disabled+0x34/0x160 [ 220.040226] proc_single_show+0xf1/0x160 [ 220.044257] seq_read+0x4e0/0x11d0 [ 220.047770] ? __lock_acquire+0x619/0x4320 [ 220.051979] ? seq_lseek+0x3d0/0x3d0 [ 220.055665] ? trace_hardirqs_on+0x10/0x10 [ 220.059869] ? lock_downgrade+0x560/0x560 [ 220.063991] ? fsnotify+0x639/0x12d0 [ 220.067677] ? debug_check_no_obj_freed+0x150/0x77c [ 220.072665] __vfs_read+0xf4/0x5b0 [ 220.076177] ? seq_lseek+0x3d0/0x3d0 [ 220.079865] ? vfs_copy_file_range+0x9f0/0x9f0 [ 220.084422] ? __fsnotify_parent+0xb1/0x300 [ 220.088715] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 220.095353] ? __inode_security_revalidate+0xd5/0x120 [ 220.100521] ? avc_policy_seqno+0x5/0x10 [ 220.104561] ? security_file_permission+0x88/0x1e0 [ 220.109463] vfs_read+0x11e/0x330 [ 220.112892] SyS_pread64+0x136/0x160 [ 220.116917] ? SyS_write+0x1a0/0x1a0 [ 220.120605] ? do_syscall_64+0x43/0x4b0 [ 220.124557] ? SyS_write+0x1a0/0x1a0 [ 220.128240] do_syscall_64+0x19b/0x4b0 [ 220.132101] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 220.137263] RIP: 0033:0x457679 [ 220.140425] RSP: 002b:00007f827e155c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 220.148102] RAX: ffffffffffffffda RBX: 00007f827e1566d4 RCX: 0000000000457679 [ 220.155344] RDX: 0000000000000592 RSI: 00000000200000c0 RDI: 0000000000000006 [ 220.162604] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 220.169845] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 220.177089] R13: 00000000004d4860 R14: 00000000004c30c2 R15: 0000000000000001 2018/09/22 00:12:04 executed programs: 3833 2018/09/22 00:12:09 executed programs: 4283