[....] Starting enhanced syslogd: rsyslogd[ 17.392911] audit: type=1400 audit(1520340156.658:5): avc: denied { syslog } for pid=4088 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.633207] audit: type=1400 audit(1520340162.899:6): avc: denied { map } for pid=4229 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. executing program [ 29.933796] audit: type=1400 audit(1520340169.199:7): avc: denied { map } for pid=4243 comm="syzkaller026705" path="/root/syzkaller026705524" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 29.936421] [ 29.959764] audit: type=1400 audit(1520340169.202:8): avc: denied { map } for pid=4243 comm="syzkaller026705" path="/dev/ashmem" dev="devtmpfs" ino=194 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 29.961368] ====================================================== [ 29.961370] WARNING: possible circular locking dependency detected [ 29.961374] 4.16.0-rc4+ #342 Not tainted [ 29.961375] ------------------------------------------------------ [ 29.961378] syzkaller026705/4243 is trying to acquire lock: [ 29.961379] (&mm->mmap_sem){++++}, at: [<00000000308e7744>] __might_fault+0xe0/0x1d0 [ 29.961397] [ 29.961397] but task is already holding lock: [ 30.028509] (ashmem_mutex){+.+.}, at: [<00000000398b74e3>] ashmem_ioctl+0x3db/0x11b0 [ 30.036466] [ 30.036466] which lock already depends on the new lock. [ 30.036466] [ 30.044756] [ 30.044756] the existing dependency chain (in reverse order) is: [ 30.052348] [ 30.052348] -> #1 (ashmem_mutex){+.+.}: [ 30.057864] __mutex_lock+0x16f/0x1a80 [ 30.062249] mutex_lock_nested+0x16/0x20 [ 30.066806] ashmem_mmap+0x53/0x410 [ 30.070930] mmap_region+0xa99/0x15a0 [ 30.075228] do_mmap+0x6c0/0xe00 [ 30.079091] vm_mmap_pgoff+0x1de/0x280 [ 30.083475] SyS_mmap_pgoff+0x462/0x5f0 [ 30.087946] SyS_mmap+0x16/0x20 [ 30.091722] do_syscall_64+0x281/0x940 [ 30.096104] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 30.101790] [ 30.101790] -> #0 (&mm->mmap_sem){++++}: [ 30.107314] lock_acquire+0x1d5/0x580 [ 30.111611] __might_fault+0x13a/0x1d0 [ 30.115997] _copy_from_user+0x2c/0x110 [ 30.120465] ashmem_ioctl+0x438/0x11b0 [ 30.124851] do_vfs_ioctl+0x1b1/0x1520 [ 30.129235] SyS_ioctl+0x8f/0xc0 [ 30.133101] do_syscall_64+0x281/0x940 [ 30.137488] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 30.143168] [ 30.143168] other info that might help us debug this: [ 30.143168] [ 30.151369] Possible unsafe locking scenario: [ 30.151369] [ 30.157398] CPU0 CPU1 [ 30.162038] ---- ---- [ 30.166681] lock(ashmem_mutex); [ 30.170112] lock(&mm->mmap_sem); [ 30.176147] lock(ashmem_mutex); [ 30.182094] lock(&mm->mmap_sem); [ 30.185608] [ 30.185608] *** DEADLOCK *** [ 30.185608] [ 30.191646] 1 lock held by syzkaller026705/4243: [ 30.196374] #0: (ashmem_mutex){+.+.}, at: [<00000000398b74e3>] ashmem_ioctl+0x3db/0x11b0 [ 30.204768] [ 30.204768] stack backtrace: [ 30.209242] CPU: 1 PID: 4243 Comm: syzkaller026705 Not tainted 4.16.0-rc4+ #342 [ 30.216661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.225993] Call Trace: [ 30.228560] dump_stack+0x194/0x24d [ 30.232161] ? arch_local_irq_restore+0x53/0x53 [ 30.236811] print_circular_bug.isra.38+0x2cd/0x2dc [ 30.241805] ? save_trace+0xe0/0x2b0 [ 30.245497] __lock_acquire+0x30a8/0x3e00 [ 30.249620] ? ashmem_ioctl+0x3db/0x11b0 [ 30.253671] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.258839] ? __might_sleep+0x95/0x190 [ 30.262790] ? ashmem_ioctl+0x3db/0x11b0 [ 30.266839] ? __mutex_lock+0x16f/0x1a80 [ 30.270876] ? ashmem_ioctl+0x3db/0x11b0 [ 30.274913] ? proc_nr_files+0x60/0x60 [ 30.278774] ? ashmem_ioctl+0x3db/0x11b0 [ 30.282810] ? find_held_lock+0x35/0x1d0 [ 30.286849] ? mutex_lock_io_nested+0x1900/0x1900 [ 30.291672] ? uprobe_mmap+0x15a/0xc90 [ 30.295538] ? lock_downgrade+0x980/0x980 [ 30.299664] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 30.304484] ? find_held_lock+0x35/0x1d0 [ 30.308534] ? lock_downgrade+0x980/0x980 [ 30.312669] ? vma_set_page_prot+0x16b/0x230 [ 30.317055] lock_acquire+0x1d5/0x580 [ 30.320831] ? lock_acquire+0x1d5/0x580 [ 30.324782] ? __might_fault+0xe0/0x1d0 [ 30.328736] ? lock_release+0xa40/0xa40 [ 30.332685] ? check_same_owner+0x320/0x320 [ 30.336983] ? __might_sleep+0x95/0x190 [ 30.340933] __might_fault+0x13a/0x1d0 [ 30.344797] ? __might_fault+0xe0/0x1d0 [ 30.348749] _copy_from_user+0x2c/0x110 [ 30.352704] ashmem_ioctl+0x438/0x11b0 [ 30.356570] ? ashmem_release+0x190/0x190 [ 30.360695] ? check_same_owner+0x320/0x320 [ 30.364995] ? down_read_killable+0x180/0x180 [ 30.369466] ? rcu_note_context_switch+0x710/0x710 [ 30.374371] ? ashmem_release+0x190/0x190 [ 30.378495] do_vfs_ioctl+0x1b1/0x1520 [ 30.382359] ? ioctl_preallocate+0x2b0/0x2b0 [ 30.386745] ? selinux_capable+0x40/0x40 [ 30.390784] ? putname+0xf3/0x130 [ 30.394214] ? fput+0xd2/0x140 [ 30.397382] ? SyS_mmap_pgoff+0x243/0x5f0 [ 30.401507] ? security_file_ioctl+0x7d/0xb0 [ 30.405892] ? security_file_ioctl+0x89/0xb0 [ 30.410277] SyS_ioctl+0x8f/0xc0 [ 30.413619] ? do_vfs_ioctl+0x1520/0x1520 [ 30.417747] do_syscall_64+0x281/0x940 [ 30.421611] ? __do_page_fault+0xc90/0xc90 [ 30.425826] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.430555] ? syscall_return_slowpath+0x550/0x550 [ 30.435460] ? syscall_return_slowpath+0x2ac/0x550 [ 30.440376] ? prepare_exit_to_usermode+0x350/0x350 [ 30.445379] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 30.450718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 30.455536] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 30.460701] RIP: 0033:0x43fd19 [ 30.463865] RSP: 002b:00007ffdd081adc8 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 30.471545] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 000000000043fd19 [ 30.478879] RDX: 0000000000000000 RSI: 0000000000007709 RDI: 0000000000000003 [