Warning: Permanently added '10.128.1.47' (ECDSA) to the list of known hosts. syzkaller login: [ 38.510965] random: sshd: uninitialized urandom read (32 bytes read) executing program [ 38.629523] kauditd_printk_skb: 11 callbacks suppressed [ 38.629531] audit: type=1400 audit(1571727656.851:36): avc: denied { map } for pid=6959 comm="syz-executor459" path="/root/syz-executor459306604" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 38.666182] [ 38.667829] ====================================================== [ 38.674127] WARNING: possible circular locking dependency detected [ 38.680422] 4.14.150 #0 Not tainted [ 38.684023] ------------------------------------------------------ [ 38.690717] kworker/u4:0/5 is trying to acquire lock: [ 38.695989] (sk_lock-AF_INET){+.+.}, at: [] strp_sock_lock+0x2e/0x40 [ 38.704254] [ 38.704254] but task is already holding lock: [ 38.710203] ((&strp->work)){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 38.718602] [ 38.718602] which lock already depends on the new lock. [ 38.718602] [ 38.726909] [ 38.726909] the existing dependency chain (in reverse order) is: [ 38.734502] [ 38.734502] -> #1 ((&strp->work)){+.+.}: [ 38.740047] lock_acquire+0x16f/0x430 [ 38.744345] flush_work+0xae/0x730 [ 38.748442] __cancel_work_timer+0x2f0/0x480 [ 38.753528] cancel_work_sync+0x18/0x20 [ 38.758010] strp_done+0x58/0xe0 [ 38.761876] kcm_ioctl+0x8d9/0x1120 [ 38.766007] sock_do_ioctl+0x64/0xb0 [ 38.770221] sock_ioctl+0x2a6/0x470 [ 38.774342] do_vfs_ioctl+0x7ae/0x1060 [ 38.778723] SyS_ioctl+0x8f/0xc0 [ 38.782623] do_syscall_64+0x1e8/0x640 [ 38.787006] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 38.792697] [ 38.792697] -> #0 (sk_lock-AF_INET){+.+.}: [ 38.798391] __lock_acquire+0x2cb3/0x4620 [ 38.803033] lock_acquire+0x16f/0x430 [ 38.807326] lock_sock_nested+0xbd/0x110 [ 38.811882] strp_sock_lock+0x2e/0x40 [ 38.816184] strp_work+0x43/0x100 [ 38.820134] process_one_work+0x863/0x1600 [ 38.824949] worker_thread+0x5d9/0x1050 [ 38.829416] kthread+0x319/0x430 [ 38.833277] ret_from_fork+0x24/0x30 [ 38.837488] [ 38.837488] other info that might help us debug this: [ 38.837488] [ 38.845600] Possible unsafe locking scenario: [ 38.845600] [ 38.851640] CPU0 CPU1 [ 38.856278] ---- ---- [ 38.860914] lock((&strp->work)); [ 38.864428] lock(sk_lock-AF_INET); [ 38.870633] lock((&strp->work)); [ 38.876671] lock(sk_lock-AF_INET); [ 38.880366] [ 38.880366] *** DEADLOCK *** [ 38.880366] [ 38.886397] 2 locks held by kworker/u4:0/5: [ 38.890696] #0: ("%s""kstrp"){+.+.}, at: [] process_one_work+0x76e/0x1600 [ 38.899349] #1: ((&strp->work)){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 38.908163] [ 38.908163] stack backtrace: [ 38.912639] CPU: 1 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.150 #0 [ 38.919118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.928460] Workqueue: kstrp strp_work [ 38.932321] Call Trace: [ 38.934885] dump_stack+0x138/0x197 [ 38.938485] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 38.943820] __lock_acquire+0x2cb3/0x4620 [ 38.947965] ? _raw_spin_unlock_irq+0x5e/0x90 [ 38.952443] ? trace_hardirqs_on+0x10/0x10 [ 38.956648] ? save_trace+0x290/0x290 [ 38.960424] ? lock_sock_nested+0x9e/0x110 [ 38.964638] ? lock_sock_nested+0x9e/0x110 [ 38.968932] lock_acquire+0x16f/0x430 [ 38.972707] ? strp_sock_lock+0x2e/0x40 [ 38.976653] lock_sock_nested+0xbd/0x110 [ 38