INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes [ 149.098698] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.11' (ECDSA) to the list of known hosts. [ 154.633547] random: sshd: uninitialized urandom read (32 bytes read) [ 154.720443] audit: type=1400 audit(1537649246.181:7): avc: denied { map } for pid=1826 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/09/22 20:47:26 parsed 1 programs [ 155.194485] audit: type=1400 audit(1537649246.651:8): avc: denied { map } for pid=1826 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 155.826104] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/22 20:47:28 executed programs: 0 [ 157.128339] audit: type=1400 audit(1537649248.581:9): avc: denied { map } for pid=1826 comm="syz-execprog" path="/root/syzkaller-shm889316429" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2018/09/22 20:47:34 executed programs: 6 [ 165.181362] [ 165.183020] ====================================================== [ 165.189327] WARNING: possible circular locking dependency detected [ 165.195627] 4.14.71+ #8 Not tainted [ 165.199222] ------------------------------------------------------ [ 165.205522] syz-executor5/4593 is trying to acquire lock: [ 165.211044] (&sig->cred_guard_mutex){+.+.}, at: [] do_io_accounting+0x1d7/0x770 [ 165.220148] [ 165.220148] but task is already holding lock: [ 165.226110] (&p->lock){+.+.}, at: [] seq_read+0xd4/0x11d0 [ 165.233301] [ 165.233301] which lock already depends on the new lock. [ 165.233301] [ 165.241605] [ 165.241605] the existing dependency chain (in reverse order) is: [ 165.249212] [ 165.249212] -> #2 (&p->lock){+.+.}: [ 165.254307] __mutex_lock+0xf5/0x1480 [ 165.258622] seq_read+0xd4/0x11d0 [ 165.262591] proc_reg_read+0xef/0x170 [ 165.266903] do_iter_read+0x3cc/0x580 [ 165.271223] vfs_readv+0xe6/0x150 [ 165.275184] default_file_splice_read+0x495/0x860 [ 165.280525] do_splice_to+0x102/0x150 [ 165.284821] SyS_splice+0xf4d/0x12a0 [ 165.289033] do_syscall_64+0x19b/0x4b0 [ 165.293423] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 165.299124] [ 165.299124] -> #1 (&pipe->mutex/1){+.+.}: [ 165.304757] __mutex_lock+0xf5/0x1480 [ 165.309067] fifo_open+0x156/0x9d0 [ 165.313104] do_dentry_open+0x426/0xda0 [ 165.317575] vfs_open+0x11c/0x210 [ 165.321523] path_openat+0x4eb/0x23a0 [ 165.325816] do_filp_open+0x197/0x270 [ 165.330111] do_open_execat+0x10d/0x5b0 [ 165.334581] do_execveat_common.isra.14+0x6cb/0x1d60 [ 165.340184] SyS_execve+0x34/0x40 [ 165.344133] do_syscall_64+0x19b/0x4b0 [ 165.348515] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 165.354196] [ 165.354196] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 165.360496] lock_acquire+0x10f/0x380 [ 165.364790] __mutex_lock+0xf5/0x1480 [ 165.369088] do_io_accounting+0x1d7/0x770 [ 165.373729] proc_single_show+0xf1/0x160 [ 165.378292] seq_read+0x4e0/0x11d0 [ 165.382338] __vfs_read+0xf4/0x5b0 [ 165.386369] vfs_read+0x11e/0x330 [ 165.390319] SyS_pread64+0x136/0x160 [ 165.394532] do_syscall_64+0x19b/0x4b0 [ 165.398918] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 165.404599] [ 165.404599] other info that might help us debug this: [ 165.404599] [ 165.412713] Chain exists of: [ 165.412713] &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 165.412713] [ 165.423526] Possible unsafe locking scenario: [ 165.423526] [ 165.429553] CPU0 CPU1 [ 165.434202] ---- ---- [ 165.438852] lock(&p->lock); [ 165.441931] lock(&pipe->mutex/1); [ 165.448048] lock(&p->lock); [ 165.453644] lock(&sig->cred_guard_mutex); [ 165.457944] [ 165.457944] *** DEADLOCK *** [ 165.457944] [ 165.463981] 1 lock held by syz-executor5/4593: [ 165.468530] #0: (&p->lock){+.+.}, at: [] seq_read+0xd4/0x11d0 [ 165.476131] [ 165.476131] stack backtrace: [ 165.480600] CPU: 1 PID: 4593 Comm: syz-executor5 Not tainted 4.14.71+ #8 [ 165.487407] Call Trace: [ 165.489969] dump_stack+0xb9/0x11b [ 165.493485] print_circular_bug.isra.18.cold.43+0x2d3/0x40c [ 165.499168] ? save_trace+0xd6/0x250 [ 165.502860] __lock_acquire+0x2ff9/0x4320 [ 165.506987] ? trace_hardirqs_on+0x10/0x10 [ 165.511200] ? __is_insn_slot_addr+0x112/0x1f0 [ 165.515757] ? lock_downgrade+0x560/0x560 [ 165.519881] ? check_preemption_disabled+0x34/0x160 [ 165.524874] ? depot_save_stack+0x20a/0x428 [ 165.529169] ? mark_held_locks+0xc2/0x130 [ 165.533293] lock_acquire+0x10f/0x380 [ 165.537072] ? do_io_accounting+0x1d7/0x770 [ 165.541372] ? do_io_accounting+0x1d7/0x770 [ 165.545672] __mutex_lock+0xf5/0x1480 [ 165.549449] ? do_io_accounting+0x1d7/0x770 [ 165.553757] ? do_io_accounting+0x1d7/0x770 [ 165.558054] ? kasan_kmalloc.part.1+0x4f/0xd0 [ 165.562523] ? __kmalloc+0x153/0x340 [ 165.566218] ? kvmalloc_node+0x42/0xd0 [ 165.570080] ? __ww_mutex_wakeup_for_backoff+0x240/0x240 [ 165.575504] ? trace_hardirqs_on+0x10/0x10 [ 165.579710] ? seq_read+0xd4/0x11d0 [ 165.583317] ? __mutex_lock+0x6f4/0x1480 [ 165.587361] ? seq_read+0xd4/0x11d0 [ 165.590971] ? do_io_accounting+0x1d7/0x770 [ 165.595272] do_io_accounting+0x1d7/0x770 [ 165.599407] ? proc_uid_map_open+0x30/0x30 [ 165.603618] ? check_preemption_disabled+0x34/0x160 [ 165.608613] proc_single_show+0xf1/0x160 [ 165.612682] seq_read+0x4e0/0x11d0 [ 165.616203] ? __lock_acquire+0x619/0x4320 [ 165.620420] ? seq_lseek+0x3d0/0x3d0 [ 165.624109] ? trace_hardirqs_on+0x10/0x10 [ 165.628318] ? lock_downgrade+0x560/0x560 [ 165.632438] ? fsnotify+0x639/0x12d0 [ 165.636127] ? debug_check_no_obj_freed+0x150/0x77c [ 165.641177] __vfs_read+0xf4/0x5b0 [ 165.644693] ? seq_lseek+0x3d0/0x3d0 [ 165.648379] ? vfs_copy_file_range+0x9f0/0x9f0 [ 165.652935] ? __fsnotify_parent+0xb1/0x300 [ 165.657232] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 165.663914] ? __inode_security_revalidate+0xd5/0x120 [ 165.669083] ? avc_policy_seqno+0x5/0x10 [ 165.673119] ? security_file_permission+0x88/0x1e0 [ 165.678022] vfs_read+0x11e/0x330 [ 165.681453] SyS_pread64+0x136/0x160 [ 165.685153] ? SyS_write+0x1a0/0x1a0 [ 165.688844] ? do_syscall_64+0x43/0x4b0 [ 165.692789] ? SyS_write+0x1a0/0x1a0 [ 165.696474] do_syscall_64+0x19b/0x4b0 [ 165.700338] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 165.705506] RIP: 0033:0x457679 [ 165.708687] RSP: 002b:00007f3f75f96c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 165.716366] RAX: ffffffffffffffda RBX: 00007f3f75f976d4 RCX: 0000000000457679 [ 165.723619] RDX: 0000000000000000 RSI: 00000000200012c0 RDI: 0000000000000006 [ 165.730877] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 165.738125] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 165.745369] R13: 00000000004d4860 R14: 00000000004c30c2 R15: 0000000000000001 2018/09/22 20:47:39 executed programs: 274 2018/09/22 20:47:44 executed programs: 724