[ 31.144114] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 31.642282] random: sshd: uninitialized urandom read (32 bytes read) [ 31.897510] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.601295] random: sshd: uninitialized urandom read (32 bytes read) [ 32.786607] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.223' (ECDSA) to the list of known hosts. [ 38.358721] random: sshd: uninitialized urandom read (32 bytes read) executing program [ 38.470622] kauditd_printk_skb: 10 callbacks suppressed [ 38.470631] audit: type=1400 audit(1578361014.750:36): avc: denied { map } for pid=7081 comm="syz-executor204" path="/root/syz-executor204274193" dev="sda1" ino=16484 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 38.474003] netlink: 20 bytes leftover after parsing attributes in process `syz-executor204'. [ 38.516849] netlink: 20 bytes leftover after parsing attributes in process `syz-executor204'. [ 38.581180] [ 38.582851] ============================================ [ 38.588300] WARNING: possible recursive locking detected [ 38.593742] 4.14.162-syzkaller #0 Not tainted [ 38.598226] -------------------------------------------- [ 38.603670] syz-executor204/7081 is trying to acquire lock: [ 38.609373] (rtnl_mutex){+.+.}, at: [] rtnl_lock+0x17/0x20 [ 38.616663] [ 38.616663] but task is already holding lock: [ 38.622627] (rtnl_mutex){+.+.}, at: [] rtnetlink_rcv_msg+0x339/0xb70 [ 38.630776] [ 38.630776] other info that might help us debug this: [ 38.637434] Possible unsafe locking scenario: [ 38.637434] [ 38.643481] CPU0 [ 38.646059] ---- [ 38.648629] lock(rtnl_mutex); [ 38.651898] lock(rtnl_mutex); [ 38.655165] [ 38.655165] *** DEADLOCK *** [ 38.655165] [ 38.661214] May be due to missing lock nesting notation [ 38.661214] [ 38.668135] 1 lock held by syz-executor204/7081: [ 38.672877] #0: (rtnl_mutex){+.+.}, at: [] rtnetlink_rcv_msg+0x339/0xb70 [ 38.681461] [ 38.681461] stack backtrace: [ 38.685977] CPU: 0 PID: 7081 Comm: syz-executor204 Not tainted 4.14.162-syzkaller #0 [ 38.693849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 38.703196] Call Trace: [ 38.705797] dump_stack+0x142/0x197 [ 38.709425] __lock_acquire.cold+0x2bf/0x8dc [ 38.713831] ? save_trace+0x290/0x290 [ 38.717628] ? trace_hardirqs_on_caller+0x400/0x590 [ 38.722645] ? trace_hardirqs_on+0x10/0x10 [ 38.726876] ? put_dec+0xc0/0xc0 [ 38.730242] ? format_decode+0x1d8/0x930 [ 38.734306] ? save_trace+0x290/0x290 [ 38.738105] ? set_precision+0x150/0x150 [ 38.742165] ? __lock_is_held+0xb6/0x140 [ 38.746222] lock_acquire+0x16f/0x430 [ 38.750018] ? rtnl_lock+0x17/0x20 [ 38.753570] ? rtnl_lock+0x17/0x20 [ 38.757101] __mutex_lock+0xe8/0x1470 [ 38.760893] ? rtnl_lock+0x17/0x20 [ 38.764430] ? vsprintf+0x40/0x40 [ 38.767874] ? rtnl_lock+0x17/0x20 [ 38.771410] ? mutex_trylock+0x1c0/0x1c0 [ 38.775467] ? __dev_alloc_name+0x251/0x2c0 [ 38.779781] ? __lock_is_held+0xb6/0x140 [ 38.783836] ? __dev_get_by_name+0x140/0x140 [ 38.788237] ? memcpy+0x46/0x50 [ 38.791514] ? hsr_dev_close+0x10/0x10 [ 38.795395] mutex_lock_nested+0x16/0x20 [ 38.799447] ? mutex_lock_nested+0x16/0x20 [ 38.803676] rtnl_lock+0x17/0x20 [ 38.807039] hsr_dev_destroy+0x1f/0xc0 [ 38.810927] ? hsr_dev_close+0x10/0x10 [ 38.814812] register_netdevice+0x7da/0xca0 [ 38.819132] ? netdev_change_features+0x80/0x80 [ 38.823804] ? hsr_add_port+0x42a/0x610 [ 38.827775] hsr_dev_finalize+0x582/0x80a [ 38.831917] hsr_newlink+0x250/0x340 [ 38.835625] ? send_hsr_supervision_frame.cold+0x26/0x26 [ 38.841073] ? rtnl_create_link+0x12c/0x850 [ 38.845388] rtnl_newlink+0xecb/0x1700 [ 38.849270] ? send_hsr_supervision_frame.cold+0x26/0x26 [ 38.854712] ? rtnl_link_unregister+0x200/0x200 [ 38.859376] ? avc_has_perm_noaudit+0x2b2/0x420 [ 38.864041] ? lock_acquire+0x16f/0x430 [ 38.868015] ? rtnetlink_rcv_msg+0x339/0xb70 [ 38.872429] ? rtnl_link_unregister+0x200/0x200 [ 38.877150] rtnetlink_rcv_msg+0x3da/0xb70 [ 38.881404] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 38.885984] ? netlink_deliver_tap+0x93/0x8f0 [ 38.890460] netlink_rcv_skb+0x14f/0x3c0 [ 38.894498] ? rtnl_bridge_getlink+0x7a0/0x7a0 [ 38.899058] ? lock_downgrade+0x740/0x740 [ 38.903218] ? netlink_ack+0x9a0/0x9a0 [ 38.907086] ? netlink_deliver_tap+0xba/0x8f0 [ 38.911564] rtnetlink_rcv+0x1d/0x30 [ 38.915251] netlink_unicast+0x44d/0x650 [ 38.919289] ? netlink_attachskb+0x6a0/0x6a0 [ 38.923719] ? security_netlink_send+0x81/0xb0 [ 38.928281] netlink_sendmsg+0x7c4/0xc60 [ 38.932318] ? netlink_unicast+0x650/0x650 [ 38.936625] ? security_socket_sendmsg+0x89/0xb0 [ 38.941393] ? netlink_unicast+0x650/0x650 [ 38.945642] sock_sendmsg+0xce/0x110 [ 38.949330] ___sys_sendmsg+0x70a/0x840 [ 38.953278] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 38.958010] ? __might_fault+0x110/0x1d0 [ 38.962057] ? find_held_lock+0x35/0x130 [ 38.966093] ? __might_fault+0x110/0x1d0 [ 38.970129] ? lock_downgrade+0x740/0x740 [ 38.974254] ? kasan_check_read+0x11/0x20 [ 38.978387] ? _copy_to_user+0x87/0xd0 [ 38.982251] ? move_addr_to_user+0x94/0x1a0 [ 38.986550] ? __fget_light+0x172/0x1f0 [ 38.990501] ? __fdget+0x1b/0x20 [ 38.993857] ? sockfd_lookup_light+0xb4/0x160 [ 38.998342] __sys_sendmsg+0xb9/0x140 [ 39.002125] ? SyS_shutdown+0x170/0x170 [ 39.006103] ? fd_install+0x4d/0x60 [ 39.009737] SyS_sendmsg+0x2d/0x50 [ 39.013258] ? __sys_sendmsg+0x140/0x140 [ 39.017321] do_syscall_64+0x1e8/0x640 [ 39.021185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 39.026003] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 39.031169] RIP: 0033:0x4408e9 [ 39.034335] RSP: 002b:00007fff7a08c6c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 39.042020] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 00000000004408e9 [ 39.049265] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 39.056512] RBP: 00000000006cb018 R08: 0000000000000002 R09: 00000000004002c8 [ 39.063771] R10: 0000000000000014 R11: 0000000000000246 R12: 0000000000402170 [ 39.071017] R13: 0000000000402200 R14: 0000000000000000 R15: 0000000000000000