[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 18.624943] audit: type=1400 audit(1517926310.701:6): avc: denied { map } for pid=4151 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.58' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 29.628500] audit: type=1400 audit(1517926321.705:7): avc: denied { map } for pid=4167 comm="syzkaller266120" path="/root/syzkaller266120241" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 29.654479] audit: type=1400 audit(1517926321.708:8): avc: denied { prog_load } for pid=4167 comm="syzkaller266120" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 29.677969] audit: type=1400 audit(1517926321.754:9): avc: denied { prog_run } for pid=4167 comm="syzkaller266120" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 29.707454] [ 29.709175] ============================= [ 29.713339] WARNING: suspicious RCU usage [ 29.717499] 4.15.0+ #11 Not tainted [ 29.721134] ----------------------------- [ 29.725289] ./include/linux/rcupdate.h:302 Illegal context switch in RCU read-side critical section! [ 29.734608] [ 29.734608] other info that might help us debug this: [ 29.734608] [ 29.742776] [ 29.742776] rcu_scheduler_active = 2, debug_locks = 1 [ 29.749467] 3 locks held by syzkaller266120/4167: [ 29.754323] #0: (&ctx->mutex){+.+.}, at: [<000000006c145b6b>] perf_event_ctx_lock_nested+0x21b/0x450 [ 29.763820] #1: (bpf_event_mutex){+.+.}, at: [<000000009e69c1c4>] perf_event_query_prog_array+0x10e/0x280 [ 29.773743] #2: (rcu_read_lock){....}, at: [<00000000dfe676ad>] bpf_prog_array_copy_to_user+0x0/0x4d0 [ 29.783339] [ 29.783339] stack backtrace: [ 29.787871] CPU: 1 PID: 4167 Comm: syzkaller266120 Not tainted 4.15.0+ #11 [ 29.794868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.804197] Call Trace: [ 29.806759] dump_stack+0x194/0x257 [ 29.810363] ? arch_local_irq_restore+0x53/0x53 [ 29.815019] lockdep_rcu_suspicious+0x123/0x170 [ 29.819663] ___might_sleep+0x385/0x470 [ 29.823611] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 29.829476] __might_sleep+0x95/0x190 [ 29.833250] ? __lock_is_held+0xb6/0x140 [ 29.837289] __might_fault+0xab/0x1d0 [ 29.841065] _copy_to_user+0x2c/0xc0 [ 29.844756] bpf_prog_array_copy_to_user+0x217/0x4d0 [ 29.849837] ? bpf_prog_array_length+0x2d0/0x2d0 [ 29.854566] ? __might_sleep+0x95/0x190 [ 29.858521] ? kasan_check_read+0x11/0x20 [ 29.862641] ? _copy_to_user+0xa2/0xc0 [ 29.866502] bpf_prog_array_copy_info+0x17b/0x1c0 [ 29.871319] ? bpf_prog_array_copy+0x370/0x370 [ 29.875888] perf_event_query_prog_array+0x196/0x280 [ 29.880963] ? perf_event_detach_bpf_prog+0x3d0/0x3d0 [ 29.886136] ? handle_mm_fault+0x2a0/0x930 [ 29.890352] perf_ioctl+0x3e1/0x1480 [ 29.894039] ? SYSC_perf_event_open+0x2f10/0x2f10 [ 29.898855] ? __do_page_fault+0x5f7/0xc90 [ 29.903062] ? lock_downgrade+0x980/0x980 [ 29.907190] ? handle_mm_fault+0x476/0x930 [ 29.911395] ? down_read_trylock+0xdb/0x170 [ 29.915692] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 29.922860] ? vmacache_find+0x5f/0x280 [ 29.926825] ? up_read+0x1a/0x40 [ 29.930165] ? __do_page_fault+0x3d6/0xc90 [ 29.934381] ? SYSC_perf_event_open+0x2f10/0x2f10 [ 29.939196] do_vfs_ioctl+0x1b1/0x1520 [ 29.943061] ? ioctl_preallocate+0x2b0/0x2b0 [ 29.947449] ? selinux_capable+0x40/0x40 [ 29.951500] ? security_file_ioctl+0x89/0xb0 [ 29.955896] SyS_ioctl+0x8f/0xc0 [ 29.959248] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.963976] RIP: 0033:0x43ffa9 [ 29.967141] RSP: 002b:00007ffc543f1578 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 29.974828] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000043ffa9 [ 29.982071] RDX: 0000000020e4e000 RSI: 00000000c008240a RDI: 0000000000000004 [ 29.989314] RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 [ 29.996557] R10: 0000000000000000 R11: 0000000000000217 R12: 00000000004018d0 [ 30.003800] R13: 0000000000401960 R14: 0000000000000000 R15: 0000000000000000 [ 30.011164] BUG: sleeping function called from invalid context at lib/usercopy.c:25 [ 30.018998] in_atomic(): 1, irqs_disabled(): 0, pid: 4167, name: syzkaller266120 [ 30.026563] 3 locks held by syzkaller266120/4167: [ 30.031422] #0: (&ctx->mutex){+.+.}, at: [<000000006c145b6b>] perf_event_ctx_lock_nested+0x21b/0x450 [ 30.040921] #1: (bpf_event_mutex){+.+.}, at: [<000000009e69c1c4>] perf_event_query_prog_array+0x10e/0x280 [ 30.050985] #2: (rcu_read_lock){....}, at: [<00000000dfe676ad>] bpf_prog_array_copy_to_user+0x0/0x4d0 [ 30.060613] CPU: 1 PID: 4167 Comm: syzkaller266120 Not tainted 4.15.0+ #11 [ 30.067604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.076931] Call Trace: [ 30.079496] dump_stack+0x194/0x257 [ 30.083099] ? arch_local_irq_restore+0x53/0x53 [ 30.087746] ? print_lock+0x9f/0xa2 [ 30.091351] ? lockdep_print_held_locks+0xc4/0x130 [ 30.096262] ___might_sleep+0x2b2/0x470 [ 30.100220] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.106091] __might_sleep+0x95/0x190 [ 30.109870] ? __lock_is_held+0xb6/0x140 [ 30.113914] __might_fault+0xab/0x1d0 [ 30.117690] _copy_to_user+0x2c/0xc0 [ 30.121385] bpf_prog_array_copy_to_user+0x217/0x4d0 [ 30.126478] ? bpf_prog_array_length+0x2d0/0x2d0 [ 30.131211] ? __might_sleep+0x95/0x190 [ 30.135164] ? kasan_check_read+0x11/0x20 [ 30.139285] ? _copy_to_user+0xa2/0xc0 [ 30.143159] bpf_prog_array_copy_info+0x17b/0x1c0 [ 30.147979] ? bpf_prog_array_copy+0x370/0x370 [ 30.152543] perf_event_query_prog_array+0x196/0x280 [ 30.157621] ? perf_event_detach_bpf_prog+0x3d0/0x3d0 [ 30.162788] ? handle_mm_fault+0x2a0/0x930 [ 30.167004] perf_ioctl+0x3e1/0x1480 [ 30.170694] ? SYSC_perf_event_open+0x2f10/0x2f10 [ 30.175510] ? __do_page_fault+0x5f7/0xc90 [ 30.179719] ? lock_downgrade+0x980/0x980 [ 30.183847] ? handle_mm_fault+0x476/0x930 [ 30.188054] ? down_read_trylock+0xdb/0x170 [ 30.192350] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 30.196902] ? vmacache_find+0x5f/0x280 [ 30.200856] ? up_read+0x1a/0x40 [ 30.204196] ? __do_page_fault+0x3d6/0xc90 [ 30.208412] ? SYSC_perf_event_open+0x2f10/0x2f10 [ 30.213228] do_vfs_ioctl+0x1b1/0x1520 [ 30.217092] ? ioctl_preallocate+0x2b0/0x2b0 [ 30.221474] ? selinux_capable+0x40/0x40 [ 30.225523] ? security_file_ioctl+0x89/0xb0 [ 30.229910] SyS_ioctl+0x8f/0xc0 [ 30.233282] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.238036] RIP: 0033:0x43ffa9 [ 30.241218] RSP: 002b:00007ffc543f1578 EFLAGS: 00000217 ORIG_RAX: 0000000000000010 [ 30.248897] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000043ffa9 [ 30.256139] RDX: 0000000020e4e000 RSI: 00000000c008240a RDI: 0000000000000004 [ 30.263390] RBP: 00000000006ca018 R08: 0000000000000000 R09: 0000000000000000 [ 30.270631] R10: 0000000000000000 R11: 0000000000000217 R12: 00000000004018d0 [ 30.277877] R13: 0000000000401960 R14