Warning: Permanently added '10.128.10.28' (ECDSA) to the list of known hosts. executing program [ 51.136100] audit: type=1400 audit(1546962618.514:36): avc: denied { map } for pid=7995 comm="syz-executor128" path="/root/syz-executor128932871" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 51.211490] [ 51.213121] ====================================================== [ 51.219426] WARNING: possible circular locking dependency detected [ 51.225720] 5.0.0-rc1+ #14 Not tainted [ 51.229585] ------------------------------------------------------ [ 51.235882] syz-executor128/7997 is trying to acquire lock: [ 51.241561] 0000000038019c1e (&pipe->mutex/1){+.+.}, at: fifo_open+0x159/0xb00 [ 51.248900] [ 51.248900] but task is already holding lock: [ 51.254839] 000000007cdc487b (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x45d/0x2700 [ 51.264174] [ 51.264174] which lock already depends on the new lock. [ 51.264174] [ 51.272456] [ 51.272456] the existing dependency chain (in reverse order) is: [ 51.280054] [ 51.280054] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 51.286352] __mutex_lock+0x12f/0x1670 [ 51.290742] mutex_lock_interruptible_nested+0x16/0x20 [ 51.296512] proc_pid_attr_write+0x1fa/0x530 [ 51.301424] __vfs_write+0x116/0xb40 [ 51.305630] __kernel_write+0x110/0x3b0 [ 51.310096] write_pipe_buf+0x180/0x240 [ 51.314562] __splice_from_pipe+0x39a/0x7e0 [ 51.319387] splice_from_pipe+0x1ea/0x310 [ 51.324049] default_file_splice_write+0x3c/0x90 [ 51.329326] do_splice+0x64b/0x1410 [ 51.333468] __x64_sys_splice+0x2c6/0x330 [ 51.338112] do_syscall_64+0x1a3/0x800 [ 51.342501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.348180] [ 51.348180] -> #0 (&pipe->mutex/1){+.+.}: [ 51.353782] lock_acquire+0x1db/0x570 [ 51.358096] __mutex_lock+0x12f/0x1670 [ 51.362476] mutex_lock_nested+0x16/0x20 [ 51.367031] fifo_open+0x159/0xb00 [ 51.371067] do_dentry_open+0x48a/0x1210 [ 51.375658] vfs_open+0xa0/0xd0 [ 51.379442] path_openat+0x144f/0x5650 [ 51.383820] do_filp_open+0x26f/0x370 [ 51.388126] do_open_execat+0x20e/0x930 [ 51.392594] __do_execve_file.isra.0+0x1966/0x2700 [ 51.398020] __x64_sys_execve+0x8f/0xc0 [ 51.402498] do_syscall_64+0x1a3/0x800 [ 51.406889] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.412577] [ 51.412577] other info that might help us debug this: [ 51.412577] [ 51.420694] Possible unsafe locking scenario: [ 51.420694] [ 51.426725] CPU0 CPU1 [ 51.431359] ---- ---- [ 51.435995] lock(&sig->cred_guard_mutex); [ 51.440288] lock(&pipe->mutex/1); [ 51.446402] lock(&sig->cred_guard_mutex); [ 51.453211] lock(&pipe->mutex/1); [ 51.456810] [ 51.456810] *** DEADLOCK *** [ 51.456810] [ 51.462837] 1 lock held by syz-executor128/7997: [ 51.467557] #0: 000000007cdc487b (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x45d/0x2700 [ 51.477338] [ 51.477338] stack backtrace: [ 51.481809] CPU: 1 PID: 7997 Comm: syz-executor128 Not tainted 5.0.0-rc1+ #14 [ 51.489050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.498375] Call Trace: [ 51.500935] dump_stack+0x1db/0x2d0 [ 51.504556] ? dump_stack_print_info.cold+0x20/0x20 [ 51.509570] ? print_stack_trace+0x77/0xb0 [ 51.513779] ? vprintk_func+0x86/0x189 [ 51.517652] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 51.522990] __lock_acquire+0x3014/0x4a30 [ 51.527110] ? add_lock_to_list.isra.0+0x450/0x450 [ 51.532024] ? is_bpf_text_address+0xac/0x170 [ 51.536517] ? mark_held_locks+0x100/0x100 [ 51.540726] ? mark_held_locks+0xb1/0x100 [ 51.544848] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 51.549943] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 51.555020] ? lockdep_hardirqs_on+0x415/0x5d0 [ 51.559578] ? trace_hardirqs_off_caller+0x300/0x300 [ 51.564652] ? do_raw_spin_trylock+0x270/0x270 [ 51.569207] ? add_lock_to_list.isra.0+0x450/0x450 [ 51.574123] ? print_usage_bug+0xd0/0xd0 [ 51.578160] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 51.583249] ? __lock_is_held+0xb6/0x140 [ 51.587287] lock_acquire+0x1db/0x570 [ 51.591071] ? fifo_open+0x159/0xb00 [ 51.594760] ? ___might_sleep+0x1e7/0x310 [ 51.598894] ? lock_release+0xc40/0xc40 [ 51.602840] ? fifo_open+0x159/0xb00 [ 51.606528] ? fifo_open+0x159/0xb00 [ 51.610215] __mutex_lock+0x12f/0x1670 [ 51.614082] ? fifo_open+0x159/0xb00 [ 51.617781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.623290] ? fifo_open+0x159/0xb00 [ 51.626982] ? check_preemption_disabled+0x48/0x290 [ 51.631987] ? lockdep_init_map+0x10c/0x5b0 [ 51.636293] ? mutex_trylock+0x2d0/0x2d0 [ 51.640337] ? add_lock_to_list.isra.0+0x450/0x450 [ 51.645252] ? __mutex_init+0x1f6/0x2a0 [ 51.649198] ? psi_task_change.cold+0x1ec/0x1ec [ 51.653841] ? fifo_open+0x2b5/0xb00 [ 51.657527] ? find_held_lock+0x35/0x120 [ 51.661571] ? fifo_open+0x2b5/0xb00 [ 51.665268] ? lock_acquire+0x1db/0x570 [ 51.669219] ? kasan_check_read+0x11/0x20 [ 51.673351] ? do_raw_spin_unlock+0xa0/0x330 [ 51.677734] ? do_raw_spin_trylock+0x270/0x270 [ 51.682301] mutex_lock_nested+0x16/0x20 [ 51.686348] ? _raw_spin_unlock+0x2d/0x50 [ 51.690466] ? mutex_lock_nested+0x16/0x20 [ 51.694672] fifo_open+0x159/0xb00 [ 51.698198] do_dentry_open+0x48a/0x1210 [ 51.702247] ? pipe_release+0x280/0x280 [ 51.706194] ? chown_common+0x740/0x740 [ 51.710156] ? security_inode_permission+0xd5/0x110 [ 51.715166] ? inode_permission+0xb4/0x570 [ 51.719386] vfs_open+0xa0/0xd0 [ 51.722640] path_openat+0x144f/0x5650 [ 51.726514] ? unwind_get_return_address+0x61/0xa0 [ 51.731454] ? __save_stack_trace+0x8a/0xf0 [ 51.735764] ? path_lookupat.isra.0+0xba0/0xba0 [ 51.740416] ? kmemdup+0x27/0x60 [ 51.743756] ? selinux_cred_prepare+0x49/0xb0 [ 51.748227] ? security_prepare_creds+0x7d/0xc0 [ 51.752881] ? prepare_exec_creds+0x12/0xf0 [ 51.757188] ? __do_execve_file.isra.0+0x47a/0x2700 [ 51.762178] ? __x64_sys_execve+0x8f/0xc0 [ 51.766311] ? __lock_acquire+0x572/0x4a30 [ 51.770529] ? __lock_is_held+0xb6/0x140 [ 51.774563] do_filp_open+0x26f/0x370 [ 51.778346] ? may_open_dev+0x100/0x100 [ 51.782291] ? add_lock_to_list.isra.0+0x450/0x450 [ 51.787229] ? add_lock_to_list.isra.0+0x450/0x450 [ 51.792144] ? __do_execve_file.isra.0+0x901/0x2700 [ 51.797150] do_open_execat+0x20e/0x930 [ 51.801099] ? unregister_binfmt+0x2b0/0x2b0 [ 51.805481] ? kasan_check_read+0x11/0x20 [ 51.809613] ? do_raw_spin_trylock+0x270/0x270 [ 51.814171] ? __phys_addr_symbol+0x30/0x70 [ 51.818466] __do_execve_file.isra.0+0x1966/0x2700 [ 51.823371] ? copy_strings_kernel+0x110/0x110 [ 51.827956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 51.833478] ? strncpy_from_user+0x3aa/0x4e0 [ 51.837885] ? digsig_verify.cold+0x32/0x32 [ 51.842184] ? kmem_cache_alloc+0x341/0x710 [ 51.846483] ? do_syscall_64+0x8c/0x800 [ 51.850447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 51.855961] ? getname_flags+0x277/0x5b0 [ 51.859994] ? trace_hardirqs_off_caller+0x300/0x300 [ 51.865073] __x64_sys_execve+0x8f/0xc0 [ 51.869024] do_syscall_64+0x1a3/0x800 [ 51.872885] ? syscall_return_slowpath+0x5f0/0x5f0 [ 51.877790] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 51.882783] ? __switch_to_asm+0x34/0x70 [ 51.886991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 51.891813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 51.896975] RIP: 0033:0x445709 [ 51.900258] Code: e8 ec b8 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 8b 12 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 51.919349] RSP: 002b:00007efea8a3bd18 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 51.927030] RAX: ffffffffffffffda RBX: 00000000006dac58 RCX: 0000000000445709 [ 51.934277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 51.941523] RBP: 00000000006dac50 R08: 68742f636f72702f R09: 68742f636f72702f [ 51.948765] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dac5c [ 51.956123] R13: 00007efea8a3bd20 R14: 0030656c69662f2e R15: 00000000006dad4c