[ 10.395546] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.607266] random: sshd: uninitialized urandom read (32 bytes read) [ 25.868619] audit: type=1400 audit(1546265512.768:6): avc: denied { map } for pid=1766 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 25.894122] random: sshd: uninitialized urandom read (32 bytes read) [ 26.367691] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. [ 31.971662] urandom_read: 1 callbacks suppressed [ 31.971665] random: sshd: uninitialized urandom read (32 bytes read) [ 32.066029] audit: type=1400 audit(1546265518.968:7): avc: denied { map } for pid=1784 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/12/31 14:11:59 parsed 1 programs [ 32.785437] audit: type=1400 audit(1546265519.688:8): avc: denied { map } for pid=1784 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 33.574337] random: cc1: uninitialized urandom read (8 bytes read) 2018/12/31 14:12:01 executed programs: 0 [ 34.758761] audit: type=1400 audit(1546265521.658:9): avc: denied { map } for pid=1784 comm="syz-execprog" path="/root/syzkaller-shm757642741" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.811537] audit: type=1400 audit(1546265523.718:10): avc: denied { create } for pid=1946 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 36.835446] audit: type=1400 audit(1546265523.718:11): avc: denied { write } for pid=1946 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 36.859263] audit: type=1400 audit(1546265523.718:12): avc: denied { read } for pid=1946 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 37.569302] sched: DL replenish lagged too much 2018/12/31 14:12:07 executed programs: 4 [ 43.948411] ------------[ cut here ]------------ [ 43.953818] WARNING: CPU: 0 PID: 2017 at kernel/sched/deadline.c:596 enqueue_task_dl+0x1cc9/0x2ca0 [ 43.962891] Kernel panic - not syncing: panic_on_warn set ... [ 43.962891] [ 43.970240] CPU: 0 PID: 2017 Comm: syz-executor0 Not tainted 4.14.91+ #1 [ 43.977054] Call Trace: [ 43.979618] dump_stack+0xb9/0x10e [ 43.983140] panic+0x1d9/0x3c2 [ 43.986309] ? add_taint.cold+0x16/0x16 [ 43.990263] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 43.994652] ? __probe_kernel_read+0x163/0x1c0 [ 43.999229] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.003623] __warn.cold+0x2f/0x3b [ 44.007181] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.011604] ? report_bug+0x20a/0x248 [ 44.015395] ? do_error_trap+0x1bf/0x2d0 [ 44.019445] ? math_error+0x2d0/0x2d0 [ 44.023233] ? trace_hardirqs_on+0x10/0x10 [ 44.027453] ? avc_has_perm+0x143/0x350 [ 44.031413] ? lock_downgrade+0x5d0/0x5d0 [ 44.035542] ? lock_acquire+0x10f/0x380 [ 44.039498] ? avc_has_perm+0x9c/0x350 [ 44.043378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 44.048213] ? invalid_op+0x18/0x40 [ 44.051835] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.056232] ? __setparam_dl+0x1ca/0x2e0 [ 44.060291] ? __sched_setscheduler+0xe09/0x2780 [ 44.065050] ? cpu_cgroup_fork+0x120/0x120 [ 44.069282] ? lock_acquire+0x10f/0x380 [ 44.073360] ? check_preemption_disabled+0x35/0x1f0 [ 44.078351] ? SyS_sched_setattr+0x23c/0x390 [ 44.082748] ? SyS_sched_setparam+0x20/0x20 [ 44.087041] ? do_clock_gettime+0xd0/0xd0 [ 44.091160] ? do_syscall_64+0x43/0x4b0 [ 44.095107] ? SyS_sched_setparam+0x20/0x20 [ 44.099531] ? do_syscall_64+0x19b/0x4b0 [ 44.103586] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 44.108943] [ 44.108946] ====================================================== [ 44.108949] WARNING: possible circular locking dependency detected [ 44.108951] 4.14.91+ #1 Not tainted [ 44.108954] ------------------------------------------------------ [ 44.108956] syz-executor0/2017 is trying to acquire lock: [ 44.108958] ((console_sem).lock){-.-.}, at: [] down_trylock+0xe/0x60 [ 44.108966] [ 44.108968] but task is already holding lock: [ 44.108969] (&rq->lock){-.-.}, at: [] task_rq_lock+0xc8/0x330 [ 44.108976] [ 44.108978] which lock already depends on the new lock. [ 44.108980] [ 44.108981] [ 44.108984] the existing dependency chain (in reverse order) is: [ 44.108985] [ 44.108986] -> #2 (&rq->lock){-.-.}: [ 44.109008] [ 44.109009] -> #1 (&p->pi_lock){-.-.}: [ 44.109030] [ 44.109032] -> #0 ((console_sem).lock){-.-.}: [ 44.109053] [ 44.109055] other info that might help us debug this: [ 44.109056] [ 44.109058] Chain exists of: [ 44.109059] (console_sem).lock --> &p->pi_lock --> &rq->lock [ 44.109068] [ 44.109070] Possible unsafe locking scenario: [ 44.109072] [ 44.109074] CPU0 CPU1 [ 44.109076] ---- ---- [ 44.109077] lock(&rq->lock); [ 44.109082] lock(&p->pi_lock); [ 44.109087] lock(&rq->lock); [ 44.109091] lock((console_sem).lock); [ 44.109095] [ 44.109097] *** DEADLOCK *** [ 44.109098] [ 44.109100] 3 locks held by syz-executor0/2017: [ 44.109101] #0: (rcu_read_lock){....}, at: [] SyS_sched_setattr+0x1d0/0x390 [ 44.109109] #1: (&p->pi_lock){-.-.}, at: [] task_rq_lock+0x6a/0x330 [ 44.109116] #2: (&rq->lock){-.-.}, at: [] task_rq_lock+0xc8/0x330 [ 44.109124] [ 44.109126] stack backtrace: [ 44.109128] CPU: 0 PID: 2017 Comm: syz-executor0 Not tainted 4.14.91+ #1 [ 44.109130] Call Trace: [ 44.109139] dump_stack+0xb9/0x10e [ 44.109142] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 44.109144] ? __lock_acquire+0x2d83/0x3fa0 [ 44.109146] ? trace_hardirqs_on+0x10/0x10 [ 44.109148] ? format_decode+0x1e1/0x8f0 [ 44.109150] ? check_preemption_disabled+0x35/0x1f0 [ 44.109152] ? kvm_clock_read+0x1f/0x30 [ 44.109155] ? kvm_sched_clock_read+0x5/0x10 [ 44.109157] ? lock_acquire+0x10f/0x380 [ 44.109158] ? down_trylock+0xe/0x60 [ 44.109160] ? vprintk_emit+0xa4/0x330 [ 44.109163] ? _raw_spin_lock_irqsave+0x42/0x60 [ 44.109165] ? down_trylock+0xe/0x60 [ 44.109166] ? down_trylock+0xe/0x60 [ 44.109168] ? vprintk_emit+0x11a/0x330 [ 44.109171] ? __down_trylock_console_sem+0x33/0xd0 [ 44.109173] ? console_trylock+0x14/0x70 [ 44.109175] ? vprintk_emit+0x11a/0x330 [ 44.109177] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.109179] ? vprintk_func+0x58/0x152 [ 44.109181] ? printk+0xba/0xed [ 44.109183] ? show_regs_print_info+0x5b/0x5b [ 44.109185] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.109187] ? __probe_kernel_read+0x163/0x1c0 [ 44.109189] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.109191] ? __warn+0x36/0x1b0 [ 44.109193] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.109210] ? report_bug+0x20a/0x248 [ 44.109212] ? do_error_trap+0x1bf/0x2d0 [ 44.109214] ? math_error+0x2d0/0x2d0 [ 44.109216] ? trace_hardirqs_on+0x10/0x10 [ 44.109218] ? avc_has_perm+0x143/0x350 [ 44.109220] ? lock_downgrade+0x5d0/0x5d0 [ 44.109222] ? lock_acquire+0x10f/0x380 [ 44.109224] ? avc_has_perm+0x9c/0x350 [ 44.109227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 44.109229] ? invalid_op+0x18/0x40 [ 44.109231] ? enqueue_task_dl+0x1cc9/0x2ca0 [ 44.109233] ? __setparam_dl+0x1ca/0x2e0 [ 44.109236] ? __sched_setscheduler+0xe09/0x2780 [ 44.109238] ? cpu_cgroup_fork+0x120/0x120 [ 44.109240] ? lock_acquire+0x10f/0x380 [ 44.109243] ? check_preemption_disabled+0x35/0x1f0 [ 44.109245] ? SyS_sched_setattr+0x23c/0x390 [ 44.109247] ? SyS_sched_setparam+0x20/0x20 [ 44.109249] ? do_clock_gettime+0xd0/0xd0 [ 44.109251] ? do_syscall_64+0x43/0x4b0 [ 44.109254] ? SyS_sched_setparam+0x20/0x20 [ 44.109256] ? do_syscall_64+0x19b/0x4b0 [ 44.109258] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 45.265643] Shutting down cpus with NMI [ 45.666888] Kernel Offset: 0x1a000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 45.677976] Rebooting in 86400 seconds..