Warning: Permanently added '10.128.0.79' (ECDSA) to the list of known hosts. [ 52.373361] random: sshd: uninitialized urandom read (32 bytes read) [ 52.471574] audit: type=1400 audit(1554715189.355:7): avc: denied { map } for pid=1797 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/04/08 09:19:50 parsed 1 programs [ 53.460750] audit: type=1400 audit(1554715190.345:8): avc: denied { map } for pid=1797 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5011 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 54.082362] random: cc1: uninitialized urandom read (8 bytes read) 2019/04/08 09:19:52 executed programs: 0 [ 55.736293] audit: type=1400 audit(1554715192.615:9): avc: denied { map } for pid=1797 comm="syz-execprog" path="/root/syzkaller-shm999670741" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 57.831262] [ 57.833252] ====================================================== [ 57.847112] WARNING: possible circular locking dependency detected [ 57.857606] 4.14.111+ #50 Not tainted [ 57.861593] ------------------------------------------------------ [ 57.868019] syz-executor.0/1961 is trying to acquire lock: [ 57.873631] (pmus_lock){+.+.}, at: [< (ptrval)>] perf_swevent_init+0x123/0x4e0 [ 57.882031] [ 57.882031] but task is already holding lock: [ 57.888006] (&cpuctx_mutex/1){+.+.}, at: [< (ptrval)>] perf_event_ctx_lock_nested+0x14d/0x2c0 [ 57.897366] [ 57.897366] which lock already depends on the new lock. [ 57.897366] [ 57.905910] [ 57.905910] the existing dependency chain (in reverse order) is: [ 57.913721] [ 57.913721] -> #2 (&cpuctx_mutex/1){+.+.}: [ 57.919429] [ 57.919429] -> #1 (&cpuctx_mutex){+.+.}: [ 57.925239] [ 57.925239] -> #0 (pmus_lock){+.+.}: [ 57.930429] [ 57.930429] other info that might help us debug this: [ 57.930429] [ 57.938654] Chain exists of: [ 57.938654] pmus_lock --> &cpuctx_mutex --> &cpuctx_mutex/1 [ 57.938654] [ 57.948991] Possible unsafe locking scenario: [ 57.948991] [ 57.955125] CPU0 CPU1 [ 57.959781] ---- ---- [ 57.964453] lock(&cpuctx_mutex/1); [ 57.968155] lock(&cpuctx_mutex); [ 57.974352] lock(&cpuctx_mutex/1); [ 57.980661] lock(pmus_lock); [ 57.983843] [ 57.983843] *** DEADLOCK *** [ 57.983843] [ 57.989887] 2 locks held by syz-executor.0/1961: [ 57.994625] #0: (&pmus_srcu){....}, at: [< (ptrval)>] perf_event_alloc.part.0+0xadd/0x1e70 [ 58.003810] #1: (&cpuctx_mutex/1){+.+.}, at: [< (ptrval)>] perf_event_ctx_lock_nested+0x14d/0x2c0 [ 58.013601] [ 58.013601] stack backtrace: [ 58.018087] CPU: 0 PID: 1961 Comm: syz-executor.0 Not tainted 4.14.111+ #50 [ 58.025198] Call Trace: [ 58.027788] dump_stack+0xb9/0x10e [ 58.031352] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 58.036728] ? __lock_acquire+0x2d83/0x3fa0 [ 58.041121] ? __lock_acquire+0x56a/0x3fa0 [ 58.045339] ? trace_hardirqs_on+0x10/0x10 [ 58.049580] ? trace_hardirqs_on+0x10/0x10 [ 58.053794] ? __lock_acquire+0x56a/0x3fa0 [ 58.058016] ? __save_stack_trace+0x7a/0xf0 [ 58.062322] ? lock_acquire+0x10f/0x380 [ 58.066277] ? perf_swevent_init+0x123/0x4e0 [ 58.070791] ? perf_swevent_init+0x123/0x4e0 [ 58.075202] ? __mutex_lock+0xf7/0x1430 [ 58.079173] ? perf_swevent_init+0x123/0x4e0 [ 58.083561] ? __mutex_lock+0x6aa/0x1430 [ 58.087619] ? perf_swevent_init+0x123/0x4e0 [ 58.092007] ? perf_event_ctx_lock_nested+0x14d/0x2c0 [ 58.097178] ? perf_try_init_event+0xf1/0x200 [ 58.101653] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 58.107090] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 58.112517] ? trace_hardirqs_on+0x10/0x10 [ 58.116731] ? perf_event_ctx_lock_nested+0x117/0x2c0 [ 58.121895] ? lock_downgrade+0x5d0/0x5d0 [ 58.126016] ? lock_acquire+0x10f/0x380 [ 58.129969] ? perf_event_ctx_lock_nested+0x39/0x2c0 [ 58.135057] ? perf_swevent_init+0x123/0x4e0 [ 58.139448] ? perf_swevent_init+0x123/0x4e0 [ 58.143834] ? perf_event_ctx_lock_nested+0x14d/0x2c0 [ 58.148998] ? perf_event_ctx_lock_nested+0x247/0x2c0 [ 58.154164] ? perf_try_init_event+0xe5/0x200 [ 58.158635] ? perf_event_alloc.part.0+0xcc5/0x1e70 [ 58.163633] ? SyS_perf_event_open+0x6eb/0x2520 [ 58.168281] ? perf_bp_event+0x1a0/0x1a0 [ 58.172320] ? nsecs_to_jiffies+0x30/0x30 [ 58.176519] ? do_clock_gettime+0xd0/0xd0 [ 58.180647] ? do_syscal