INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2018/09/22 18:42:29 parsed 1 programs 2018/09/22 18:42:31 executed programs: 0 [ 260.807474] audit: type=1400 audit(1537641755.607:5): avc: denied { associate } for pid=2117 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 2018/09/22 18:42:36 executed programs: 31 2018/09/22 18:42:41 executed programs: 518 2018/09/22 18:42:46 executed programs: 1008 2018/09/22 18:42:51 executed programs: 1482 2018/09/22 18:42:56 executed programs: 1982 2018/09/22 18:43:01 executed programs: 2458 2018/09/22 18:43:06 executed programs: 2946 2018/09/22 18:43:11 executed programs: 3455 2018/09/22 18:43:16 executed programs: 3944 2018/09/22 18:43:21 executed programs: 4424 2018/09/22 18:43:26 executed programs: 4944 2018/09/22 18:43:31 executed programs: 5433 2018/09/22 18:43:36 executed programs: 5916 2018/09/22 18:43:41 executed programs: 6412 2018/09/22 18:43:46 executed programs: 6927 [ 333.629495] [ 333.631281] ====================================================== [ 333.637581] [ INFO: possible circular locking dependency detected ] [ 333.643958] 4.9.128+ #41 Not tainted [ 333.647665] ------------------------------------------------------- [ 333.654038] syz-executor5/25622 is trying to acquire lock: [ 333.659635] (&sig->cred_guard_mutex){+.+.+.}, at: [] do_io_accounting+0x1fb/0x7e0 [ 333.669349] but task is already holding lock: [ 333.673985] (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x12d0 [ 333.681738] which lock already depends on the new lock. [ 333.681738] [ 333.688828] [ 333.688828] the existing dependency chain (in reverse order) is: [ 333.696419] -> #2 (&p->lock){+.+.+.}: [ 333.700885] lock_acquire+0x130/0x3e0 [ 333.705221] mutex_lock_nested+0xc0/0x870 [ 333.709883] seq_read+0xdd/0x12d0 [ 333.713995] proc_reg_read+0xfd/0x180 [ 333.718298] do_loop_readv_writev.part.1+0xd5/0x280 [ 333.723807] do_readv_writev+0x56e/0x7b0 [ 333.728361] vfs_readv+0x84/0xc0 [ 333.732236] default_file_splice_read+0x44b/0x7e0 [ 333.737573] do_splice_to+0x10c/0x170 [ 333.741867] SyS_splice+0x10d2/0x14d0 [ 333.746204] do_syscall_64+0x19f/0x480 [ 333.750603] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 333.756198] -> #1 (&pipe->mutex/1){+.+.+.}: [ 333.761303] lock_acquire+0x130/0x3e0 [ 333.765598] mutex_lock_nested+0xc0/0x870 [ 333.770257] fifo_open+0x15c/0x9e0 [ 333.774312] do_dentry_open+0x3ef/0xc90 [ 333.778796] vfs_open+0x11c/0x210 [ 333.782745] path_openat+0x542/0x2790 [ 333.787036] do_filp_open+0x197/0x270 [ 333.791343] do_open_execat+0x10f/0x640 [ 333.795810] do_execveat_common.isra.15+0x687/0x1f80 [ 333.801417] SyS_execve+0x42/0x50 [ 333.805363] do_syscall_64+0x19f/0x480 [ 333.809832] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 333.815534] -> #0 (&sig->cred_guard_mutex){+.+.+.}: [ 333.821202] __lock_acquire+0x3189/0x4a10 [ 333.825849] lock_acquire+0x130/0x3e0 [ 333.830193] mutex_lock_killable_nested+0xcc/0x960 [ 333.835648] do_io_accounting+0x1fb/0x7e0 [ 333.840289] proc_tgid_io_accounting+0x22/0x30 [ 333.845493] proc_single_show+0xfd/0x170 [ 333.850054] seq_read+0x4b6/0x12d0 [ 333.854086] __vfs_read+0x115/0x560 [ 333.858204] vfs_read+0x124/0x390 [ 333.862152] SyS_pread64+0x145/0x170 [ 333.866365] do_syscall_64+0x19f/0x480 [ 333.870748] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 333.876342] [ 333.876342] other info that might help us debug this: [ 333.876342] [ 333.884483] Chain exists of: &sig->cred_guard_mutex --> &pipe->mutex/1 --> &p->lock [ 333.893530] Possible unsafe locking scenario: [ 333.893530] [ 333.899565] CPU0 CPU1 [ 333.904203] ---- ---- [ 333.908845] lock(&p->lock); [ 333.912173] lock(&pipe->mutex/1); [ 333.918656] lock(&p->lock); [ 333.924504] lock(&sig->cred_guard_mutex); [ 333.929037] [ 333.929037] *** DEADLOCK *** [ 333.929037] [ 333.935095] 1 lock held by syz-executor5/25622: [ 333.939733] #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x12d0 [ 333.947988] [ 333.947988] stack backtrace: [ 333.952462] CPU: 1 PID: 25622 Comm: syz-executor5 Not tainted 4.9.128+ #41 [ 333.959449] ffff8801d80af648 ffffffff81af2469 ffffffff83aa7d80 ffffffff83aa2c80 [ 333.967466] ffffffff83aa1330 ffff8801d7d4e7d0 ffff8801d7d4df00 ffff8801d80af690 [ 333.975459] ffffffff813e79ed 0000000000000001 00000000d7d4e7b0 0000000000000001 [ 333.983460] Call Trace: [ 333.986130] [] dump_stack+0xc1/0x128 [ 333.991501] [] print_circular_bug.cold.36+0x2f7/0x432 [ 333.998314] [] __lock_acquire+0x3189/0x4a10 [ 334.004275] [] ? check_preemption_disabled+0x3b/0x170 [ 334.011092] [] ? trace_hardirqs_on+0x10/0x10 [ 334.017131] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 334.024029] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 334.030838] [] lock_acquire+0x130/0x3e0 [ 334.036437] [] ? do_io_accounting+0x1fb/0x7e0 [ 334.042556] [] mutex_lock_killable_nested+0xcc/0x960 [ 334.049280] [] ? do_io_accounting+0x1fb/0x7e0 [ 334.055450] [] ? mark_wake_futex+0x120/0x120 [ 334.061497] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 334.068394] [] ? do_io_accounting+0x1fb/0x7e0 [ 334.074510] [] ? _mutex_lock_nest_lock+0x870/0x870 [ 334.081068] [] ? trace_hardirqs_on+0x10/0x10 [ 334.087098] [] do_io_accounting+0x1fb/0x7e0 [ 334.093043] [] ? proc_uid_map_open+0x30/0x30 [ 334.099073] [] ? check_preemption_disabled+0x3b/0x170 [ 334.105909] [] ? get_pid_task+0x9b/0x140 [ 334.111593] [] proc_tgid_io_accounting+0x22/0x30 [ 334.117997] [] proc_single_show+0xfd/0x170 [ 334.123869] [] seq_read+0x4b6/0x12d0 [ 334.129552] [] ? seq_lseek+0x3c0/0x3c0 [ 334.135062] [] ? trace_hardirqs_on+0x10/0x10 [ 334.141207] [] ? fsnotify+0x114/0x1100 [ 334.146754] [] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 334.153652] [] __vfs_read+0x115/0x560 [ 334.159072] [] ? seq_lseek+0x3c0/0x3c0 [ 334.164579] [] ? clone_verify_area+0x220/0x220 [ 334.170798] [] ? __fsnotify_inode_delete+0x30/0x30 [ 334.177350] [] ? __fsnotify_update_child_dentry_flags.part.0+0x300/0x300 [ 334.185849] [] ? avc_policy_seqno+0x9/0x20 [ 334.191728] [] ? selinux_file_permission+0x82/0x470 [ 334.198366] [] ? security_file_permission+0x8f/0x1e0 [ 334.205179] [] ? rw_verify_area+0xe5/0x2a0 [ 334.211042] [] vfs_read+0x124/0x390 [ 334.216291] [] SyS_pread64+0x145/0x170 [ 334.221805] [] ? SyS_write+0x1c0/0x1c0 [ 334.227332] [] ? do_syscall_64+0x48/0x480 [ 334.233167] [] ? SyS_write+0x1c0/0x1c0 [ 334.238683] [] do_syscall_64+0x19f/0x480 [ 334.244368] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb 2018/09/22 18:43:51 executed programs: 7364 2018/09/22 18:43:56 executed programs: 7939