[....] Starting OpenBSD Secure Shell server: sshd[ 10.604326] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 25.292609] random: sshd: uninitialized urandom read (32 bytes read) [ 25.836232] audit: type=1400 audit(1552999433.785:6): avc: denied { map } for pid=1765 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 25.868556] random: sshd: uninitialized urandom read (32 bytes read) [ 26.357780] random: sshd: uninitialized urandom read (32 bytes read) [ 26.512743] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. [ 31.957412] random: sshd: uninitialized urandom read (32 bytes read) [ 32.049145] audit: type=1400 audit(1552999439.995:7): avc: denied { map } for pid=1783 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/03/19 12:44:00 parsed 1 programs [ 32.887939] audit: type=1400 audit(1552999440.835:8): avc: denied { map } for pid=1783 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5005 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 33.585313] random: cc1: uninitialized urandom read (8 bytes read) 2019/03/19 12:44:02 executed programs: 0 [ 34.902802] audit: type=1400 audit(1552999442.855:9): avc: denied { map } for pid=1783 comm="syz-execprog" path="/root/syzkaller-shm633174910" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.820917] [ 36.822579] ====================================================== [ 36.828880] WARNING: possible circular locking dependency detected [ 36.835372] 4.14.106+ #31 Not tainted [ 36.839157] ------------------------------------------------------ [ 36.845460] syz-executor.0/1948 is trying to acquire lock: [ 36.851064] (&cpuctx_mutex/1){+.+.}, at: [] SyS_perf_event_open+0x11f1/0x2520 [ 36.859994] [ 36.859994] but task is already holding lock: [ 36.865954] (&cpuctx_mutex){+.+.}, at: [] SyS_perf_event_open+0x11e4/0x2520 [ 36.874704] [ 36.874704] which lock already depends on the new lock. [ 36.874704] [ 36.883004] [ 36.883004] the existing dependency chain (in reverse order) is: [ 36.890614] [ 36.890614] -> #2 (&cpuctx_mutex){+.+.}: [ 36.896147] [ 36.896147] -> #1 (pmus_lock){+.+.}: [ 36.901344] [ 36.901344] -> #0 (&cpuctx_mutex/1){+.+.}: [ 36.907049] [ 36.907049] other info that might help us debug this: [ 36.907049] [ 36.915177] Chain exists of: [ 36.915177] &cpuctx_mutex/1 --> pmus_lock --> &cpuctx_mutex [ 36.915177] [ 36.925411] Possible unsafe locking scenario: [ 36.925411] [ 36.931460] CPU0 CPU1 [ 36.936112] ---- ---- [ 36.940759] lock(&cpuctx_mutex); [ 36.944281] lock(pmus_lock); [ 36.949975] lock(&cpuctx_mutex); [ 36.956018] lock(&cpuctx_mutex/1); [ 36.959723] [ 36.959723] *** DEADLOCK *** [ 36.959723] [ 36.965792] 1 lock held by syz-executor.0/1948: [ 36.970443] #0: (&cpuctx_mutex){+.+.}, at: [] SyS_perf_event_open+0x11e4/0x2520 [ 36.979804] [ 36.979804] stack backtrace: [ 36.984293] CPU: 0 PID: 1948 Comm: syz-executor.0 Not tainted 4.14.106+ #31 [ 36.991375] Call Trace: [ 36.993958] dump_stack+0xb9/0x10e [ 36.997495] print_circular_bug.isra.0.cold+0x2dc/0x425 [ 37.002854] ? __lock_acquire+0x2d83/0x3fa0 [ 37.007170] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 37.011665] ? trace_hardirqs_on+0x10/0x10 [ 37.015909] ? perf_trace_lock_acquire+0x4e0/0x4e0 [ 37.020845] ? perf_trace_lock+0x304/0x4e0 [ 37.025087] ? lock_acquire+0x10f/0x380 [ 37.029067] ? SyS_perf_event_open+0x11f1/0x2520 [ 37.033816] ? SyS_perf_event_open+0x11f1/0x2520 [ 37.038564] ? __mutex_lock+0xf7/0x1430 [ 37.042550] ? SyS_perf_event_open+0x11f1/0x2520 [ 37.047293] ? __lockdep_init_map+0x100/0x4a0 [ 37.051797] ? SyS_perf_event_open+0x11f1/0x2520 [ 37.056544] ? debug_mutex_init+0x28/0x53 [ 37.060685] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 37.066126] ? alloc_file+0x28a/0x3b0 [ 37.069921] ? SyS_perf_event_open+0x118d/0x2520 [ 37.074666] ? lock_downgrade+0x5d0/0x5d0 [ 37.078803] ? lock_acquire+0x10f/0x380 [ 37.082770] ? SyS_perf_event_open+0x10ab/0x2520 [ 37.087516] ? check_preemption_disabled+0x35/0x1f0 [ 37.092543] ? SyS_perf_event_open+0x11f1/0x2520 [ 37.097285] ? SyS_perf_event_open+0x11f1/0x2520 [ 37.102030] ? perf_bp_event+0x1a0/0x1a0 [ 37.106102] ? nsecs_to_jiffies+0x30/0x30 [ 37.110241] ? do_clock_gettime+0xd0/0xd0 [ 37.114381] ? do_syscall_64+0x43/0x4b0 [ 37.118353] ? perf_bp_event+0x1a0/0x1a0 [ 37.122411] ? do_syscall_64+0x19b/0x4b0 [ 37.126471] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7