[....] Starting OpenBSD Secure Shell server: sshd[ 22.378870] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.761772] random: sshd: uninitialized urandom read (32 bytes read) [ 24.003472] audit: type=1400 audit(1536343811.054:6): avc: denied { map } for pid=4394 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 24.054326] random: sshd: uninitialized urandom read (32 bytes read) [ 24.607865] random: sshd: uninitialized urandom read (32 bytes read) [ 91.880628] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.50' (ECDSA) to the list of known hosts. [ 97.696312] random: sshd: uninitialized urandom read (32 bytes read) [ 97.809188] audit: type=1400 audit(1536343884.860:7): avc: denied { map } for pid=4411 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/09/07 18:11:25 parsed 1 programs [ 98.314215] audit: type=1400 audit(1536343885.365:8): avc: denied { map } for pid=4411 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13946 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 98.963965] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/07 18:11:27 executed programs: 0 [ 100.253876] audit: type=1400 audit(1536343887.304:9): avc: denied { map } for pid=4411 comm="syz-execprog" path="/root/syzkaller-shm754679822" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 100.289712] IPVS: ftp: loaded support on port[0] = 21 [ 100.522713] bridge0: port 1(bridge_slave_0) entered blocking state [ 100.529239] bridge0: port 1(bridge_slave_0) entered disabled state [ 100.536955] device bridge_slave_0 entered promiscuous mode [ 100.556886] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.563366] bridge0: port 2(bridge_slave_1) entered disabled state [ 100.570593] device bridge_slave_1 entered promiscuous mode [ 100.587921] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 100.605075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 100.652623] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 100.672552] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 100.745112] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 100.752553] team0: Port device team_slave_0 added [ 100.769542] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 100.776747] team0: Port device team_slave_1 added [ 100.794116] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 100.812917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 100.832568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 100.853381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 100.990710] bridge0: port 2(bridge_slave_1) entered blocking state [ 100.997179] bridge0: port 2(bridge_slave_1) entered forwarding state [ 101.004158] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.010543] bridge0: port 1(bridge_slave_0) entered forwarding state [ 101.492561] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 101.498715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 101.506144] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 101.556295] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 101.605252] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 101.611428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 101.619123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 101.665235] 8021q: adding VLAN 0 to HW filter on device team0 [ 101.991794] [ 101.993541] ====================================================== [ 101.999838] WARNING: possible circular locking dependency detected [ 102.006137] 4.19.0-rc2+ #5 Not tainted [ 102.010002] ------------------------------------------------------ [ 102.016340] syz-executor0/4690 is trying to acquire lock: [ 102.021860] 000000000b2ec27b ((wq_completion)bond_dev->name){+.+.}, at: flush_workqueue+0x2db/0x1e10 [ 102.031122] [ 102.031122] but task is already holding lock: [ 102.037076] 0000000060587fb4 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x412/0xc30 [ 102.044788] [ 102.044788] which lock already depends on the new lock. [ 102.044788] [ 102.053080] [ 102.053080] the existing dependency chain (in reverse order) is: [ 102.060676] [ 102.060676] -> #2 (rtnl_mutex){+.+.}: [ 102.065944] __mutex_lock+0x171/0x1700 [ 102.070330] mutex_lock_nested+0x16/0x20 [ 102.074915] rtnl_lock+0x17/0x20 [ 102.079189] bond_netdev_notify_work+0x44/0xd0 [ 102.084283] process_one_work+0xc73/0x1aa0 [ 102.089026] worker_thread+0x189/0x13c0 [ 102.093538] kthread+0x35a/0x420 [ 102.097407] ret_from_fork+0x3a/0x50 [ 102.101669] [ 102.101669] -> #1 ((work_completion)(&(&nnw->work)->work)){+.+.}: [ 102.109380] process_one_work+0xc0b/0x1aa0 [ 102.114115] worker_thread+0x189/0x13c0 [ 102.118594] kthread+0x35a/0x420 [ 102.122462] ret_from_fork+0x3a/0x50 [ 102.126674] [ 102.126674] -> #0 ((wq_completion)bond_dev->name){+.+.}: [ 102.133605] lock_acquire+0x1e4/0x4f0 [ 102.137907] flush_workqueue+0x30a/0x1e10 [ 102.142549] drain_workqueue+0x2a9/0x640 [ 102.147113] destroy_workqueue+0xc6/0x9d0 [ 102.151859] __alloc_workqueue_key+0xef9/0x1190 [ 102.157037] bond_init+0x269/0x940 [ 102.161082] register_netdevice+0x337/0x1100 [ 102.165993] bond_newlink+0x49/0xa0 [ 102.170180] rtnl_newlink+0xef4/0x1d50 [ 102.174587] rtnetlink_rcv_msg+0x46e/0xc30 [ 102.179325] netlink_rcv_skb+0x172/0x440 [ 102.183891] rtnetlink_rcv+0x1c/0x20 [ 102.188104] netlink_unicast+0x5a0/0x760 [ 102.192661] netlink_sendmsg+0xa18/0xfc0 [ 102.197226] sock_sendmsg+0xd5/0x120 [ 102.201441] ___sys_sendmsg+0x7fd/0x930 [ 102.205921] __sys_sendmsg+0x11d/0x290 [ 102.210328] __x64_sys_sendmsg+0x78/0xb0 [ 102.214895] do_syscall_64+0x1b9/0x820 [ 102.219351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 102.225049] [ 102.225049] other info that might help us debug this: [ 102.225049] [ 102.233166] Chain exists of: [ 102.233166] (wq_completion)bond_dev->name --> (work_completion)(&(&nnw->work)->work) --> rtnl_mutex [ 102.233166] [ 102.246878] Possible unsafe locking scenario: [ 102.246878] [ 102.253011] CPU0 CPU1 [ 102.257657] ---- ---- [ 102.262312] lock(rtnl_mutex); [ 102.265570] lock((work_completion)(&(&nnw->work)->work)); [ 102.273778] lock(rtnl_mutex); [ 102.279569] lock((wq_completion)bond_dev->name); [ 102.284479] [ 102.284479] *** DEADLOCK *** [ 102.284479] [ 102.290519] 1 lock held by syz-executor0/4690: [ 102.295072] #0: 0000000060587fb4 (rtnl_mutex){+.+.}, at: rtnetlink_rcv_msg+0x412/0xc30 [ 102.303217] [ 102.303217] stack backtrace: [ 102.307713] CPU: 0 PID: 4690 Comm: syz-executor0 Not tainted 4.19.0-rc2+ #5 [ 102.314797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.324140] Call Trace: [ 102.326716] dump_stack+0x1c9/0x2b4 [ 102.330332] ? dump_stack_print_info.cold.2+0x52/0x52 [ 102.335509] ? vprintk_func+0x81/0x117 [ 102.339391] print_circular_bug.isra.34.cold.55+0x1bd/0x27d [ 102.345083] ? save_trace+0xe0/0x290 [ 102.348834] __lock_acquire+0x3449/0x5020 [ 102.352989] ? mark_held_locks+0x160/0x160 [ 102.357214] ? mark_held_locks+0x160/0x160 [ 102.361431] ? __lock_is_held+0xb5/0x140 [ 102.365492] ? __account_cfs_rq_runtime+0x770/0x770 [ 102.370502] ? set_next_entity+0x2f0/0xa80 [ 102.374729] ? lock_downgrade+0x8f0/0x8f0 [ 102.378861] lock_acquire+0x1e4/0x4f0 [ 102.382651] ? flush_workqueue+0x2db/0x1e10 [ 102.386966] ? lock_release+0x9f0/0x9f0 [ 102.390925] ? lockdep_init_map+0x9/0x10 [ 102.394985] ? __init_waitqueue_head+0x9e/0x150 [ 102.399641] ? init_wait_entry+0x1c0/0x1c0 [ 102.403882] flush_workqueue+0x30a/0x1e10 [ 102.408009] ? flush_workqueue+0x2db/0x1e10 [ 102.412321] ? lock_acquire+0x1e4/0x4f0 [ 102.416312] ? drain_workqueue+0xa9/0x640 [ 102.420444] ? lock_release+0x9f0/0x9f0 [ 102.424404] ? check_same_owner+0x340/0x340 [ 102.428714] ? __queue_delayed_work+0x390/0x390 [ 102.433403] ? graph_lock+0x170/0x170 [ 102.437202] ? kasan_check_write+0x14/0x20 [ 102.441442] ? __mutex_lock+0x6d0/0x1700 [ 102.445490] ? drain_workqueue+0xa9/0x640 [ 102.449624] ? finish_task_switch+0x2ca/0x870 [ 102.454137] ? find_held_lock+0x36/0x1c0 [ 102.458197] ? lock_downgrade+0x8f0/0x8f0 [ 102.462327] ? __schedule+0x884/0x1df0 [ 102.466291] ? graph_lock+0x170/0x170 [ 102.470075] ? find_held_lock+0x36/0x1c0 [ 102.474123] ? kasan_check_write+0x14/0x20 [ 102.478350] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 102.483272] ? wait_for_completion+0x8d0/0x8d0 [ 102.487848] ? do_raw_spin_unlock+0xa7/0x2f0 [ 102.492239] ? trace_hardirqs_on+0x2c0/0x2c0 [ 102.496645] drain_workqueue+0x2a9/0x640 [ 102.500708] ? drain_workqueue+0x2a9/0x640 [ 102.504927] ? flush_workqueue+0x1e10/0x1e10 [ 102.509338] ? save_stack+0xa9/0xd0 [ 102.512962] ? save_stack+0x43/0xd0 [ 102.516574] ? __kasan_slab_free+0x11a/0x170 [ 102.520981] ? kasan_slab_free+0xe/0x10 [ 102.524957] ? print_usage_bug+0xc0/0xc0 [ 102.529018] ? bond_init+0x269/0x940 [ 102.532728] ? register_netdevice+0x337/0x1100 [ 102.537319] ? bond_newlink+0x49/0xa0 [ 102.541104] ? rtnl_newlink+0xef4/0x1d50 [ 102.545156] ? rtnetlink_rcv_msg+0x46e/0xc30 [ 102.549544] ? netlink_rcv_skb+0x172/0x440 [ 102.553773] ? rtnetlink_rcv+0x1c/0x20 [ 102.557660] ? netlink_unicast+0x5a0/0x760 [ 102.561910] ? netlink_sendmsg+0xa18/0xfc0 [ 102.566147] ? sock_sendmsg+0xd5/0x120 [ 102.570024] destroy_workqueue+0xc6/0x9d0 [ 102.574159] ? kasan_check_write+0x14/0x20 [ 102.578378] ? wq_watchdog_timer_fn+0x830/0x830 [ 102.583032] ? mark_held_locks+0xc9/0x160 [ 102.587163] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 102.592273] ? kfree+0x111/0x210 [ 102.595622] ? kfree+0x111/0x210 [ 102.598984] ? lockdep_hardirqs_on+0x421/0x5c0 [ 102.603548] ? trace_hardirqs_on+0xbd/0x2c0 [ 102.607852] ? init_rescuer.part.26+0x155/0x190 [ 102.612504] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 102.617702] ? __kasan_slab_free+0x131/0x170 [ 102.622104] ? init_rescuer.part.26+0x155/0x190 [ 102.626768] __alloc_workqueue_key+0xef9/0x1190 [ 102.631434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.636963] ? workqueue_sysfs_register+0x3f0/0x3f0 [ 102.641968] ? put_dec+0xf0/0xf0 [ 102.645334] ? format_decode+0x1b1/0xaf0 [ 102.649398] ? set_precision+0xe0/0xe0 [ 102.653270] ? simple_strtoll+0xa0/0xa0 [ 102.657228] ? graph_lock+0x170/0x170 [ 102.661016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.666560] ? vsnprintf+0x20d/0x1b60 [ 102.670342] ? find_held_lock+0x36/0x1c0 [ 102.674402] ? lock_downgrade+0x8f0/0x8f0 [ 102.678536] ? kasan_check_read+0x11/0x20 [ 102.682688] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 102.687358] bond_init+0x269/0x940 [ 102.690885] ? __dev_get_by_name+0x170/0x170 [ 102.695279] ? bond_arp_rcv+0x11c0/0x11c0 [ 102.699425] ? check_same_owner+0x340/0x340 [ 102.703752] ? rcu_note_context_switch+0x680/0x680 [ 102.708677] ? bond_arp_rcv+0x11c0/0x11c0 [ 102.712816] register_netdevice+0x337/0x1100 [ 102.717211] ? netdev_change_features+0x110/0x110 [ 102.722050] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.727587] ? ns_capable_common+0x13f/0x170 [ 102.731999] ? ns_capable+0x22/0x30 [ 102.735612] bond_newlink+0x49/0xa0 [ 102.739225] ? bond_changelink+0x2360/0x2360 [ 102.743621] rtnl_newlink+0xef4/0x1d50 [ 102.747500] ? rtnl_link_unregister+0x390/0x390 [ 102.752159] ? print_usage_bug+0xc0/0xc0 [ 102.756206] ? __lock_acquire+0x7fc/0x5020 [ 102.760424] ? graph_lock+0x170/0x170 [ 102.764219] ? print_usage_bug+0xc0/0xc0 [ 102.768278] ? __lock_acquire+0x7fc/0x5020 [ 102.772495] ? graph_lock+0x170/0x170 [ 102.776292] ? print_usage_bug+0xc0/0xc0 [ 102.780337] ? mark_held_locks+0x160/0x160 [ 102.784566] ? find_held_lock+0x36/0x1c0 [ 102.788610] ? lock_acquire+0x1e4/0x4f0 [ 102.792581] ? rtnetlink_rcv_msg+0x412/0xc30 [ 102.796969] ? lock_release+0x9f0/0x9f0 [ 102.800943] ? check_same_owner+0x340/0x340 [ 102.805282] ? mutex_trylock+0x2b0/0x2b0 [ 102.809346] ? __lock_acquire+0x7fc/0x5020 [ 102.813561] ? graph_lock+0x170/0x170 [ 102.817356] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.822888] ? rtnl_get_link+0x170/0x370 [ 102.826954] ? rtnl_dump_all+0x600/0x600 [ 102.831285] ? rcu_is_watching+0x8c/0x150 [ 102.835428] ? rtnl_link_unregister+0x390/0x390 [ 102.840096] rtnetlink_rcv_msg+0x46e/0xc30 [ 102.844313] ? rtnetlink_put_metrics+0x690/0x690 [ 102.849084] netlink_rcv_skb+0x172/0x440 [ 102.853135] ? rtnetlink_put_metrics+0x690/0x690 [ 102.857904] ? netlink_ack+0xbe0/0xbe0 [ 102.861819] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 102.866472] rtnetlink_rcv+0x1c/0x20 [ 102.870170] netlink_unicast+0x5a0/0x760 [ 102.874222] ? netlink_attachskb+0x9a0/0x9a0 [ 102.878619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.884153] netlink_sendmsg+0xa18/0xfc0 [ 102.888220] ? netlink_unicast+0x760/0x760 [ 102.892462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.897998] ? security_socket_sendmsg+0x94/0xc0 [ 102.902750] ? netlink_unicast+0x760/0x760 [ 102.906968] sock_sendmsg+0xd5/0x120 [ 102.910680] ___sys_sendmsg+0x7fd/0x930 [ 102.914657] ? copy_msghdr_from_user+0x580/0x580 [ 102.919402] ? lock_downgrade+0x8f0/0x8f0 [ 102.923534] ? __fget_light+0x2f7/0x440 [ 102.927504] ? fget_raw+0x20/0x20 [ 102.930968] ? __fd_install+0x2db/0x880 [ 102.934955] ? get_unused_fd_flags+0x1a0/0x1a0 [ 102.939530] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.945050] ? sockfd_lookup_light+0xc5/0x160 [ 102.949526] __sys_sendmsg+0x11d/0x290 [ 102.953401] ? __ia32_sys_shutdown+0x80/0x80 [ 102.957798] ? __x64_sys_futex+0x47f/0x6a0 [ 102.962015] ? do_syscall_64+0x9a/0x820 [ 102.965972] ? do_syscall_64+0x9a/0x820 [ 102.969936] ? trace_hardirqs_off_caller+0x2b0/0x2b0 [ 102.975019] ? trace_hardirqs_off+0xb8/0x2c0 [ 102.979410] __x64_sys_sendmsg+0x78/0xb0 [ 102.983455] do_syscall_64+0x1b9/0x820 [ 102.987328] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 102.992691] ? syscall_return_slowpath+0x5e0/0x5e0 [ 102.997607] ? trace_hardirqs_on_caller+0x2c0/0x2c0 [ 103.002607] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 103.007605] ? recalc_sigpending_tsk+0x180/0x180 [ 103.012343] ? kasan_check_write+0x14/0x20 [ 103.016563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 103.021393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.026567] RIP: 0033:0x457099 [ 103.029755] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 103.048637] RSP: 002b:00007ff4fc9a2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 103.056346] RAX: ffffffffffffffda RBX: 00007ff4fc9a36d4 RCX: 0000000000457099 [ 103.063622] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 103.070892] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 103.078150] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 103.085398] R13: 00000000004d4bf0 R14: 00000000004c9133 R15: 0000000000000000 2018/09/07 18:11:32 executed programs: 112 2018/09/07 18:11:37 executed programs: 356