random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) audit: type=1400 audit(1551098697.636:7): avc: denied { map } for pid=1797 comm="syz-executor070" path="/root/syz-executor070093446" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 dl_rq->running_bw > dl_rq->this_bw ------------[ cut here ]------------ WARNING: CPU: 1 PID: 1798 at kernel/sched/deadline.c:125 sub_rq_bw kernel/sched/deadline.c:125 [inline] WARNING: CPU: 1 PID: 1798 at kernel/sched/deadline.c:125 switched_from_dl.cold+0x5b/0x62 kernel/sched/deadline.c:2236 Kernel panic - not syncing: panic_on_warn set ... CPU: 1 PID: 1798 Comm: syz-executor070 Not tainted 4.14.103+ #18 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x10e lib/dump_stack.c:53 panic+0x1d9/0x3c2 kernel/panic.c:182 __warn.cold+0x2f/0x3b kernel/panic.c:546 ====================================================== WARNING: possible circular locking dependency detected 4.14.103+ #18 Not tainted ------------------------------------------------------ syz-executor070/1798 is trying to acquire lock: (console_owner){-...}, at: [] console_trylock_spinning kernel/printk/printk.c:1652 [inline] (console_owner){-...}, at: [] vprintk_emit+0x1b8/0x330 kernel/printk/printk.c:1916 but task is already holding lock: (&rq->lock){-.-.}, at: [] task_rq_lock+0xc8/0x330 kernel/sched/core.c:126 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #4 (&rq->lock){-.-.}: -> #3 (&p->pi_lock){-.-.}: -> #2 (&tty->write_wait){-.-.}: -> #1 (&port_lock_key){-.-.}: -> #0 (console_owner){-...}: other info that might help us debug this: Chain exists of: console_owner --> &p->pi_lock --> &rq->lock Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&rq->lock); lock(&p->pi_lock); lock(&rq->lock); lock(console_owner); *** DEADLOCK *** 3 locks held by syz-executor070/1798: #0: (rcu_read_lock){....}, at: [] SYSC_sched_setattr kernel/sched/core.c:4517 [inline] #0: (rcu_read_lock){....}, at: [] SyS_sched_setattr+0x1d0/0x390 kernel/sched/core.c:4503 #1: (&p->pi_lock){-.-.}, at: [] task_rq_lock+0x6a/0x330 kernel/sched/core.c:124 #2: (&rq->lock){-.-.}, at: [] task_rq_lock+0xc8/0x330 kernel/sched/core.c:126 stack backtrace: CPU: 1 PID: 1798 Comm: syz-executor070 Not tainted 4.14.103+ #18 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x10e lib/dump_stack.c:53 print_circular_bug.isra.0.cold+0x2dc/0x425 kernel/locking/lockdep.c:1258 Kernel Offset: 0x1dc00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) Rebooting in 86400 seconds..