audit: type=1800 audit(1543375485.471:30): pid=5875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 ==================================== WARNING: syz-executor448/6030 still has locks held! 4.20.0-rc4+ #352 Not tainted ------------------------------------ 1 lock held by syz-executor448/6030: #0: 000000006dd1faec (&sig->cred_guard_mutex){+.+.}, at: prepare_bprm_creds+0x53/0x120 fs/exec.c:1405 stack backtrace: CPU: 1 PID: 6030 Comm: syz-executor448 Not tainted 4.20.0-rc4+ #352 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x244/0x39d lib/dump_stack.c:113 print_held_locks_bug kernel/locking/lockdep.c:4362 [inline] debug_check_no_locks_held.cold.49+0x93/0x9f kernel/locking/lockdep.c:4368 try_to_freeze include/linux/freezer.h:66 [inline] freezer_count include/linux/freezer.h:128 [inline] freezable_schedule include/linux/freezer.h:173 [inline] de_thread fs/exec.c:1115 [inline] flush_old_exec+0x1ea2/0x2480 fs/exec.c:1262 load_elf_binary+0xa9a/0x5cf0 fs/binfmt_elf.c:869 search_binary_handler+0x17d/0x570 fs/exec.c:1654 exec_binprm fs/exec.c:1696 [inline] __do_execve_file.isra.33+0x1661/0x25d0 fs/exec.c:1820 do_execveat_common fs/exec.c:1867 [inline] do_execveat fs/exec.c:1895 [inline] __do_sys_execveat fs/exec.c:1976 [inline] __se_sys_execveat fs/exec.c:1968 [inline] __x64_sys_execveat+0xed/0x130 fs/exec.c:1968 do_syscall_64+0x1b9/0x820 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x446269 Code: e8 2c b3 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fde02a86da8 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 RAX: ffffffffffffffda RBX: 00000000006dbc28 RCX: 0000000000446269 RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 00000000006dbc20 R08: 0000000000001000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dbc2c R13: 00000000004ae358 R14: 00000000200003c0 R15: 00000000006dbd2c kobject: 'regulatory.0' (000000007b588f9f): kobject_uevent_env kobject: 'regulatory.0' (000000007b588f9f): fill_kobj_path: path = '/devices/platform/regulatory.0' kobject: 'regulatory.0' (000000007b588f9f): kobject_uevent_env kobject: 'regulatory.0' (000000007b588f9f): fill_kobj_path: path = '/devices/platform/regulatory.0'