[....] Starting enhanced syslogd: rsyslogd[ 13.340073] audit: type=1400 audit(1517107920.594:5): avc: denied { syslog } for pid=3528 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.951569] audit: type=1400 audit(1517107927.206:6): avc: denied { map } for pid=3669 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.29' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 26.267088] audit: type=1400 audit(1517107933.521:7): avc: denied { map } for pid=3683 comm="syzkaller230533" path="/root/syzkaller230533332" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 26.650578] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 26.977826] [ 26.979469] ====================================================== [ 26.985752] WARNING: possible circular locking dependency detected [ 26.992039] 4.15.0-rc9+ #212 Not tainted [ 26.996066] ------------------------------------------------------ [ 27.002348] syzkaller230533/3683 is trying to acquire lock: [ 27.008024] (rtnl_mutex){+.+.}, at: [<0000000020698a3c>] rtnl_lock+0x17/0x20 [ 27.015276] [ 27.015276] but task is already holding lock: [ 27.021210] (sk_lock-AF_INET){+.+.}, at: [<000000007e95eb3a>] ip_setsockopt+0x8c/0xb0 [ 27.029239] [ 27.029239] which lock already depends on the new lock. [ 27.029239] [ 27.037522] [ 27.037522] the existing dependency chain (in reverse order) is: [ 27.045111] [ 27.045111] -> #1 (sk_lock-AF_INET){+.+.}: [ 27.050798] lock_sock_nested+0xc2/0x110 [ 27.055350] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 27.060767] ip_setsockopt+0x3a/0xb0 [ 27.064972] udp_setsockopt+0x45/0x80 [ 27.069261] sock_common_setsockopt+0x95/0xd0 [ 27.074244] SyS_setsockopt+0x189/0x360 [ 27.078706] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 27.083949] [ 27.083949] -> #0 (rtnl_mutex){+.+.}: [ 27.089203] lock_acquire+0x1d5/0x580 [ 27.093505] __mutex_lock+0x16f/0x1a80 [ 27.097902] mutex_lock_nested+0x16/0x20 [ 27.102456] rtnl_lock+0x17/0x20 [ 27.106315] register_netdevice_notifier+0xad/0x860 [ 27.111834] clusterip_tg_check+0xeb9/0x1570 [ 27.116734] xt_check_target+0x22c/0x7d0 [ 27.121284] find_check_entry.isra.8+0x8c8/0xcb0 [ 27.126527] translate_table+0xed1/0x1610 [ 27.131169] do_ipt_set_ctl+0x370/0x5f0 [ 27.135631] nf_setsockopt+0x67/0xc0 [ 27.139833] ip_setsockopt+0xa1/0xb0 [ 27.144037] raw_setsockopt+0xb7/0xd0 [ 27.148327] sock_common_setsockopt+0x95/0xd0 [ 27.153311] SyS_setsockopt+0x189/0x360 [ 27.157777] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 27.163022] [ 27.163022] other info that might help us debug this: [ 27.163022] [ 27.171131] Possible unsafe locking scenario: [ 27.171131] [ 27.177153] CPU0 CPU1 [ 27.181788] ---- ---- [ 27.186420] lock(sk_lock-AF_INET); [ 27.190099] lock(rtnl_mutex); [ 27.195863] lock(sk_lock-AF_INET); [ 27.202061] lock(rtnl_mutex); [ 27.205307] [ 27.205307] *** DEADLOCK *** [ 27.205307] [ 27.211335] 1 lock held by syzkaller230533/3683: [ 27.216054] #0: (sk_lock-AF_INET){+.+.}, at: [<000000007e95eb3a>] ip_setsockopt+0x8c/0xb0 [ 27.224517] [ 27.224517] stack backtrace: [ 27.228981] CPU: 1 PID: 3683 Comm: syzkaller230533 Not tainted 4.15.0-rc9+ #212 [ 27.236395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 27.245717] Call Trace: [ 27.248276] dump_stack+0x194/0x257 [ 27.251873] ? arch_local_irq_restore+0x53/0x53 [ 27.256514] print_circular_bug.isra.37+0x2cd/0x2dc [ 27.261498] ? save_trace+0xe0/0x2b0 [ 27.265183] __lock_acquire+0x30a8/0x3e00 [ 27.269304] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 27.274462] ? trace_hardirqs_off+0x10/0x10 [ 27.278752] ? __is_insn_slot_addr+0x1fc/0x330 [ 27.283301] ? lock_downgrade+0x980/0x980 [ 27.287417] ? lock_release+0xa40/0xa40 [ 27.291364] ? bpf_prog_kallsyms_find+0xbd/0x440 [ 27.296090] ? modules_open+0xa0/0xa0 [ 27.299858] ? trace_raw_output_xdp_redirect_map_err+0x440/0x440 [ 27.305972] ? is_bpf_text_address+0x7b/0x120 [ 27.310435] ? lock_downgrade+0x980/0x980 [ 27.314988] ? lock_release+0xa40/0xa40 [ 27.318933] ? __free_insn_slot+0x5c0/0x5c0 [ 27.323225] ? check_noncircular+0x20/0x20 [ 27.327434] ? kernel_text_address+0x102/0x140 [ 27.331987] lock_acquire+0x1d5/0x580 [ 27.335759] ? lock_acquire+0x1d5/0x580 [ 27.339703] ? rtnl_lock+0x17/0x20 [ 27.343211] ? lock_release+0xa40/0xa40 [ 27.347153] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 27.353008] ? print_irqtrace_events+0x270/0x270 [ 27.357746] ? idr_get_free_cmn+0x64e/0xfd0 [ 27.362041] ? rcu_note_context_switch+0x710/0x710 [ 27.366939] ? __might_sleep+0x95/0x190 [ 27.370880] ? rtnl_lock+0x17/0x20 [ 27.374387] __mutex_lock+0x16f/0x1a80 [ 27.378240] ? rtnl_lock+0x17/0x20 [ 27.381750] ? rtnl_lock+0x17/0x20 [ 27.385257] ? __lock_acquire+0x664/0x3e00 [ 27.389460] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 27.394530] ? mutex_lock_io_nested+0x1900/0x1900 [ 27.399341] ? trace_hardirqs_on+0xd/0x10 [ 27.403461] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 27.408618] ? save_stack+0xa3/0xd0 [ 27.412223] ? kasan_kmalloc+0xad/0xe0 [ 27.416083] ? __proc_create+0x21a/0x880 [ 27.420111] ? proc_create_data+0x76/0x180 [ 27.424313] ? clusterip_tg_check+0xe4d/0x1570 [ 27.428864] ? rb_insert_color+0x1580/0x1580 [ 27.433240] ? do_ipt_set_ctl+0x370/0x5f0 [ 27.437354] ? ip_setsockopt+0xa1/0xb0 [ 27.441211] ? raw_setsockopt+0xb7/0xd0 [ 27.445155] ? sock_common_setsockopt+0x95/0xd0 [ 27.449791] ? SyS_setsockopt+0x189/0x360 [ 27.453913] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 27.458817] ? _find_next_bit+0xee/0x120 [ 27.462852] ? check_noncircular+0x20/0x20 [ 27.467058] ? find_first_zero_bit+0x93/0xe0 [ 27.471436] ? ida_get_new_above+0x421/0x9d0 [ 27.475822] ? print_irqtrace_events+0x270/0x270 [ 27.480549] ? check_noncircular+0x20/0x20 [ 27.484751] ? print_irqtrace_events+0x270/0x270 [ 27.489475] ? ida_simple_get+0x15c/0x220 [ 27.493591] ? lock_downgrade+0x980/0x980 [ 27.497706] ? find_held_lock+0x35/0x1d0 [ 27.501735] mutex_lock_nested+0x16/0x20 [ 27.505765] ? mutex_lock_nested+0x16/0x20 [ 27.509968] rtnl_lock+0x17/0x20 [ 27.513301] register_netdevice_notifier+0xad/0x860 [ 27.518286] ? lock_downgrade+0x980/0x980 [ 27.522409] ? __dev_close_many+0x350/0x350 [ 27.526700] ? ida_simple_get+0x176/0x220 [ 27.530817] ? do_raw_write_trylock+0x190/0x190 [ 27.535452] ? ida_remove+0x3f0/0x3f0 [ 27.539221] ? _raw_write_unlock+0x22/0x30 [ 27.543427] ? proc_register+0x261/0x370 [ 27.547458] ? proc_create_data+0x101/0x180 [ 27.551756] clusterip_tg_check+0xeb9/0x1570 [ 27.556135] ? arp_mangle+0x550/0x550 [ 27.559906] ? xt_find_target+0x150/0x1e0 [ 27.564027] ? lock_downgrade+0x980/0x980 [ 27.568144] ? rcu_read_lock_sched_held+0x108/0x120 [ 27.573131] ? pcpu_alloc+0x146/0x10e0 [ 27.576991] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 27.581803] ? pcpu_free_area+0xa00/0xa00 [ 27.585918] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 27.590729] ? __kernel_text_address+0xd/0x40 [ 27.595191] ? wait_for_completion+0x770/0x770 [ 27.599743] ? trace_hardirqs_off+0xd/0x10 [ 27.603945] ? arp_mangle+0x550/0x550 [ 27.607721] xt_check_target+0x22c/0x7d0 [ 27.611762] ? xt_target_seq_next+0x30/0x30 [ 27.616055] ? mutex_unlock+0xd/0x10 [ 27.619740] ? mutex_unlock+0xd/0x10 [ 27.623426] ? xt_find_target+0x17b/0x1e0 [ 27.627546] find_check_entry.isra.8+0x8c8/0xcb0 [ 27.632273] ? ipt_do_table+0x1860/0x1860 [ 27.636407] ? mark_held_locks+0xaf/0x100 [ 27.640525] ? kfree+0xf0/0x260 [ 27.643772] ? trace_hardirqs_on+0xd/0x10 [ 27.647891] translate_table+0xed1/0x1610 [ 27.652017] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 27.656835] ? kasan_check_write+0x14/0x20 [ 27.661039] ? _copy_from_user+0x99/0x110 [ 27.665226] do_ipt_set_ctl+0x370/0x5f0 [ 27.669181] ? translate_compat_table+0x1b90/0x1b90 [ 27.674169] ? mutex_unlock+0xd/0x10 [ 27.677851] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 27.683097] nf_setsockopt+0x67/0xc0 [ 27.686780] ip_setsockopt+0xa1/0xb0 [ 27.690460] raw_setsockopt+0xb7/0xd0 [ 27.694233] sock_common_setsockopt+0x95/0xd0 [ 27.698699] SyS_setsockopt+0x189/0x360 [ 27.702642] ? SyS_recv+0x40/0x40 [ 27.706066] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 27.710879] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.715864] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 27.720590] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 27.725312] RIP: 0033:0x445d99 [ 27.728469] RSP: 002b:00007ffd2a095458 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 27.736152] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000445d99 [ 27.743390] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 27.750630] RBP: 00007ffd2a095558 R08: 00000000000002f8 R09: 0000000020007f10 [ 27.757868] R10: 000000002000b000 R11: 0000000000000203 R12: 00007ffd2a095558 [ 27.765108] R13: 0000000000403260 R14: 0000000000000000 R15: 0000000000000000 [ 27.776171] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated a