[....] Starting enhanced syslogd: rsyslogd[ 11.085895] audit: type=1400 audit(1514690126.817:5): avc: denied { syslog } for pid=3038 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.295051] audit: type=1400 audit(1514690132.026:6): avc: denied { map } for pid=3179 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.44' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 23.249277] audit: type=1400 audit(1514690138.981:7): avc: denied { map } for pid=3193 comm="syzkaller015658" path="/root/syzkaller015658014" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 23.330348] audit: type=1400 audit(1514690139.061:8): avc: denied { create } for pid=3193 comm="syzkaller015658" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 23.331302] [ 23.331307] ============================= [ 23.331309] WARNING: suspicious RCU usage [ 23.331312] 4.15.0-rc5+ #243 Not tainted [ 23.331314] ----------------------------- [ 23.331317] net/tipc/bearer.c:177 suspicious rcu_dereference_protected() usage! [ 23.331319] [ 23.331319] other info that might help us debug this: [ 23.331319] [ 23.331321] [ 23.331321] rcu_scheduler_active = 2, debug_locks = 1 [ 23.331324] 2 locks held by syzkaller015658/3193: [ 23.331325] #0: (cb_lock){++++}, at: [<00000000a19a66ca>] genl_rcv+0x19/0x40 [ 23.331342] #1: (genl_mutex){+.+.}, at: [<000000000ac1cc6d>] genl_rcv_msg+0x115/0x140 [ 23.331352] [ 23.331352] stack backtrace: [ 23.331356] CPU: 1 PID: 3193 Comm: syzkaller015658 Not tainted 4.15.0-rc5+ #243 [ 23.331359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 23.331361] Call Trace: [ 23.331370] dump_stack+0x194/0x257 [ 23.331380] ? arch_local_irq_restore+0x53/0x53 [ 23.331397] lockdep_rcu_suspicious+0x123/0x170 [ 23.331407] tipc_bearer_find+0x2b4/0x3b0 [ 23.331413] ? tipc_media_addr_printf+0x3a0/0x3a0 [ 23.331430] tipc_nl_compat_link_set+0x329/0x9f0 [ 23.331440] tipc_nl_compat_doit+0x15b/0x660 [ 23.331447] ? security_capable+0x8e/0xc0 [ 23.331452] ? tipc_nl_compat_link_stat_dump+0x3000/0x3000 [ 23.3