[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 12.748857] audit: type=1400 audit(1517075472.512:6): avc: denied { map } for pid=3661 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 21.572723] audit: type=1400 audit(1517075481.336:7): avc: denied { map } for pid=3676 comm="syzkaller251332" path="/root/syzkaller251332582" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 21.599899] [ 21.601521] ====================================================== [ 21.607806] WARNING: possible circular locking dependency detected [ 21.614091] 4.15.0-rc9+ #283 Not tainted [ 21.618118] ------------------------------------------------------ [ 21.624400] syzkaller251332/3676 is trying to acquire lock: [ 21.630075] (sk_lock-AF_INET6){+.+.}, at: [<000000004222b5b8>] do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 [ 21.639495] [ 21.639495] but task is already holding lock: [ 21.645429] (rtnl_mutex){+.+.}, at: [<00000000ee4ed558>] rtnl_lock+0x17/0x20 [ 21.652674] [ 21.652674] which lock already depends on the new lock. [ 21.652674] [ 21.660956] [ 21.660956] the existing dependency chain (in reverse order) is: [ 21.668540] [ 21.668540] -> #1 (rtnl_mutex){+.+.}: [ 21.673796] __mutex_lock+0x16f/0x1a80 [ 21.678174] mutex_lock_nested+0x16/0x20 [ 21.682723] rtnl_lock+0x17/0x20 [ 21.686579] register_netdevice_notifier+0xad/0x860 [ 21.692093] tee_tg_check+0x1a0/0x280 [ 21.696387] xt_check_target+0x22c/0x7d0 [ 21.700938] find_check_entry.isra.7+0x935/0xcf0 [ 21.706182] translate_table+0xf52/0x1690 [ 21.710817] do_ip6t_set_ctl+0x370/0x5f0 [ 21.715368] nf_setsockopt+0x67/0xc0 [ 21.719572] ipv6_setsockopt+0x115/0x150 [ 21.724119] udpv6_setsockopt+0x45/0x80 [ 21.728582] sock_common_setsockopt+0x95/0xd0 [ 21.733568] SyS_setsockopt+0x189/0x360 [ 21.738040] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 21.743287] [ 21.743287] -> #0 (sk_lock-AF_INET6){+.+.}: [ 21.749062] lock_acquire+0x1d5/0x580 [ 21.753353] lock_sock_nested+0xc2/0x110 [ 21.757904] do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 [ 21.763410] ipv6_setsockopt+0xd7/0x150 [ 21.767874] udpv6_setsockopt+0x45/0x80 [ 21.772343] sock_common_setsockopt+0x95/0xd0 [ 21.777329] SyS_setsockopt+0x189/0x360 [ 21.781797] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 21.787044] [ 21.787044] other info that might help us debug this: [ 21.787044] [ 21.795153] Possible unsafe locking scenario: [ 21.795153] [ 21.801181] CPU0 CPU1 [ 21.805820] ---- ---- [ 21.810454] lock(rtnl_mutex); [ 21.813700] lock(sk_lock-AF_INET6); [ 21.819985] lock(rtnl_mutex); [ 21.825747] lock(sk_lock-AF_INET6); [ 21.829525] [ 21.829525] *** DEADLOCK *** [ 21.829525] [ 21.835558] 1 lock held by syzkaller251332/3676: [ 21.840277] #0: (rtnl_mutex){+.+.}, at: [<00000000ee4ed558>] rtnl_lock+0x17/0x20 [ 21.847959] [ 21.847959] stack backtrace: [ 21.852424] CPU: 0 PID: 3676 Comm: syzkaller251332 Not tainted 4.15.0-rc9+ #283 [ 21.859836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 21.869157] Call Trace: [ 21.871718] dump_stack+0x194/0x257 [ 21.875317] ? arch_local_irq_restore+0x53/0x53 [ 21.879957] print_circular_bug.isra.37+0x2cd/0x2dc [ 21.884952] ? save_trace+0xe0/0x2b0 [ 21.888643] __lock_acquire+0x30a8/0x3e00 [ 21.892767] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 21.897935] ? rtnl_lock+0x17/0x20 [ 21.901444] ? __mutex_lock+0x16f/0x1a80 [ 21.905472] ? rtnl_lock+0x17/0x20 [ 21.908980] ? check_noncircular+0x20/0x20 [ 21.913183] ? lru_cache_add+0x1c7/0x3a0 [ 21.917213] ? get_mem_cgroup_from_mm+0x710/0x710 [ 21.922028] ? rtnl_lock+0x17/0x20 [ 21.925544] ? __bfs+0x6d0/0x750 [ 21.928881] ? __mem_cgroup_threshold+0x8f0/0x8f0 [ 21.933693] ? mutex_lock_io_nested+0x1900/0x1900 [ 21.938504] ? mark_held_locks+0xaf/0x100 [ 21.942622] ? print_irqtrace_events+0x270/0x270 [ 21.947347] ? find_held_lock+0x35/0x1d0 [ 21.951384] ? check_noncircular+0x20/0x20 [ 21.955587] ? check_noncircular+0x20/0x20 [ 21.959791] ? pudp_huge_clear_flush+0x1f0/0x1f0 [ 21.964526] ? __lock_acquire+0x664/0x3e00 [ 21.968734] ? find_held_lock+0x35/0x1d0 [ 21.972768] lock_acquire+0x1d5/0x580 [ 21.976546] ? lock_sock_nested+0xa3/0x110 [ 21.980747] ? lock_acquire+0x1d5/0x580 [ 21.984696] ? do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 [ 21.989853] ? lock_release+0xa40/0xa40 [ 21.993796] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 21.999650] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 22.005514] ? do_raw_spin_trylock+0x190/0x190 [ 22.010072] ? lock_sock_nested+0x44/0x110 [ 22.014280] lock_sock_nested+0xc2/0x110 [ 22.018311] ? do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 [ 22.023477] do_ipv6_setsockopt.isra.8+0x3c5/0x39d0 [ 22.028463] ? ipv6_update_options+0x330/0x330 [ 22.033017] ? save_stack+0x43/0xd0 [ 22.036612] ? kasan_kmalloc+0xad/0xe0 [ 22.040470] ? kasan_slab_alloc+0x12/0x20 [ 22.044585] ? kmem_cache_alloc+0x12e/0x760 [ 22.048883] ? selinux_file_alloc_security+0xae/0x190 [ 22.054060] ? security_file_alloc+0x6d/0xa0 [ 22.058447] ? get_empty_filp+0x189/0x4f0 [ 22.062569] ? alloc_file+0x26/0x390 [ 22.066257] ? sock_alloc_file+0x1f3/0x560 [ 22.070461] ? sock_map_fd+0x34/0x90 [ 22.074149] ? SyS_socket+0x125/0x1d0 [ 22.077924] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 22.082824] ? kasan_slab_alloc+0x12/0x20 [ 22.086948] ? kmem_cache_alloc+0x12e/0x760 [ 22.091238] ? get_empty_filp+0xfb/0x4f0 [ 22.095269] ? alloc_file+0x26/0x390 [ 22.098949] ? sock_alloc_file+0x1f3/0x560 [ 22.103153] ? find_held_lock+0x35/0x1d0 [ 22.107185] ? avc_has_perm+0x35e/0x680 [ 22.111128] ? lock_downgrade+0x980/0x980 [ 22.115248] ? lock_release+0xa40/0xa40 [ 22.119191] ? check_noncircular+0x20/0x20 [ 22.123396] ? __pmd_alloc+0x4e0/0x4e0 [ 22.127255] ? __lockdep_init_map+0xe4/0x650 [ 22.131639] ? find_held_lock+0x35/0x1d0 [ 22.135670] ? avc_has_perm+0x43e/0x680 [ 22.139616] ? avc_has_perm_noaudit+0x520/0x520 [ 22.144254] ? __do_page_fault+0x5f7/0xc90 [ 22.148459] ? lock_downgrade+0x980/0x980 [ 22.152578] ? handle_mm_fault+0x410/0x8d0 [ 22.156782] ? down_read_trylock+0xdb/0x170 [ 22.161163] ? __do_page_fault+0x32d/0xc90 [ 22.165366] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 22.169919] ? vmacache_find+0x5f/0x280 [ 22.173863] ? sock_has_perm+0x2a4/0x420 [ 22.177896] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 22.183227] ? __do_page_fault+0x3d6/0xc90 [ 22.187430] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 22.193116] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 22.198371] ipv6_setsockopt+0xd7/0x150 [ 22.202312] ? ipv6_setsockopt+0xd7/0x150 [ 22.206428] udpv6_setsockopt+0x45/0x80 [ 22.210371] sock_common_setsockopt+0x95/0xd0 [ 22.214834] SyS_setsockopt+0x189/0x360 [ 22.218788] ? SyS_recv+0x40/0x40 [ 22.222211] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 22.227029] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 22.232034] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 22.236761] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 22.241485] RIP: 0033:0x4411d9 [ 22.244643] RSP: 002b:00007ffe8e9dd0d8 EFLAGS: 00000207 ORIG_RAX: 0000000000000036 [ 22.252325] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004411d9 [ 22.259571] RDX: 000000000000002d RSI: 0000000000000029 RDI: 0000000000000004 [ 22.266812] RBP: 00000000006cb018 R08: 0000000000000088 R09: 0000000000000000 [ 22.274053] R10: 00