[....] Starting enhanced syslogd: rsyslogd[ 16.429948] audit: type=1400 audit(1517336286.837:5): avc: denied { syslog } for pid=3904 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.754680] audit: type=1400 audit(1517336293.162:6): avc: denied { map } for pid=4045 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.15.217' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 29.163727] audit: type=1400 audit(1517336299.571:7): avc: denied { map } for pid=4059 comm="syzkaller581578" path="/root/syzkaller581578061" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 29.551473] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 29.881559] [ 29.883213] ====================================================== [ 29.889496] WARNING: possible circular locking dependency detected [ 29.895782] 4.15.0-rc9+ #217 Not tainted [ 29.899809] ------------------------------------------------------ [ 29.906094] syzkaller581578/4059 is trying to acquire lock: [ 29.911769] (rtnl_mutex){+.+.}, at: [<00000000b8e1457b>] rtnl_lock+0x17/0x20 [ 29.919022] [ 29.919022] but task is already holding lock: [ 29.924959] (sk_lock-AF_INET){+.+.}, at: [<00000000a3a0337d>] ip_setsockopt+0x8c/0xb0 [ 29.932989] [ 29.932989] which lock already depends on the new lock. [ 29.932989] [ 29.941273] [ 29.941273] the existing dependency chain (in reverse order) is: [ 29.948859] [ 29.948859] -> #1 (sk_lock-AF_INET){+.+.}: [ 29.954543] lock_sock_nested+0xc2/0x110 [ 29.959092] do_ip_getsockopt+0x1b3/0x2170 [ 29.963813] ip_getsockopt+0x90/0x220 [ 29.968102] udp_getsockopt+0x45/0x80 [ 29.972397] sock_common_getsockopt+0x95/0xd0 [ 29.977379] SyS_getsockopt+0x178/0x340 [ 29.981842] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.987082] [ 29.987082] -> #0 (rtnl_mutex){+.+.}: [ 29.992418] lock_acquire+0x1d5/0x580 [ 29.996706] __mutex_lock+0x16f/0x1a80 [ 30.001079] mutex_lock_nested+0x16/0x20 [ 30.005632] rtnl_lock+0x17/0x20 [ 30.009489] register_netdevice_notifier+0xad/0x860 [ 30.014993] tee_tg_check+0x1a0/0x280 [ 30.019284] xt_check_target+0x22c/0x7d0 [ 30.023835] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.029077] translate_table+0xed1/0x1610 [ 30.033712] do_ipt_set_ctl+0x370/0x5f0 [ 30.038173] nf_setsockopt+0x67/0xc0 [ 30.042381] ip_setsockopt+0xa1/0xb0 [ 30.046584] raw_setsockopt+0xb7/0xd0 [ 30.050876] sock_common_setsockopt+0x95/0xd0 [ 30.055867] SyS_setsockopt+0x189/0x360 [ 30.060330] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.065571] [ 30.065571] other info that might help us debug this: [ 30.065571] [ 30.073677] Possible unsafe locking scenario: [ 30.073677] [ 30.079710] CPU0 CPU1 [ 30.084343] ---- ---- [ 30.088983] lock(sk_lock-AF_INET); [ 30.092665] lock(rtnl_mutex); [ 30.098429] lock(sk_lock-AF_INET); [ 30.104626] lock(rtnl_mutex); [ 30.107875] [ 30.107875] *** DEADLOCK *** [ 30.107875] [ 30.113908] 1 lock held by syzkaller581578/4059: [ 30.118628] #0: (sk_lock-AF_INET){+.+.}, at: [<00000000a3a0337d>] ip_setsockopt+0x8c/0xb0 [ 30.127093] [ 30.127093] stack backtrace: [ 30.131557] CPU: 1 PID: 4059 Comm: syzkaller581578 Not tainted 4.15.0-rc9+ #217 [ 30.138970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.148291] Call Trace: [ 30.150857] dump_stack+0x194/0x257 [ 30.154458] ? arch_local_irq_restore+0x53/0x53 [ 30.159101] print_circular_bug.isra.37+0x2cd/0x2dc [ 30.164085] ? save_trace+0xe0/0x2b0 [ 30.167766] __lock_acquire+0x30a8/0x3e00 [ 30.171880] ? print_irqtrace_events+0x270/0x270 [ 30.176608] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.181766] ? print_irqtrace_events+0x270/0x270 [ 30.186492] ? __lock_acquire+0x664/0x3e00 [ 30.190712] ? rcutorture_record_progress+0x10/0x10 [ 30.195697] ? print_irqtrace_events+0x270/0x270 [ 30.200428] ? __lock_acquire+0x664/0x3e00 [ 30.204630] ? __save_stack_trace+0x7e/0xd0 [ 30.208922] ? add_lock_to_list.isra.28+0x24d/0x352 [ 30.213913] ? check_noncircular+0x20/0x20 [ 30.218114] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.223275] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.228434] lock_acquire+0x1d5/0x580 [ 30.232201] ? lock_acquire+0x1d5/0x580 [ 30.236143] ? rtnl_lock+0x17/0x20 [ 30.239651] ? lock_release+0xa40/0xa40 [ 30.243603] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.249456] ? rcu_note_context_switch+0x710/0x710 [ 30.254356] ? __might_sleep+0x95/0x190 [ 30.258301] ? rtnl_lock+0x17/0x20 [ 30.261809] __mutex_lock+0x16f/0x1a80 [ 30.265668] ? rtnl_lock+0x17/0x20 [ 30.269177] ? lock_downgrade+0x980/0x980 [ 30.273294] ? rtnl_lock+0x17/0x20 [ 30.276804] ? mutex_lock_io_nested+0x1900/0x1900 [ 30.281616] ? is_bpf_text_address+0x7b/0x120 [ 30.286830] ? print_irqtrace_events+0x270/0x270 [ 30.291645] ? depot_save_stack+0x3b5/0x490 [ 30.295935] ? lock_downgrade+0x980/0x980 [ 30.300053] ? lock_release+0xa40/0xa40 [ 30.304004] ? mark_held_locks+0xaf/0x100 [ 30.308126] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 30.313196] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.318181] ? trace_hardirqs_on+0xd/0x10 [ 30.322305] ? depot_save_stack+0x3b5/0x490 [ 30.326629] ? save_stack+0xa3/0xd0 [ 30.330226] ? save_stack+0x43/0xd0 [ 30.333820] ? kasan_kmalloc+0xad/0xe0 [ 30.337675] ? kmem_cache_alloc_trace+0x136/0x750 [ 30.342488] ? tee_tg_check+0xed/0x280 [ 30.346344] ? xt_check_target+0x22c/0x7d0 [ 30.350548] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 30.355443] ? translate_table+0xed1/0x1610 [ 30.359730] ? do_ipt_set_ctl+0x370/0x5f0 [ 30.363861] ? nf_setsockopt+0x67/0xc0 [ 30.367719] ? ip_setsockopt+0xa1/0xb0 [ 30.371574] ? raw_setsockopt+0xb7/0xd0 [ 30.375532] ? sock_common_setsockopt+0x95/0xd0 [ 30.380179] ? SyS_setsockopt+0x189/0x360 [ 30.384297] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.389197] mutex_lock_nested+0x16/0x20 [ 30.393225] ? mutex_lock_nested+0x16/0x20 [ 30.397430] rtnl_lock+0x17/0x20 [ 30.400766] register_netdevice_notifier+0xad/0x860 [ 30.405760] ? __dev_close_many+0x350/0x350 [ 30.410052] ? __lock_is_held+0xb6/0x140 [ 30.414083] ? tee_tg_check+0xed/0x280 [ 30.417940] ? rcu_read_lock_sched_held+0x108/0x120 [ 30.422924] ? kmem_cache_alloc_trace+0x456/0x750 [ 30.427745] ? __kernel_text_address+0xd/0x40 [ 30.432218] ? wait_for_completion+0x770/0x770 [ 30.436781] tee_tg_check+0x1a0/0x280 [ 30.440554] ? tee_tg4+0x170/0x170 [ 30.444062] xt_check_target+0x22c/0x7d0 [ 30.448091] ? xt_target_seq_next+0x30/0x30 [ 30.452383] ? save_stack+0xa3/0xd0 [ 30.455979] ? kasan_slab_free+0x71/0xc0 [ 30.460009] ? kfree+0xd6/0x260 [ 30.463261] ? kvfree+0x36/0x60 [ 30.466509] ? mutex_unlock+0xd/0x10 [ 30.470192] ? xt_find_target+0x17b/0x1e0 [ 30.474310] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.479039] ? ipt_do_table+0x1860/0x1860 [ 30.483166] ? mark_held_locks+0xaf/0x100 [ 30.487281] ? kfree+0xf0/0x260 [ 30.490530] ? trace_hardirqs_on+0xd/0x10 [ 30.494648] translate_table+0xed1/0x1610 [ 30.498767] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 30.503579] ? kasan_check_write+0x14/0x20 [ 30.507782] ? _copy_from_user+0x99/0x110 [ 30.511904] do_ipt_set_ctl+0x370/0x5f0 [ 30.515849] ? translate_compat_table+0x1b90/0x1b90 [ 30.520834] ? mutex_unlock+0xd/0x10 [ 30.524516] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 30.529761] nf_setsockopt+0x67/0xc0 [ 30.533445] ip_setsockopt+0xa1/0xb0 [ 30.537125] raw_setsockopt+0xb7/0xd0 [ 30.540903] sock_common_setsockopt+0x95/0xd0 [ 30.545369] SyS_setsockopt+0x189/0x360 [ 30.549313] ? SyS_recv+0x40/0x40 [ 30.552734] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 30.557546] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.562531] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.567267] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.571989] RIP: 0033:0x445b09 [ 30.575149] RSP: 002b:00007ffc07fb5af8 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 30.582825] RAX: