[....] Starting enhanced syslogd: rsyslogd[ 16.433913] audit: type=1400 audit(1517461357.061:5): avc: denied { syslog } for pid=4012 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.181723] audit: type=1400 audit(1517461362.809:6): avc: denied { map } for pid=4153 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.15.203' (ECDSA) to the list of known hosts. executing program [ 32.647829] audit: type=1400 audit(1517461373.275:7): avc: denied { map } for pid=4168 comm="syzkaller236724" path="/root/syzkaller236724855" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 32.674714] [ 32.676336] ====================================================== [ 32.682619] WARNING: possible circular locking dependency detected [ 32.688905] 4.15.0-rc9+ #218 Not tainted [ 32.692938] ------------------------------------------------------ [ 32.699223] syzkaller236724/4168 is trying to acquire lock: [ 32.704897] (sk_lock-AF_INET){+.+.}, at: [<000000003662c4fd>] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 32.714146] [ 32.714146] but task is already holding lock: [ 32.720082] (rtnl_mutex){+.+.}, at: [<0000000085a0e176>] rtnl_lock+0x17/0x20 [ 32.727330] [ 32.727330] which lock already depends on the new lock. [ 32.727330] [ 32.735618] [ 32.735618] the existing dependency chain (in reverse order) is: [ 32.743212] [ 32.743212] -> #1 (rtnl_mutex){+.+.}: [ 32.748465] __mutex_lock+0x16f/0x1a80 [ 32.752842] mutex_lock_nested+0x16/0x20 [ 32.757392] rtnl_lock+0x17/0x20 [ 32.761248] register_netdevice_notifier+0xad/0x860 [ 32.766752] tee_tg_check+0x1a0/0x280 [ 32.771041] xt_check_target+0x22c/0x7d0 [ 32.775594] find_check_entry.isra.8+0x8c8/0xcb0 [ 32.780837] translate_table+0xed1/0x1610 [ 32.785471] do_ipt_set_ctl+0x370/0x5f0 [ 32.789942] nf_setsockopt+0x67/0xc0 [ 32.794147] ip_setsockopt+0xa1/0xb0 [ 32.798348] raw_setsockopt+0xb7/0xd0 [ 32.802636] sock_common_setsockopt+0x95/0xd0 [ 32.807618] SyS_setsockopt+0x189/0x360 [ 32.812082] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 32.817321] [ 32.817321] -> #0 (sk_lock-AF_INET){+.+.}: [ 32.823008] lock_acquire+0x1d5/0x580 [ 32.827296] lock_sock_nested+0xc2/0x110 [ 32.831844] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 32.837261] ip_setsockopt+0x3a/0xb0 [ 32.841463] udp_setsockopt+0x45/0x80 [ 32.845750] sock_common_setsockopt+0x95/0xd0 [ 32.850735] SyS_setsockopt+0x189/0x360 [ 32.855198] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 32.860439] [ 32.860439] other info that might help us debug this: [ 32.860439] [ 32.868547] Possible unsafe locking scenario: [ 32.868547] [ 32.874568] CPU0 CPU1 [ 32.879200] ---- ---- [ 32.883833] lock(rtnl_mutex); [ 32.887079] lock(sk_lock-AF_INET); [ 32.893279] lock(rtnl_mutex); [ 32.899041] lock(sk_lock-AF_INET); [ 32.902721] [ 32.902721] *** DEADLOCK *** [ 32.902721] [ 32.908749] 1 lock held by syzkaller236724/4168: [ 32.913467] #0: (rtnl_mutex){+.+.}, at: [<0000000085a0e176>] rtnl_lock+0x17/0x20 [ 32.921147] [ 32.921147] stack backtrace: [ 32.925614] CPU: 0 PID: 4168 Comm: syzkaller236724 Not tainted 4.15.0-rc9+ #218 [ 32.933033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 32.942361] Call Trace: [ 32.944920] dump_stack+0x194/0x257 [ 32.948514] ? arch_local_irq_restore+0x53/0x53 [ 32.953155] print_circular_bug.isra.37+0x2cd/0x2dc [ 32.958136] ? save_trace+0xe0/0x2b0 [ 32.961818] __lock_acquire+0x30a8/0x3e00 [ 32.965937] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 32.971097] ? rtnl_lock+0x17/0x20 [ 32.974603] ? __mutex_lock+0x16f/0x1a80 [ 32.978632] ? rtnl_lock+0x17/0x20 [ 32.982142] ? mem_cgroup_update_lru_size+0xe0/0xe0 [ 32.987127] ? rtnl_lock+0x17/0x20 [ 32.990636] ? __lock_acquire+0x664/0x3e00 [ 32.994839] ? mutex_lock_io_nested+0x1900/0x1900 [ 32.999647] ? print_irqtrace_events+0x270/0x270 [ 33.004374] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.009532] ? check_noncircular+0x20/0x20 [ 33.013735] ? __lru_cache_add+0x2a4/0x410 [ 33.017942] ? find_held_lock+0x35/0x1d0 [ 33.021974] lock_acquire+0x1d5/0x580 [ 33.025742] ? lock_sock_nested+0xa3/0x110 [ 33.029945] ? lock_acquire+0x1d5/0x580 [ 33.033895] ? do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 33.038964] ? lock_release+0xa40/0xa40 [ 33.042906] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 33.048759] ? do_raw_spin_trylock+0x190/0x190 [ 33.053308] ? lock_sock_nested+0x44/0x110 [ 33.057512] lock_sock_nested+0xc2/0x110 [ 33.061542] ? do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 33.066614] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 33.071511] ? ip_ra_control+0x5c0/0x5c0 [ 33.075541] ? lock_release+0xa40/0xa40 [ 33.079486] ? find_held_lock+0x35/0x1d0 [ 33.083518] ? avc_has_perm+0x35e/0x680 [ 33.087462] ? lock_downgrade+0x980/0x980 [ 33.091582] ? lock_release+0xa40/0xa40 [ 33.095522] ? check_noncircular+0x20/0x20 [ 33.099727] ? __pmd_alloc+0x4e0/0x4e0 [ 33.103584] ? find_held_lock+0x35/0x1d0 [ 33.107616] ? avc_has_perm+0x43e/0x680 [ 33.111559] ? avc_has_perm_noaudit+0x520/0x520 [ 33.116198] ? __do_page_fault+0x5f7/0xc90 [ 33.120401] ? lock_downgrade+0x980/0x980 [ 33.124518] ? handle_mm_fault+0x410/0x8d0 [ 33.128719] ? down_read_trylock+0xdb/0x170 [ 33.133009] ? __do_page_fault+0x32d/0xc90 [ 33.137218] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 33.141765] ? vmacache_find+0x5f/0x280 [ 33.145723] ? sock_has_perm+0x2a4/0x420 [ 33.149753] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 33.155087] ? __do_page_fault+0x3d6/0xc90 [ 33.159290] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 33.164968] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 33.170213] ip_setsockopt+0x3a/0xb0 [ 33.173897] udp_setsockopt+0x45/0x80 [ 33.177665] sock_common_setsockopt+0x95/0xd0 [ 33.182128] SyS_setsockopt+0x189/0x360 [ 33.186073] ? SyS_recv+0x40/0x40 [ 33.189495] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 33.194306] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.199292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.204017] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 33.208740] RIP: 0033:0x440ba9 [ 33.211901] RSP: 002b:00007fffc5c0aea8 EFLAGS: 00000207 ORIG_RAX: 0000000000000036 [ 33.219576] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000440ba9 [ 33.226813] RDX: 0000000000000027 RSI: 0000000000000000 RDI: 0000000000000004 [ 33.234050] RBP: 00000000006cb018 R08: 000000000000000c R09: 0000000000000000 [ 33.241287] R10: 0000000020e48000 R11: 0000000000000207 R12: 00000000004024d0 [ 33.248533] R13: 00000