[....] Starting enhanced syslogd: rsyslogd[ 17.098783] audit: type=1400 audit(1517459973.712:5): avc: denied { syslog } for pid=4009 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.335506] audit: type=1400 audit(1517459978.949:6): avc: denied { map } for pid=4150 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.36' (ECDSA) to the list of known hosts. executing program [ 28.640497] audit: type=1400 audit(1517459985.254:7): avc: denied { map } for pid=4164 comm="syzkaller437415" path="/root/syzkaller437415992" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 28.667188] [ 28.668824] ====================================================== [ 28.675114] WARNING: possible circular locking dependency detected [ 28.681404] 4.15.0+ #290 Not tainted [ 28.685085] ------------------------------------------------------ [ 28.691370] syzkaller437415/4164 is trying to acquire lock: [ 28.697045] (sk_lock-AF_INET){+.+.}, at: [<00000000e7c7df27>] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 28.706297] [ 28.706297] but task is already holding lock: [ 28.712237] (rtnl_mutex){+.+.}, at: [<00000000792bd739>] rtnl_lock+0x17/0x20 [ 28.719485] [ 28.719485] which lock already depends on the new lock. [ 28.719485] [ 28.727766] [ 28.727766] the existing dependency chain (in reverse order) is: [ 28.735355] [ 28.735355] -> #1 (rtnl_mutex){+.+.}: [ 28.740608] __mutex_lock+0x16f/0x1a80 [ 28.744984] mutex_lock_nested+0x16/0x20 [ 28.749533] rtnl_lock+0x17/0x20 [ 28.753391] register_netdevice_notifier+0xad/0x860 [ 28.758899] tee_tg_check+0x1a0/0x280 [ 28.763191] xt_check_target+0x22c/0x7d0 [ 28.767744] find_check_entry.isra.8+0x8c8/0xcb0 [ 28.772989] translate_table+0xed1/0x1610 [ 28.777627] do_ipt_set_ctl+0x370/0x5f0 [ 28.782092] nf_setsockopt+0x67/0xc0 [ 28.786295] ip_setsockopt+0xa1/0xb0 [ 28.790496] raw_setsockopt+0xb7/0xd0 [ 28.794787] sock_common_setsockopt+0x95/0xd0 [ 28.799769] SyS_setsockopt+0x189/0x360 [ 28.804235] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 28.809476] [ 28.809476] -> #0 (sk_lock-AF_INET){+.+.}: [ 28.815162] lock_acquire+0x1d5/0x580 [ 28.819450] lock_sock_nested+0xc2/0x110 [ 28.824000] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 28.829417] ip_setsockopt+0x3a/0xb0 [ 28.833620] udp_setsockopt+0x45/0x80 [ 28.837912] sock_common_setsockopt+0x95/0xd0 [ 28.842896] SyS_setsockopt+0x189/0x360 [ 28.847360] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 28.852604] [ 28.852604] other info that might help us debug this: [ 28.852604] [ 28.860711] Possible unsafe locking scenario: [ 28.860711] [ 28.866734] CPU0 CPU1 [ 28.871368] ---- ---- [ 28.876001] lock(rtnl_mutex); [ 28.879250] lock(sk_lock-AF_INET); [ 28.885450] lock(rtnl_mutex); [ 28.891213] lock(sk_lock-AF_INET); [ 28.894894] [ 28.894894] *** DEADLOCK *** [ 28.894894] [ 28.900922] 1 lock held by syzkaller437415/4164: [ 28.905646] #0: (rtnl_mutex){+.+.}, at: [<00000000792bd739>] rtnl_lock+0x17/0x20 [ 28.913330] [ 28.913330] stack backtrace: [ 28.917796] CPU: 0 PID: 4164 Comm: syzkaller437415 Not tainted 4.15.0+ #290 [ 28.924862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.934194] Call Trace: [ 28.936756] dump_stack+0x194/0x257 [ 28.940355] ? arch_local_irq_restore+0x53/0x53 [ 28.945007] print_circular_bug.isra.38+0x2cd/0x2dc [ 28.949990] ? save_trace+0xe0/0x2b0 [ 28.953672] __lock_acquire+0x30a8/0x3e00 [ 28.957791] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.962950] ? rtnl_lock+0x17/0x20 [ 28.966458] ? __mutex_lock+0x16f/0x1a80 [ 28.970485] ? rtnl_lock+0x17/0x20 [ 28.973996] ? mem_cgroup_update_lru_size+0xe0/0xe0 [ 28.978980] ? __lock_acquire+0x664/0x3e00 [ 28.983183] ? rtnl_lock+0x17/0x20 [ 28.986692] ? __lock_acquire+0x664/0x3e00 [ 28.990897] ? mutex_lock_io_nested+0x1900/0x1900 [ 28.995708] ? print_irqtrace_events+0x270/0x270 [ 29.000439] ? retint_kernel+0x10/0x10 [ 29.004296] ? trace_hardirqs_on_caller+0x19e/0x5c0 [ 29.009282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.014008] ? retint_kernel+0x10/0x10 [ 29.017864] ? find_held_lock+0x35/0x1d0 [ 29.021893] lock_acquire+0x1d5/0x580 [ 29.025664] ? lock_sock_nested+0xa3/0x110 [ 29.029868] ? lock_acquire+0x1d5/0x580 [ 29.033813] ? do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 29.038886] ? lock_release+0xa40/0xa40 [ 29.042833] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 29.048688] ? do_raw_spin_trylock+0x190/0x190 [ 29.053237] ? lock_sock_nested+0x44/0x110 [ 29.057442] lock_sock_nested+0xc2/0x110 [ 29.061473] ? do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 29.066546] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 29.071446] ? ip_ra_control+0x5c0/0x5c0 [ 29.075476] ? lock_release+0xa40/0xa40 [ 29.079422] ? find_held_lock+0x35/0x1d0 [ 29.083455] ? avc_has_perm+0x35e/0x680 [ 29.087396] ? lock_downgrade+0x980/0x980 [ 29.091513] ? lock_release+0xa40/0xa40 [ 29.095459] ? __pmd_alloc+0x4e0/0x4e0 [ 29.099314] ? check_noncircular+0x20/0x20 [ 29.103518] ? find_held_lock+0x35/0x1d0 [ 29.107549] ? avc_has_perm+0x43e/0x680 [ 29.111496] ? avc_has_perm_noaudit+0x520/0x520 [ 29.116143] ? __do_page_fault+0x5f7/0xc90 [ 29.120358] ? lock_downgrade+0x980/0x980 [ 29.124479] ? handle_mm_fault+0x476/0x930 [ 29.128681] ? down_read_trylock+0xdb/0x170 [ 29.132982] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 29.137532] ? vmacache_find+0x5f/0x280 [ 29.141474] ? sock_has_perm+0x2a4/0x420 [ 29.145503] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 29.150835] ? __do_page_fault+0x3d6/0xc90 [ 29.155049] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 29.160731] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 29.165978] ip_setsockopt+0x3a/0xb0 [ 29.169665] udp_setsockopt+0x45/0x80 [ 29.173437] sock_common_setsockopt+0x95/0xd0 [ 29.177900] SyS_setsockopt+0x189/0x360 [ 29.181855] ? SyS_recv+0x40/0x40 [ 29.185279] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 29.190090] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.195076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.199801] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.204525] RIP: 0033:0x440ba9 [ 29.207684] RSP: 002b:00007ffe9a47ed48 EFLAGS: 00000207 ORIG_RAX: 0000000000000036 [ 29.215362] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000440ba9 [ 29.222600] RDX: 0000000000000027 RSI: 0000000000000000 RDI: 0000000000000004 [ 29.229842] RBP: 00000000006cb018 R08: 000000000000000c R09: 0000000000000000 [ 29.237083] R10: 0000000020e48000 R11: 0000000000000207 R12: 00000