[....] Starting enhanced syslogd: rsyslogd[ 17.028627] audit: type=1400 audit(1517239889.630:5): avc: denied { syslog } for pid=4013 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.060621] audit: type=1400 audit(1517239895.662:6): avc: denied { map } for pid=4153 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.42' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 29.322110] audit: type=1400 audit(1517239901.923:7): avc: denied { map } for pid=4167 comm="syzkaller129424" path="/root/syzkaller129424633" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 29.599683] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 29.944239] [ 29.945884] ====================================================== [ 29.952172] WARNING: possible circular locking dependency detected [ 29.958460] 4.15.0-rc9+ #214 Not tainted [ 29.962485] ------------------------------------------------------ [ 29.968769] syzkaller129424/4167 is trying to acquire lock: [ 29.974447] (rtnl_mutex){+.+.}, at: [<0000000050806f7f>] rtnl_lock+0x17/0x20 [ 29.981701] [ 29.981701] but task is already holding lock: [ 29.987641] (sk_lock-AF_INET){+.+.}, at: [<0000000013943772>] ip_setsockopt+0x8c/0xb0 [ 29.995684] [ 29.995684] which lock already depends on the new lock. [ 29.995684] [ 30.003967] [ 30.003967] the existing dependency chain (in reverse order) is: [ 30.011557] [ 30.011557] -> #1 (sk_lock-AF_INET){+.+.}: [ 30.017246] lock_sock_nested+0xc2/0x110 [ 30.021797] do_ip_getsockopt+0x1b3/0x2170 [ 30.026519] ip_getsockopt+0x90/0x220 [ 30.030822] udp_getsockopt+0x45/0x80 [ 30.035121] sock_common_getsockopt+0x95/0xd0 [ 30.040105] SyS_getsockopt+0x178/0x340 [ 30.044569] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.049815] [ 30.049815] -> #0 (rtnl_mutex){+.+.}: [ 30.055069] lock_acquire+0x1d5/0x580 [ 30.059359] __mutex_lock+0x16f/0x1a80 [ 30.063736] mutex_lock_nested+0x16/0x20 [ 30.068288] rtnl_lock+0x17/0x20 [ 30.072143] register_netdevice_notifier+0xad/0x860 [ 30.077651] clusterip_tg_check+0xeb9/0x1570 [ 30.082549] xt_check_target+0x22c/0x7d0 [ 30.087101] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.092358] translate_table+0xed1/0x1610 [ 30.096996] do_ipt_set_ctl+0x370/0x5f0 [ 30.101462] nf_setsockopt+0x67/0xc0 [ 30.105669] ip_setsockopt+0xa1/0xb0 [ 30.109873] raw_setsockopt+0xb7/0xd0 [ 30.114163] sock_common_setsockopt+0x95/0xd0 [ 30.119148] SyS_setsockopt+0x189/0x360 [ 30.123614] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.128855] [ 30.128855] other info that might help us debug this: [ 30.128855] [ 30.136966] Possible unsafe locking scenario: [ 30.136966] [ 30.142992] CPU0 CPU1 [ 30.147628] ---- ---- [ 30.152268] lock(sk_lock-AF_INET); [ 30.155955] lock(rtnl_mutex); [ 30.161737] lock(sk_lock-AF_INET); [ 30.167950] lock(rtnl_mutex); [ 30.171198] [ 30.171198] *** DEADLOCK *** [ 30.171198] [ 30.177237] 1 lock held by syzkaller129424/4167: [ 30.181958] #0: (sk_lock-AF_INET){+.+.}, at: [<0000000013943772>] ip_setsockopt+0x8c/0xb0 [ 30.190428] [ 30.190428] stack backtrace: [ 30.194896] CPU: 1 PID: 4167 Comm: syzkaller129424 Not tainted 4.15.0-rc9+ #214 [ 30.202311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.211635] Call Trace: [ 30.214197] dump_stack+0x194/0x257 [ 30.217793] ? arch_local_irq_restore+0x53/0x53 [ 30.222436] print_circular_bug.isra.37+0x2cd/0x2dc [ 30.227430] ? save_trace+0xe0/0x2b0 [ 30.231115] __lock_acquire+0x30a8/0x3e00 [ 30.235238] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.240569] ? trace_hardirqs_off+0x10/0x10 [ 30.244862] ? __is_insn_slot_addr+0x1fc/0x330 [ 30.249412] ? lock_downgrade+0x980/0x980 [ 30.253530] ? lock_release+0xa40/0xa40 [ 30.257472] ? bpf_prog_kallsyms_find+0xbd/0x440 [ 30.262199] ? modules_open+0xa0/0xa0 [ 30.265990] ? trace_raw_output_xdp_redirect_map_err+0x440/0x440 [ 30.272114] ? is_bpf_text_address+0x7b/0x120 [ 30.276581] ? lock_downgrade+0x980/0x980 [ 30.280711] ? lock_release+0xa40/0xa40 [ 30.284667] ? __free_insn_slot+0x5c0/0x5c0 [ 30.288958] ? check_noncircular+0x20/0x20 [ 30.293167] ? kernel_text_address+0x102/0x140 [ 30.297720] lock_acquire+0x1d5/0x580 [ 30.301489] ? lock_acquire+0x1d5/0x580 [ 30.305443] ? rtnl_lock+0x17/0x20 [ 30.308953] ? lock_release+0xa40/0xa40 [ 30.312899] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.318752] ? print_irqtrace_events+0x270/0x270 [ 30.323486] ? idr_get_free_cmn+0x64e/0xfd0 [ 30.327783] ? rcu_note_context_switch+0x710/0x710 [ 30.332684] ? __might_sleep+0x95/0x190 [ 30.336626] ? rtnl_lock+0x17/0x20 [ 30.340136] __mutex_lock+0x16f/0x1a80 [ 30.344008] ? rtnl_lock+0x17/0x20 [ 30.347521] ? rtnl_lock+0x17/0x20 [ 30.351030] ? __lock_acquire+0x664/0x3e00 [ 30.355236] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 30.360307] ? mutex_lock_io_nested+0x1900/0x1900 [ 30.365120] ? trace_hardirqs_on+0xd/0x10 [ 30.369247] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.374407] ? save_stack+0xa3/0xd0 [ 30.378002] ? kasan_kmalloc+0xad/0xe0 [ 30.381860] ? __proc_create+0x21a/0x880 [ 30.385898] ? proc_create_data+0x76/0x180 [ 30.390101] ? clusterip_tg_check+0xe4d/0x1570 [ 30.394654] ? rb_insert_color+0x1580/0x1580 [ 30.399042] ? do_ipt_set_ctl+0x370/0x5f0 [ 30.403173] ? ip_setsockopt+0xa1/0xb0 [ 30.407035] ? raw_setsockopt+0xb7/0xd0 [ 30.410982] ? sock_common_setsockopt+0x95/0xd0 [ 30.415620] ? SyS_setsockopt+0x189/0x360 [ 30.419738] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.424636] ? _find_next_bit+0xee/0x120 [ 30.428668] ? check_noncircular+0x20/0x20 [ 30.432872] ? find_first_zero_bit+0x93/0xe0 [ 30.437254] ? ida_get_new_above+0x421/0x9d0 [ 30.441645] ? print_irqtrace_events+0x270/0x270 [ 30.446372] ? check_noncircular+0x20/0x20 [ 30.450575] ? print_irqtrace_events+0x270/0x270 [ 30.455298] ? ida_simple_get+0x15c/0x220 [ 30.459417] ? lock_downgrade+0x980/0x980 [ 30.463535] ? find_held_lock+0x35/0x1d0 [ 30.467564] mutex_lock_nested+0x16/0x20 [ 30.471593] ? mutex_lock_nested+0x16/0x20 [ 30.475796] rtnl_lock+0x17/0x20 [ 30.479131] register_netdevice_notifier+0xad/0x860 [ 30.484118] ? lock_downgrade+0x980/0x980 [ 30.488236] ? __dev_close_many+0x350/0x350 [ 30.492528] ? ida_simple_get+0x176/0x220 [ 30.496649] ? do_raw_write_trylock+0x190/0x190 [ 30.501285] ? ida_remove+0x3f0/0x3f0 [ 30.505056] ? _raw_write_unlock+0x22/0x30 [ 30.509259] ? proc_register+0x261/0x370 [ 30.513289] ? proc_create_data+0x101/0x180 [ 30.517580] clusterip_tg_check+0xeb9/0x1570 [ 30.521959] ? arp_mangle+0x550/0x550 [ 30.525730] ? xt_find_target+0x150/0x1e0 [ 30.529852] ? lock_downgrade+0x980/0x980 [ 30.533971] ? rcu_read_lock_sched_held+0x108/0x120 [ 30.538955] ? pcpu_alloc+0x146/0x10e0 [ 30.542811] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 30.547623] ? pcpu_free_area+0xa00/0xa00 [ 30.551742] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 30.556559] ? __kernel_text_address+0xd/0x40 [ 30.561022] ? wait_for_completion+0x770/0x770 [ 30.565576] ? trace_hardirqs_off+0xd/0x10 [ 30.569781] ? arp_mangle+0x550/0x550 [ 30.573551] xt_check_target+0x22c/0x7d0 [ 30.577596] ? xt_target_seq_next+0x30/0x30 [ 30.581886] ? mutex_unlock+0xd/0x10 [ 30.585572] ? mutex_unlock+0xd/0x10 [ 30.589256] ? xt_find_target+0x17b/0x1e0 [ 30.593390] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.598117] ? retint_kernel+0x10/0x10 [ 30.601992] ? ipt_do_table+0x1860/0x1860 [ 30.606111] ? mark_held_locks+0xaf/0x100 [ 30.610228] ? kfree+0xf0/0x260 [ 30.613479] ? trace_hardirqs_on+0xd/0x10 [ 30.617600] translate_table+0xed1/0x1610 [ 30.621737] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 30.626550] ? kasan_check_write+0x14/0x20 [ 30.630767] ? _copy_from_user+0x99/0x110 [ 30.634885] do_ipt_set_ctl+0x370/0x5f0 [ 30.638845] ? translate_compat_table+0x1b90/0x1b90 [ 30.643840] ? mutex_unlock+0xd/0x10 [ 30.647534] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 30.652782] nf_setsockopt+0x67/0xc0 [ 30.656469] ip_setsockopt+0xa1/0xb0 [ 30.660151] raw_setsockopt+0xb7/0xd0 [ 30.663923] sock_common_setsockopt+0x95/0xd0 [ 30.668386] SyS_setsockopt+0x189/0x360 [ 30.672329] ? SyS_recv+0x40/0x40 [ 30.675750] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 30.680563] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.685549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.690274] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.694996] RIP: 0033:0x445eb9 [ 30.698157] RSP: 002b:00007fff36cf3be8 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 30.705835] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000445eb9 [ 30.713074] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 30.720324] RBP: 00007fff36cf3d08 R08: 00000000000002f8 R09: 0000000000000000 [ 30.727562] R10: 000000002000b000 R11: 0000000000000203 R12: 00007fff36cf3d08 [ 30.734803] R13: 0000000000403380 R14: 0000000000000000 R15: 0000000000000000 [ 30.742618] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and