[....] Starting enhanced syslogd: rsyslogd[ 17.356154] audit: type=1400 audit(1517240714.247:5): avc: denied { syslog } for pid=4008 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.035180] audit: type=1400 audit(1517240718.926:6): avc: denied { map } for pid=4146 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.51' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 28.390709] audit: type=1400 audit(1517240725.282:7): avc: denied { map } for pid=4160 comm="syzkaller464589" path="/root/syzkaller464589238" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 28.691485] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 29.034856] [ 29.036504] ====================================================== [ 29.042790] WARNING: possible circular locking dependency detected [ 29.049078] 4.15.0+ #285 Not tainted [ 29.052759] ------------------------------------------------------ [ 29.059045] syzkaller464589/4160 is trying to acquire lock: [ 29.064722] (rtnl_mutex){+.+.}, at: [<0000000067cabbf5>] rtnl_lock+0x17/0x20 [ 29.071973] [ 29.071973] but task is already holding lock: [ 29.077909] (sk_lock-AF_INET){+.+.}, at: [<00000000eecead9b>] ip_setsockopt+0x8c/0xb0 [ 29.085939] [ 29.085939] which lock already depends on the new lock. [ 29.085939] [ 29.094228] [ 29.094228] the existing dependency chain (in reverse order) is: [ 29.101816] [ 29.101816] -> #1 (sk_lock-AF_INET){+.+.}: [ 29.107501] lock_sock_nested+0xc2/0x110 [ 29.112052] do_ip_getsockopt+0x1b3/0x2170 [ 29.116777] ip_getsockopt+0x90/0x220 [ 29.121067] udp_getsockopt+0x45/0x80 [ 29.125359] sock_common_getsockopt+0x95/0xd0 [ 29.130344] SyS_getsockopt+0x178/0x340 [ 29.134817] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.140065] [ 29.140065] -> #0 (rtnl_mutex){+.+.}: [ 29.145316] lock_acquire+0x1d5/0x580 [ 29.149605] __mutex_lock+0x16f/0x1a80 [ 29.153979] mutex_lock_nested+0x16/0x20 [ 29.158527] rtnl_lock+0x17/0x20 [ 29.162383] register_netdevice_notifier+0xad/0x860 [ 29.167889] clusterip_tg_check+0xeb9/0x1570 [ 29.172790] xt_check_target+0x22c/0x7d0 [ 29.177343] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.182588] translate_table+0xed1/0x1610 [ 29.187224] do_ipt_set_ctl+0x370/0x5f0 [ 29.191686] nf_setsockopt+0x67/0xc0 [ 29.195887] ip_setsockopt+0xa1/0xb0 [ 29.200091] raw_setsockopt+0xb7/0xd0 [ 29.204386] sock_common_setsockopt+0x95/0xd0 [ 29.209384] SyS_setsockopt+0x189/0x360 [ 29.213855] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.219183] [ 29.219183] other info that might help us debug this: [ 29.219183] [ 29.227291] Possible unsafe locking scenario: [ 29.227291] [ 29.233323] CPU0 CPU1 [ 29.237958] ---- ---- [ 29.242592] lock(sk_lock-AF_INET); [ 29.246276] lock(rtnl_mutex); [ 29.252044] lock(sk_lock-AF_INET); [ 29.258244] lock(rtnl_mutex); [ 29.261500] [ 29.261500] *** DEADLOCK *** [ 29.261500] [ 29.267527] 1 lock held by syzkaller464589/4160: [ 29.272257] #0: (sk_lock-AF_INET){+.+.}, at: [<00000000eecead9b>] ip_setsockopt+0x8c/0xb0 [ 29.280723] [ 29.280723] stack backtrace: [ 29.285190] CPU: 0 PID: 4160 Comm: syzkaller464589 Not tainted 4.15.0+ #285 [ 29.292262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.301673] Call Trace: [ 29.304235] dump_stack+0x194/0x257 [ 29.307841] ? arch_local_irq_restore+0x53/0x53 [ 29.312499] print_circular_bug.isra.37+0x2cd/0x2dc [ 29.317484] ? save_trace+0xe0/0x2b0 [ 29.321166] __lock_acquire+0x30a8/0x3e00 [ 29.325301] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.330482] ? trace_hardirqs_off+0x10/0x10 [ 29.334775] ? __is_insn_slot_addr+0x1fc/0x330 [ 29.339327] ? lock_downgrade+0x980/0x980 [ 29.343453] ? lock_release+0xa40/0xa40 [ 29.347403] ? bpf_prog_kallsyms_find+0xbd/0x440 [ 29.352130] ? modules_open+0xa0/0xa0 [ 29.355989] ? trace_raw_output_xdp_redirect_map_err+0x440/0x440 [ 29.362107] ? is_bpf_text_address+0x7b/0x120 [ 29.366572] ? lock_downgrade+0x980/0x980 [ 29.370690] ? lock_release+0xa40/0xa40 [ 29.374639] ? __free_insn_slot+0x5c0/0x5c0 [ 29.378934] ? check_noncircular+0x20/0x20 [ 29.383142] ? kernel_text_address+0x102/0x140 [ 29.387696] lock_acquire+0x1d5/0x580 [ 29.391467] ? lock_acquire+0x1d5/0x580 [ 29.395411] ? rtnl_lock+0x17/0x20 [ 29.398923] ? lock_release+0xa40/0xa40 [ 29.402952] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 29.408819] ? print_irqtrace_events+0x270/0x270 [ 29.413542] ? idr_get_free_cmn+0x64e/0xfd0 [ 29.417833] ? rcu_note_context_switch+0x710/0x710 [ 29.422729] ? __might_sleep+0x95/0x190 [ 29.426673] ? rtnl_lock+0x17/0x20 [ 29.430184] __mutex_lock+0x16f/0x1a80 [ 29.434040] ? rtnl_lock+0x17/0x20 [ 29.437549] ? rtnl_lock+0x17/0x20 [ 29.441057] ? __lock_acquire+0x664/0x3e00 [ 29.445261] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 29.450333] ? mutex_lock_io_nested+0x1900/0x1900 [ 29.455154] ? trace_hardirqs_on+0xd/0x10 [ 29.459279] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.464439] ? save_stack+0xa3/0xd0 [ 29.468046] ? kasan_kmalloc+0xad/0xe0 [ 29.471993] ? __proc_create+0x21a/0x880 [ 29.476025] ? proc_create_data+0x76/0x180 [ 29.480229] ? clusterip_tg_check+0xe4d/0x1570 [ 29.484793] ? rb_insert_color+0x1580/0x1580 [ 29.489180] ? do_ipt_set_ctl+0x370/0x5f0 [ 29.493475] ? ip_setsockopt+0xa1/0xb0 [ 29.497333] ? raw_setsockopt+0xb7/0xd0 [ 29.501278] ? sock_common_setsockopt+0x95/0xd0 [ 29.505917] ? SyS_setsockopt+0x189/0x360 [ 29.510047] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.514948] ? _find_next_bit+0xee/0x120 [ 29.518979] ? check_noncircular+0x20/0x20 [ 29.523184] ? find_first_zero_bit+0x93/0xe0 [ 29.527564] ? ida_get_new_above+0x421/0x9d0 [ 29.531944] ? print_irqtrace_events+0x270/0x270 [ 29.536675] ? check_noncircular+0x20/0x20 [ 29.540887] ? print_irqtrace_events+0x270/0x270 [ 29.545623] ? ida_simple_get+0x15c/0x220 [ 29.549743] ? lock_downgrade+0x980/0x980 [ 29.553859] ? find_held_lock+0x35/0x1d0 [ 29.557989] mutex_lock_nested+0x16/0x20 [ 29.562019] ? mutex_lock_nested+0x16/0x20 [ 29.566236] rtnl_lock+0x17/0x20 [ 29.569573] register_netdevice_notifier+0xad/0x860 [ 29.574568] ? lock_downgrade+0x980/0x980 [ 29.578699] ? __dev_close_many+0x330/0x330 [ 29.583006] ? ida_simple_get+0x176/0x220 [ 29.587129] ? do_raw_write_trylock+0x190/0x190 [ 29.591766] ? ida_remove+0x3f0/0x3f0 [ 29.595541] ? _raw_write_unlock+0x22/0x30 [ 29.599747] ? proc_register+0x261/0x370 [ 29.603781] ? proc_create_data+0x101/0x180 [ 29.608075] clusterip_tg_check+0xeb9/0x1570 [ 29.612474] ? arp_mangle+0x550/0x550 [ 29.616247] ? xt_find_target+0x150/0x1e0 [ 29.620363] ? lock_downgrade+0x980/0x980 [ 29.624480] ? rcu_read_lock_sched_held+0x108/0x120 [ 29.629472] ? pcpu_alloc+0x146/0x10e0 [ 29.633332] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 29.638142] ? pcpu_free_area+0xa00/0xa00 [ 29.642262] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 29.647090] ? __kernel_text_address+0xd/0x40 [ 29.651566] ? wait_for_completion+0x770/0x770 [ 29.656118] ? trace_hardirqs_off+0xd/0x10 [ 29.660331] ? arp_mangle+0x550/0x550 [ 29.664201] xt_check_target+0x22c/0x7d0 [ 29.668234] ? xt_target_seq_next+0x30/0x30 [ 29.672526] ? mutex_unlock+0xd/0x10 [ 29.676210] ? mutex_unlock+0xd/0x10 [ 29.679893] ? xt_find_target+0x17b/0x1e0 [ 29.684012] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.688739] ? ipt_do_table+0x1860/0x1860 [ 29.692869] ? mark_held_locks+0xaf/0x100 [ 29.696989] ? kfree+0xf0/0x260 [ 29.700249] ? trace_hardirqs_on+0xd/0x10 [ 29.704370] translate_table+0xed1/0x1610 [ 29.708495] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 29.713308] ? kasan_check_write+0x14/0x20 [ 29.717517] ? _copy_from_user+0x99/0x110 [ 29.721638] do_ipt_set_ctl+0x370/0x5f0 [ 29.725586] ? translate_compat_table+0x1b90/0x1b90 [ 29.730577] ? mutex_unlock+0xd/0x10 [ 29.734261] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 29.739509] nf_setsockopt+0x67/0xc0 [ 29.743203] ip_setsockopt+0xa1/0xb0 [ 29.746892] raw_setsockopt+0xb7/0xd0 [ 29.750673] sock_common_setsockopt+0x95/0xd0 [ 29.755141] SyS_setsockopt+0x189/0x360 [ 29.759088] ? SyS_recv+0x40/0x40 [ 29.762512] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 29.767351] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.772339] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.777066] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.781793] RIP: 0033:0x445eb9 [ 29.784963] RSP: 002b:00007ffd1da1db08 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 29.792650] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000445eb9 [ 29.800566] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 29.807808] RBP: 00007ffd1da1dc28 R08: 00000000000002f8 R09: 0000000000000000 [ 29.815049] R10: 000000002000b000 R11: 0000000000000203 R12: 00007ffd1da1dc28 [ 29.822303] R13: 0000000000403380 R14: 0000000000000000 R15: 0000000000000000