[....] Starting enhanced syslogd: rsyslogd[ 13.019845] audit: type=1400 audit(1515953132.297:5): avc: denied { syslog } for pid=3502 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.405754] audit: type=1400 audit(1515953138.683:6): avc: denied { map } for pid=3644 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.46' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 25.572719] audit: type=1400 audit(1515953144.850:7): avc: denied { map } for pid=3658 comm="syzkaller402707" path="/root/syzkaller402707899" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 25.963297] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument [ 26.308573] audit: type=1400 audit(1515953145.586:8): avc: denied { map } for pid=3658 comm="syzkaller402707" path="/dev/ashmem" dev="devtmpfs" ino=82 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 26.308919] [ 26.308921] ====================================================== [ 26.308923] WARNING: possible circular locking dependency detected [ 26.308927] 4.15.0-rc7+ #171 Not tainted [ 26.308928] ------------------------------------------------------ [ 26.308931] syzkaller402707/3658 is trying to acquire lock: [ 26.308933] (&sb->s_type->i_mutex_key#11){++++}, at: [<00000000b734623c>] shmem_file_llseek+0xef/0x240 [ 26.308951] [ 26.308951] but task is already holding lock: [ 26.308952] (ashmem_mutex){+.+.}, at: [<0000000046beb9b9>] ashmem_llseek+0x56/0x1f0 [ 26.308964] [ 26.308964] which lock already depends on the new lock. [ 26.308964] [ 26.308965] [ 26.308965] the existing dependency chain (in reverse order) is: [ 26.308967] [ 26.308967] -> #2 (ashmem_mutex){+.+.}: