[....] Starting enhanced syslogd: rsyslogd[ 17.156926] audit: type=1400 audit(1517302403.415:5): avc: denied { syslog } for pid=4012 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 23.315739] audit: type=1400 audit(1517302409.574:6): avc: denied { map } for pid=4152 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 29.655739] audit: type=1400 audit(1517302415.914:7): avc: denied { map } for pid=4167 comm="syzkaller802600" path="/root/syzkaller802600539" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 30.048744] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 30.384241] [ 30.385899] ====================================================== [ 30.392188] WARNING: possible circular locking dependency detected [ 30.398476] 4.15.0+ #286 Not tainted [ 30.402157] ------------------------------------------------------ [ 30.408442] syzkaller802600/4167 is trying to acquire lock: [ 30.414116] (rtnl_mutex){+.+.}, at: [<000000007535439d>] rtnl_lock+0x17/0x20 [ 30.421372] [ 30.421372] but task is already holding lock: [ 30.427308] (sk_lock-AF_INET){+.+.}, at: [<0000000010420bd9>] ip_setsockopt+0x8c/0xb0 [ 30.435336] [ 30.435336] which lock already depends on the new lock. [ 30.435336] [ 30.443618] [ 30.443618] the existing dependency chain (in reverse order) is: [ 30.451209] [ 30.451209] -> #1 (sk_lock-AF_INET){+.+.}: [ 30.456896] lock_sock_nested+0xc2/0x110 [ 30.461445] do_ip_getsockopt+0x1b3/0x2170 [ 30.466177] ip_getsockopt+0x90/0x220 [ 30.470469] tcp_getsockopt+0x82/0xd0 [ 30.474761] sock_common_getsockopt+0x95/0xd0 [ 30.479744] SyS_getsockopt+0x178/0x340 [ 30.484207] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.489449] [ 30.489449] -> #0 (rtnl_mutex){+.+.}: [ 30.494701] lock_acquire+0x1d5/0x580 [ 30.498989] __mutex_lock+0x16f/0x1a80 [ 30.503365] mutex_lock_nested+0x16/0x20 [ 30.507914] rtnl_lock+0x17/0x20 [ 30.511771] register_netdevice_notifier+0xad/0x860 [ 30.517274] tee_tg_check+0x1a0/0x280 [ 30.521560] xt_check_target+0x22c/0x7d0 [ 30.526111] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.531353] translate_table+0xed1/0x1610 [ 30.535987] do_ipt_set_ctl+0x370/0x5f0 [ 30.540451] nf_setsockopt+0x67/0xc0 [ 30.544653] ip_setsockopt+0xa1/0xb0 [ 30.548857] dccp_setsockopt+0x85/0xd0 [ 30.553233] sock_common_setsockopt+0x95/0xd0 [ 30.558218] SyS_setsockopt+0x189/0x360 [ 30.562680] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.567919] [ 30.567919] other info that might help us debug this: [ 30.567919] [ 30.576030] Possible unsafe locking scenario: [ 30.576030] [ 30.582059] CPU0 CPU1 [ 30.586690] ---- ---- [ 30.591321] lock(sk_lock-AF_INET); [ 30.595002] lock(rtnl_mutex); [ 30.600774] lock(sk_lock-AF_INET); [ 30.606974] lock(rtnl_mutex); [ 30.610218] [ 30.610218] *** DEADLOCK *** [ 30.610218] [ 30.616244] 1 lock held by syzkaller802600/4167: [ 30.620963] #0: (sk_lock-AF_INET){+.+.}, at: [<0000000010420bd9>] ip_setsockopt+0x8c/0xb0 [ 30.629428] [ 30.629428] stack backtrace: [ 30.633893] CPU: 0 PID: 4167 Comm: syzkaller802600 Not tainted 4.15.0+ #286 [ 30.640956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.650277] Call Trace: [ 30.652840] dump_stack+0x194/0x257 [ 30.656435] ? arch_local_irq_restore+0x53/0x53 [ 30.661074] print_circular_bug.isra.37+0x2cd/0x2dc [ 30.666059] ? save_trace+0xe0/0x2b0 [ 30.669745] __lock_acquire+0x30a8/0x3e00 [ 30.673860] ? print_irqtrace_events+0x270/0x270 [ 30.678586] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.683745] ? print_irqtrace_events+0x270/0x270 [ 30.688467] ? __lock_acquire+0x664/0x3e00 [ 30.692672] ? rcutorture_record_progress+0x10/0x10 [ 30.697657] ? print_irqtrace_events+0x270/0x270 [ 30.702381] ? __lock_acquire+0x664/0x3e00 [ 30.706587] ? add_lock_to_list.isra.28+0x24d/0x352 [ 30.711860] ? check_noncircular+0x20/0x20 [ 30.716065] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.721222] ? __lock_acquire+0x664/0x3e00 [ 30.725425] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.730582] lock_acquire+0x1d5/0x580 [ 30.734351] ? lock_acquire+0x1d5/0x580 [ 30.738294] ? rtnl_lock+0x17/0x20 [ 30.741806] ? lock_release+0xa40/0xa40 [ 30.745748] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.751602] ? rcu_note_context_switch+0x710/0x710 [ 30.756500] ? find_held_lock+0x35/0x1d0 [ 30.760528] ? __might_sleep+0x95/0x190 [ 30.764469] ? rtnl_lock+0x17/0x20 [ 30.767977] __mutex_lock+0x16f/0x1a80 [ 30.771831] ? rtnl_lock+0x17/0x20 [ 30.775340] ? check_noncircular+0x20/0x20 [ 30.779541] ? lock_downgrade+0x980/0x980 [ 30.783659] ? rtnl_lock+0x17/0x20 [ 30.787168] ? find_held_lock+0x35/0x1d0 [ 30.791198] ? mutex_lock_io_nested+0x1900/0x1900 [ 30.796014] ? is_bpf_text_address+0x7b/0x120 [ 30.800484] ? print_irqtrace_events+0x270/0x270 [ 30.805210] ? depot_save_stack+0x3b5/0x490 [ 30.809506] ? lock_downgrade+0x980/0x980 [ 30.813624] ? lock_release+0xa40/0xa40 [ 30.817568] ? mark_held_locks+0xaf/0x100 [ 30.821684] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 30.826763] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.831756] ? trace_hardirqs_on+0xd/0x10 [ 30.835875] ? depot_save_stack+0x3b5/0x490 [ 30.840168] ? save_stack+0xa3/0xd0 [ 30.843761] ? save_stack+0x43/0xd0 [ 30.847357] ? kasan_kmalloc+0xad/0xe0 [ 30.851211] ? kmem_cache_alloc_trace+0x136/0x750 [ 30.856028] ? tee_tg_check+0xed/0x280 [ 30.859888] ? xt_check_target+0x22c/0x7d0 [ 30.864093] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 30.868997] ? translate_table+0xed1/0x1610 [ 30.873290] ? do_ipt_set_ctl+0x370/0x5f0 [ 30.877405] ? nf_setsockopt+0x67/0xc0 [ 30.881263] ? ip_setsockopt+0xa1/0xb0 [ 30.885121] ? dccp_setsockopt+0x85/0xd0 [ 30.889153] ? sock_common_setsockopt+0x95/0xd0 [ 30.893793] ? SyS_setsockopt+0x189/0x360 [ 30.897908] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.902808] mutex_lock_nested+0x16/0x20 [ 30.906839] ? print_irqtrace_events+0x270/0x270 [ 30.911564] ? mutex_lock_nested+0x16/0x20 [ 30.915768] rtnl_lock+0x17/0x20 [ 30.919107] register_netdevice_notifier+0xad/0x860 [ 30.924090] ? __dev_close_many+0x330/0x330 [ 30.928382] ? __lock_is_held+0xb6/0x140 [ 30.932412] ? tee_tg_check+0xed/0x280 [ 30.936267] ? rcu_read_lock_sched_held+0x108/0x120 [ 30.941251] ? kmem_cache_alloc_trace+0x456/0x750 [ 30.946064] ? __kernel_text_address+0xd/0x40 [ 30.950526] ? wait_for_completion+0x770/0x770 [ 30.955077] tee_tg_check+0x1a0/0x280 [ 30.958844] ? tee_tg4+0x170/0x170 [ 30.962351] xt_check_target+0x22c/0x7d0 [ 30.966380] ? xt_target_seq_next+0x30/0x30 [ 30.970671] ? save_stack+0xa3/0xd0 [ 30.974266] ? kasan_slab_free+0x71/0xc0 [ 30.978294] ? kfree+0xd6/0x260 [ 30.981540] ? kvfree+0x36/0x60 [ 30.984788] ? translate_table+0xdd2/0x1610 [ 30.989078] ? mutex_unlock+0xd/0x10 [ 30.992762] ? xt_find_target+0x17b/0x1e0 [ 30.996881] find_check_entry.isra.8+0x8c8/0xcb0 [ 31.001606] ? ipt_do_table+0x1860/0x1860 [ 31.005735] ? mark_held_locks+0xaf/0x100 [ 31.009850] ? kfree+0xf0/0x260 [ 31.013098] ? trace_hardirqs_on+0xd/0x10 [ 31.017213] translate_table+0xed1/0x1610 [ 31.021334] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 31.026145] ? kasan_check_write+0x14/0x20 [ 31.030346] ? _copy_from_user+0x99/0x110 [ 31.034464] do_ipt_set_ctl+0x370/0x5f0 [ 31.038407] ? translate_compat_table+0x1b90/0x1b90 [ 31.043394] ? mutex_unlock+0xd/0x10 [ 31.047079] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 31.052324] nf_setsockopt+0x67/0xc0 [ 31.056009] ip_setsockopt+0xa1/0xb0 [ 31.059701] dccp_setsockopt+0x85/0xd0 [ 31.063560] sock_common_setsockopt+0x95/0xd0 [ 31.068033] SyS_setsockopt+0x189/0x360 [ 31.071977] ? SyS_recv+0x40/0x40 [ 31.075402] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 31.080213] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 31.085207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 31.089935] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 31.094657] RIP: 0033:0x4458f9 [ 31.097817] RSP: 002b:00007ffc92a54438 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 31.105491] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004458f9 [ 31.112730] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 31.119971] RBP: 00007ffc92a544e8 R08: 00000000000002f8 R09: 0000000000000000 [ 31.127209] R10: 0000000020004000 R11: 0000000000000203 R12: 00007ffc92a544e8 [ 31.134447] R13: 0000000000402e