[ 12.417245] audit: type=1400 audit(1517077929.145:5): avc: denied { syslog } for pid=3526 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.809488] audit: type=1400 audit(1517077935.537:6): avc: denied { map } for pid=3668 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 27.805506] audit: type=1400 audit(1517077944.533:7): avc: denied { map } for pid=3683 comm="syzkaller753690" path="/root/syzkaller753690605" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 28.203612] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 28.555895] [ 28.557542] ====================================================== [ 28.563827] WARNING: possible circular locking dependency detected [ 28.570120] 4.15.0-rc9+ #212 Not tainted [ 28.574149] ------------------------------------------------------ [ 28.580435] syzkaller753690/3683 is trying to acquire lock: [ 28.586111] (rtnl_mutex){+.+.}, at: [<00000000ff6acd68>] rtnl_lock+0x17/0x20 [ 28.593378] [ 28.593378] but task is already holding lock: [ 28.599317] (sk_lock-AF_INET){+.+.}, at: [<00000000bea1916e>] ip_setsockopt+0x8c/0xb0 [ 28.607354] [ 28.607354] which lock already depends on the new lock. [ 28.607354] [ 28.615637] [ 28.615637] the existing dependency chain (in reverse order) is: [ 28.623402] [ 28.623402] -> #1 (sk_lock-AF_INET){+.+.}: [ 28.629104] lock_sock_nested+0xc2/0x110 [ 28.633662] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 28.639086] ip_setsockopt+0x3a/0xb0 [ 28.643297] tcp_setsockopt+0x82/0xd0 [ 28.647596] sock_common_setsockopt+0x95/0xd0 [ 28.652584] SyS_setsockopt+0x189/0x360 [ 28.657056] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 28.662303] [ 28.662303] -> #0 (rtnl_mutex){+.+.}: [ 28.667563] lock_acquire+0x1d5/0x580 [ 28.671872] __mutex_lock+0x16f/0x1a80 [ 28.676260] mutex_lock_nested+0x16/0x20 [ 28.680823] rtnl_lock+0x17/0x20 [ 28.684686] register_netdevice_notifier+0xad/0x860 [ 28.690199] clusterip_tg_check+0xeb9/0x1570 [ 28.695103] xt_check_target+0x22c/0x7d0 [ 28.699655] find_check_entry.isra.8+0x8c8/0xcb0 [ 28.704905] translate_table+0xed1/0x1610 [ 28.709543] do_ipt_set_ctl+0x370/0x5f0 [ 28.714010] nf_setsockopt+0x67/0xc0 [ 28.718225] ip_setsockopt+0xa1/0xb0 [ 28.722432] raw_setsockopt+0xb7/0xd0 [ 28.726732] sock_common_setsockopt+0x95/0xd0 [ 28.731724] SyS_setsockopt+0x189/0x360 [ 28.736202] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 28.741458] [ 28.741458] other info that might help us debug this: [ 28.741458] [ 28.749571] Possible unsafe locking scenario: [ 28.749571] [ 28.755598] CPU0 CPU1 [ 28.760239] ---- ---- [ 28.764879] lock(sk_lock-AF_INET); [ 28.768567] lock(rtnl_mutex); [ 28.774334] lock(sk_lock-AF_INET); [ 28.780535] lock(rtnl_mutex); [ 28.783787] [ 28.783787] *** DEADLOCK *** [ 28.783787] [ 28.789817] 1 lock held by syzkaller753690/3683: [ 28.794552] #0: (sk_lock-AF_INET){+.+.}, at: [<00000000bea1916e>] ip_setsockopt+0x8c/0xb0 [ 28.803032] [ 28.803032] stack backtrace: [ 28.807519] CPU: 1 PID: 3683 Comm: syzkaller753690 Not tainted 4.15.0-rc9+ #212 [ 28.814936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.824283] Call Trace: [ 28.826849] dump_stack+0x194/0x257 [ 28.830453] ? arch_local_irq_restore+0x53/0x53 [ 28.835102] print_circular_bug.isra.37+0x2cd/0x2dc [ 28.840096] ? save_trace+0xe0/0x2b0 [ 28.843786] __lock_acquire+0x30a8/0x3e00 [ 28.847908] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.853070] ? trace_hardirqs_off+0x10/0x10 [ 28.857363] ? noop_count+0x40/0x40 [ 28.860963] ? trace_hardirqs_off+0x10/0x10 [ 28.865258] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.870421] ? check_noncircular+0x20/0x20 [ 28.874630] ? check_usage+0x22f/0xb60 [ 28.878491] ? trace_raw_output_xdp_redirect_map_err+0x440/0x440 [ 28.884612] ? check_usage+0x22f/0xb60 [ 28.888480] ? check_noncircular+0x20/0x20 [ 28.892692] ? check_noncircular+0x20/0x20 [ 28.896902] ? find_held_lock+0x35/0x1d0 [ 28.900941] ? __bfs+0x2e0/0x750 [ 28.904280] ? __is_insn_slot_addr+0x1fc/0x330 [ 28.908836] lock_acquire+0x1d5/0x580 [ 28.912607] ? lock_acquire+0x1d5/0x580 [ 28.916553] ? rtnl_lock+0x17/0x20 [ 28.920065] ? lock_release+0xa40/0xa40 [ 28.924015] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 28.929875] ? print_irqtrace_events+0x270/0x270 [ 28.934601] ? idr_get_free_cmn+0x64e/0xfd0 [ 28.938894] ? rcu_note_context_switch+0x710/0x710 [ 28.943795] ? __might_sleep+0x95/0x190 [ 28.947751] ? rtnl_lock+0x17/0x20 [ 28.951263] __mutex_lock+0x16f/0x1a80 [ 28.955131] ? rtnl_lock+0x17/0x20 [ 28.958653] ? rtnl_lock+0x17/0x20 [ 28.962166] ? __lock_acquire+0x664/0x3e00 [ 28.966374] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 28.971450] ? mutex_lock_io_nested+0x1900/0x1900 [ 28.976265] ? trace_hardirqs_on+0xd/0x10 [ 28.980390] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.985551] ? save_stack+0xa3/0xd0 [ 28.989150] ? kasan_kmalloc+0xad/0xe0 [ 28.993016] ? __proc_create+0x21a/0x880 [ 28.997054] ? proc_create_data+0x76/0x180 [ 29.001261] ? clusterip_tg_check+0xe4d/0x1570 [ 29.005820] ? rb_insert_color+0x1580/0x1580 [ 29.010204] ? do_ipt_set_ctl+0x370/0x5f0 [ 29.014339] ? ip_setsockopt+0xa1/0xb0 [ 29.018206] ? raw_setsockopt+0xb7/0xd0 [ 29.022161] ? sock_common_setsockopt+0x95/0xd0 [ 29.026801] ? SyS_setsockopt+0x189/0x360 [ 29.030924] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.035830] ? _find_next_bit+0xee/0x120 [ 29.039863] ? check_noncircular+0x20/0x20 [ 29.044077] ? find_first_zero_bit+0x93/0xe0 [ 29.048466] ? ida_get_new_above+0x421/0x9d0 [ 29.052851] ? print_irqtrace_events+0x270/0x270 [ 29.057592] ? check_noncircular+0x20/0x20 [ 29.061801] ? print_irqtrace_events+0x270/0x270 [ 29.066530] ? ida_simple_get+0x15c/0x220 [ 29.070650] ? lock_downgrade+0x980/0x980 [ 29.074769] ? find_held_lock+0x35/0x1d0 [ 29.078809] mutex_lock_nested+0x16/0x20 [ 29.082845] ? mutex_lock_nested+0x16/0x20 [ 29.087054] rtnl_lock+0x17/0x20 [ 29.090395] register_netdevice_notifier+0xad/0x860 [ 29.095386] ? lock_downgrade+0x980/0x980 [ 29.099512] ? __dev_close_many+0x350/0x350 [ 29.103824] ? ida_simple_get+0x176/0x220 [ 29.107965] ? do_raw_write_trylock+0x190/0x190 [ 29.112613] ? ida_remove+0x3f0/0x3f0 [ 29.116389] ? _raw_write_unlock+0x22/0x30 [ 29.120595] ? proc_register+0x261/0x370 [ 29.125245] ? proc_create_data+0x101/0x180 [ 29.129545] clusterip_tg_check+0xeb9/0x1570 [ 29.133938] ? arp_mangle+0x550/0x550 [ 29.137736] ? xt_find_target+0x150/0x1e0 [ 29.141868] ? lock_downgrade+0x980/0x980 [ 29.145990] ? mutex_unlock+0xd/0x10 [ 29.149678] ? ipv4_hooks_register+0x1fb/0x3e0 [ 29.154238] ? ipv4_conntrack_in+0x90/0x90 [ 29.158446] ? ipv4_conntrack_in+0x90/0x90 [ 29.162657] ? nf_ct_netns_do_get+0x20f/0x340 [ 29.167128] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 29.171947] ? __kernel_text_address+0xd/0x40 [ 29.176412] ? wait_for_completion+0x770/0x770 [ 29.180966] ? nf_ct_netns_get+0x35/0x90 [ 29.185014] ? arp_mangle+0x550/0x550 [ 29.188792] xt_check_target+0x22c/0x7d0 [ 29.192835] ? xt_target_seq_next+0x30/0x30 [ 29.197134] ? mutex_unlock+0xd/0x10 [ 29.200821] ? mutex_unlock+0xd/0x10 [ 29.204518] ? xt_find_target+0x17b/0x1e0 [ 29.208642] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.213382] ? ipt_do_table+0x1860/0x1860 [ 29.217524] ? mark_held_locks+0xaf/0x100 [ 29.221661] ? kfree+0xf0/0x260 [ 29.224917] ? trace_hardirqs_on+0xd/0x10 [ 29.229045] translate_table+0xed1/0x1610 [ 29.233171] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 29.237985] ? kasan_check_write+0x14/0x20 [ 29.242195] ? _copy_from_user+0x99/0x110 [ 29.246324] do_ipt_set_ctl+0x370/0x5f0 [ 29.250279] ? translate_compat_table+0x1b90/0x1b90 [ 29.255270] ? mutex_unlock+0xd/0x10 [ 29.258965] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 29.264224] nf_setsockopt+0x67/0xc0 [ 29.267912] ip_setsockopt+0xa1/0xb0 [ 29.271599] raw_setsockopt+0xb7/0xd0 [ 29.275371] sock_common_setsockopt+0x95/0xd0 [ 29.279838] SyS_setsockopt+0x189/0x360 [ 29.283782] ? SyS_recv+0x40/0x40 [ 29.287208] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 29.292029] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.297028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.301762] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.306490] RIP: 0033:0x4465c9 [ 29.309653] RSP: 002b:00007ffc49656cc8 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 29.317334] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00000000004465c9 [ 29.324579] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 29.331824] RBP: 00007ffc49656dd8 R08: 0000000000000328 R09: 0000000000000000 [ 29.339084] R10: 0000000020397cd8 R11: 0000000000000203 R12: 00007ffc49656dd8 [ 29.346331] R13: 0000000000403a90 R14: 0000000000000000 R15: 0000000000000000 [ 29.354650] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecate