[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.506704] audit: type=1400 audit(1517075579.323:6): avc: denied { map } for pid=3659 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 17.158861] sshd (3660) used greatest stack depth: 17024 bytes left Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 27.776056] audit: type=1400 audit(1517075590.592:7): avc: denied { map } for pid=3675 comm="syzkaller019515" path="/root/syzkaller019515276" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 28.128390] ip (3741) used greatest stack depth: 16448 bytes left [ 28.163839] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 28.491304] [ 28.492965] ====================================================== [ 28.499249] WARNING: possible circular locking dependency detected [ 28.505536] 4.15.0-rc9+ #212 Not tainted [ 28.509561] ------------------------------------------------------ [ 28.515845] syzkaller019515/3675 is trying to acquire lock: [ 28.521524] (rtnl_mutex){+.+.}, at: [<0000000011df2e90>] rtnl_lock+0x17/0x20 [ 28.528779] [ 28.528779] but task is already holding lock: [ 28.534715] (sk_lock-AF_INET){+.+.}, at: [<000000006990ac9d>] ip_setsockopt+0x8c/0xb0 [ 28.542746] [ 28.542746] which lock already depends on the new lock. [ 28.542746] [ 28.551034] [ 28.551034] the existing dependency chain (in reverse order) is: [ 28.558620] [ 28.558620] -> #1 (sk_lock-AF_INET){+.+.}: [ 28.564313] lock_sock_nested+0xc2/0x110 [ 28.568865] do_ip_setsockopt.isra.12+0x1d9/0x3210 [ 28.574284] ip_setsockopt+0x3a/0xb0 [ 28.578490] dccp_setsockopt+0x85/0xd0 [ 28.582875] sock_common_setsockopt+0x95/0xd0 [ 28.587864] SyS_setsockopt+0x189/0x360 [ 28.592328] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 28.597570] [ 28.597570] -> #0 (rtnl_mutex){+.+.}: [ 28.602825] lock_acquire+0x1d5/0x580 [ 28.607117] __mutex_lock+0x16f/0x1a80 [ 28.611492] mutex_lock_nested+0x16/0x20 [ 28.616046] rtnl_lock+0x17/0x20 [ 28.619907] register_netdevice_notifier+0xad/0x860 [ 28.625416] tee_tg_check+0x1a0/0x280 [ 28.629713] xt_check_target+0x22c/0x7d0 [ 28.634264] find_check_entry.isra.8+0x8c8/0xcb0 [ 28.639509] translate_table+0xed1/0x1610 [ 28.644142] do_ipt_set_ctl+0x370/0x5f0 [ 28.648606] nf_setsockopt+0x67/0xc0 [ 28.652812] ip_setsockopt+0xa1/0xb0 [ 28.657026] raw_setsockopt+0xb7/0xd0 [ 28.661319] sock_common_setsockopt+0x95/0xd0 [ 28.666302] SyS_setsockopt+0x189/0x360 [ 28.670765] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 28.676011] [ 28.676011] other info that might help us debug this: [ 28.676011] [ 28.684129] Possible unsafe locking scenario: [ 28.684129] [ 28.690155] CPU0 CPU1 [ 28.694788] ---- ---- [ 28.699420] lock(sk_lock-AF_INET); [ 28.703104] lock(rtnl_mutex); [ 28.708870] lock(sk_lock-AF_INET); [ 28.715076] lock(rtnl_mutex); [ 28.718322] [ 28.718322] *** DEADLOCK *** [ 28.718322] [ 28.724348] 1 lock held by syzkaller019515/3675: [ 28.729067] #0: (sk_lock-AF_INET){+.+.}, at: [<000000006990ac9d>] ip_setsockopt+0x8c/0xb0 [ 28.737534] [ 28.737534] stack backtrace: [ 28.742001] CPU: 1 PID: 3675 Comm: syzkaller019515 Not tainted 4.15.0-rc9+ #212 [ 28.749419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.758741] Call Trace: [ 28.761304] dump_stack+0x194/0x257 [ 28.764916] ? arch_local_irq_restore+0x53/0x53 [ 28.769566] print_circular_bug.isra.37+0x2cd/0x2dc [ 28.774550] ? save_trace+0xe0/0x2b0 [ 28.778236] __lock_acquire+0x30a8/0x3e00 [ 28.783033] ? print_irqtrace_events+0x270/0x270 [ 28.787769] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.792933] ? check_noncircular+0x20/0x20 [ 28.797157] ? print_irqtrace_events+0x270/0x270 [ 28.801883] ? __lock_acquire+0x664/0x3e00 [ 28.806094] ? __debug_object_init+0x235/0x1040 [ 28.810742] ? lock_downgrade+0x980/0x980 [ 28.814862] ? print_irqtrace_events+0x270/0x270 [ 28.819586] ? __lock_acquire+0x664/0x3e00 [ 28.823792] ? debug_object_activate+0x307/0x730 [ 28.828519] ? check_noncircular+0x20/0x20 [ 28.832723] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.837885] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 28.843048] lock_acquire+0x1d5/0x580 [ 28.846816] ? lock_acquire+0x1d5/0x580 [ 28.850761] ? rtnl_lock+0x17/0x20 [ 28.854270] ? lock_release+0xa40/0xa40 [ 28.858215] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 28.864073] ? rcu_note_context_switch+0x710/0x710 [ 28.868974] ? __might_sleep+0x95/0x190 [ 28.872920] ? rtnl_lock+0x17/0x20 [ 28.876430] __mutex_lock+0x16f/0x1a80 [ 28.880294] ? rtnl_lock+0x17/0x20 [ 28.883804] ? lock_downgrade+0x980/0x980 [ 28.887924] ? rtnl_lock+0x17/0x20 [ 28.891438] ? mutex_lock_io_nested+0x1900/0x1900 [ 28.896253] ? is_bpf_text_address+0x7b/0x120 [ 28.900809] ? print_irqtrace_events+0x270/0x270 [ 28.905537] ? depot_save_stack+0x3b5/0x490 [ 28.909831] ? lock_downgrade+0x980/0x980 [ 28.913953] ? lock_release+0xa40/0xa40 [ 28.917903] ? mark_held_locks+0xaf/0x100 [ 28.922030] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 28.927107] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 28.932100] ? trace_hardirqs_on+0xd/0x10 [ 28.936222] ? depot_save_stack+0x3b5/0x490 [ 28.940520] ? save_stack+0xa3/0xd0 [ 28.944122] ? save_stack+0x43/0xd0 [ 28.947725] ? kasan_kmalloc+0xad/0xe0 [ 28.951584] ? kmem_cache_alloc_trace+0x136/0x750 [ 28.956396] ? tee_tg_check+0xed/0x280 [ 28.960251] ? xt_check_target+0x22c/0x7d0 [ 28.964456] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 28.969355] ? translate_table+0xed1/0x1610 [ 28.973646] ? do_ipt_set_ctl+0x370/0x5f0 [ 28.977772] ? nf_setsockopt+0x67/0xc0 [ 28.981634] ? ip_setsockopt+0xa1/0xb0 [ 28.985493] ? raw_setsockopt+0xb7/0xd0 [ 28.989438] ? sock_common_setsockopt+0x95/0xd0 [ 28.994078] ? SyS_setsockopt+0x189/0x360 [ 28.998197] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.003098] mutex_lock_nested+0x16/0x20 [ 29.007132] ? mutex_lock_nested+0x16/0x20 [ 29.011340] rtnl_lock+0x17/0x20 [ 29.014680] register_netdevice_notifier+0xad/0x860 [ 29.019667] ? __dev_close_many+0x350/0x350 [ 29.023965] ? __lock_is_held+0xb6/0x140 [ 29.028000] ? tee_tg_check+0xed/0x280 [ 29.031868] ? rcu_read_lock_sched_held+0x108/0x120 [ 29.036855] ? kmem_cache_alloc_trace+0x456/0x750 [ 29.041669] ? __kernel_text_address+0xd/0x40 [ 29.046134] ? wait_for_completion+0x770/0x770 [ 29.050689] tee_tg_check+0x1a0/0x280 [ 29.054456] ? tee_tg4+0x170/0x170 [ 29.057967] xt_check_target+0x22c/0x7d0 [ 29.061997] ? xt_target_seq_next+0x30/0x30 [ 29.066291] ? save_stack+0xa3/0xd0 [ 29.069891] ? kasan_slab_free+0x71/0xc0 [ 29.073921] ? kfree+0xd6/0x260 [ 29.077171] ? kvfree+0x36/0x60 [ 29.080421] ? mutex_unlock+0xd/0x10 [ 29.084106] ? xt_find_target+0x17b/0x1e0 [ 29.088230] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.092960] ? ipt_do_table+0x1860/0x1860 [ 29.097080] ? mark_held_locks+0xaf/0x100 [ 29.101202] ? kfree+0xf0/0x260 [ 29.104451] ? trace_hardirqs_on+0xd/0x10 [ 29.108571] translate_table+0xed1/0x1610 [ 29.112697] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 29.117511] ? kasan_check_write+0x14/0x20 [ 29.121714] ? _copy_from_user+0x99/0x110 [ 29.125834] do_ipt_set_ctl+0x370/0x5f0 [ 29.129781] ? translate_compat_table+0x1b90/0x1b90 [ 29.134771] ? mutex_unlock+0xd/0x10 [ 29.138455] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 29.143702] nf_setsockopt+0x67/0xc0 [ 29.147392] ip_setsockopt+0xa1/0xb0 [ 29.151077] raw_setsockopt+0xb7/0xd0 [ 29.154860] sock_common_setsockopt+0x95/0xd0 [ 29.159323] SyS_setsockopt+0x189/0x360 [ 29.163267] ? SyS_recv+0x40/0x40 [ 29.166689] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 29.171501] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.176490] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.181222] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.185944] RIP: 0033:0x445c39 [ 29.189103] RSP: 002b:00007ffdf8e4a318 EFLAGS: 00000203 OR