[....] Starting enhanced syslogd: rsyslogd[ 16.079367] audit: type=1400 audit(1517442295.663:5): avc: denied { syslog } for pid=3996 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.435719] audit: type=1400 audit(1517442299.019:6): avc: denied { map } for pid=4136 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 32.123976] audit: type=1400 audit(1517442311.707:7): avc: denied { map } for pid=4152 comm="syzkaller430070" path="/root/syzkaller430070580" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 32.405972] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 32.749905] [ 32.751556] ====================================================== [ 32.757841] WARNING: possible circular locking dependency detected [ 32.764129] 4.15.0+ #288 Not tainted [ 32.767809] ------------------------------------------------------ [ 32.774122] syzkaller430070/4152 is trying to acquire lock: [ 32.779812] (rtnl_mutex){+.+.}, at: [<000000002b72b28d>] rtnl_lock+0x17/0x20 [ 32.787069] [ 32.787069] but task is already holding lock: [ 32.793119] (sk_lock-AF_INET){+.+.}, at: [<00000000542dcc9a>] ip_setsockopt+0x8c/0xb0 [ 32.801159] [ 32.801159] which lock already depends on the new lock. [ 32.801159] [ 32.809457] [ 32.809457] the existing dependency chain (in reverse order) is: [ 32.817053] [ 32.817053] -> #1 (sk_lock-AF_INET){+.+.}: [ 32.822749] lock_sock_nested+0xc2/0x110 [ 32.827305] do_ip_getsockopt+0x1b3/0x2170 [ 32.832035] ip_getsockopt+0x90/0x220 [ 32.836330] tcp_getsockopt+0x82/0xd0 [ 32.840628] sock_common_getsockopt+0x95/0xd0 [ 32.845620] SyS_getsockopt+0x178/0x340 [ 32.850090] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 32.855338] [ 32.855338] -> #0 (rtnl_mutex){+.+.}: [ 32.860598] lock_acquire+0x1d5/0x580 [ 32.864898] __mutex_lock+0x16f/0x1a80 [ 32.869283] mutex_lock_nested+0x16/0x20 [ 32.873847] rtnl_lock+0x17/0x20 [ 32.877708] register_netdevice_notifier+0xad/0x860 [ 32.883221] tee_tg_check+0x1a0/0x280 [ 32.887517] xt_check_target+0x22c/0x7d0 [ 32.892083] find_check_entry.isra.8+0x8c8/0xcb0 [ 32.897347] translate_table+0xed1/0x1610 [ 32.901994] do_ipt_set_ctl+0x370/0x5f0 [ 32.906467] nf_setsockopt+0x67/0xc0 [ 32.910675] ip_setsockopt+0xa1/0xb0 [ 32.914884] sctp_setsockopt+0x2a0/0x5de0 [ 32.919528] sock_common_setsockopt+0x95/0xd0 [ 32.924522] SyS_setsockopt+0x189/0x360 [ 32.928994] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 32.934242] [ 32.934242] other info that might help us debug this: [ 32.934242] [ 32.942360] Possible unsafe locking scenario: [ 32.942360] [ 32.948388] CPU0 CPU1 [ 32.953039] ---- ---- [ 32.957678] lock(sk_lock-AF_INET); [ 32.961371] lock(rtnl_mutex); [ 32.967142] lock(sk_lock-AF_INET); [ 32.973347] lock(rtnl_mutex); [ 32.976608] [ 32.976608] *** DEADLOCK *** [ 32.976608] [ 32.982641] 1 lock held by syzkaller430070/4152: [ 32.987365] #0: (sk_lock-AF_INET){+.+.}, at: [<00000000542dcc9a>] ip_setsockopt+0x8c/0xb0 [ 32.995838] [ 32.995838] stack backtrace: [ 33.000309] CPU: 0 PID: 4152 Comm: syzkaller430070 Not tainted 4.15.0+ #288 [ 33.007383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.016712] Call Trace: [ 33.019278] dump_stack+0x194/0x257 [ 33.022889] ? arch_local_irq_restore+0x53/0x53 [ 33.027550] print_circular_bug.isra.38+0x2cd/0x2dc [ 33.032540] ? save_trace+0xe0/0x2b0 [ 33.036230] __lock_acquire+0x30a8/0x3e00 [ 33.040353] ? print_irqtrace_events+0x270/0x270 [ 33.045091] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.050261] ? print_irqtrace_events+0x270/0x270 [ 33.054994] ? __lock_acquire+0x664/0x3e00 [ 33.059209] ? rcutorture_record_progress+0x10/0x10 [ 33.064201] ? print_irqtrace_events+0x270/0x270 [ 33.068946] ? __lock_acquire+0x664/0x3e00 [ 33.073156] ? __save_stack_trace+0x7e/0xd0 [ 33.077455] ? add_lock_to_list.isra.29+0x24d/0x352 [ 33.082448] ? __lock_acquire+0x664/0x3e00 [ 33.086654] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.091819] ? __lock_acquire+0x664/0x3e00 [ 33.096032] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.101196] lock_acquire+0x1d5/0x580 [ 33.104971] ? lock_acquire+0x1d5/0x580 [ 33.108933] ? rtnl_lock+0x17/0x20 [ 33.112457] ? lock_release+0xa40/0xa40 [ 33.116406] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 33.122269] ? rcu_note_context_switch+0x710/0x710 [ 33.127172] ? find_held_lock+0x35/0x1d0 [ 33.131210] ? __might_sleep+0x95/0x190 [ 33.135164] ? rtnl_lock+0x17/0x20 [ 33.138689] __mutex_lock+0x16f/0x1a80 [ 33.142549] ? rtnl_lock+0x17/0x20 [ 33.146062] ? lock_downgrade+0x980/0x980 [ 33.150182] ? rtnl_lock+0x17/0x20 [ 33.153694] ? check_noncircular+0x20/0x20 [ 33.157901] ? find_held_lock+0x35/0x1d0 [ 33.161935] ? mutex_lock_io_nested+0x1900/0x1900 [ 33.166760] ? is_bpf_text_address+0x7b/0x120 [ 33.171233] ? print_irqtrace_events+0x270/0x270 [ 33.175967] ? depot_save_stack+0x3b5/0x490 [ 33.180265] ? lock_downgrade+0x980/0x980 [ 33.184387] ? lock_release+0xa40/0xa40 [ 33.188340] ? mark_held_locks+0xaf/0x100 [ 33.192463] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 33.197540] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.202799] ? trace_hardirqs_on+0xd/0x10 [ 33.206924] ? depot_save_stack+0x3b5/0x490 [ 33.211259] ? save_stack+0xa3/0xd0 [ 33.214858] ? save_stack+0x43/0xd0 [ 33.218458] ? kasan_kmalloc+0xad/0xe0 [ 33.222314] ? kmem_cache_alloc_trace+0x136/0x750 [ 33.227132] ? tee_tg_check+0xed/0x280 [ 33.231003] ? xt_check_target+0x22c/0x7d0 [ 33.235212] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 33.240124] ? translate_table+0xed1/0x1610 [ 33.244418] ? do_ipt_set_ctl+0x370/0x5f0 [ 33.248539] ? nf_setsockopt+0x67/0xc0 [ 33.252398] ? ip_setsockopt+0xa1/0xb0 [ 33.256258] ? sctp_setsockopt+0x2a0/0x5de0 [ 33.260553] ? sock_common_setsockopt+0x95/0xd0 [ 33.265192] ? SyS_setsockopt+0x189/0x360 [ 33.269310] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 33.274214] mutex_lock_nested+0x16/0x20 [ 33.278248] ? print_irqtrace_events+0x270/0x270 [ 33.282976] ? mutex_lock_nested+0x16/0x20 [ 33.287213] rtnl_lock+0x17/0x20 [ 33.290556] register_netdevice_notifier+0xad/0x860 [ 33.295546] ? __dev_close_many+0x330/0x330 [ 33.299851] ? __lock_is_held+0xb6/0x140 [ 33.303888] ? tee_tg_check+0xed/0x280 [ 33.307748] ? rcu_read_lock_sched_held+0x108/0x120 [ 33.312748] ? kmem_cache_alloc_trace+0x456/0x750 [ 33.317563] ? __kernel_text_address+0xd/0x40 [ 33.322036] ? wait_for_completion+0x770/0x770 [ 33.326604] tee_tg_check+0x1a0/0x280 [ 33.330377] ? tee_tg4+0x170/0x170 [ 33.333886] xt_check_target+0x22c/0x7d0 [ 33.337923] ? xt_target_seq_next+0x30/0x30 [ 33.342215] ? save_stack+0xa3/0xd0 [ 33.345816] ? kasan_slab_free+0x71/0xc0 [ 33.349849] ? kfree+0xd6/0x260 [ 33.353100] ? kvfree+0x36/0x60 [ 33.356353] ? translate_table+0xdd2/0x1610 [ 33.360648] ? mutex_unlock+0xd/0x10 [ 33.364357] ? xt_find_target+0x17b/0x1e0 [ 33.368480] find_check_entry.isra.8+0x8c8/0xcb0 [ 33.373210] ? ipt_do_table+0x1950/0x1950 [ 33.377332] ? mark_held_locks+0xaf/0x100 [ 33.381450] ? kfree+0xf0/0x260 [ 33.384700] ? trace_hardirqs_on+0xd/0x10 [ 33.388825] translate_table+0xed1/0x1610 [ 33.392951] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 33.397790] ? kasan_check_write+0x14/0x20 [ 33.402011] ? _copy_from_user+0x99/0x110 [ 33.406137] do_ipt_set_ctl+0x370/0x5f0 [ 33.410085] ? translate_compat_table+0x1b90/0x1b90 [ 33.415093] ? mutex_unlock+0xd/0x10 [ 33.418794] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 33.424050] nf_setsockopt+0x67/0xc0 [ 33.427752] ip_setsockopt+0xa1/0xb0 [ 33.431442] sctp_setsockopt+0x2a0/0x5de0 [ 33.435576] ? sctp_setsockopt_paddr_thresholds+0x550/0x550 [ 33.441266] ? __thp_get_unmapped_area+0x130/0x130 [ 33.446176] ? __lock_acquire+0x664/0x3e00 [ 33.450474] ? __lock_acquire+0x664/0x3e00 [ 33.454688] ? is_bpf_text_address+0xa4/0x120 [ 33.459169] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.464331] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.469496] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 33.474668] ? save_stack+0xa3/0xd0 [ 33.478264] ? check_noncircular+0x20/0x20 [ 33.482472] ? kasan_kmalloc+0xad/0xe0 [ 33.486336] ? kasan_slab_alloc+0x12/0x20 [ 33.490475] ? kmem_cache_alloc+0x12e/0x760 [ 33.494769] ? selinux_file_alloc_security+0xae/0x190 [ 33.499938] ? security_file_alloc+0x6d/0xa0 [ 33.504341] ? get_empty_filp+0x189/0x4f0 [ 33.508461] ? alloc_file+0x26/0x390 [ 33.512149] ? sock_alloc_file+0x1f3/0x560 [ 33.516357] ? sock_map_fd+0x34/0x90 [ 33.520044] ? SyS_socket+0x125/0x1d0 [ 33.523819] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 33.528733] ? kasan_slab_alloc+0x12/0x20 [ 33.532854] ? kmem_cache_alloc+0x12e/0x760 [ 33.537144] ? get_empty_filp+0xfb/0x4f0 [ 33.541181] ? alloc_file+0x26/0x390 [ 33.544879] ? sock_alloc_file+0x1f3/0x560 [ 33.549091] ? find_held_lock+0x35/0x1d0 [ 33.553127] ? avc_has_perm+0x35e/0x680 [ 33.557169] ? lock_downgrade+0x980/0x980 [ 33.561289] ? lock_release+0xa40/0xa40 [ 33.565242] ? __pmd_alloc+0x4e0/0x4e0 [ 33.569100] ? check_noncircular+0x20/0x20 [ 33.573323] ? __lockdep_init_map+0xe4/0x650 [ 33.577708] ? find_held_lock+0x35/0x1d0 [ 33.581746] ? avc_has_perm+0x43e/0x680 [ 33.585696] ? avc_has_perm_noaudit+0x520/0x520 [ 33.590344] ? __do_page_fault+0x5f7/0xc90 [ 33.594557] ? lock_downgrade+0x980/0x980 [ 33.598683] ? handle_mm_fault+0x410/0x8d0 [ 33.602895] ? down_read_trylock+0xdb/0x170 [ 33.607190] ? __do_page_fault+0x32d/0xc90 [ 33.611400] ? __handle_mm_fault+0x3ce0/0x3ce0 [ 33.615953] ? vmacache_find+0x5f/0x280 [ 33.619918] ? sock_has_perm+0x2a4/0x420 [ 33.623957] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 33.629295] ? __do_page_fault+0x3d6/0xc90 [ 33.633508] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 33.639203] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 33.644469] sock_common_setsockopt+0x95/0xd0 [ 33.648940] SyS_setsockopt+0x189/0x360 [ 33.652887] ? SyS_recv+0x40/0x40 [ 33.656313] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 33.661131] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 33.666125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 33.670868] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 33.675595] RIP: 0033:0x445be9 [ 33.678755] RSP: 002b:00007ffc7c343528 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 33.686434] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 0000000000445be9 [ 33.693677] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 33.700930] RBP: 00007ffc7c3435d8