[....] Starting enhanced syslogd: rsyslogd[ 12.672055] audit: type=1400 audit(1517081481.375:5): avc: denied { syslog } for pid=3526 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.359401] audit: type=1400 audit(1517081488.063:6): avc: denied { map } for pid=3667 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.43' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 25.662609] audit: type=1400 audit(1517081494.366:7): avc: denied { map } for pid=3681 comm="syzkaller172156" path="/root/syzkaller172156587" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 25.912262] ip (3747) used greatest stack depth: 16016 bytes left [ 25.946255] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 26.294441] [ 26.296101] ====================================================== [ 26.302385] WARNING: possible circular locking dependency detected [ 26.308672] 4.15.0-rc9+ #283 Not tainted [ 26.312710] ------------------------------------------------------ [ 26.318997] syzkaller172156/3681 is trying to acquire lock: [ 26.324852] (rtnl_mutex){+.+.}, at: [<000000006aa6b8d6>] rtnl_lock+0x17/0x20 [ 26.332109] [ 26.332109] but task is already holding lock: [ 26.338049] (sk_lock-AF_INET){+.+.}, at: [<00000000fbc4a015>] ip_setsockopt+0x8c/0xb0 [ 26.346079] [ 26.346079] which lock already depends on the new lock. [ 26.346079] [ 26.354372] [ 26.354372] the existing dependency chain (in reverse order) is: [ 26.362056] [ 26.362056] -> #1 (sk_lock-AF_INET){+.+.}: [ 26.367749] lock_sock_nested+0xc2/0x110 [ 26.372300] do_ip_setsockopt.isra.12+0x1d9/0x32e0 [ 26.377805] ip_setsockopt+0x3a/0xb0 [ 26.382008] tcp_setsockopt+0x82/0xd0 [ 26.386301] sock_common_setsockopt+0x95/0xd0 [ 26.391295] SyS_setsockopt+0x189/0x360 [ 26.395761] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 26.401004] [ 26.401004] -> #0 (rtnl_mutex){+.+.}: [ 26.406259] lock_acquire+0x1d5/0x580 [ 26.410550] __mutex_lock+0x16f/0x1a80 [ 26.414936] mutex_lock_nested+0x16/0x20 [ 26.419495] rtnl_lock+0x17/0x20 [ 26.423438] register_netdevice_notifier+0xad/0x860 [ 26.428946] clusterip_tg_check+0xeb9/0x1570 [ 26.433845] xt_check_target+0x22c/0x7d0 [ 26.438400] find_check_entry.isra.8+0x8c8/0xcb0 [ 26.443650] translate_table+0xed1/0x1610 [ 26.448287] do_ipt_set_ctl+0x370/0x5f0 [ 26.452749] nf_setsockopt+0x67/0xc0 [ 26.456959] ip_setsockopt+0xa1/0xb0 [ 26.461267] raw_setsockopt+0xb7/0xd0 [ 26.465557] sock_common_setsockopt+0x95/0xd0 [ 26.470543] SyS_setsockopt+0x189/0x360 [ 26.475016] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 26.480258] [ 26.480258] other info that might help us debug this: [ 26.480258] [ 26.488367] Possible unsafe locking scenario: [ 26.488367] [ 26.494392] CPU0 CPU1 [ 26.499028] ---- ---- [ 26.503676] lock(sk_lock-AF_INET); [ 26.507362] lock(rtnl_mutex); [ 26.513127] lock(sk_lock-AF_INET); [ 26.519325] lock(rtnl_mutex); [ 26.522573] [ 26.522573] *** DEADLOCK *** [ 26.522573] [ 26.528611] 1 lock held by syzkaller172156/3681: [ 26.533336] #0: (sk_lock-AF_INET){+.+.}, at: [<00000000fbc4a015>] ip_setsockopt+0x8c/0xb0 [ 26.541802] [ 26.541802] stack backtrace: [ 26.546266] CPU: 0 PID: 3681 Comm: syzkaller172156 Not tainted 4.15.0-rc9+ #283 [ 26.553687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 26.563011] Call Trace: [ 26.565573] dump_stack+0x194/0x257 [ 26.569177] ? arch_local_irq_restore+0x53/0x53 [ 26.573818] print_circular_bug.isra.37+0x2cd/0x2dc [ 26.578804] ? save_trace+0xe0/0x2b0 [ 26.582508] __lock_acquire+0x30a8/0x3e00 [ 26.586662] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 26.591851] ? trace_hardirqs_off+0x10/0x10 [ 26.596149] ? __is_insn_slot_addr+0x1fc/0x330 [ 26.600698] ? lock_downgrade+0x980/0x980 [ 26.604813] ? lock_release+0xa40/0xa40 [ 26.608758] ? bpf_prog_kallsyms_find+0xbd/0x440 [ 26.613485] ? modules_open+0xa0/0xa0 [ 26.617273] ? trace_raw_output_xdp_redirect_map_err+0x440/0x440 [ 26.623393] ? is_bpf_text_address+0x7b/0x120 [ 26.627857] ? lock_downgrade+0x980/0x980 [ 26.631973] ? lock_release+0xa40/0xa40 [ 26.635916] ? __free_insn_slot+0x5c0/0x5c0 [ 26.640216] ? check_noncircular+0x20/0x20 [ 26.644424] ? kernel_text_address+0x102/0x140 [ 26.648977] lock_acquire+0x1d5/0x580 [ 26.652748] ? lock_acquire+0x1d5/0x580 [ 26.656690] ? rtnl_lock+0x17/0x20 [ 26.660210] ? lock_release+0xa40/0xa40 [ 26.664154] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 26.670007] ? print_irqtrace_events+0x270/0x270 [ 26.674731] ? idr_get_free_cmn+0x64e/0xfd0 [ 26.679022] ? rcu_note_context_switch+0x710/0x710 [ 26.683921] ? __might_sleep+0x95/0x190 [ 26.687866] ? rtnl_lock+0x17/0x20 [ 26.691373] __mutex_lock+0x16f/0x1a80 [ 26.695230] ? rtnl_lock+0x17/0x20 [ 26.698824] ? rtnl_lock+0x17/0x20 [ 26.702348] ? __lock_acquire+0x664/0x3e00 [ 26.706551] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 26.711626] ? mutex_lock_io_nested+0x1900/0x1900 [ 26.716445] ? trace_hardirqs_on+0xd/0x10 [ 26.720575] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 26.725734] ? save_stack+0xa3/0xd0 [ 26.729329] ? kasan_kmalloc+0xad/0xe0 [ 26.733194] ? __proc_create+0x21a/0x880 [ 26.737221] ? proc_create_data+0x76/0x180 [ 26.741422] ? clusterip_tg_check+0xe4d/0x1570 [ 26.745974] ? rb_insert_color+0x1580/0x1580 [ 26.750351] ? do_ipt_set_ctl+0x370/0x5f0 [ 26.754476] ? ip_setsockopt+0xa1/0xb0 [ 26.758336] ? raw_setsockopt+0xb7/0xd0 [ 26.762280] ? sock_common_setsockopt+0x95/0xd0 [ 26.766917] ? SyS_setsockopt+0x189/0x360 [ 26.771049] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 26.775950] ? _find_next_bit+0xee/0x120 [ 26.779992] ? check_noncircular+0x20/0x20 [ 26.784211] ? find_first_zero_bit+0x93/0xe0 [ 26.788590] ? ida_get_new_above+0x421/0x9d0 [ 26.792968] ? print_irqtrace_events+0x270/0x270 [ 26.797694] ? check_noncircular+0x20/0x20 [ 26.801896] ? print_irqtrace_events+0x270/0x270 [ 26.806631] ? ida_simple_get+0x15c/0x220 [ 26.810748] ? lock_downgrade+0x980/0x980 [ 26.814864] ? find_held_lock+0x35/0x1d0 [ 26.818895] mutex_lock_nested+0x16/0x20 [ 26.822926] ? mutex_lock_nested+0x16/0x20 [ 26.827143] rtnl_lock+0x17/0x20 [ 26.830486] register_netdevice_notifier+0xad/0x860 [ 26.835472] ? lock_downgrade+0x980/0x980 [ 26.839606] ? __dev_close_many+0x330/0x330 [ 26.843913] ? ida_simple_get+0x176/0x220 [ 26.848031] ? do_raw_write_trylock+0x190/0x190 [ 26.852670] ? ida_remove+0x3f0/0x3f0 [ 26.856442] ? _raw_write_unlock+0x22/0x30 [ 26.860646] ? proc_register+0x261/0x370 [ 26.864677] ? proc_create_data+0x101/0x180 [ 26.868969] clusterip_tg_check+0xeb9/0x1570 [ 26.873345] ? arp_mangle+0x550/0x550 [ 26.877115] ? xt_find_target+0x150/0x1e0 [ 26.881232] ? lock_downgrade+0x980/0x980 [ 26.885348] ? rcu_read_lock_sched_held+0x108/0x120 [ 26.890332] ? pcpu_alloc+0x146/0x10e0 [ 26.894188] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 26.898996] ? pcpu_free_area+0xa00/0xa00 [ 26.903119] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 26.908019] ? __kernel_text_address+0xd/0x40 [ 26.912483] ? wait_for_completion+0x770/0x770 [ 26.917035] ? trace_hardirqs_off+0xd/0x10 [ 26.921238] ? arp_mangle+0x550/0x550 [ 26.925018] xt_check_target+0x22c/0x7d0 [ 26.929057] ? xt_target_seq_next+0x30/0x30 [ 26.933354] ? mutex_unlock+0xd/0x10 [ 26.937038] ? mutex_unlock+0xd/0x10 [ 26.940724] ? xt_find_target+0x17b/0x1e0 [ 26.944853] find_check_entry.isra.8+0x8c8/0xcb0 [ 26.949595] ? ipt_do_table+0x1860/0x1860 [ 26.953721] ? mark_held_locks+0xaf/0x100 [ 26.957837] ? kfree+0xf0/0x260 [ 26.961087] ? trace_hardirqs_on+0xd/0x10 [ 26.965206] translate_table+0xed1/0x1610 [ 26.969326] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 26.974224] ? kasan_check_write+0x14/0x20 [ 26.978519] ? _copy_from_user+0x99/0x110 [ 26.982638] do_ipt_set_ctl+0x370/0x5f0 [ 26.986583] ? translate_compat_table+0x1b90/0x1b90 [ 26.991574] ? mutex_unlock+0xd/0x10 [ 26.995261] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 27.000511] nf_setsockopt+0x67/0xc0 [ 27.004194] ip_setsockopt+0xa1/0xb0 [ 27.007877] raw_setsockopt+0xb7/0xd0 [ 27.011648] sock_common_setsockopt+0x95/0xd0 [ 27.016116] SyS_setsockopt+0x189/0x360 [ 27.020079] ? SyS_recv+0x40/0x40 [ 27.023514] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 27.028423] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 27.033410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 27.038143] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 27.042878] RIP: 0033:0x445f79 [ 27.046044] RSP: 002b:00007ffc7193d618 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 27.053718] RAX: ffffffffffffffda RBX: 000000000000006e RCX: 0000000000445f79 [ 27.060957] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000005 [ 27.068198] RBP: 00007ffc7193d728 R08: 00000000000002f8 R09: 000000000000775d [ 27.075437] R10: 000000002000b000 R11: 0000000000000203 R12: 00007ffc7193d728 [ 27.082676] R13: 0000000000403440 R14: 0000000000000000 R15: 0000000000000000