[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 17.302424] audit: type=1400 audit(1517391492.795:6): avc: denied { map } for pid=4088 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.206' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 syzkaller login: [ 28.250006] audit: type=1400 audit(1517391503.742:7): avc: denied { map } for pid=4103 comm="syzkaller238925" path="/root/syzkaller238925064" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 28.634841] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 28.972899] [ 28.974595] ====================================================== [ 28.980884] WARNING: possible circular locking dependency detected [ 28.987172] 4.15.0+ #287 Not tainted [ 28.990849] ------------------------------------------------------ [ 28.997137] syzkaller238925/4103 is trying to acquire lock: [ 29.002826] (rtnl_mutex){+.+.}, at: [<00000000ac9aa15b>] rtnl_lock+0x17/0x20 [ 29.010082] [ 29.010082] but task is already holding lock: [ 29.016019] (sk_lock-AF_INET){+.+.}, at: [<0000000055263e84>] ip_setsockopt+0x8c/0xb0 [ 29.024060] [ 29.024060] which lock already depends on the new lock. [ 29.024060] [ 29.032345] [ 29.032345] the existing dependency chain (in reverse order) is: [ 29.039942] [ 29.039942] -> #1 (sk_lock-AF_INET){+.+.}: [ 29.045641] lock_sock_nested+0xc2/0x110 [ 29.050195] do_ip_getsockopt+0x1b3/0x2170 [ 29.054921] ip_getsockopt+0x90/0x220 [ 29.059218] udp_getsockopt+0x45/0x80 [ 29.063513] sock_common_getsockopt+0x95/0xd0 [ 29.068500] SyS_getsockopt+0x178/0x340 [ 29.072967] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.078211] [ 29.078211] -> #0 (rtnl_mutex){+.+.}: [ 29.083466] lock_acquire+0x1d5/0x580 [ 29.087758] __mutex_lock+0x16f/0x1a80 [ 29.092133] mutex_lock_nested+0x16/0x20 [ 29.096683] rtnl_lock+0x17/0x20 [ 29.100540] register_netdevice_notifier+0xad/0x860 [ 29.106058] tee_tg_check+0x1a0/0x280 [ 29.110351] xt_check_target+0x22c/0x7d0 [ 29.114901] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.120154] translate_table+0xed1/0x1610 [ 29.124799] do_ipt_set_ctl+0x370/0x5f0 [ 29.129268] nf_setsockopt+0x67/0xc0 [ 29.133475] ip_setsockopt+0xa1/0xb0 [ 29.137681] sctp_setsockopt+0x2a0/0x5de0 [ 29.142323] sock_common_setsockopt+0x95/0xd0 [ 29.147308] SyS_setsockopt+0x189/0x360 [ 29.151774] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.157015] [ 29.157015] other info that might help us debug this: [ 29.157015] [ 29.165131] Possible unsafe locking scenario: [ 29.165131] [ 29.171157] CPU0 CPU1 [ 29.175793] ---- ---- [ 29.180429] lock(sk_lock-AF_INET); [ 29.184115] lock(rtnl_mutex); [ 29.189886] lock(sk_lock-AF_INET); [ 29.196085] lock(rtnl_mutex); [ 29.199333] [ 29.199333] *** DEADLOCK *** [ 29.199333] [ 29.205360] 1 lock held by syzkaller238925/4103: [ 29.210080] #0: (sk_lock-AF_INET){+.+.}, at: [<0000000055263e84>] ip_setsockopt+0x8c/0xb0 [ 29.218557] [ 29.218557] stack backtrace: [ 29.223027] CPU: 1 PID: 4103 Comm: syzkaller238925 Not tainted 4.15.0+ #287 [ 29.230112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.239452] Call Trace: [ 29.242027] dump_stack+0x194/0x257 [ 29.245627] ? arch_local_irq_restore+0x53/0x53 [ 29.250272] print_circular_bug.isra.38+0x2cd/0x2dc [ 29.255259] ? save_trace+0xe0/0x2b0 [ 29.258942] __lock_acquire+0x30a8/0x3e00 [ 29.263067] ? print_irqtrace_events+0x270/0x270 [ 29.267808] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.272979] ? print_irqtrace_events+0x270/0x270 [ 29.277703] ? __lock_acquire+0x664/0x3e00 [ 29.281909] ? rcutorture_record_progress+0x10/0x10 [ 29.286896] ? print_irqtrace_events+0x270/0x270 [ 29.291625] ? __lock_acquire+0x664/0x3e00 [ 29.295830] ? __save_stack_trace+0x7e/0xd0 [ 29.300123] ? add_lock_to_list.isra.29+0x24d/0x352 [ 29.305112] ? __lock_acquire+0x664/0x3e00 [ 29.309317] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.314474] ? __lock_acquire+0x664/0x3e00 [ 29.318680] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.323844] lock_acquire+0x1d5/0x580 [ 29.327619] ? lock_acquire+0x1d5/0x580 [ 29.331570] ? rtnl_lock+0x17/0x20 [ 29.335080] ? lock_release+0xa40/0xa40 [ 29.339030] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 29.344891] ? rcu_note_context_switch+0x710/0x710 [ 29.349791] ? find_held_lock+0x35/0x1d0 [ 29.353824] ? __might_sleep+0x95/0x190 [ 29.357774] ? rtnl_lock+0x17/0x20 [ 29.361287] __mutex_lock+0x16f/0x1a80 [ 29.365150] ? rtnl_lock+0x17/0x20 [ 29.368663] ? lock_downgrade+0x980/0x980 [ 29.372779] ? rtnl_lock+0x17/0x20 [ 29.376289] ? check_noncircular+0x20/0x20 [ 29.380493] ? find_held_lock+0x35/0x1d0 [ 29.384525] ? mutex_lock_io_nested+0x1900/0x1900 [ 29.389339] ? is_bpf_text_address+0x7b/0x120 [ 29.393803] ? print_irqtrace_events+0x270/0x270 [ 29.398534] ? depot_save_stack+0x3b5/0x490 [ 29.402824] ? lock_downgrade+0x980/0x980 [ 29.406943] ? lock_release+0xa40/0xa40 [ 29.410888] ? mark_held_locks+0xaf/0x100 [ 29.415013] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 29.420087] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.425075] ? trace_hardirqs_on+0xd/0x10 [ 29.429199] ? depot_save_stack+0x3b5/0x490 [ 29.433497] ? save_stack+0xa3/0xd0 [ 29.437096] ? save_stack+0x43/0xd0 [ 29.440702] ? kasan_kmalloc+0xad/0xe0 [ 29.444561] ? kmem_cache_alloc_trace+0x136/0x750 [ 29.449375] ? tee_tg_check+0xed/0x280 [ 29.453231] ? xt_check_target+0x22c/0x7d0 [ 29.457435] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 29.462331] ? translate_table+0xed1/0x1610 [ 29.466623] ? do_ipt_set_ctl+0x370/0x5f0 [ 29.470760] ? nf_setsockopt+0x67/0xc0 [ 29.474621] ? ip_setsockopt+0xa1/0xb0 [ 29.478480] ? sctp_setsockopt+0x2a0/0x5de0 [ 29.482773] ? sock_common_setsockopt+0x95/0xd0 [ 29.487410] ? SyS_setsockopt+0x189/0x360 [ 29.491530] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.496434] mutex_lock_nested+0x16/0x20 [ 29.500492] ? print_irqtrace_events+0x270/0x270 [ 29.505216] ? mutex_lock_nested+0x16/0x20 [ 29.509423] rtnl_lock+0x17/0x20 [ 29.512759] register_netdevice_notifier+0xad/0x860 [ 29.517747] ? __dev_close_many+0x330/0x330 [ 29.522039] ? __lock_is_held+0xb6/0x140 [ 29.526075] ? tee_tg_check+0xed/0x280 [ 29.529939] ? rcu_read_lock_sched_held+0x108/0x120 [ 29.534929] ? kmem_cache_alloc_trace+0x456/0x750 [ 29.539765] ? __kernel_text_address+0xd/0x40 [ 29.544251] ? wait_for_completion+0x770/0x770 [ 29.548909] tee_tg_check+0x1a0/0x280 [ 29.552693] ? tee_tg4+0x170/0x170 [ 29.556206] xt_check_target+0x22c/0x7d0 [ 29.560237] ? xt_target_seq_next+0x30/0x30 [ 29.564530] ? save_stack+0xa3/0xd0 [ 29.568125] ? kasan_slab_free+0x71/0xc0 [ 29.572160] ? kfree+0xd6/0x260 [ 29.575407] ? kvfree+0x36/0x60 [ 29.578654] ? translate_table+0xdd2/0x1610 [ 29.582945] ? mutex_unlock+0xd/0x10 [ 29.586627] ? xt_find_target+0x17b/0x1e0 [ 29.590751] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.595477] ? ipt_do_table+0x1950/0x1950 [ 29.599595] ? mark_held_locks+0xaf/0x100 [ 29.603710] ? kfree+0xf0/0x260 [ 29.606974] ? trace_hardirqs_on+0xd/0x10 [ 29.611091] translate_table+0xed1/0x1610 [ 29.615212] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 29.620025] ? kasan_check_write+0x14/0x20 [ 29.624229] ? _copy_from_user+0x99/0x110 [ 29.628346] do_ipt_set_ctl+0x370/0x5f0 [ 29.632290] ? translate_compat_table+0x1b90/0x1b90 [ 29.637279] ? mutex_unlock+0xd/0x10 [ 29.640965] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 29.646211] nf_setsockopt+0x67/0xc0 [ 29.649897] ip_setsockopt+0xa1/0xb0 [ 29.653582] sctp_setsockopt+0x2a0/0x5de0 [ 29.657701] ? __free_insn_slot+0x5c0/0x5c0 [ 29.661990] ? sctp_setsockopt_paddr_thresholds+0x550/0x550 [ 29.667675] ? rcutorture_record_progress+0x10/0x10 [ 29.672664] ? is_bpf_text_address+0xa4/0x120 [ 29.677129] ? __lock_acquire+0x664/0x3e00 [ 29.681334] ? unwind_get_return_address+0x61/0xa0 [ 29.686237] ? __save_stack_trace+0x7e/0xd0 [ 29.690528] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.695686] ? save_stack+0xa3/0xd0 [ 29.699282] ? check_noncircular+0x20/0x20 [ 29.703484] ? kasan_kmalloc+0xad/0xe0 [ 29.707340] ? kasan_slab_alloc+0x12/0x20 [ 29.711466] ? kmem_cache_alloc+0x12e/0x760 [ 29.715761] ? selinux_file_alloc_security+0xae/0x190 [ 29.720923] ? security_file_alloc+0x6d/0xa0 [ 29.725302] ? get_empty_filp+0x189/0x4f0 [ 29.729417] ? alloc_file+0x26/0x390 [ 29.733101] ? sock_alloc_file+0x1f3/0x560 [ 29.737302] ? sock_map_fd+0x34/0x90 [ 29.740999] ? SyS_socket+0x125/0x1d0 [ 29.744768] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.749670] ? kasan_slab_alloc+0x12/0x20 [ 29.753785] ? kmem_cache_alloc+0x12e/0x760 [ 29.758086] ? get_empty_filp+0xfb/0x4f0 [ 29.762125] ? alloc_file+0x26/0x390 [ 29.765809] ? sock_alloc_file+0x1f3/0x560 [ 29.770017] ? find_held_lock+0x35/0x1d0 [ 29.774051] ? avc_has_perm+0x35e/0x680 [ 29.777994] ? lock_downgrade+0x980/0x980 [ 29.782113] ? debug_mutex_init+0x1c/0x60 [ 29.786231] ? lock_release+0xa40/0xa40 [ 29.790175] ? __lockdep_init_map+0xe4/0x650 [ 29.794553] ? check_noncircular+0x20/0x20 [ 29.798759] ? avc_has_perm+0x43e/0x680 [ 29.802704] ? avc_has_perm_noaudit+0x520/0x520 [ 29.807344] ? __fd_install+0x25f/0x740 [ 29.811288] ? lock_downgrade+0x980/0x980 [ 29.815408] ? __lock_is_held+0xb6/0x140 [ 29.819443] ? sock_has_perm+0x2a4/0x420 [ 29.823472] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 29.828810] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 29.834493] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 29.839739] ? alloc_file+0x27e/0x390 [ 29.843514] sock_common_setsockopt+0x95/0xd0 [ 29.847981] SyS_setsockopt+0x189/0x360 [ 29.851926] ? SyS_recv+0x40/0x40 [ 29.855352] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 29.860164] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 29.865151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 29.869877] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.874601] RIP: 0033:0x4