[....] Starting enhanced syslogd: rsyslogd[ 16.557066] audit: type=1400 audit(1517338957.723:5): avc: denied { syslog } for pid=4005 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.396646] audit: type=1400 audit(1517338963.563:6): avc: denied { map } for pid=4145 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.33' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 28.927166] audit: type=1400 audit(1517338970.093:7): avc: denied { map } for pid=4159 comm="syzkaller909082" path="/root/syzkaller909082209" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 29.312807] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 29.647671] [ 29.649317] ====================================================== [ 29.655600] WARNING: possible circular locking dependency detected [ 29.661892] 4.15.0+ #286 Not tainted [ 29.665572] ------------------------------------------------------ [ 29.671855] syzkaller909082/4159 is trying to acquire lock: [ 29.677532] (rtnl_mutex){+.+.}, at: [<000000004aa4e729>] rtnl_lock+0x17/0x20 [ 29.684784] [ 29.684784] but task is already holding lock: [ 29.690721] (sk_lock-AF_INET){+.+.}, at: [<000000008ac1ac8e>] ip_setsockopt+0x8c/0xb0 [ 29.698750] [ 29.698750] which lock already depends on the new lock. [ 29.698750] [ 29.707038] [ 29.707038] the existing dependency chain (in reverse order) is: [ 29.714628] [ 29.714628] -> #1 (sk_lock-AF_INET){+.+.}: [ 29.720318] lock_sock_nested+0xc2/0x110 [ 29.724882] do_ip_getsockopt+0x1b3/0x2170 [ 29.729607] ip_getsockopt+0x90/0x220 [ 29.733897] udp_getsockopt+0x45/0x80 [ 29.738204] sock_common_getsockopt+0x95/0xd0 [ 29.743189] SyS_getsockopt+0x178/0x340 [ 29.747653] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.752894] [ 29.752894] -> #0 (rtnl_mutex){+.+.}: [ 29.758145] lock_acquire+0x1d5/0x580 [ 29.762434] __mutex_lock+0x16f/0x1a80 [ 29.767259] mutex_lock_nested+0x16/0x20 [ 29.771809] rtnl_lock+0x17/0x20 [ 29.775663] register_netdevice_notifier+0xad/0x860 [ 29.781169] tee_tg_check+0x1a0/0x280 [ 29.785455] xt_check_target+0x22c/0x7d0 [ 29.790009] find_check_entry.isra.8+0x8c8/0xcb0 [ 29.795264] translate_table+0xed1/0x1610 [ 29.799899] do_ipt_set_ctl+0x370/0x5f0 [ 29.804360] nf_setsockopt+0x67/0xc0 [ 29.808564] ip_setsockopt+0xa1/0xb0 [ 29.812766] raw_setsockopt+0xb7/0xd0 [ 29.817057] sock_common_setsockopt+0x95/0xd0 [ 29.822043] SyS_setsockopt+0x189/0x360 [ 29.826512] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 29.831754] [ 29.831754] other info that might help us debug this: [ 29.831754] [ 29.839863] Possible unsafe locking scenario: [ 29.839863] [ 29.845886] CPU0 CPU1 [ 29.850520] ---- ---- [ 29.855154] lock(sk_lock-AF_INET); [ 29.858846] lock(rtnl_mutex); [ 29.864608] lock(sk_lock-AF_INET); [ 29.870813] lock(rtnl_mutex); [ 29.874068] [ 29.874068] *** DEADLOCK *** [ 29.874068] [ 29.880097] 1 lock held by syzkaller909082/4159: [ 29.884818] #0: (sk_lock-AF_INET){+.+.}, at: [<000000008ac1ac8e>] ip_setsockopt+0x8c/0xb0 [ 29.893286] [ 29.893286] stack backtrace: [ 29.897752] CPU: 0 PID: 4159 Comm: syzkaller909082 Not tainted 4.15.0+ #286 [ 29.904816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.914137] Call Trace: [ 29.916700] dump_stack+0x194/0x257 [ 29.920298] ? arch_local_irq_restore+0x53/0x53 [ 29.924940] print_circular_bug.isra.37+0x2cd/0x2dc [ 29.929923] ? save_trace+0xe0/0x2b0 [ 29.933610] __lock_acquire+0x30a8/0x3e00 [ 29.937812] ? print_irqtrace_events+0x270/0x270 [ 29.942541] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.947699] ? print_irqtrace_events+0x270/0x270 [ 29.952423] ? __lock_acquire+0x664/0x3e00 [ 29.956627] ? rcutorture_record_progress+0x10/0x10 [ 29.961616] ? print_irqtrace_events+0x270/0x270 [ 29.966341] ? __lock_acquire+0x664/0x3e00 [ 29.970546] ? __save_stack_trace+0x7e/0xd0 [ 29.974839] ? add_lock_to_list.isra.28+0x24d/0x352 [ 29.979827] ? check_noncircular+0x20/0x20 [ 29.984035] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.989204] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 29.994365] lock_acquire+0x1d5/0x580 [ 29.998136] ? lock_acquire+0x1d5/0x580 [ 30.002078] ? rtnl_lock+0x17/0x20 [ 30.005589] ? lock_release+0xa40/0xa40 [ 30.009537] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.015403] ? rcu_note_context_switch+0x710/0x710 [ 30.020305] ? __might_sleep+0x95/0x190 [ 30.024250] ? rtnl_lock+0x17/0x20 [ 30.027758] __mutex_lock+0x16f/0x1a80 [ 30.031614] ? rtnl_lock+0x17/0x20 [ 30.035120] ? lock_downgrade+0x980/0x980 [ 30.039236] ? rtnl_lock+0x17/0x20 [ 30.042745] ? mutex_lock_io_nested+0x1900/0x1900 [ 30.047565] ? is_bpf_text_address+0x7b/0x120 [ 30.052032] ? print_irqtrace_events+0x270/0x270 [ 30.056761] ? depot_save_stack+0x3b5/0x490 [ 30.061051] ? lock_downgrade+0x980/0x980 [ 30.065171] ? lock_release+0xa40/0xa40 [ 30.069114] ? mark_held_locks+0xaf/0x100 [ 30.073230] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 30.078302] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.083286] ? trace_hardirqs_on+0xd/0x10 [ 30.087406] ? depot_save_stack+0x3b5/0x490 [ 30.091697] ? save_stack+0xa3/0xd0 [ 30.095292] ? save_stack+0x43/0xd0 [ 30.098886] ? kasan_kmalloc+0xad/0xe0 [ 30.102741] ? kmem_cache_alloc_trace+0x136/0x750 [ 30.107552] ? tee_tg_check+0xed/0x280 [ 30.111407] ? xt_check_target+0x22c/0x7d0 [ 30.115617] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 30.120511] ? translate_table+0xed1/0x1610 [ 30.124800] ? do_ipt_set_ctl+0x370/0x5f0 [ 30.128916] ? nf_setsockopt+0x67/0xc0 [ 30.132773] ? ip_setsockopt+0xa1/0xb0 [ 30.136631] ? raw_setsockopt+0xb7/0xd0 [ 30.140579] ? sock_common_setsockopt+0x95/0xd0 [ 30.145220] ? SyS_setsockopt+0x189/0x360 [ 30.149431] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.154331] mutex_lock_nested+0x16/0x20 [ 30.158362] ? mutex_lock_nested+0x16/0x20 [ 30.162567] rtnl_lock+0x17/0x20 [ 30.165905] register_netdevice_notifier+0xad/0x860 [ 30.170898] ? __dev_close_many+0x330/0x330 [ 30.175192] ? __lock_is_held+0xb6/0x140 [ 30.179223] ? tee_tg_check+0xed/0x280 [ 30.183084] ? rcu_read_lock_sched_held+0x108/0x120 [ 30.188912] ? kmem_cache_alloc_trace+0x456/0x750 [ 30.193727] ? __kernel_text_address+0xd/0x40 [ 30.198194] ? wait_for_completion+0x770/0x770 [ 30.202747] tee_tg_check+0x1a0/0x280 [ 30.206514] ? tee_tg4+0x170/0x170 [ 30.210029] xt_check_target+0x22c/0x7d0 [ 30.214065] ? xt_target_seq_next+0x30/0x30 [ 30.218363] ? save_stack+0xa3/0xd0 [ 30.221959] ? kasan_slab_free+0x71/0xc0 [ 30.225989] ? kfree+0xd6/0x260 [ 30.229240] ? kvfree+0x36/0x60 [ 30.232495] ? mutex_unlock+0xd/0x10 [ 30.236178] ? xt_find_target+0x17b/0x1e0 [ 30.240302] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.245034] ? ipt_do_table+0x1860/0x1860 [ 30.249162] ? mark_held_locks+0xaf/0x100 [ 30.253280] ? kfree+0xf0/0x260 [ 30.256531] ? trace_hardirqs_on+0xd/0x10 [ 30.260668] translate_table+0xed1/0x1610 [ 30.264788] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 30.269602] ? kasan_check_write+0x14/0x20 [ 30.273805] ? _copy_from_user+0x99/0x110 [ 30.277924] do_ipt_set_ctl+0x370/0x5f0 [ 30.281867] ? translate_compat_table+0x1b90/0x1b90 [ 30.286856] ? mutex_unlock+0xd/0x10 [ 30.290540] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 30.295792] nf_setsockopt+0x67/0xc0 [ 30.299480] ip_setsockopt+0xa1/0xb0 [ 30.303173] raw_setsockopt+0xb7/0xd0 [ 30.306952] sock_common_setsockopt+0x95/0xd0 [ 30.311415] SyS_setsockopt+0x189/0x360 [ 30.315357] ? SyS_recv+0x40/0x40 [ 30.318782] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 30.323615] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.328605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.333336] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.338064] RIP: 0033:0x445b09 [ 30.341222] RSP: 002b:00007ffd327cf408 EFLAGS: 00000203 ORIG_RAX: 0000000000000036 [ 30.348909] RAX: