[....] Starting enhanced syslogd: rsyslogd[ 16.579751] audit: type=1400 audit(1517397642.496:5): avc: denied { syslog } for pid=4034 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.856837] audit: type=1400 audit(1517397648.773:6): avc: denied { map } for pid=4175 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.15.192' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 29.170773] audit: type=1400 audit(1517397655.087:7): avc: denied { map } for pid=4189 comm="syzkaller374529" path="/root/syzkaller374529467" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 RTNETLINK answers: Operation not supported RTNETLINK answers: No buffer space available RTNETLINK answers: Operation not supported [ 29.571346] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Operation not supported RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument RTNETLINK answers: Invalid argument executing program [ 29.930462] [ 29.932106] ====================================================== [ 29.938395] WARNING: possible circular locking dependency detected [ 29.944687] 4.15.0-rc9+ #217 Not tainted [ 29.948716] ------------------------------------------------------ [ 29.955004] syzkaller374529/4189 is trying to acquire lock: [ 29.960686] (rtnl_mutex){+.+.}, at: [<000000004cda6a5a>] rtnl_lock+0x17/0x20 [ 29.967941] [ 29.967941] but task is already holding lock: [ 29.973889] (sk_lock-AF_INET){+.+.}, at: [<00000000b9ed9aa0>] ip_setsockopt+0x8c/0xb0 [ 29.981923] [ 29.981923] which lock already depends on the new lock. [ 29.981923] [ 29.990206] [ 29.990206] the existing dependency chain (in reverse order) is: [ 29.997794] [ 29.997794] -> #1 (sk_lock-AF_INET){+.+.}: [ 30.003602] lock_sock_nested+0xc2/0x110 [ 30.008161] do_ip_getsockopt+0x1b3/0x2170 [ 30.012894] ip_getsockopt+0x90/0x220 [ 30.017186] udp_getsockopt+0x45/0x80 [ 30.021480] sock_common_getsockopt+0x95/0xd0 [ 30.026476] SyS_getsockopt+0x178/0x340 [ 30.030951] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.036195] [ 30.036195] -> #0 (rtnl_mutex){+.+.}: [ 30.041452] lock_acquire+0x1d5/0x580 [ 30.045742] __mutex_lock+0x16f/0x1a80 [ 30.050123] mutex_lock_nested+0x16/0x20 [ 30.054680] rtnl_lock+0x17/0x20 [ 30.058538] register_netdevice_notifier+0xad/0x860 [ 30.064055] tee_tg_check+0x1a0/0x280 [ 30.068355] xt_check_target+0x22c/0x7d0 [ 30.072909] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.078155] translate_table+0xed1/0x1610 [ 30.082793] do_ipt_set_ctl+0x370/0x5f0 [ 30.087258] nf_setsockopt+0x67/0xc0 [ 30.091463] ip_setsockopt+0xa1/0xb0 [ 30.095674] raw_setsockopt+0xb7/0xd0 [ 30.099966] sock_common_setsockopt+0x95/0xd0 [ 30.104952] SyS_setsockopt+0x189/0x360 [ 30.109418] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.114663] [ 30.114663] other info that might help us debug this: [ 30.114663] [ 30.122774] Possible unsafe locking scenario: [ 30.122774] [ 30.128801] CPU0 CPU1 [ 30.133438] ---- ---- [ 30.138074] lock(sk_lock-AF_INET); [ 30.141758] lock(rtnl_mutex); [ 30.147527] lock(sk_lock-AF_INET); [ 30.153727] lock(rtnl_mutex); [ 30.156987] [ 30.156987] *** DEADLOCK *** [ 30.156987] [ 30.163020] 1 lock held by syzkaller374529/4189: [ 30.167755] #0: (sk_lock-AF_INET){+.+.}, at: [<00000000b9ed9aa0>] ip_setsockopt+0x8c/0xb0 [ 30.176312] [ 30.176312] stack backtrace: [ 30.180780] CPU: 0 PID: 4189 Comm: syzkaller374529 Not tainted 4.15.0-rc9+ #217 [ 30.188196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.197524] Call Trace: [ 30.200088] dump_stack+0x194/0x257 [ 30.203689] ? arch_local_irq_restore+0x53/0x53 [ 30.208332] print_circular_bug.isra.37+0x2cd/0x2dc [ 30.213318] ? save_trace+0xe0/0x2b0 [ 30.217003] __lock_acquire+0x30a8/0x3e00 [ 30.221128] ? print_irqtrace_events+0x270/0x270 [ 30.225858] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.231021] ? check_noncircular+0x20/0x20 [ 30.235233] ? print_irqtrace_events+0x270/0x270 [ 30.239960] ? __lock_acquire+0x664/0x3e00 [ 30.244171] ? __debug_object_init+0x235/0x1040 [ 30.248814] ? lock_downgrade+0x980/0x980 [ 30.252933] ? print_irqtrace_events+0x270/0x270 [ 30.257662] ? __lock_acquire+0x664/0x3e00 [ 30.261869] ? debug_object_activate+0x307/0x730 [ 30.266597] ? check_noncircular+0x20/0x20 [ 30.270804] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.275968] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 30.281130] lock_acquire+0x1d5/0x580 [ 30.284903] ? lock_acquire+0x1d5/0x580 [ 30.288850] ? rtnl_lock+0x17/0x20 [ 30.292363] ? lock_release+0xa40/0xa40 [ 30.296309] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 30.302169] ? rcu_note_context_switch+0x710/0x710 [ 30.307072] ? __might_sleep+0x95/0x190 [ 30.311028] ? rtnl_lock+0x17/0x20 [ 30.314545] __mutex_lock+0x16f/0x1a80 [ 30.318409] ? rtnl_lock+0x17/0x20 [ 30.321922] ? lock_downgrade+0x980/0x980 [ 30.326049] ? rtnl_lock+0x17/0x20 [ 30.329565] ? mutex_lock_io_nested+0x1900/0x1900 [ 30.334388] ? is_bpf_text_address+0x7b/0x120 [ 30.338860] ? print_irqtrace_events+0x270/0x270 [ 30.343607] ? depot_save_stack+0x3b5/0x490 [ 30.347903] ? lock_downgrade+0x980/0x980 [ 30.352036] ? lock_release+0xa40/0xa40 [ 30.355993] ? mark_held_locks+0xaf/0x100 [ 30.360122] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 30.365207] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.370203] ? trace_hardirqs_on+0xd/0x10 [ 30.374331] ? depot_save_stack+0x3b5/0x490 [ 30.378629] ? save_stack+0xa3/0xd0 [ 30.382226] ? save_stack+0x43/0xd0 [ 30.385826] ? kasan_kmalloc+0xad/0xe0 [ 30.389685] ? kmem_cache_alloc_trace+0x136/0x750 [ 30.394499] ? tee_tg_check+0xed/0x280 [ 30.398357] ? xt_check_target+0x22c/0x7d0 [ 30.402572] ? find_check_entry.isra.8+0x8c8/0xcb0 [ 30.407474] ? translate_table+0xed1/0x1610 [ 30.411765] ? do_ipt_set_ctl+0x370/0x5f0 [ 30.415885] ? nf_setsockopt+0x67/0xc0 [ 30.419755] ? ip_setsockopt+0xa1/0xb0 [ 30.423622] ? raw_setsockopt+0xb7/0xd0 [ 30.427577] ? sock_common_setsockopt+0x95/0xd0 [ 30.432219] ? SyS_setsockopt+0x189/0x360 [ 30.436341] ? entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.441244] mutex_lock_nested+0x16/0x20 [ 30.445277] ? mutex_lock_nested+0x16/0x20 [ 30.449487] rtnl_lock+0x17/0x20 [ 30.452826] register_netdevice_notifier+0xad/0x860 [ 30.457824] ? __dev_close_many+0x350/0x350 [ 30.462119] ? __lock_is_held+0xb6/0x140 [ 30.466175] ? tee_tg_check+0xed/0x280 [ 30.470036] ? rcu_read_lock_sched_held+0x108/0x120 [ 30.475033] ? kmem_cache_alloc_trace+0x456/0x750 [ 30.479852] ? __kernel_text_address+0xd/0x40 [ 30.484320] ? wait_for_completion+0x770/0x770 [ 30.488873] tee_tg_check+0x1a0/0x280 [ 30.492646] ? tee_tg4+0x170/0x170 [ 30.496160] xt_check_target+0x22c/0x7d0 [ 30.500193] ? xt_target_seq_next+0x30/0x30 [ 30.504484] ? save_stack+0xa3/0xd0 [ 30.508092] ? kasan_slab_free+0x71/0xc0 [ 30.512125] ? kfree+0xd6/0x260 [ 30.515376] ? kvfree+0x36/0x60 [ 30.518629] ? mutex_unlock+0xd/0x10 [ 30.522325] ? xt_find_target+0x17b/0x1e0 [ 30.526448] find_check_entry.isra.8+0x8c8/0xcb0 [ 30.531188] ? ipt_do_table+0x1860/0x1860 [ 30.535314] ? mark_held_locks+0xaf/0x100 [ 30.539434] ? kfree+0xf0/0x260 [ 30.542686] ? trace_hardirqs_on+0xd/0x10 [ 30.546806] translate_table+0xed1/0x1610 [ 30.550930] ? alloc_counters.isra.11+0x7d0/0x7d0 [ 30.555750] ? kasan_check_write+0x14/0x20 [ 30.559956] ? _copy_from_user+0x99/0x110 [ 30.564079] do_ipt_set_ctl+0x370/0x5f0 [ 30.568034] ? translate_compat_table+0x1b90/0x1b90 [ 30.573031] ? mutex_unlock+0xd/0x10 [ 30.576718] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 30.581966] nf_setsockopt+0x67/0xc0 [ 30.585651] ip_setsockopt+0xa1/0xb0 [ 30.589347] raw_setsockopt+0xb7/0xd0 [ 30.593121] sock_common_setsockopt+0x95/0xd0 [ 30.597589] SyS_setsockopt+0x189/0x360 [ 30.601535] ? SyS_recv+0x40/0x40 [ 30.604960] ? entry_SYSCALL_64_fastpath+0x5/0xa0 [ 30.609777] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 30.614768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 30.619495] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 30.624229] RIP: 0033:0x445a19 [ 30.627390] RSP: 002b:00007ffc6bc2d818 EFLAGS: 00000203 ORIG_RAX: 00000