[....] Starting enhanced syslogd: rsyslogd[ 12.006783] audit: type=1400 audit(1514679877.367:5): avc: denied { syslog } for pid=3041 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 16.564574] audit: type=1400 audit(1514679881.925:6): avc: denied { map } for pid=3180 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.13' (ECDSA) to the list of known hosts. net.ipv6.conf.syz0.accept_dad = 0 net.ipv6.conf.syz0.router_solicitations = 0 [ 22.765875] audit: type=1400 audit(1514679888.126:7): avc: denied { map } for pid=3194 comm="syzkaller021477" path="/root/syzkaller021477969" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 22.883889] [ 22.883990] audit: type=1400 audit(1514679888.242:8): avc: denied { create } for pid=3194 comm="syzkaller021477" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 22.884041] audit: type=1400 audit(1514679888.244:9): avc: denied { write } for pid=3194 comm="syzkaller021477" path="socket:[11143]" dev="sockfs" ino=11143 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 22.937446] ============================= [ 22.941618] WARNING: suspicious RCU usage [ 22.945779] 4.15.0-rc5+ #152 Not tainted [ 22.949858] ----------------------------- [ 22.954032] net/tipc/bearer.c:177 suspicious rcu_dereference_protected() usage! [ 22.961496] [ 22.961496] other info that might help us debug this: [ 22.961496] [ 22.969644] [ 22.969644] rcu_scheduler_active = 2, debug_locks = 1 [ 22.976325] 2 locks held by syzkaller021477/3194: [ 22.981178] #0: (cb_lock){++++}, at: [<00000000d20133ea>] genl_rcv+0x19/0x40 [ 22.988561] #1: (genl_mutex){+.+.}, at: [<00000000fcc5d1bc>] genl_rcv_msg+0x115/0x140 [ 22.996941] [ 22.996941] stack backtrace: [ 23.001450] CPU: 1 PID: 3194 Comm: syzkaller021477 Not tainted 4.15.0-rc5+ #152 [ 23.008881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 23.018217] Call Trace: [ 23.020791] dump_stack+0x194/0x257 [ 23.024394] ? arch_local_irq_restore+0x53/0x53 [ 23.029067] lockdep_rcu_suspicious+0x123/0x170 [ 23.033719] tipc_bearer_find+0x2b4/0x3b0 [ 23.037836] ? tipc_media_addr_printf+0x3a0/0x3a0 [ 23.042658] tipc_nl_compat_link_set+0x329/0x9f0 [ 23.047401] tipc_nl_compat_doit+0x15b/0x660 [ 23.051794] ? security_capable+0x8e/0xc0 [ 23.055921] ? tipc_nl_compat_link_stat_dump+0x3000/0x3000 [ 23.061539] ? ns_capable_common+0xcf/0x160 [ 23.065838] ? ns_capable+0x22/0x30 [ 23.069452] ? __netlink_ns_capable+0xe1/0x120 [ 23.074026] tipc_nl_compat_recv+0x112f/0x18f0 [ 23.078585] ? tipc_nl_compat_doit+0x660/0x660 [ 23.083144] ? tipc_nl_node_dump+0x1280/0x1280 [ 23.087704] ? tipc_nl_compat_bearer_enable+0x5c0/0x5c0 [ 23.093048] ? trace_hardirqs_on+0xd/0x10 [ 23.097193] genl_family_rcv_msg+0x7b7/0xfb0 [ 23.101577] ? genl_rcv+0x40/0x40 [ 23.105008] ? lock_downgrade+0x980/0x980 [ 23.109140] ? lock_acquire+0x1d5/0x580 [ 23.113099] genl_rcv_msg+0xb2/0x140 [ 23.116786] netlink_rcv_skb+0x21e/0x460 [ 23.120822] ? genl_family_rcv_msg+0xfb0/0xfb0 [ 23.125373] ? netlink_ack+0xa10/0xa10 [ 23.129228] ? genl_rcv+0x19/0x40 [ 23.132660] ? netlink_skb_destructor+0x1d0/0x1d0 [ 23.137479] ? selinux_nlmsg_lookup+0x32b/0x430 [ 23.142121] genl_rcv+0x28/0x40 [ 23.145371] netlink_unicast+0x4e8/0x6f0 [ 23.149417] ? netlink_attachskb+0x8a0/0x8a0 [ 23.153801] ? security_netlink_send+0x81/0xb0 [ 23.158363] netlink_sendmsg+0xa4a/0xe60 [ 23.162400] ? netlink_unicast+0x6f0/0x6f0 [ 23.166617] ? security_socket_sendmsg+0x89/0xb0 [ 23.171341] ? netlink_unicast+0x6f0/0x6f0 [ 23.175555] sock_sendmsg+0xca/0x110 [ 23.179347] sock_write_iter+0x31a/0x5d0 [ 23.183382] ? sock_sendmsg+0x110/0x110 [ 23.187339] ? iov_iter_init+0xaf/0x1d0 [ 23.191288] __vfs_write+0x684/0x970 [ 23.194980] ? kernel_read+0x120/0x120 [ 23.198843] ? bpf_fd_pass+0x280/0x280 [ 23.202705] ? _cond_resched+0x14/0x30 [ 23.206565] ? selinux_file_permission+0x82/0x460 [ 23.211386] ? rw_verify_area+0xe5/0x2b0 [ 23.215414] ? __fdget_raw+0x20/0x20 [ 23.219098] vfs_write+0x189/0x510 [ 23.222614] SyS_write+0xef/0x220 [ 23.226037] ? __do_page_fault+0x3d6/0xc90 [ 23.230244] ? SyS_read+0x220/0x220 [ 23.233843] ? do_fast_syscall_32+0x156/0xf9d [ 23.238309] ? SyS_read+0x220/0x220 [ 23.241914] do_fast_syscall_32+0x3ee/0xf9d [ 23.246212] ? do_int80_syscall_32+0x9d0/0x9d0 [ 23.250771] ? kasan_check_read+0x11/0x20 [ 23.254889] ? syscall_return_slowpath+0x550/0x550 [ 23.259789] ? SyS_rt_sigaction+0x94/0x1b0 [ 23.263994] ? SyS_sigprocmask+0x4b0/0x4b0 [ 23.268204] ? SyS_read+0x184/0x220 [ 23.271808] ? retint_user+0x18/0x18 [ 23.275500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 23.280319] entry_SYSENTER_compat+0x54/0x63 [ 23.28470