[....] Starting enhanced syslogd: rsyslogd[   17.353603] audit: type=1400 audit(1519638753.636:5): avc:  denied  { syslog } for  pid=4089 comm="rsyslogd" capability=34  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
Starting mcstransd: 
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   23.429793] audit: type=1400 audit(1519638759.712:6): avc:  denied  { map } for  pid=4229 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1
Warning: Permanently added '10.128.0.58' (ECDSA) to the list of known hosts.
executing program
[   29.747804] audit: type=1400 audit(1519638766.030:7): avc:  denied  { map } for  pid=4243 comm="syzkaller923784" path="/root/syzkaller923784171" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1
[   29.750248] 
[   29.773690] audit: type=1400 audit(1519638766.030:8): avc:  denied  { map } for  pid=4243 comm="syzkaller923784" path="/dev/ashmem" dev="devtmpfs" ino=9417 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1
[   29.775275] ======================================================
[   29.775276] WARNING: possible circular locking dependency detected
[   29.775280] 4.16.0-rc2+ #329 Not tainted
[   29.775281] ------------------------------------------------------
[   29.775283] syzkaller923784/4243 is trying to acquire lock:
[   29.775284]  (&mm->mmap_sem){++++}, at: [<0000000074c86253>] __might_fault+0xe0/0x1d0
[   29.775302] 
[   29.775302] but task is already holding lock:
[   29.842391]  (ashmem_mutex){+.+.}, at: [<0000000024db7f7c>] ashmem_ioctl+0x3db/0x11b0
[   29.850331] 
[   29.850331] which lock already depends on the new lock.
[   29.850331] 
[   29.858610] 
[   29.858610] the existing dependency chain (in reverse order) is:
[   29.866195] 
[   29.866195] -> #1 (ashmem_mutex){+.+.}:
[   29.871618]        __mutex_lock+0x16f/0x1a80
[   29.876003]        mutex_lock_nested+0x16/0x20
[   29.880550]        ashmem_mmap+0x53/0x410
[   29.884663]        mmap_region+0xa99/0x15a0
[   29.888950]        do_mmap+0x6c0/0xe00
[   29.892805]        vm_mmap_pgoff+0x1de/0x280
[   29.897183]        SyS_mmap_pgoff+0x462/0x5f0
[   29.901647]        SyS_mmap+0x16/0x20
[   29.905416]        do_syscall_64+0x280/0x940
[   29.909789]        entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   29.915461] 
[   29.915461] -> #0 (&mm->mmap_sem){++++}:
[   29.920974]        lock_acquire+0x1d5/0x580
[   29.925263]        __might_fault+0x13a/0x1d0
[   29.929638]        _copy_from_user+0x2c/0x110
[   29.934101]        ashmem_ioctl+0x438/0x11b0
[   29.938474]        do_vfs_ioctl+0x1b1/0x1520
[   29.942864]        SyS_ioctl+0x8f/0xc0
[   29.946720]        do_syscall_64+0x280/0x940
[   29.951094]        entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   29.956765] 
[   29.956765] other info that might help us debug this:
[   29.956765] 
[   29.964871]  Possible unsafe locking scenario:
[   29.964871] 
[   29.970893]        CPU0                    CPU1
[   29.975526]        ----                    ----
[   29.980157]   lock(ashmem_mutex);
[   29.983576]                                lock(&mm->mmap_sem);
[   29.989598]                                lock(ashmem_mutex);
[   29.995535]   lock(&mm->mmap_sem);
[   29.999051] 
[   29.999051]  *** DEADLOCK ***
[   29.999051] 
[   30.005079] 1 lock held by syzkaller923784/4243:
[   30.009799]  #0:  (ashmem_mutex){+.+.}, at: [<0000000024db7f7c>] ashmem_ioctl+0x3db/0x11b0
[   30.018176] 
[   30.018176] stack backtrace:
[   30.022640] CPU: 1 PID: 4243 Comm: syzkaller923784 Not tainted 4.16.0-rc2+ #329
[   30.030052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   30.039371] Call Trace:
[   30.041927]  dump_stack+0x194/0x24d
[   30.045522]  ? arch_local_irq_restore+0x53/0x53
[   30.050160]  print_circular_bug.isra.38+0x2cd/0x2dc
[   30.055142]  ? save_trace+0xe0/0x2b0
[   30.058822]  __lock_acquire+0x30a8/0x3e00
[   30.062936]  ? ashmem_ioctl+0x3db/0x11b0
[   30.066966]  ? debug_check_no_locks_freed+0x3c0/0x3c0
[   30.072132]  ? __might_sleep+0x95/0x190
[   30.076074]  ? ashmem_ioctl+0x3db/0x11b0
[   30.080102]  ? __mutex_lock+0x16f/0x1a80
[   30.084130]  ? ashmem_ioctl+0x3db/0x11b0
[   30.088160]  ? proc_nr_files+0x60/0x60
[   30.092015]  ? ashmem_ioctl+0x3db/0x11b0
[   30.096042]  ? find_held_lock+0x35/0x1d0
[   30.100071]  ? mutex_lock_io_nested+0x1900/0x1900
[   30.104880]  ? lock_downgrade+0x980/0x980
[   30.108995]  ? __mutex_unlock_slowpath+0xe9/0xac0
[   30.113807]  ? find_held_lock+0x35/0x1d0
[   30.117834]  ? lock_downgrade+0x980/0x980
[   30.121949]  ? vma_set_page_prot+0x16b/0x230
[   30.126324]  lock_acquire+0x1d5/0x580
[   30.130094]  ? lock_acquire+0x1d5/0x580
[   30.134034]  ? __might_fault+0xe0/0x1d0
[   30.137976]  ? lock_release+0xa40/0xa40
[   30.141921]  ? trace_event_raw_event_sched_switch+0x810/0x810
[   30.147774]  ? __might_sleep+0x95/0x190
[   30.151713]  __might_fault+0x13a/0x1d0
[   30.155566]  ? __might_fault+0xe0/0x1d0
[   30.159508]  _copy_from_user+0x2c/0x110
[   30.163447]  ashmem_ioctl+0x438/0x11b0
[   30.167302]  ? ashmem_release+0x190/0x190
[   30.171419]  ? trace_event_raw_event_sched_switch+0x810/0x810
[   30.177272]  ? down_read_killable+0x180/0x180
[   30.181734]  ? rcu_note_context_switch+0x710/0x710
[   30.186629]  ? ashmem_release+0x190/0x190
[   30.190742]  do_vfs_ioctl+0x1b1/0x1520
[   30.194597]  ? ioctl_preallocate+0x2b0/0x2b0
[   30.198975]  ? selinux_capable+0x40/0x40
[   30.203004]  ? putname+0xf3/0x130
[   30.206422]  ? fput+0xd2/0x140
[   30.209583]  ? SyS_mmap_pgoff+0x243/0x5f0
[   30.213700]  ? security_file_ioctl+0x7d/0xb0
[   30.218072]  ? security_file_ioctl+0x89/0xb0
[   30.222448]  SyS_ioctl+0x8f/0xc0
[   30.225781]  ? do_vfs_ioctl+0x1520/0x1520
[   30.229896]  do_syscall_64+0x280/0x940
[   30.233749]  ? __do_page_fault+0xc90/0xc90
[   30.237948]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[   30.242671]  ? syscall_return_slowpath+0x550/0x550
[   30.247567]  ? syscall_return_slowpath+0x2ac/0x550
[   30.252464]  ? prepare_exit_to_usermode+0x350/0x350
[   30.257449]  ? entry_SYSCALL_64_after_hwframe+0x52/0xb7
[   30.262779]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[   30.267590]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[   30.272743] RIP: 0033:0x43fd19
[   30.275903] RSP: 002b:00007ffe04d2fda8 EFLAGS: 00000217 ORIG_RAX: 0000000000000010
[   30.283575] RAX: ffffffffffffffda RBX: 00000000004002c8 RCX: 000000000043fd19
[   30.290809] RDX: 0000000000000000 RSI: 0000000000007709 RDI: 0000000000000003
[   30.298046] RBP: 000000