audit: type=1400 audit(1516820876.601:6239): avc: denied { dac_read_search } for pid=25337 comm="syz-executor2" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 =============================== [ INFO: suspicious RCU usage. ] 4.9.78-ge9dabe6 #19 Not tainted ------------------------------- kernel/rcu/tree_plugin.h:672 Illegal synchronize_rcu() in RCU read-side critical section! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 0 2 locks held by syz-executor0/25350: #0: (rcu_read_lock){......}, at: [] INIT_LIST_HEAD include/linux/list.h:28 [inline] #0: (rcu_read_lock){......}, at: [] avc_compute_av+0xad/0x640 security/selinux/avc.c:975 #1: (rcu_callback){......}, at: [] __rcu_reclaim kernel/rcu/rcu.h:108 [inline] #1: (rcu_callback){......}, at: [] rcu_do_batch kernel/rcu/tree.c:2789 [inline] #1: (rcu_callback){......}, at: [] invoke_rcu_callbacks kernel/rcu/tree.c:3053 [inline] #1: (rcu_callback){......}, at: [] __rcu_process_callbacks kernel/rcu/tree.c:3020 [inline] #1: (rcu_callback){......}, at: [] rcu_process_callbacks+0x977/0x1300 kernel/rcu/tree.c:3037 stack backtrace: CPU: 0 PID: 25350 Comm: syz-executor0 Not tainted 4.9.78-ge9dabe6 #19 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ffff8801db207d50 ffffffff81d943a9 ffff8801c1b79800 0000000000000000 0000000000000002 ffffffff83a6d440 ffff8801c6a9a658 ffff8801db207d80 ffffffff81238329 ffff8801c6a9a500 ffff8801cb510848 ffff8801cb510048 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x128 lib/dump_stack.c:51 [] lockdep_rcu_suspicious+0x139/0x180 kernel/locking/lockdep.c:4455 [] synchronize_rcu+0x68/0x90 kernel/rcu/tree_plugin.h:669 [] __l2tp_session_unhash+0x3d5/0x550 net/l2tp/l2tp_core.c:1792 [] l2tp_tunnel_closeall+0x1e7/0x3a0 net/l2tp/l2tp_core.c:1364 [] l2tp_tunnel_destruct+0x30e/0x5a0 net/l2tp/l2tp_core.c:1324 [] __sk_destruct+0x53/0x570 net/core/sock.c:1428 [] __rcu_reclaim kernel/rcu/rcu.h:118 [inline] [] rcu_do_batch kernel/rcu/tree.c:2789 [inline] [] invoke_rcu_callbacks kernel/rcu/tree.c:3053 [inline] [] __rcu_process_callbacks kernel/rcu/tree.c:3020 [inline] [] rcu_process_callbacks+0x898/0x1300 kernel/rcu/tree.c:3037 [] __do_softirq+0x206/0x951 kernel/softirq.c:284 [] invoke_softirq kernel/softirq.c:364 [inline] [] irq_exit+0x165/0x190 kernel/softirq.c:405 [] exiting_irq arch/x86/include/asm/apic.h:659 [inline] [] smp_apic_timer_interrupt+0x7b/0xa0 arch/x86/kernel/apic/apic.c:960 [] apic_timer_interrupt+0xa0/0xb0 arch/x86/entry/entry_64.S:752 [] spin_unlock_irqrestore include/linux/spinlock.h:362 [inline] [] avc_reclaim_node security/selinux/avc.c:543 [inline] [] avc_alloc_node+0x27a/0x3e0 security/selinux/avc.c:561 [] avc_insert security/selinux/avc.c:672 [inline] [] avc_compute_av+0x182/0x640 security/selinux/avc.c:978 [] avc_has_extended_perms+0x481/0xf10 security/selinux/avc.c:1026 [] ioctl_has_perm security/selinux/hooks.c:3447 [inline] [] selinux_file_ioctl+0x331/0x530 security/selinux/hooks.c:3495 [] security_file_ioctl+0x7d/0xb0 security/security.c:797 [] SYSC_ioctl fs/ioctl.c:692 [inline] [] SyS_ioctl+0x4a/0xc0 fs/ioctl.c:685 [] entry_SYSCALL_64_fastpath+0x29/0xe8 ODEBUG: object is not on stack, but annotated ------------[ cut here ]------------ WARNING: CPU: 0 PID: 25350 at lib/debugobjects.c:300 debug_object_is_on_stack lib/debugobjects.c:300 [inline] WARNING: CPU: 0 PID: 25350 at lib/debugobjects.c:300 __debug_object_init+0x526/0xc40 lib/debugobjects.c:326