audit: type=1400 audit(2000000594.500:109108): avc: denied { map_read map_write } for pid=19395 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 ============================= WARNING: suspicious RCU usage 4.14.106+ #30 Not tainted ----------------------------- net/ipv6/ip6_fib.c:1590 suspicious rcu_dereference_protected() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 1 3 locks held by syz-executor.1/19422: #0: (rtnl_mutex){+.+.}, at: [] dev_ioctl+0x260/0xca0 net/core/dev_ioctl.c:565 #1: (rcu_read_lock){....}, at: [] __fib6_clean_all+0x0/0x230 net/ipv6/ip6_fib.c:1823 #2: (&tb->tb6_lock){++--}, at: [] __fib6_clean_all+0xde/0x230 net/ipv6/ip6_fib.c:1837 stack backtrace: CPU: 0 PID: 19422 Comm: syz-executor.1 Not tainted 4.14.106+ #30 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0xb9/0x10e lib/dump_stack.c:53 fib6_del+0x8c2/0xbe0 net/ipv6/ip6_fib.c:1590 fib6_clean_node+0x270/0x440 net/ipv6/ip6_fib.c:1777 fib6_walk_continue+0x3a5/0x5f0 net/ipv6/ip6_fib.c:1703 fib6_walk+0x8d/0xe0 net/ipv6/ip6_fib.c:1748 fib6_clean_tree+0xd4/0x110 net/ipv6/ip6_fib.c:1822 __fib6_clean_all+0xf5/0x230 net/ipv6/ip6_fib.c:1838 rt6_ifdown+0x90/0x5b0 net/ipv6/route.c:2868 addrconf_ifdown+0xc5/0x13b0 net/ipv6/addrconf.c:3602 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_backlog=65 > audit_backlog_limit=64 audit: audit_lost=821 audit_rate_limit=0 audit_backlog_limit=64 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=19523 comm=syz-executor.4 kauditd_printk_skb: 281 callbacks suppressed audit: type=1400 audit(2000000599.460:109385): avc: denied { map } for pid=19533 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) audit: type=1400 audit(2000000599.470:109386): avc: denied { map } for pid=19533 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock attempt to access beyond end of device loop4: rw=12288, want=8200, limit=20 attempt to access beyond end of device audit: type=1400 audit(2000000599.530:109387): avc: denied { map } for pid=19539 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 loop4: rw=12288, want=12296, limit=20 F2FS-fs (loop4): Failed to get valid F2FS checkpoint F2FS-fs (loop4): Magic Mismatch, valid(0xf2f52010) - read(0x0) audit: type=1400 audit(2000000599.560:109388): avc: denied { map } for pid=19539 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 F2FS-fs (loop4): Can't find valid F2FS filesystem in 1th superblock attempt to access beyond end of device loop4: rw=12288, want=8200, limit=20 attempt to access beyond end of device audit: type=1400 audit(2000000599.580:109389): avc: denied { map } for pid=19539 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 loop4: rw=12288, want=12296, limit=20 F2FS-fs (loop4): Failed to get valid F2FS checkpoint SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=19550 comm=syz-executor.4 audit: type=1400 audit(2000000599.580:109390): avc: denied { map } for pid=19539 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(2000000599.630:109391): avc: denied { map } for pid=19540 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(2000000599.630:109392): avc: denied { map } for pid=19539 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(2000000599.640:109393): avc: denied { map } for pid=19540 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(2000000599.640:109394): avc: denied { map } for pid=19539 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 netlink: 6 bytes leftover after parsing attributes in process `syz-executor.0'. kauditd_printk_skb: 136 callbacks suppressed audit: type=1400 audit(2000000604.480:109531): avc: denied { create } for pid=19677 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000604.520:109532): avc: denied { write } for pid=19677 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000604.540:109533): avc: denied { map } for pid=19682 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(2000000604.540:109534): avc: denied { map } for pid=19682 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 audit: type=1400 audit(2000000604.540:109535): avc: denied { create } for pid=19677 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1