audit: type=1400 audit(2000000506.695:1232): avc: denied { create } for pid=25380 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 =============================== [ INFO: suspicious RCU usage. ] 4.9.202+ #0 Not tainted ------------------------------- include/linux/radix-tree.h:199 suspicious rcu_dereference_check() usage! other info that might help us debug this: rcu_scheduler_active = 2, debug_locks = 0 2 locks held by syz-executor.0/25409: #0: (&sb->s_type->i_mutex_key#10){+.+.+.}, at: [<00000000088561da>] inode_lock include/linux/fs.h:771 [inline] #0: (&sb->s_type->i_mutex_key#10){+.+.+.}, at: [<00000000088561da>] shmem_add_seals+0x166/0x1020 mm/shmem.c:2610 #1: (&(&mapping->tree_lock)->rlock){..-...}, at: [<000000007d8a744f>] spin_lock_irq include/linux/spinlock.h:332 [inline] #1: (&(&mapping->tree_lock)->rlock){..-...}, at: [<000000007d8a744f>] shmem_tag_pins mm/shmem.c:2465 [inline] #1: (&(&mapping->tree_lock)->rlock){..-...}, at: [<000000007d8a744f>] shmem_wait_for_pins mm/shmem.c:2506 [inline] #1: (&(&mapping->tree_lock)->rlock){..-...}, at: [<000000007d8a744f>] shmem_add_seals+0x342/0x1020 mm/shmem.c:2622 stack backtrace: CPU: 0 PID: 25409 Comm: syz-executor.0 Not tainted 4.9.202+ #0 ffff8801ab627ca0 ffffffff81b55d2b ffff8801bf388c58 0000000000000000 0000000000000002 00000000000000c7 ffff8801a7655f00 ffff8801ab627cd0 ffffffff81406867 ffffea000661b880 dffffc0000000000 ffff8801ab627d78 Call Trace: [<0000000079354175>] __dump_stack lib/dump_stack.c:15 [inline] [<0000000079354175>] dump_stack+0xcb/0x130 lib/dump_stack.c:56 [<00000000ff195612>] lockdep_rcu_suspicious.cold+0x10a/0x149 kernel/locking/lockdep.c:4458 [<000000002a5d7e13>] radix_tree_deref_slot include/linux/radix-tree.h:199 [inline] [<000000002a5d7e13>] shmem_tag_pins mm/shmem.c:2467 [inline] [<000000002a5d7e13>] shmem_wait_for_pins mm/shmem.c:2506 [inline] [<000000002a5d7e13>] shmem_add_seals+0xa44/0x1020 mm/shmem.c:2622 [<0000000074955f59>] shmem_fcntl+0xf7/0x130 mm/shmem.c:2657 [<0000000072f3db83>] do_fcntl fs/fcntl.c:340 [inline] [<0000000072f3db83>] SYSC_fcntl fs/fcntl.c:376 [inline] [<0000000072f3db83>] SyS_fcntl+0x1d5/0xb50 fs/fcntl.c:361 [<0000000070df3cb3>] do_syscall_64+0x1ad/0x5c0 arch/x86/entry/common.c:288 [<00000000eeddd953>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb audit: type=1400 audit(2000000510.235:1233): avc: denied { create } for pid=25503 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.335:1234): avc: denied { create } for pid=25506 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.335:1235): avc: denied { write } for pid=25506 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.575:1236): avc: denied { read } for pid=25506 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.595:1237): avc: denied { create } for pid=25506 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.605:1238): avc: denied { write } for pid=25506 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.895:1239): avc: denied { write } for pid=25503 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000510.895:1240): avc: denied { create } for pid=25503 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 EXT4-fs (sda1): Unrecognized mount option "init¶Ś¶€_le" or missing value audit: type=1400 audit(2000000510.965:1241): avc: denied { write } for pid=25503 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000512.825:1242): avc: denied { map_create } for pid=25582 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 audit: type=1400 audit(2000000513.065:1243): avc: denied { create } for pid=25584 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000513.085:1244): avc: denied { write } for pid=25584 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000513.345:1245): avc: denied { read } for pid=25584 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000513.405:1246): avc: denied { create } for pid=25584 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000513.595:1247): avc: denied { map_create } for pid=25582 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 audit: type=1400 audit(2000000514.105:1248): avc: denied { create } for pid=25623 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000514.305:1249): avc: denied { write } for pid=25623 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000514.665:1250): avc: denied { read } for pid=25623 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 audit: type=1400 audit(2000000514.675:1251): avc: denied { create } for pid=25652 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25712 comm=syz-executor.1 SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25712 comm=syz-executor.1 binder: 25713:25715 BC_FREE_BUFFER u0000000000000000 no match binder: 25713:25724 BC_FREE_BUFFER u0000000000000000 no match SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25712 comm=syz-executor.1