[ 6.025460][ T23] audit: type=1400 audit(1635289081.499:70): avc: denied { read } for pid=255 comm="getty" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 syzkaller syzkaller login: [ 7.984395][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 12.968318][ T23] audit: type=1400 audit(1635289088.449:71): avc: denied { transition } for pid=289 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.971773][ T23] audit: type=1400 audit(1635289088.449:72): avc: denied { write } for pid=289 comm="sh" path="pipe:[10853]" dev="pipefs" ino=10853 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 13.774875][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 13.884837][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! Warning: Permanently added '10.128.10.24' (ECDSA) to the list of known hosts. [ 25.364234][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #82!!! executing program [ 25.436777][ T23] audit: type=1400 audit(1635289100.919:73): avc: denied { execmem } for pid=365 comm="syz-executor506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 25.456821][ T23] audit: type=1400 audit(1635289100.949:74): avc: denied { mounton } for pid=366 comm="syz-executor506" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 25.473216][ T367] ====================================================== [ 25.473216][ T367] WARNING: the mand mount option is being deprecated and [ 25.473216][ T367] will be removed in v5.15! [ 25.473216][ T367] ====================================================== [ 25.484865][ T23] audit: type=1400 audit(1635289100.949:75): avc: denied { mount } for pid=366 comm="syz-executor506" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 25.529368][ T23] audit: type=1400 audit(1635289100.949:76): avc: denied { mounton } for pid=366 comm="syz-executor506" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 25.536516][ T367] incfs: Can't find or create .incomplete dir in ./file0 [ 25.551366][ T23] audit: type=1400 audit(1635289100.949:77): avc: denied { read write } for pid=366 comm="syz-executor506" name="loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 25.582482][ T23] audit: type=1400 audit(1635289100.949:78): avc: denied { open } for pid=366 comm="syz-executor506" path="/dev/loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 25.582673][ T367] BUG: Dentry ffff888119947dd0{i=0,n=.incomplete} still in use (1) [unmount of vfat loop0] [ 25.606791][ T367] ------------[ cut here ]------------ [ 25.617043][ T23] audit: type=1400 audit(1635289100.949:79): avc: denied { ioctl } for pid=366 comm="syz-executor506" path="/dev/loop0" dev="devtmpfs" ino=115 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 25.622270][ T367] WARNING: CPU: 1 PID: 367 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 25.649375][ T23] audit: type=1400 audit(1635289100.949:80): avc: denied { mounton } for pid=366 comm="syz-executor506" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 25.656108][ T367] Modules linked in: [ 25.678810][ T23] audit: type=1400 audit(1635289101.019:81): avc: denied { mount } for pid=366 comm="syz-executor506" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 25.682689][ T367] CPU: 1 PID: 367 Comm: syz-executor506 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 25.704736][ T23] audit: type=1400 audit(1635289101.019:82): avc: denied { mounton } for pid=366 comm="syz-executor506" path="/root/file0" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=dir permissive=1 [ 25.714869][ T367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.747453][ T367] RIP: 0010:umount_check+0x18d/0x1d0 [ 25.752709][ T367] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 43 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 ae d9 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 25.772675][ T367] RSP: 0018:ffffc9000096f778 EFLAGS: 00010286 [ 25.778927][ T367] RAX: 0000000000000059 RBX: ffffffff866b3380 RCX: 7203d4994decad00 [ 25.786902][ T367] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 25.794871][ T367] RBP: ffffc9000096f7a8 R08: ffffffff81545368 R09: 0000000000000003 [ 25.802816][ T367] R10: fffff5200012de41 R11: 0000000000000004 R12: ffff888119947dd0 [ 25.810786][ T367] R13: dffffc0000000000 R14: ffff88811dad13f8 R15: 0000000000000001 [ 25.818774][ T367] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 25.827782][ T367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 25.834386][ T367] CR2: 00007f5947418468 CR3: 000000000640f000 CR4: 00000000003506a0 [ 25.842337][ T367] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 25.850327][ T367] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 25.858310][ T367] Call Trace: [ 25.861589][ T367] d_walk+0x309/0x540 [ 25.865587][ T367] ? __d_free+0x30/0x30 [ 25.869729][ T367] shrink_dcache_for_umount+0x8e/0x1b0 [ 25.875199][ T367] generic_shutdown_super+0x66/0x2c0 [ 25.880465][ T367] kill_block_super+0x80/0xe0 [ 25.885142][ T367] deactivate_locked_super+0xb0/0x100 [ 25.890504][ T367] deactivate_super+0xa5/0xd0 [ 25.895178][ T367] cleanup_mnt+0x45f/0x510 [ 25.899580][ T367] __cleanup_mnt+0x19/0x20 [ 25.903967][ T367] task_work_run+0x147/0x1b0 [ 25.908551][ T367] do_exit+0x70e/0x23a0 [ 25.912693][ T367] ? mm_update_next_owner+0x6e0/0x6e0 [ 25.918056][ T367] ? kfree+0xca/0x310 [ 25.922022][ T367] ? kasan_set_track+0x63/0x80 [ 25.926781][ T367] ? kasan_set_track+0x4c/0x80 [ 25.931532][ T367] ? __kasan_check_write+0x14/0x20 [ 25.936637][ T367] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 25.941732][ T367] do_group_exit+0x16a/0x2d0 [ 25.946322][ T367] get_signal+0x133e/0x1f80 [ 25.950806][ T367] ? kfree+0xca/0x310 [ 25.954778][ T367] ? kfree+0xca/0x310 [ 25.958743][ T367] ? ptrace_notify+0x340/0x340 [ 25.963477][ T367] ? ____kasan_slab_free+0x13e/0x170 [ 25.968764][ T367] ? __kasan_slab_free+0x11/0x20 [ 25.973678][ T367] ? slab_free_freelist_hook+0xb2/0x180 [ 25.979220][ T367] arch_do_signal+0x8d/0x620 [ 25.983796][ T367] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 25.989251][ T367] ? debug_smp_processor_id+0x1c/0x20 [ 25.994633][ T367] exit_to_user_mode_prepare+0xaa/0xe0 [ 26.000062][ T367] syscall_exit_to_user_mode+0x24/0x40 [ 26.005524][ T367] do_syscall_64+0x3d/0x70 [ 26.009927][ T367] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 26.015825][ T367] RIP: 0033:0x7f59473c7449 [ 26.020218][ T367] Code: Unable to access opcode bytes at RIP 0x7f59473c741f. [ 26.027590][ T367] RSP: 002b:00007f59473742f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 26.035997][ T367] RAX: fffffffffffffe00 RBX: 00007f594744c4a0 RCX: 00007f59473c7449 [ 26.043941][ T367] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f594744c4a8 [ 26.051905][ T367] RBP: 0030656c69662f2e R08: 0000000000000000 R09: 0000000000000000 [ 26.059867][ T367] R10: 0000000000000000 R11: 0000000000000246 R12: 6d616e74726f6873 [ 26.067838][ T367] R13: 66666f5f656d6974 R14: 6e656d6572636e69 R15: 00007f594744c4a8 [ 26.075810][ T367] ---[ end trace b1fcd200d023e5ec ]--- [ 26.081271][ T367] BUG: Dentry ffff888119947dd0{i=0,n=.incomplete} still in use (1) [unmount of vfat loop0] [ 26.091382][ T367] ------------[ cut here ]------------ [ 26.096890][ T367] WARNING: CPU: 1 PID: 367 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 26.105199][ T367] Modules linked in: [ 26.109079][ T367] CPU: 1 PID: 367 Comm: syz-executor506 Tainted: G W 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 26.120607][ T367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 26.130667][ T367] RIP: 0010:umount_check+0x18d/0x1d0 [ 26.135942][ T367] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 43 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 ae d9 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 26.155542][ T367] RSP: 0018:ffffc9000096f778 EFLAGS: 00010286 [ 26.161579][ T367] RAX: 0000000000000059 RBX: ffffffff866b3380 RCX: 7203d4994decad00 [ 26.169547][ T367] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000000 [ 26.177514][ T367] RBP: ffffc9000096f7a8 R08: ffffffff81545368 R09: fffff5200012de19 [ 26.185489][ T367] R10: fffff5200012de19 R11: 0000000000000000 R12: ffff888119947dd0 [ 26.193448][ T367] R13: dffffc0000000000 R14: ffff88811dad13f8 R15: 0000000000000001 [ 26.201437][ T367] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 26.210359][ T367] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 26.216935][ T367] CR2: 00007f5947418468 CR3: 000000000640f000 CR4: 00000000003506a0 [ 26.224902][ T367] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 26.232844][ T367] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 26.240809][ T367] Call Trace: [ 26.244079][ T367] d_walk+0x309/0x540 [ 26.248059][ T367] ? __d_free+0x30/0x30 [ 26.252203][ T367] shrink_dcache_for_umount+0x8e/0x1b0 [ 26.257653][ T367] generic_shutdown_super+0x66/0x2c0 [ 26.262917][ T367] kill_block_super+0x80/0xe0 [ 26.267597][ T367] deactivate_locked_super+0xb0/0x100 [ 26.272948][ T367] deactivate_super+0xa5/0xd0 [ 26.277622][ T367] cleanup_mnt+0x45f/0x510 [ 26.282036][ T367] __cleanup_mnt+0x19/0x20 [ 26.286461][ T367] task_work_run+0x147/0x1b0 [ 26.291043][ T367] do_exit+0x70e/0x23a0 [ 26.295190][ T367] ? mm_update_next_owner+0x6e0/0x6e0 [ 26.300557][ T367] ? kfree+0xca/0x310 [ 26.304543][ T367] ? kasan_set_track+0x63/0x80 [ 26.309290][ T367] ? kasan_set_track+0x4c/0x80 [ 26.314028][ T367] ? __kasan_check_write+0x14/0x20 [ 26.319131][ T367] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 26.324242][ T367] do_group_exit+0x16a/0x2d0 [ 26.328803][ T367] get_signal+0x133e/0x1f80 [ 26.333284][ T367] ? kfree+0xca/0x310 [ 26.337273][ T367] ? kfree+0xca/0x310 [ 26.341246][ T367] ? ptrace_notify+0x340/0x340 [ 26.346004][ T367] ? ____kasan_slab_free+0x13e/0x170 [ 26.351270][ T367] ? __kasan_slab_free+0x11/0x20 [ 26.356203][ T367] ? slab_free_freelist_hook+0xb2/0x180 [ 26.361727][ T367] arch_do_signal+0x8d/0x620 [ 26.366316][ T367] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 26.371760][ T367] ? debug_smp_processor_id+0x1c/0x20 [ 26.377128][ T367] exit_to_user_mode_prepare+0xaa/0xe0 [ 26.382572][ T367] syscall_exit_to_user_mode+0x24/0x40 [ 26.388036][ T367] do_syscall_64+0x3d/0x70 [ 26.392441][ T367] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 26.398343][ T367] RIP: 0033:0x7f59473c7449 [ 26.402749][ T367] Code: Unable to access opcode bytes at RIP 0x7f59473c741f. [ 26.410115][ T367] RSP: 002b:00007f59473742f8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 26.418537][ T367] RAX: fffffffffffffe00 RBX: 00007f594744c4a0 RCX: 00007f59473c7449 [ 26.426507][ T367] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f594744c4a8 [ 26.434477][ T367] RBP: 0030656c69662f2e R08: 0000000000000000 R09: 0000000