syzkaller syzkaller login: [ 8.101398][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 12.032727][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 12.032733][ T23] audit: type=1400 audit(1635222265.530:71): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.038288][ T23] audit: type=1400 audit(1635222265.530:72): avc: denied { write } for pid=290 comm="sh" path="pipe:[11407]" dev="pipefs" ino=11407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 12.651207][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #88!!! [ 12.652913][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #88!!! Warning: Permanently added '10.128.0.168' (ECDSA) to the list of known hosts. executing program [ 18.930050][ T23] audit: type=1400 audit(1635222272.420:73): avc: denied { execmem } for pid=365 comm="syz-executor695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.933422][ T23] audit: type=1400 audit(1635222272.430:74): avc: denied { mounton } for pid=366 comm="syz-executor695" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 18.936925][ T23] audit: type=1400 audit(1635222272.430:75): avc: denied { mount } for pid=366 comm="syz-executor695" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 18.940278][ T23] audit: type=1400 audit(1635222272.430:76): avc: denied { mounton } for pid=366 comm="syz-executor695" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 18.946117][ T23] audit: type=1400 audit(1635222272.440:77): avc: denied { read write } for pid=366 comm="syz-executor695" name="loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 18.949647][ T23] audit: type=1400 audit(1635222272.440:78): avc: denied { open } for pid=366 comm="syz-executor695" path="/dev/loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 18.960352][ T366] ====================================================== [ 18.960352][ T366] WARNING: the mand mount option is being deprecated and [ 18.960352][ T366] will be removed in v5.15! [ 18.960352][ T366] ====================================================== [ 18.974833][ T23] audit: type=1400 audit(1635222272.440:79): avc: denied { ioctl } for pid=366 comm="syz-executor695" path="/dev/loop0" dev="devtmpfs" ino=115 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 18.997818][ T366] incfs: Can't find or create .index dir in ./file0 [ 19.023456][ T23] audit: type=1400 audit(1635222272.450:80): avc: denied { mounton } for pid=366 comm="syz-executor695" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 19.052243][ T23] audit: type=1400 audit(1635222272.450:81): avc: denied { mount } for pid=366 comm="syz-executor695" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 19.052446][ T366] BUG: Dentry ffff888119d84220{i=0,n=.index} still in use (1) [unmount of vfat loop0] [ 19.074875][ T23] audit: type=1400 audit(1635222272.450:82): avc: denied { mounton } for pid=366 comm="syz-executor695" path="/root/file0/file0" dev="loop0" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=dir permissive=1 [ 19.084069][ T366] ------------[ cut here ]------------ [ 19.112577][ T366] WARNING: CPU: 0 PID: 366 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 19.120877][ T366] Modules linked in: [ 19.124832][ T366] CPU: 0 PID: 366 Comm: syz-executor695 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 19.134983][ T366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 19.145050][ T366] RIP: 0010:umount_check+0x18d/0x1d0 [ 19.150322][ T366] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 43 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 ae d9 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 19.169943][ T366] RSP: 0018:ffffc9000026fab8 EFLAGS: 00010286 [ 19.176168][ T366] RAX: 0000000000000054 RBX: ffffffff866b3380 RCX: e181cf95107d0f00 [ 19.184164][ T366] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 19.192161][ T366] RBP: ffffc9000026fae8 R08: ffffffff81545368 R09: 0000000000000003 [ 19.200115][ T366] R10: fffff5200004dea9 R11: 0000000000000004 R12: ffff888119d84220 [ 19.208088][ T366] R13: dffffc0000000000 R14: ffff88811d83d3f8 R15: 0000000000000001 [ 19.216066][ T366] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 19.225000][ T366] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 19.231591][ T366] CR2: 0000565259328000 CR3: 000000011d75f000 CR4: 00000000003506b0 [ 19.239637][ T366] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 19.247608][ T366] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 19.255589][ T366] Call Trace: [ 19.258860][ T366] d_walk+0x309/0x540 [ 19.262836][ T366] ? __d_free+0x30/0x30 [ 19.266976][ T366] shrink_dcache_for_umount+0x8e/0x1b0 [ 19.272434][ T366] generic_shutdown_super+0x66/0x2c0 [ 19.277708][ T366] kill_block_super+0x80/0xe0 [ 19.282390][ T366] deactivate_locked_super+0xb0/0x100 [ 19.287739][ T366] deactivate_super+0xa5/0xd0 [ 19.292421][ T366] cleanup_mnt+0x45f/0x510 [ 19.296825][ T366] __cleanup_mnt+0x19/0x20 [ 19.301241][ T366] task_work_run+0x147/0x1b0 [ 19.305822][ T366] do_exit+0x70e/0x23a0 [ 19.309949][ T366] ? vmacache_update+0xb7/0x120 [ 19.314804][ T366] ? mm_update_next_owner+0x6e0/0x6e0 [ 19.320155][ T366] ? do_user_addr_fault+0x863/0xd70 [ 19.325361][ T366] do_group_exit+0x16a/0x2d0 [ 19.329931][ T366] __do_sys_exit_group+0x17/0x20 [ 19.334867][ T366] __se_sys_exit_group+0x14/0x20 [ 19.339797][ T366] __x64_sys_exit_group+0x3b/0x40 [ 19.344841][ T366] do_syscall_64+0x31/0x70 [ 19.349272][ T366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 19.355198][ T366] RIP: 0033:0x7fd144359829 [ 19.359602][ T366] Code: Unable to access opcode bytes at RIP 0x7fd1443597ff. [ 19.366985][ T366] RSP: 002b:00007ffd57113618 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 19.375513][ T366] RAX: ffffffffffffffda RBX: 00007fd1443cd330 RCX: 00007fd144359829 [ 19.383529][ T366] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 19.391513][ T366] RBP: 0000000000000001 R08: ffffffffffffffc4 R09: 0000000000000000 [ 19.399579][ T366] R10: 0000000002000040 R11: 0000000000000246 R12: 00007fd1443cd330 [ 19.407604][ T366] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 19.415609][ T366] ---[ end trace e1efaedf9d309be8 ]--- [ 19.421788][ T366] VFS: Busy inodes after unmount of loop0. Self-destruct in 5 seconds. Have a nice day...