syzkaller syzkaller login: [ 7.074092][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 13.733665][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 13.733672][ T23] audit: type=1400 audit(1635314939.790:71): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.739155][ T23] audit: type=1400 audit(1635314939.790:72): avc: denied { write } for pid=290 comm="sh" path="pipe:[10815]" dev="pipefs" ino=10815 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.171694][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 14.181349][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 14.382312][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! [ 15.022457][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! Warning: Permanently added '10.128.1.140' (ECDSA) to the list of known hosts. executing program [ 20.636405][ T23] audit: type=1400 audit(1635314946.690:73): avc: denied { execmem } for pid=365 comm="syz-executor559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.655833][ T23] audit: type=1400 audit(1635314946.690:74): avc: denied { mounton } for pid=366 comm="syz-executor559" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 20.660552][ T366] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 20.680808][ T23] audit: type=1400 audit(1635314946.690:75): avc: denied { mount } for pid=366 comm="syz-executor559" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 20.694303][ T366] incfs: Can't find or create .index dir in ./file0 [ 20.711233][ T23] audit: type=1400 audit(1635314946.690:76): avc: denied { mounton } for pid=366 comm="syz-executor559" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 20.739294][ T23] audit: type=1400 audit(1635314946.700:77): avc: denied { read write } for pid=366 comm="syz-executor559" name="loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.739555][ T366] BUG: Dentry ffff88811a1d0dd0{i=0,n=.index} still in use (1) [unmount of ext4 loop0] [ 20.763592][ T23] audit: type=1400 audit(1635314946.700:78): avc: denied { open } for pid=366 comm="syz-executor559" path="/dev/loop0" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.773098][ T366] ------------[ cut here ]------------ [ 20.797315][ T23] audit: type=1400 audit(1635314946.700:79): avc: denied { ioctl } for pid=366 comm="syz-executor559" path="/dev/loop0" dev="devtmpfs" ino=115 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 20.802670][ T366] WARNING: CPU: 0 PID: 366 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 20.828521][ T23] audit: type=1400 audit(1635314946.710:80): avc: denied { mounton } for pid=366 comm="syz-executor559" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 20.837098][ T366] Modules linked in: [ 20.859903][ T23] audit: type=1400 audit(1635314946.750:81): avc: denied { mount } for pid=366 comm="syz-executor559" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 20.863679][ T366] CPU: 0 PID: 366 Comm: syz-executor559 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 20.885611][ T23] audit: type=1400 audit(1635314946.750:82): avc: denied { mounton } for pid=366 comm="syz-executor559" path="/root/file0" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 20.895588][ T366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.928528][ T366] RIP: 0010:umount_check+0x18d/0x1d0 [ 20.933811][ T366] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 43 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 ae d9 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 20.953591][ T366] RSP: 0018:ffffc90000bd7ab8 EFLAGS: 00010286 [ 20.959681][ T366] RAX: 0000000000000054 RBX: ffffffff86690d40 RCX: d5d8854b4e84c400 [ 20.967655][ T366] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 20.975751][ T366] RBP: ffffc90000bd7ae8 R08: ffffffff81545368 R09: 0000000000000003 [ 20.983726][ T366] R10: fffff5200017aea9 R11: 0000000000000004 R12: ffff88811a1d0dd0 [ 20.991695][ T366] R13: dffffc0000000000 R14: ffff88811d6dc3f8 R15: 0000000000000001 [ 20.999649][ T366] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 21.008582][ T366] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.015175][ T366] CR2: 00007f5b8f8091d0 CR3: 000000010c555000 CR4: 00000000003506b0 [ 21.023147][ T366] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.031103][ T366] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.039083][ T366] Call Trace: [ 21.042379][ T366] d_walk+0x309/0x540 [ 21.046421][ T366] ? __d_free+0x30/0x30 [ 21.050546][ T366] shrink_dcache_for_umount+0x8e/0x1b0 [ 21.055997][ T366] generic_shutdown_super+0x66/0x2c0 [ 21.061261][ T366] kill_block_super+0x80/0xe0 [ 21.065945][ T366] deactivate_locked_super+0xb0/0x100 [ 21.071302][ T366] deactivate_super+0xa5/0xd0 [ 21.076025][ T366] cleanup_mnt+0x45f/0x510 [ 21.080431][ T366] __cleanup_mnt+0x19/0x20 [ 21.084851][ T366] task_work_run+0x147/0x1b0 [ 21.089419][ T366] do_exit+0x70e/0x23a0 [ 21.093575][ T366] ? vmacache_update+0xb7/0x120 [ 21.098414][ T366] ? mm_update_next_owner+0x6e0/0x6e0 [ 21.103783][ T366] ? do_user_addr_fault+0x863/0xd70 [ 21.108964][ T366] do_group_exit+0x16a/0x2d0 [ 21.113573][ T366] __do_sys_exit_group+0x17/0x20 [ 21.118497][ T366] __se_sys_exit_group+0x14/0x20 [ 21.123431][ T366] __x64_sys_exit_group+0x3b/0x40 [ 21.128440][ T366] do_syscall_64+0x31/0x70 [ 21.132938][ T366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.138822][ T366] RIP: 0033:0x7f5b8f794089 [ 21.143250][ T366] Code: Unable to access opcode bytes at RIP 0x7f5b8f79405f. [ 21.150610][ T366] RSP: 002b:00007ffd0134af08 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 21.159024][ T366] RAX: ffffffffffffffda RBX: 00007f5b8f808330 RCX: 00007f5b8f794089 [ 21.166999][ T366] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 21.174967][ T366] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007f5b8f802e40 [ 21.182932][ T366] R10: 0000000000010000 R11: 0000000000000246