syzkaller syzkaller login: [ 11.577112][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 11.577122][ T23] audit: type=1400 audit(1634986389.729:71): avc: denied { transition } for pid=289 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 11.584010][ T23] audit: type=1400 audit(1634986389.729:72): avc: denied { write } for pid=289 comm="sh" path="pipe:[11578]" dev="pipefs" ino=11578 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 11.747227][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 11.750254][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 12.327151][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! [ 12.716463][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #80!!! Warning: Permanently added '10.128.0.229' (ECDSA) to the list of known hosts. executing program [ 18.436185][ T23] audit: type=1400 audit(1634986396.579:73): avc: denied { execmem } for pid=365 comm="syz-executor398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 18.439829][ T23] audit: type=1400 audit(1634986396.589:74): avc: denied { mounton } for pid=366 comm="syz-executor398" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 18.444889][ T23] audit: type=1400 audit(1634986396.589:75): avc: denied { mount } for pid=366 comm="syz-executor398" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 18.449794][ T23] audit: type=1400 audit(1634986396.589:76): avc: denied { mounton } for pid=366 comm="syz-executor398" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 18.454682][ T23] audit: type=1400 audit(1634986396.599:77): avc: denied { mounton } for pid=366 comm="syz-executor398" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 18.458669][ T366] incfs: Can't find or create .index dir in ./file0 [ 18.472651][ T23] audit: type=1400 audit(1634986396.599:78): avc: denied { mount } for pid=366 comm="syz-executor398" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 18.501424][ T23] audit: type=1400 audit(1634986396.599:79): avc: denied { mounton } for pid=366 comm="syz-executor398" path="/root/file0" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 18.501552][ T366] BUG: Dentry ffff88811a1b9cc0{i=0,n=.index} still in use (1) [unmount of 9p 9p] [ 18.524275][ T23] audit: type=1400 audit(1634986396.599:80): avc: denied { write } for pid=366 comm="syz-executor398" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 18.533384][ T366] ------------[ cut here ]------------ [ 18.554864][ T23] audit: type=1400 audit(1634986396.599:81): avc: denied { add_name } for pid=366 comm="syz-executor398" name=".index" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 18.560348][ T366] WARNING: CPU: 1 PID: 366 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 18.581459][ T23] audit: type=1400 audit(1634986396.599:82): avc: denied { create } for pid=366 comm="syz-executor398" name=".index" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 18.589584][ T366] Modules linked in: [ 18.613976][ T366] CPU: 1 PID: 366 Comm: syz-executor398 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 18.624144][ T366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 18.634207][ T366] RIP: 0010:umount_check+0x18d/0x1d0 [ 18.639505][ T366] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 43 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 ae d9 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 18.659222][ T366] RSP: 0018:ffffc90000c37a98 EFLAGS: 00010282 [ 18.665288][ T366] RAX: 000000000000004f RBX: ffffffff866d8540 RCX: e60653eb2bab2d00 [ 18.673265][ T366] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 18.681264][ T366] RBP: ffffc90000c37ac8 R08: ffffffff81545368 R09: 0000000000000003 [ 18.689435][ T366] R10: fffff52000186ea5 R11: 0000000000000004 R12: ffff88811a1b9cc0 [ 18.697509][ T366] R13: dffffc0000000000 R14: ffff88811d8653f8 R15: 0000000000000001 [ 18.705459][ T366] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 18.714390][ T366] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 18.720977][ T366] CR2: 00007f05a1b3d290 CR3: 000000010c632000 CR4: 00000000003506a0 [ 18.729026][ T366] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 18.737019][ T366] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 18.744999][ T366] Call Trace: [ 18.748297][ T366] d_walk+0x309/0x540 [ 18.752265][ T366] ? __d_free+0x30/0x30 [ 18.756434][ T366] shrink_dcache_for_umount+0x8e/0x1b0 [ 18.761878][ T366] generic_shutdown_super+0x66/0x2c0 [ 18.767166][ T366] kill_anon_super+0x3c/0x70 [ 18.771738][ T366] v9fs_kill_super+0x4c/0x90 [ 18.776300][ T366] deactivate_locked_super+0xb0/0x100 [ 18.781698][ T366] deactivate_super+0xa5/0xd0 [ 18.786359][ T366] cleanup_mnt+0x45f/0x510 [ 18.790785][ T366] __cleanup_mnt+0x19/0x20 [ 18.795178][ T366] task_work_run+0x147/0x1b0 [ 18.799780][ T366] do_exit+0x70e/0x23a0 [ 18.803923][ T366] ? vmacache_update+0xb7/0x120 [ 18.808780][ T366] ? mm_update_next_owner+0x6e0/0x6e0 [ 18.814133][ T366] ? do_user_addr_fault+0x863/0xd70 [ 18.819339][ T366] do_group_exit+0x16a/0x2d0 [ 18.823915][ T366] __do_sys_exit_group+0x17/0x20 [ 18.828952][ T366] __se_sys_exit_group+0x14/0x20 [ 18.833968][ T366] __x64_sys_exit_group+0x3b/0x40 [ 18.839004][ T366] do_syscall_64+0x31/0x70 [ 18.843409][ T366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 18.849303][ T366] RIP: 0033:0x7f05a1ac79a9 [ 18.853698][ T366] Code: Unable to access opcode bytes at RIP 0x7f05a1ac797f. [ 18.861091][ T366] RSP: 002b:00007ffd1e569068 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 18.869537][ T366] RAX: ffffffffffffffda RBX: 00007f05a1b3c3f0 RCX: 00007f05a1ac79a9 [ 18.877625][ T366] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 18.885580][ T366] RBP: 00