OK syzkaller syzkaller login: [ 12.058718][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 12.058727][ T23] audit: type=1400 audit(1635081924.519:71): avc: denied { transition } for pid=290 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 12.063309][ T23] audit: type=1400 audit(1635081924.529:72): avc: denied { write } for pid=290 comm="sh" path="pipe:[284]" dev="pipefs" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 12.529025][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #88!!! [ 12.530502][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #88!!! Warning: Permanently added '10.128.0.60' (ECDSA) to the list of known hosts. executing program [ 29.717831][ T23] audit: type=1400 audit(1635081942.179:73): avc: denied { execmem } for pid=365 comm="syz-executor160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 29.724174][ T23] audit: type=1400 audit(1635081942.189:74): avc: denied { mounton } for pid=366 comm="syz-executor160" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 29.731034][ T23] audit: type=1400 audit(1635081942.189:75): avc: denied { mount } for pid=366 comm="syz-executor160" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 29.736472][ T23] audit: type=1400 audit(1635081942.189:76): avc: denied { mounton } for pid=366 comm="syz-executor160" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 29.744192][ T366] incfs: Can't find or create .index dir in ./file0 [ 29.753806][ T23] audit: type=1400 audit(1635081942.199:77): avc: denied { mounton } for pid=366 comm="syz-executor160" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 29.783038][ T23] audit: type=1400 audit(1635081942.199:78): avc: denied { mount } for pid=366 comm="syz-executor160" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 29.783227][ T366] BUG: Dentry ffff88811a1a2aa0{i=0,n=.index} still in use (1) [unmount of sysfs sysfs] [ 29.805356][ T23] audit: type=1400 audit(1635081942.199:79): avc: denied { mounton } for pid=366 comm="syz-executor160" path="/root/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 29.815062][ T366] ------------[ cut here ]------------ [ 29.843197][ T366] WARNING: CPU: 1 PID: 366 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 29.851605][ T366] Modules linked in: [ 29.855491][ T366] CPU: 1 PID: 366 Comm: syz-executor160 Not tainted 5.10.75-syzkaller-01082-g234d53d2bb60 #0 [ 29.865676][ T366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 29.875881][ T366] RIP: 0010:umount_check+0x18d/0x1d0 [ 29.881180][ T366] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 43 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 ae d9 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 29.900810][ T366] RSP: 0018:ffffc9000097fa70 EFLAGS: 00010292 [ 29.906867][ T366] RAX: 0000000000000055 RBX: ffffffff86672100 RCX: 18591439f54f5400 [ 29.914865][ T366] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 29.922957][ T366] RBP: ffffc9000097faa0 R08: ffffffff81545368 R09: 0000000000000003 [ 29.930950][ T366] R10: fffff5200012fea1 R11: 0000000000000004 R12: ffff88811a1a2aa0 [ 29.938992][ T366] R13: dffffc0000000000 R14: ffff88811d7173f8 R15: 0000000000000001 [ 29.947065][ T366] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 29.956038][ T366] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 29.962642][ T366] CR2: 00007fc8692ac1d0 CR3: 000000010bb82000 CR4: 00000000003506a0 [ 29.970637][ T366] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 29.978747][ T366] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 29.986730][ T366] Call Trace: [ 29.990038][ T366] d_walk+0x309/0x540 [ 29.994003][ T366] ? __d_free+0x30/0x30 [ 29.998139][ T366] shrink_dcache_for_umount+0x8e/0x1b0 [ 30.003715][ T366] generic_shutdown_super+0x66/0x2c0 [ 30.009023][ T366] kill_anon_super+0x3c/0x70 [ 30.013703][ T366] kernfs_kill_sb+0x14d/0x170 [ 30.018357][ T366] sysfs_kill_sb+0x22/0x40 [ 30.022943][ T366] deactivate_locked_super+0xb0/0x100 [ 30.028308][ T366] deactivate_super+0xa5/0xd0 [ 30.032992][ T366] cleanup_mnt+0x45f/0x510 [ 30.037398][ T366] __cleanup_mnt+0x19/0x20 [ 30.041826][ T366] task_work_run+0x147/0x1b0 [ 30.046537][ T366] do_exit+0x70e/0x23a0 [ 30.050701][ T366] ? vmacache_update+0xb7/0x120 [ 30.055540][ T366] ? mm_update_next_owner+0x6e0/0x6e0 [ 30.060912][ T366] ? do_user_addr_fault+0x863/0xd70 [ 30.066096][ T366] do_group_exit+0x16a/0x2d0 [ 30.070687][ T366] __do_sys_exit_group+0x17/0x20 [ 30.075627][ T366] __se_sys_exit_group+0x14/0x20 [ 30.080594][ T366] __x64_sys_exit_group+0x3b/0x40 [ 30.085603][ T366] do_syscall_64+0x31/0x70 [ 30.090021][ T366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 30.095893][ T366] RIP: 0033:0x7fc869237529 [ 30.100305][ T366] Code: Unable to access opcode bytes at RIP 0x7fc8692374ff. [ 30.107652][ T366] RSP: 002b:00007fff890df778 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 30.116067][ T366] RAX: ffffffffffffffda RBX: 00007fc8692ab330 RCX: 00007fc869237529 [ 30.124054][ T366] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 30.132764][ T366] RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 00007fc8692a5e40 [ 30.140842][ T366] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc8692ab330 [ 30.148831][ T366] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001 [ 30.156903][ T366] ---[ end trace 052112e93fd2cc8e ]--- [ 30.162420][ T366] VFS: Busy inodes after unmount of sysfs. Self-destruct in 5 s