[ 20.204280][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 20.216528][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 20.232162][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 20.241331][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 20.250329][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 20.267863][ T373] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 20.813595][ T7] device bridge_slave_1 left promiscuous mode [ 20.820335][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.828177][ T7] device bridge_slave_0 left promiscuous mode [ 20.834571][ T7] bridge0: port 1(bridge_slave_0) entered disabled state Warning: Permanently added '10.128.0.211' (ECDSA) to the list of known hosts. [ 39.496251][ T23] kauditd_printk_skb: 65 callbacks suppressed [ 39.496261][ T23] audit: type=1400 audit(1643215492.339:148): avc: denied { mounton } for pid=406 comm="syz-executor750" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 39.526652][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.528852][ T23] audit: type=1400 audit(1643215492.339:149): avc: denied { mount } for pid=406 comm="syz-executor750" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 39.535536][ T407] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.559918][ T23] audit: type=1400 audit(1643215492.339:150): avc: denied { mounton } for pid=407 comm="syz-executor750" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 39.568928][ T407] device bridge_slave_0 entered promiscuous mode [ 39.592297][ T23] audit: type=1400 audit(1643215492.339:151): avc: denied { module_request } for pid=407 comm="syz-executor750" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 39.599153][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.627751][ T407] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.635151][ T407] device bridge_slave_1 entered promiscuous mode [ 39.660797][ T407] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.667877][ T407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.675161][ T407] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.682177][ T407] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.697829][ T379] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.705893][ T379] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.713234][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.721150][ T379] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.744329][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.752816][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 39.761941][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.770945][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.780098][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.788727][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.797432][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.804990][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.812639][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.821491][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.828812][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.836433][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.844587][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory [ 39.858682][ T23] audit: type=1400 audit(1643215492.699:152): avc: denied { mount } for pid=407 comm="syz-executor750" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 39.881780][ T23] audit: type=1400 audit(1643215492.709:153): avc: denied { mounton } for pid=407 comm="syz-executor750" path="/root/file0" dev="sda1" ino=1143 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 39.905383][ T412] BUG: Dentry ffff888120c23330{i=47a,n=.incomplete} still in use (64) [unmount of incremental-fs incremental-fs] [ 39.905492][ T23] audit: type=1400 audit(1643215492.709:154): avc: denied { mounton } for pid=407 comm="syz-executor750" path="/root/file0" dev="incremental-fs" ino=1143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 39.918397][ T412] ------------[ cut here ]------------ [ 39.942296][ T23] audit: type=1400 audit(1643215492.719:155): avc: denied { write } for pid=407 comm="syz-executor750" name="/" dev="incremental-fs" ino=1143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 39.947405][ T412] WARNING: CPU: 0 PID: 412 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 39.971020][ T23] audit: type=1400 audit(1643215492.719:156): avc: denied { add_name } for pid=407 comm="syz-executor750" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 39.979522][ T412] Modules linked in: [ 40.000544][ T23] audit: type=1400 audit(1643215492.719:157): avc: denied { create } for pid=407 comm="syz-executor750" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 40.004550][ T412] CPU: 0 PID: 412 Comm: syz-executor750 Not tainted 5.10.81-syzkaller-00148-gfd4c6594f5ce #0 [ 40.035507][ T412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.045773][ T412] RIP: 0010:umount_check+0x18d/0x1d0 [ 40.051050][ T412] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 45 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 5e d8 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 40.070842][ T412] RSP: 0018:ffffc900009df778 EFLAGS: 00010286 [ 40.077113][ T412] RAX: 000000000000006f RBX: ffffffff862d67a0 RCX: 6d8608f3fd0ed600 [ 40.085401][ T412] RDX: 0000000000000000 RSI: 0000000080000002 RDI: 0000000000000000 [ 40.093642][ T412] RBP: ffffc900009df7a8 R08: ffffffff81544cc8 R09: 0000000000000003 [ 40.101647][ T412] R10: fffff5200013be41 R11: 0000000000000004 R12: ffff888120c23330 [ 40.109990][ T412] R13: dffffc0000000000 R14: ffff88810e5ea3f8 R15: 0000000000000040 [ 40.118088][ T412] FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 40.127204][ T412] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.134149][ T412] CR2: 000055d6c44fae30 CR3: 000000000600f000 CR4: 00000000003506b0 [ 40.142134][ T412] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.150211][ T412] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.158233][ T412] Call Trace: [ 40.161743][ T412] d_walk+0x309/0x540 [ 40.165812][ T412] ? __d_free+0x30/0x30 [ 40.169979][ T412] shrink_dcache_for_umount+0x8e/0x1b0 [ 40.175717][ T412] generic_shutdown_super+0x66/0x2c0 [ 40.181020][ T412] incfs_kill_sb+0x4b/0x80 [ 40.185575][ T412] deactivate_locked_super+0xb0/0x100 [ 40.190957][ T412] deactivate_super+0xa5/0xd0 [ 40.195785][ T412] cleanup_mnt+0x45f/0x510 [ 40.200199][ T412] __cleanup_mnt+0x19/0x20 [ 40.204848][ T412] task_work_run+0x147/0x1b0 [ 40.209435][ T412] do_exit+0x70e/0x23a0 [ 40.213617][ T412] ? kasan_save_stack+0x4d/0x60 [ 40.218494][ T412] ? kasan_save_stack+0x36/0x60 [ 40.223325][ T412] ? cleanup_mnt+0x49e/0x510 [ 40.227946][ T412] ? __cleanup_mnt+0x19/0x20 [ 40.232552][ T412] ? task_work_run+0x147/0x1b0 [ 40.237567][ T412] ? syscall_exit_to_user_mode+0x24/0x40 [ 40.243306][ T412] ? mm_update_next_owner+0x6e0/0x6e0 [ 40.248813][ T412] ? __kasan_check_write+0x14/0x20 [ 40.253985][ T412] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 40.259099][ T412] do_group_exit+0x16a/0x2d0 [ 40.263937][ T412] get_signal+0x131f/0x1f70 [ 40.268444][ T412] ? ptrace_notify+0x340/0x340 [ 40.273194][ T412] ? rcu_force_quiescent_state+0x180/0x180 [ 40.279165][ T412] ? ida_free+0x2d4/0x3c0 [ 40.283861][ T412] arch_do_signal+0x8d/0x620 [ 40.288769][ T412] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 40.294327][ T412] exit_to_user_mode_prepare+0xaa/0xe0 [ 40.299793][ T412] syscall_exit_to_user_mode+0x24/0x40 [ 40.305299][ T412] do_syscall_64+0x3d/0x70 [ 40.310056][ T412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 40.316102][ T412] RIP: 0033:0x7fccb88b3909 [ 40.320538][ T412] Code: Unable to access opcode bytes at RIP 0x7fccb88b38df. [ 40.328075][ T412] RSP: 002b:00007fccb8839218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 40.336525][ T412] RAX: fffffffffffffe00 RBX: 00007fccb8935498 RCX: 00007fccb88b3909 [ 40.344665][ T412] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fccb8935498 [ 40.353090][ T412] RBP: 00007fccb8935490 R08: 0000000000000000 R09: 0000000000000000 [ 40.361792][ T412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccb893549c [ 40.369888][ T412] R13: 00007fff834ac22f R14: 00007fccb8839300 R15: 0000000000022000 [ 40.377884][ T412] ---[ end trace 3c0f45961e706dda ]--- [ 40.383347][ T412] BUG: Dentry ffff888120c23660{i=479,n=.index} still in use (64) [unmount of incremental-fs incremental-fs] [ 40.395399][ T412] ------------[ cut here ]------------ [ 40.400861][ T412] WARNING: CPU: 0 PID: 412 at fs/dcache.c:1616 umount_check+0x18d/0x1d0 [ 40.410350][ T412] Modules linked in: [ 40.414445][ T412] CPU: 0 PID: 412 Comm: syz-executor750 Tainted: G W 5.10.81-syzkaller-00148-gfd4c6594f5ce #0 [ 40.426337][ T412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 40.436541][ T412] RIP: 0010:umount_check+0x18d/0x1d0 [ 40.441971][ T412] Code: 8b 0b 49 81 c6 f8 03 00 00 48 c7 c7 40 45 2e 85 4c 89 e6 48 8b 55 d0 4c 89 e1 45 89 f8 31 c0 41 56 e8 5e d8 9e ff 48 83 c4 08 <0f> 0b e9 f1 fe ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c c9 fe ff [ 40.462396][ T412] RSP: 0018:ffffc900009df778 EFLAGS: 00010286 [ 40.468571][ T412] RAX: 000000000000006a RBX: ffffffff862d67a0 RCX: 6d8608f3fd0ed600 [ 40.476569][ T412] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 40.484578][ T412] RBP: ffffc900009df7a8 R08: ffffffff81544cc8 R09: fffff5200013be19 [ 40.492759][ T412] R10: fffff5200013be19 R11: 0000000000000000 R12: ffff888120c23660 [ 40.500839][ T412] R13: dffffc0000000000 R14: ffff88810e5ea3f8 R15: 0000000000000040 [ 40.508990][ T412] FS: 0000000000000000(0000) GS:ffff8881f7200000(0000) knlGS:0000000000000000 [ 40.517995][ T412] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.524781][ T412] CR2: 000055d6c44fae30 CR3: 000000000600f000 CR4: 00000000003506b0 [ 40.533125][ T412] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.541325][ T412] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 40.549465][ T412] Call Trace: [ 40.552774][ T412] d_walk+0x309/0x540 [ 40.557054][ T412] ? __d_free+0x30/0x30 [ 40.561565][ T412] shrink_dcache_for_umount+0x8e/0x1b0 [ 40.567055][ T412] generic_shutdown_super+0x66/0x2c0 [ 40.572357][ T412] incfs_kill_sb+0x4b/0x80 [ 40.576798][ T412] deactivate_locked_super+0xb0/0x100 [ 40.582353][ T412] deactivate_super+0xa5/0xd0 [ 40.587078][ T412] cleanup_mnt+0x45f/0x510 [ 40.591559][ T412] __cleanup_mnt+0x19/0x20 [ 40.596113][ T412] task_work_run+0x147/0x1b0 [ 40.600891][ T412] do_exit+0x70e/0x23a0 [ 40.605156][ T412] ? kasan_save_stack+0x4d/0x60 [ 40.610109][ T412] ? kasan_save_stack+0x36/0x60 [ 40.615001][ T412] ? cleanup_mnt+0x49e/0x510 [ 40.619926][ T412] ? __cleanup_mnt+0x19/0x20 [ 40.624558][ T412] ? task_work_run+0x147/0x1b0 [ 40.629322][ T412] ? syscall_exit_to_user_mode+0x24/0x40 [ 40.634987][ T412] ? mm_update_next_owner+0x6e0/0x6e0 [ 40.640619][ T412] ? __kasan_check_write+0x14/0x20 [ 40.645765][ T412] ? _raw_spin_lock_irq+0xa4/0x1b0 [ 40.650893][ T412] do_group_exit+0x16a/0x2d0 [ 40.655517][ T412] get_signal+0x131f/0x1f70 [ 40.660013][ T412] ? ptrace_notify+0x340/0x340 [ 40.664893][ T412] ? rcu_force_quiescent_state+0x180/0x180 [ 40.670709][ T412] ? ida_free+0x2d4/0x3c0 [ 40.675209][ T412] arch_do_signal+0x8d/0x620 [ 40.679794][ T412] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 40.685514][ T412] exit_to_user_mode_prepare+0xaa/0xe0 [ 40.690965][ T412] syscall_exit_to_user_mode+0x24/0x40 [ 40.696458][ T412] do_syscall_64+0x3d/0x70 [ 40.700893][ T412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 40.706905][ T412] RIP: 0033:0x7fccb88b3909 [ 40.711488][ T412] Code: Unable to access opcode bytes at RIP 0x7fccb88b38df. [ 40.719214][ T412] RSP: 002b:00007fccb8839218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 40.727914][ T412] RAX: fffffffffffffe00 RBX: 00007fccb8935498 RCX: 00007fccb88b3909 [ 40.736043][ T412] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fccb8935498 [ 40.744169][ T412] RBP: 00007fccb8935490 R08: 0000000000000000 R09: 0000000000000000 [ 40.752132][ T412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fccb893549c write to /proc/sys/kernel/softlockup_all_cpu_backtrace failed: No such file or directory [ 40.760369][ T412] R13: 00007fff834ac22f R14: 00007fccb8839300 R15: 000