[ 7.853507][ T22] audit: type=1400 audit(1635050944.080:67): avc: denied { read write } for pid=235 comm="getty" name="utmp" dev="tmpfs" ino=10165 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7.857393][ T22] audit: type=1400 audit(1635050944.080:68): avc: denied { open } for pid=235 comm="getty" path="/run/utmp" dev="tmpfs" ino=10165 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7.860631][ T22] audit: type=1400 audit(1635050944.080:69): avc: denied { lock } for pid=235 comm="getty" path="/run/utmp" dev="tmpfs" ino=10165 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7.863989][ T22] audit: type=1400 audit(1635050944.080:70): avc: denied { read } for pid=235 comm="getty" name="log" dev="sda1" ino=1125 scontext=system_u:system_r:getty_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 syzkaller syzkaller login: [ 14.539391][ T22] audit: type=1400 audit(1635050950.780:71): avc: denied { transition } for pid=266 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.544903][ T22] audit: type=1400 audit(1635050950.780:72): avc: denied { write } for pid=266 comm="sh" path="pipe:[10575]" dev="pipefs" ino=10575 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.1.188' (ECDSA) to the list of known hosts. executing program [ 21.231404][ T22] audit: type=1400 audit(1635050957.460:73): avc: denied { execmem } for pid=299 comm="syz-executor790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 21.250866][ T22] audit: type=1400 audit(1635050957.470:74): avc: denied { mounton } for pid=300 comm="syz-executor790" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 21.275124][ T22] audit: type=1400 audit(1635050957.470:75): avc: denied { mount } for pid=300 comm="syz-executor790" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 21.304573][ T22] audit: type=1400 audit(1635050957.470:76): avc: denied { mounton } for pid=300 comm="syz-executor790" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 21.313608][ T300] ====================================================== [ 21.313608][ T300] WARNING: the mand mount option is being deprecated and [ 21.313608][ T300] will be removed in v5.15! [ 21.313608][ T300] ====================================================== [ 21.326383][ T22] audit: type=1400 audit(1635050957.490:77): avc: denied { read write } for pid=300 comm="syz-executor790" name="loop0" dev="devtmpfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 21.352229][ T300] incfs: Can't find or create .index dir in ./file0 [ 21.376236][ T22] audit: type=1400 audit(1635050957.490:78): avc: denied { open } for pid=300 comm="syz-executor790" path="/dev/loop0" dev="devtmpfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 21.406889][ T22] audit: type=1400 audit(1635050957.490:79): avc: denied { ioctl } for pid=300 comm="syz-executor790" path="/dev/loop0" dev="devtmpfs" ino=96 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 21.406993][ T300] BUG: Dentry ffff8881e6a8e880{i=0,n=.index} still in use (1) [unmount of vfat loop0] [ 21.432395][ T22] audit: type=1400 audit(1635050957.490:80): avc: denied { mounton } for pid=300 comm="syz-executor790" path="/root/file0" dev="sda1" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 21.432409][ T22] audit: type=1400 audit(1635050957.530:81): avc: denied { mount } for pid=300 comm="syz-executor790" name="/" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 21.432422][ T22] audit: type=1400 audit(1635050957.550:82): avc: denied { mounton } for pid=300 comm="syz-executor790" path="/root/file0/file0" dev="loop0" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=dir permissive=1 [ 21.510062][ T300] ------------[ cut here ]------------ [ 21.515502][ T300] WARNING: CPU: 1 PID: 300 at fs/dcache.c:1597 umount_check+0x179/0x1c0 [ 21.523801][ T300] Modules linked in: [ 21.527665][ T300] CPU: 1 PID: 300 Comm: syz-executor790 Not tainted 5.4.147-syzkaller-00036-geb4a5a5dbd5b #0 [ 21.537780][ T300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 21.547895][ T300] RIP: 0010:umount_check+0x179/0x1c0 [ 21.553262][ T300] Code: ff 4c 8b 0b 48 81 c5 20 04 00 00 48 c7 c7 e0 14 c9 84 4c 89 fe 4c 89 f2 4c 89 f9 45 89 e8 31 c0 55 e8 b7 0e b3 ff 48 83 c4 08 <0f> 0b e9 fd fe ff ff 89 e9 80 e1 07 80 c1 03 38 c1 0f 8c d4 fe ff [ 21.572858][ T300] RSP: 0018:ffff8881de1efb78 EFLAGS: 00010286 [ 21.578893][ T300] RAX: 0000000000000054 RBX: ffffffff85dc6240 RCX: 13b5b51766ce6a00 [ 21.586835][ T300] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 21.594796][ T300] RBP: ffff8881ddc78420 R08: ffffffff814b2a4c R09: ffffed103ede9608 [ 21.602738][ T300] R10: ffffed103ede9608 R11: 0000000000000000 R12: dffffc0000000000 [ 21.610694][ T300] R13: 0000000000000001 R14: 0000000000000000 R15: ffff8881e6a8e880 [ 21.618636][ T300] FS: 000055555745e3c0(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.627546][ T300] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.634124][ T300] CR2: 00007fa8c79961d0 CR3: 00000001ee1d1000 CR4: 00000000003406e0 [ 21.642087][ T300] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.650048][ T300] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.657991][ T300] Call Trace: [ 21.661257][ T300] d_walk+0x2d9/0x540 [ 21.665219][ T300] ? __d_free+0x20/0x20 [ 21.669346][ T300] shrink_dcache_for_umount+0x8a/0x1a0 [ 21.674776][ T300] generic_shutdown_super+0x63/0x2a0 [ 21.680115][ T300] kill_block_super+0x79/0xd0 [ 21.684760][ T300] deactivate_locked_super+0xaf/0x100 [ 21.690096][ T300] deactivate_super+0x168/0x210 [ 21.694917][ T300] cleanup_mnt+0x432/0x4e0 [ 21.699312][ T300] task_work_run+0x186/0x1b0 [ 21.703883][ T300] do_exit+0xc0a/0x2aa0 [ 21.708006][ T300] do_group_exit+0x15c/0x2c0 [ 21.712564][ T300] ? do_user_addr_fault+0x6b0/0xb40 [ 21.717729][ T300] __do_sys_exit_group+0x13/0x20 [ 21.722631][ T300] __se_sys_exit_group+0x10/0x10 [ 21.727538][ T300] __x64_sys_exit_group+0x37/0x40 [ 21.732530][ T300] do_syscall_64+0xcb/0x1e0 [ 21.737009][ T300] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.742868][ T300] RIP: 0033:0x7fa8c7921829 [ 21.747339][ T300] Code: Bad RIP value. [ 21.751373][ T300] RSP: 002b:00007fffcb157b48 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 21.759749][ T300] RAX: ffffffffffffffda RBX: 00007fa8c7995330 RCX: 00007fa8c7921829 [ 21.767689][ T300] RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001 [ 21.775637][ T300] RBP: 0000000000000001 R08: ffffffffffffffc4 R09: 0000000000000000 [ 2