nux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) epoll_create(0x6) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) [ 1272.091103] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1272.096709] SELinux: policydb string SE Lin [ 1272.096709] x does not match my string SE Linux [ 1272.125426] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1272.136195] gfs2: can't parse mount arguments 07:53:39 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0xfffffffffffffe81) [ 1272.145786] gfs2: can't parse mount arguments [ 1272.160333] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1272.179437] gfs2: can't parse mount arguments 07:53:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e697815000000000000000800000007000000"], 0x20) 07:53:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733212", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1272.186698] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1272.214928] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1272.221167] CPU: 0 PID: 29136 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1272.228457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.237804] Call Trace: [ 1272.237830] dump_stack+0x1c4/0x2b4 [ 1272.237848] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1272.244030] ? kasan_check_read+0x11/0x20 [ 1272.244053] warn_alloc.cold.119+0xb7/0x1bd [ 1272.244068] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1272.244089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.244127] __vmalloc_node_range+0x472/0x750 [ 1272.272508] ? graph_lock+0x170/0x170 [ 1272.276307] ? __lock_is_held+0xb5/0x140 [ 1272.280372] ? sel_write_load+0x1d1/0x460 [ 1272.284510] vmalloc+0x6f/0x80 [ 1272.287691] ? sel_write_load+0x1d1/0x460 [ 1272.291826] sel_write_load+0x1d1/0x460 [ 1272.295809] __vfs_write+0x119/0x9f0 [ 1272.299516] ? check_preemption_disabled+0x48/0x200 [ 1272.304523] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1272.312485] ? kernel_read+0x120/0x120 [ 1272.316368] ? __lock_is_held+0xb5/0x140 [ 1272.320431] ? rcu_read_lock_sched_held+0x108/0x120 [ 1272.325442] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1272.330965] ? __sb_start_write+0x1b2/0x370 [ 1272.335270] vfs_write+0x1fc/0x560 [ 1272.338791] ksys_write+0x101/0x260 [ 1272.342402] ? __ia32_sys_read+0xb0/0xb0 [ 1272.346448] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1272.351880] __x64_sys_write+0x73/0xb0 [ 1272.355759] do_syscall_64+0x1b9/0x820 [ 1272.359635] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1272.364981] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1272.369916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1272.374756] ? trace_hardirqs_on_caller+0x310/0x310 [ 1272.379753] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1272.384751] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1272.389750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1272.394578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1272.399755] RIP: 0033:0x457569 [ 1272.402957] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1272.421874] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1272.429577] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1272.436829] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1272.444082] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1272.451353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1272.458608] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1272.466302] Mem-Info: [ 1272.468752] active_anon:156979 inactive_anon:109 isolated_anon:0 [ 1272.468752] active_file:21407 inactive_file:38306 isolated_file:0 [ 1272.468752] unevictable:0 dirty:238 writeback:0 unstable:0 [ 1272.468752] slab_reclaimable:14413 slab_unreclaimable:104975 [ 1272.468752] mapped:55549 shmem:133 pagetables:1543 bounce:0 [ 1272.468752] free:1209335 free_pcp:677 free_cma:0 [ 1272.503042] Node 0 active_anon:627916kB inactive_anon:436kB active_file:85628kB inactive_file:153224kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222196kB dirty:952kB writeback:0kB shmem:532kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 362496kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1272.534530] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1272.565556] lowmem_reserve[]: 0 2819 6323 6323 07:53:39 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x2bf, 0x47, 0x1}, 0xb7) [ 1272.570829] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:68kB free_cma:0kB [ 1272.601048] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1272.607380] gfs2: can't parse mount arguments [ 1272.618671] lowmem_reserve[]: 0 0 3503 3503 07:53:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1272.623771] Node 0 Normal free:1931576kB min:37352kB low:46688kB high:56024kB active_anon:627724kB inactive_anon:436kB active_file:85628kB inactive_file:153260kB unevictable:0kB writepending:1004kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6368kB pagetables:6040kB bounce:0kB free_pcp:2260kB local_pcp:1160kB free_cma:0kB [ 1272.654867] lowmem_reserve[]: 0 0 0 0 [ 1272.658736] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1272.672982] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB 07:53:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:40 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xff, 0x80000) ioctl$RTC_PIE_OFF(r0, 0x7006) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80000, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1272.712366] Node 0 Normal: 4222*4kB (UME) 226*8kB (UME) 41*16kB (UE) 1254*32kB (UME) 570*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 3*2048kB (ME) 435*4096kB (M) = 1932376kB [ 1272.737724] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1272.761431] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1272.773001] 59857 total pagecache pages [ 1272.778537] 0 pages in swap cache [ 1272.787052] Swap cache stats: add 0, delete 0, find 0/0 [ 1272.808613] Free swap = 0kB [ 1272.818712] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1272.823565] Total swap = 0kB [ 1272.845966] 1965979 pages RAM [ 1272.849535] gfs2: can't parse mount arguments [ 1272.850655] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1272.861736] 0 pages HighMem/MovableOnly 07:53:40 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x100, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x3ec61e96f14115b8}, 0xffffffffffffff51) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x77359400}}, 0x100) [ 1272.868793] 342307 pages reserved [ 1272.876883] 0 pages cma reserved [ 1272.881197] gfs2: can't parse mount arguments [ 1272.889475] SELinux: policydb string SE Linix does not match my string SE Linux [ 1272.907286] sel_write_load: 40 callbacks suppressed [ 1272.907292] SELinux: failed to load policy 07:53:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733215", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1272.933407] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1272.948272] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1272.960982] CPU: 1 PID: 29136 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1272.968269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1272.977623] Call Trace: [ 1272.980229] dump_stack+0x1c4/0x2b4 [ 1272.983870] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1272.989071] ? kasan_check_read+0x11/0x20 [ 1272.993244] warn_alloc.cold.119+0xb7/0x1bd [ 1272.997575] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1273.002425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.007999] __vmalloc_node_range+0x472/0x750 [ 1273.012501] ? graph_lock+0x170/0x170 [ 1273.016332] ? __lock_is_held+0xb5/0x140 [ 1273.020392] ? sel_write_load+0x1d1/0x460 [ 1273.024545] vmalloc+0x6f/0x80 [ 1273.027747] ? sel_write_load+0x1d1/0x460 [ 1273.031892] sel_write_load+0x1d1/0x460 [ 1273.035879] __vfs_write+0x119/0x9f0 [ 1273.039603] ? check_preemption_disabled+0x48/0x200 [ 1273.044618] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1273.049553] ? kernel_read+0x120/0x120 [ 1273.053450] ? __lock_is_held+0xb5/0x140 [ 1273.057527] ? rcu_read_lock_sched_held+0x108/0x120 [ 1273.062560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1273.068105] ? __sb_start_write+0x1b2/0x370 [ 1273.072434] vfs_write+0x1fc/0x560 [ 1273.075980] ksys_write+0x101/0x260 [ 1273.079610] ? __ia32_sys_read+0xb0/0xb0 [ 1273.083677] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1273.089135] __x64_sys_write+0x73/0xb0 [ 1273.093030] do_syscall_64+0x1b9/0x820 [ 1273.096928] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1273.102295] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1273.107225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1273.112072] ? trace_hardirqs_on_caller+0x310/0x310 [ 1273.117090] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1273.117104] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1273.117122] ? trace_hardirqs_off_thunk+0x1a/0x1c 07:53:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e737815000000000000000800000007000000"], 0x20) [ 1273.131957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1273.137143] RIP: 0033:0x457569 [ 1273.140334] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1273.159226] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1273.159242] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1273.159250] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000005 07:53:40 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000140)) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)="5fa272fa68cdac69ed037604deae62489e0459e9c9ee63ded4625e0589004ccb2fb9eb17eb535248adad3c017787d24d452aea7394a2ca1786f6ea19a8eec977b6bc2244db04d1d6b74698bd40ae7e95749bb77f64b910bced119dee05250564686ae2b8a726923272ec28d33cf2d2f1cf93c96bdb2370231c932a364ef7e4a8047a9bbd33a7b729ce3ca9e0bc796a94f0"}, 0x10) [ 1273.159257] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1273.159264] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1273.159272] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1273.205738] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.215036] gfs2: can't parse mount arguments 07:53:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1273.278007] SELinux: policydb string SE Linsx does not match my string SE Linux [ 1273.286288] SELinux: failed to load policy 07:53:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e6c7815000000000000000800000007000000"], 0x20) 07:53:40 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8000000040000, 0x90106) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000080)={0x7, 0xffff, 0x8000, 0x1, 0x6, 0xfff}) r1 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f00000007c0), 0x4) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x5, 0x600802) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000003c0)={0x9, 0x108, 0xfa00, {r4, 0x45, "53c754", "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"}}, 0x110) syz_open_dev$rtc(&(0x7f00000001c0)='/dev/rtc#\x00', 0x1, 0x12400) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000500)=""/236) r5 = dup2(r2, r1) name_to_handle_at(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="b300000000040000c202cd502c95aa7921efe28549244f21faf8304643133b85e7a235e3e4ba5a2a9b7e2be0d4ed71b6aa384f62c05f1b2c8af02ec2a7601666ce2190218a172837786128902321e123b93e421dc88bd4e79ac38838016fa946844483de609cd8a9eaeb6a7b5d21b33fcf63ef94f95292d053a3275d6d593de7f9ee30a01969b10ebe853934f6f5efd72e6c37995624464a3c68bc6db8e87b6e98205137e8c66ac2803fe69c515d110ab40000"], &(0x7f0000000300), 0x1000) r6 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r6, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$IOC_PR_PREEMPT_ABORT(r6, 0x401870cc, &(0x7f0000000100)={0x78, 0x9, 0x3, 0x89}) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000180)={0x9, 0x7}) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000180)) 07:53:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e647815000000000000000800000007000000"], 0x20) [ 1273.364215] SELinux: policydb string SE Linlx does not match my string SE Linux [ 1273.373162] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.379481] gfs2: can't parse mount arguments [ 1273.384283] SELinux: failed to load policy 07:53:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1273.438541] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.443695] SELinux: failed to load policy [ 1273.452481] gfs2: can't parse mount arguments [ 1273.468901] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.472732] SELinux: policydb string SE Lindx does not match my string SE Linux 07:53:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x12) [ 1273.507113] gfs2: can't parse mount arguments 07:53:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2l', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1273.549142] SELinux: failed to load policy 07:53:40 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000080)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) write$P9_RGETATTR(r0, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x0, {0x80, 0x2, 0x7}, 0x84, r1, r2, 0x1, 0x2, 0x7fff, 0xd2, 0x7, 0xff, 0x1, 0x922, 0xe8f, 0x8, 0xd4d, 0x1000, 0x5, 0x0, 0x8001}}, 0xa0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) rt_sigreturn() clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) setitimer(0x1, &(0x7f0000000380)={{}, {r4, r5/1000+30000}}, 0x0) write$P9_RLINK(r3, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e587815000000000000000800000007000000"], 0x20) [ 1273.573731] SELinux: policydb magic number 0x30307830 does not match expected magic number 0xf97cff8c [ 1273.585256] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.604539] gfs2: can't parse mount arguments [ 1273.617620] SELinux: failed to load policy 07:53:40 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="4168251ff8df779d46ee473d6a9021ffe34eec349fec3be1a70688ae4125dbec40dc17235da2d95a5fecd742a4023db57af9b25c93a1a4894f14ff2b42426e726813bf44d19dfcef1aae757ec91edb8502694e171035f14741582fd5b06427be8c52c2732012794cf78b31ad5e5705408337b0a3bcab9aa7ef3794c67349511d1ae0451b"], 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x4, {0x7, 0x1b, 0x6, 0x0, 0xfbdc, 0x8, 0x584, 0x5}}, 0x50) [ 1273.638068] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.652867] gfs2: can't parse mount arguments [ 1273.664806] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:41 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 1273.697004] gfs2: can't parse mount arguments [ 1273.715387] SELinux: policydb string SE LinXx does not match my string SE Linux [ 1273.732105] SELinux: failed to load policy 07:53:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e637815000000000000000800000007000000"], 0x20) 07:53:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1273.751199] SELinux: failed to load policy 07:53:41 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 1273.780766] SELinux: failed to load policy [ 1273.830294] SELinux: policydb string SE Lincx does not match my string SE Linux [ 1273.838352] SELinux: failed to load policy [ 1273.858653] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.875753] gfs2: can't parse mount arguments 07:53:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="676673321e", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:41 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x6) ftruncate(r0, 0x40) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1273.901463] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.906208] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1273.922256] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1273.932387] gfs2: can't parse mount arguments 07:53:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e787815000000000000000800000007000000"], 0x20) 07:53:41 executing program 4: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) [ 1273.952602] gfs2: can't parse mount arguments [ 1273.961642] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1273.969400] CPU: 0 PID: 29282 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1273.976683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1273.986036] Call Trace: [ 1273.988641] dump_stack+0x1c4/0x2b4 [ 1273.992286] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1273.997486] ? kasan_check_read+0x11/0x20 [ 1274.001632] warn_alloc.cold.119+0xb7/0x1bd [ 1274.005946] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1274.010803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.016353] __vmalloc_node_range+0x472/0x750 [ 1274.020839] ? graph_lock+0x170/0x170 [ 1274.024626] ? __lock_is_held+0xb5/0x140 [ 1274.028682] ? sel_write_load+0x1d1/0x460 [ 1274.032809] vmalloc+0x6f/0x80 [ 1274.035987] ? sel_write_load+0x1d1/0x460 [ 1274.040113] sel_write_load+0x1d1/0x460 [ 1274.044074] __vfs_write+0x119/0x9f0 [ 1274.047770] ? check_preemption_disabled+0x48/0x200 [ 1274.052777] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1274.057707] ? kernel_read+0x120/0x120 [ 1274.061663] ? __lock_is_held+0xb5/0x140 [ 1274.065798] ? rcu_read_lock_sched_held+0x108/0x120 [ 1274.070802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1274.076338] ? __sb_start_write+0x1b2/0x370 [ 1274.080655] vfs_write+0x1fc/0x560 [ 1274.084190] ksys_write+0x101/0x260 [ 1274.087801] ? __ia32_sys_read+0xb0/0xb0 [ 1274.091861] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1274.097294] __x64_sys_write+0x73/0xb0 [ 1274.101176] do_syscall_64+0x1b9/0x820 [ 1274.105047] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1274.110401] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1274.115316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1274.120140] ? trace_hardirqs_on_caller+0x310/0x310 [ 1274.125134] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1274.130130] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1274.135126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1274.139958] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1274.145129] RIP: 0033:0x457569 [ 1274.148316] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1274.167209] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1274.174910] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1274.182165] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1274.189415] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1274.196664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1274.203912] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1274.212573] warn_alloc_show_mem: 1 callbacks suppressed [ 1274.212578] Mem-Info: [ 1274.220534] active_anon:156981 inactive_anon:109 isolated_anon:0 [ 1274.220534] active_file:21407 inactive_file:38331 isolated_file:0 [ 1274.220534] unevictable:0 dirty:264 writeback:0 unstable:0 [ 1274.220534] slab_reclaimable:14419 slab_unreclaimable:104881 [ 1274.220534] mapped:55567 shmem:132 pagetables:1511 bounce:0 07:53:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1274.220534] free:1209309 free_pcp:850 free_cma:0 [ 1274.264414] Node 0 active_anon:625732kB inactive_anon:436kB active_file:85628kB inactive_file:153324kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222268kB dirty:1056kB writeback:0kB shmem:528kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 368640kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1274.292877] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1274.330602] lowmem_reserve[]: 0 2819 6323 6323 [ 1274.341337] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:68kB free_cma:0kB [ 1274.387366] lowmem_reserve[]: 0 0 3503 3503 07:53:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733210", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:41 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f00000000c0)=0x40) [ 1274.391866] Node 0 Normal free:1931440kB min:37352kB low:46688kB high:56024kB active_anon:625708kB inactive_anon:436kB active_file:85628kB inactive_file:153324kB unevictable:0kB writepending:1056kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6496kB pagetables:6340kB bounce:0kB free_pcp:1576kB local_pcp:908kB free_cma:0kB [ 1274.424672] lowmem_reserve[]: 0 0 0 0 [ 1274.428561] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1274.442489] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB [ 1274.447367] (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1274.447468] Node 0 Normal: 4313*4kB (UME) 177*8kB (UE) 73*16kB (UME) 1250*32kB (UME) 571*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 2*2048kB (ME) 435*4096kB (M) = 1930748kB [ 1274.484693] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1274.492177] gfs2: can't parse mount arguments [ 1274.499792] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1274.516730] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 07:53:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:41 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x200, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000000c0)=""/76) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xfffffc1b}, 0x6ac) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) [ 1274.546849] 59877 total pagecache pages [ 1274.552939] 0 pages in swap cache [ 1274.556514] Swap cache stats: add 0, delete 0, find 0/0 [ 1274.563679] Free swap = 0kB [ 1274.566984] Total swap = 0kB [ 1274.570215] 1965979 pages RAM [ 1274.574068] 0 pages HighMem/MovableOnly [ 1274.578243] 342307 pages reserved [ 1274.582167] 0 pages cma reserved [ 1274.585989] SELinux: policydb string SE Linxx does not match my string SE Linux 07:53:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e257815000000000000000800000007000000"], 0x20) [ 1274.608508] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1274.646687] gfs2: can't parse mount arguments 07:53:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733202", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:41 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a1f2f2ac885ceac375924424542c246ac"], 0x1) 07:53:41 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) sendmmsg$alg(r0, &(0x7f0000003c00)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)="8273a9c597e5d9f0ccce4b137ac257ef4d54a6280b1076f53e85fc15eba2b8b7c0b75a1066bab4644e071e873dd0740eba400352985bc6ec1ceec5d7ad6c21b008b1e646d4b1733f41b2478c0fc36168922191ce4538bb86449cc255c44715a8297bcf41631c3ebf9bab52566c777ef54ab798019a1044f34de2f597af1e596f09b035c0f3d72fd186463f9bec24e4f109b7b9055878419814b304233d37b288e82d9c2e74f49533f282260cdd9195bd0b8f6db1d72d96c020f7571a1af90dd2544a4b6c54f0f386eaa737774ec7073395e2404ee73b8d95dd82a6a2a81e9be85196c1cfa9", 0xe5}, {&(0x7f0000000140)="9586ab632c4c50a57aed1644c0b059930cc639a57582cccfe5b9df88d188eae0f742f8", 0x23}, {&(0x7f0000000180)="54f99253e9a28d53083b06ba27c5009ce7ed4c271d3ed2d7fadcd3d17df5353c720eb993a9659b934f5948c8ca7d53161e15615e189dd88f36d0593b2e07b68b11c337ca0ada0ee64eb08776931f", 0x4e}, {&(0x7f0000000200)="ccb7b92b542164cfe6ae1064a00127e27b8f34822c164af403aa71ba72d485676ec6d151133682bdaab3f173bee528903b0d029339d8702e2592b5da0bc24cd20efc09c6fecb86d5cfd8e7b02fffde2a136d0b5318f8ac7a9281f65e9fcac5fd95283e11f2202c61ff15a0a564bb7b2dfb75aca2fae9831031ce47cf6fb96ed31f501c91a1851ddde047ce09d55ec740c3bbf5a393572e85f9cb370ea24c234dbcfa15aef66b1b8043f8ef310d832ab7f462cbce", 0xb4}, {&(0x7f00000002c0)="4d053651b8fea6df19f692947ff07591903c9cb5afe5b9532f0d2ff15d997884750c87081b41cb19d33900bc5debb6e890904c63975530230f9f02dcf1fc960398b441f683dd4363719436e18fa1bfe7d61a7fd3890ee2627501215de2366498590d6bab254f42badea232e944e8e6cbaf420ac8f9f742499422af", 0x7b}], 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000001701000004000000010000000000000038000000000000001701000002000000200000002a07d899edf44968eb4bb070d7d941eace24b4652f8dd70c36860c196c9b3c75000000001800000000000000170100000400000008001f0000000000"], 0x68, 0x20000000}, {0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000000440)="d34ccb1749bb484dc140ab03641faee10b37548215ea36abab6c96d1185596780ee3bb949e60dcd60922ea19c6b6f2934cf2460c105028f057241887ec61", 0x3e}, {&(0x7f0000000480)="43ec34e1e1594c68c6852301dba03a4f0a4b0791fd0b3fad382377610137ad6dc807c6ad12aed9d2e3672b02276dbf42585803543b80a4f1c0061438a80b92326b478e1cbe4e2616001d9b0f7b9c5785080cd7fcf3f458e164c28481e390f63a71e42b975d04e71f841cf5c723ddd5a69889aac950c2293e9bb40e5f742ddfe9a15a8cb5c89835dc4ee07b3624f70bd5464c0e605ef680c766fb79a5cdc815c8807fac3cca0f63f7ce574e3afc37e66bf94c7083f06b1f5be2f971056cbb2ad03b3e9c598f168911696401293a1688f84521517eb781199ed4762dc00fd3a055c91d7d1350f8383fe54506003ee74b5319a5", 0xf2}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f0000001580)="4a7a05f653a504b035bedddf2d6465c3e8eff3b6486ed35a23173f9beaa3ca3788279e367b5de1c5d18e6257341746ada48a6cc7b1f4187808b0973d856c6ea947fe482007aa6847d4f4e49ed52fd8be2753fb8d631de0d1c7508d7b77bee7546872271406f0b0d9dc17784d6dbde56f294e8ff09ff86821fda559f72467798096c409f6195eae63f16378d7d87c38ae296421a7505ae7ba90d669b01bbf567013513a6263c6bef56683b01168c367c614fb43bcd3014b66e57f963968dcacf94844146914d8dc345e3c0ad64dd3fc9f603468bbf7292281d6c7f1690370f4abd7b69bb38e88f3f224111d80ed6e9d4ca579c32185c54339", 0xf8}, {&(0x7f0000001680)="681e17043c3428b804ec1f9c03709d029dc487055afefd6591ea1aefb59415316998cef864bad2381ce69bfe4a81fcbac82a45217762a28fe8479b69ec62a3dba098f2c67e23d2c284c8bcdb939a00618901bfcad64a32ded0eb5f82e81b60927b10ed2e8d587ce7a9b85a98ff4c92363e2381687ac61f0176e438ee1fc4ef058d80f3b0b082db2bec61d6fd133f42bea25d37", 0x93}, {&(0x7f0000001740)="ceba6fdb12797ea02611d4ac81c9fac23a4c14cadc667ba9fb023f30e442d1eca1fdeca65896de21ef74c6a23091ea4256df3f7db8384714012c3498830f5857ffa01b4722cbf8050739e486169a36e60916c78a443319091fe0f2b2049406444694158d5c7fd2c2a515aae1ff50982df7e20c5c36aaac119e0d2c2046960ddbe44c90f648e8bd886695a5", 0x8b}], 0x6, &(0x7f0000003d40)=ANY=[@ANYBLOB="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"], 0x2078, 0x40000}, {0x0, 0x0, &(0x7f00000039c0)=[{&(0x7f0000003940)="364c66ae115262a0f667ce5128f100d4a3536860ee6ddb46bcec67d1100fd053902cac93e75bdf7872543eb3b52f2337c7618b7bbb8270cf361f635543f8ef37cdf425915b464dbfbc1c0f1a99907fb2c8c5a98679b1f39b26392868f48e81c5d5a501f9aa38a7d0d9d4072c388474297eefee801428", 0x76}], 0x1, 0x0, 0x0, 0x10}, {0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f0000003a00)="6c06bb44907c29ecc386ed2bf111c6f4a82428928386990d367c582be4b28ef5f0d26e819eaeef11f7f724a7924352596a35434f03bd4b8c8093b14a3122e1a9051b857ae86d66c3960f8539d86fde0abf112f11882d4c6b1c8085115ba165802405dc8f8603fb02c32adcc7f60812daafe24c8a8da9600fd4f45320c9a98fe31724f7f72afee0f2822890d38ddea55b28e2747492a433e9a658683827c402ea5e564c6057b2fc1dad20ad85c1baf7858a6528bb76e17b07c943cf1f766cdc25bb68a9b89dd6aaff2625dfcb37dd", 0xce}], 0x1, &(0x7f0000003b40)=[@iv={0x40, 0x117, 0x2, 0x29, "ad8ee23d9b71b696bce9842c748a5a6cc315af5f5af38e833aa9ceee8b0cc6ec99c7a6179397a340d2"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x10001}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x88, 0x4000040}], 0x4, 0x4000010) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000003d00)={0x2, 0x100000001}) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e6f7815000000000000000800000007000000"], 0x20) 07:53:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1274.678548] SELinux: policydb string SE Lin%x does not match my string SE Linux [ 1274.785875] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1274.790358] SELinux: policydb string SE Linox does not match my string SE Linux [ 1274.798731] gfs2: can't parse mount arguments 07:53:42 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000040)={0x0, 0x3, 0x4138, 0x0, 0x1000, 0x2}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="4002b4e004253ebf59e36fcd3041efad917d1c7e23ac14905b2a0607d7cb4005f4ecb603ead2608b48033b42e5791715d61e3045e944b276b5c825e248b3eb9ccd117c1171639fe73dccef9fd33493e336b9"], 0x1) 07:53:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e750a15000000000000000800000007000000"], 0x20) 07:53:42 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) keyctl$session_to_parent(0x12) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1274.896118] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1274.959417] SELinux: policydb string SE Linu [ 1274.959417] does not match my string SE Linux [ 1274.964405] gfs2: can't parse mount arguments 07:53:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e752515000000000000000800000007000000"], 0x20) 07:53:42 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x6, 0x0, [], [{0xff, 0x1000, 0x9, 0x8000, 0x29f69ceb, 0x81}, {0x6, 0x7, 0x8, 0xffff, 0x7fffffff, 0x100000000}], [[], [], [], [], [], []]}) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000040)=0x7) 07:53:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="e2ba78"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000001980)=@sco, &(0x7f0000001a00)=0x80, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001880)={{{@in6=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001840)=0xffffffffffffffbe) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) socketpair(0xb, 0x7, 0x81, &(0x7f00000016c0)={0xffffffffffffffff}) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x6, 0x200000) bind$bt_sco(r4, &(0x7f0000001700)={0x1f, {0x7, 0x474000000000000, 0x7, 0xfffffffffffffffa, 0x100000000}}, 0x8) sendmsg$nl_netfilter(r0, &(0x7f0000001680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001640)={&(0x7f0000000280)={0x350, 0x8, 0xe, 0x300, 0x70bd2a, 0x25dfdbfd, {0x1, 0x0, 0x3}, [@generic="cd2a7d2cbf771e715b9e495ad1c66a05bc3ce6b45080472b9e3eb5e409c4a33a778501c872025a58eb075ca5e7e87aba59", @generic="7e33980be070ef4b4fd97b87842f7186b7cb9f1c1cb5e300d67e16d59bc232aca28800437bbd9f86217bab1a3e260c2c2a5143d25d5ebad215377161fa54d71a358681abc8cd8a74fe1b344b4d9fc7ce127c20b0a7437215b7401560948f72af419fba4b8186a005ffca7f93be320483f201bd5c033bd453bdec74d86b3734c32c9a0133077eb93ca252c10d", @typed={0x8, 0x30, @uid=r2}, @generic="9d719cbe5cf2d02974cc5ba359f5c76bfdbbf059e38624157ee30c31a4cc5e8d274cd93ee6fc85a94f33c5af6feb267c838f9e9d3f39c416fc8c4ca7b2d606ee3c6ddfa360eb289848b91ffa00cb5109de6648d37647fb4a8f80cdd0efdf41092c0fc0b96ac1f666e87cdf0f69601a792b079b26459668c1b389fdbd8f73ac1e98c7997e9cd6613806faeafb9e4685053f816c4fef71276d40a4f9da023ffff730a78bea41b65e02ac7548fee1634f624b299ea1d6911351a4bc547be42642ca4199b4b16e9b822a18b2c78fb390479b11e2df19134e", @generic="db061559b2d92bdb5609944e759e3d75edf8d1517971f152b5b432df5c26090f75c6c063d4d0b21ec840cec5708494ffb25ed4236f9302c4650cbdd78dc9354958457823f0f9d980c80813becf9f5b9150f63df3ce49e2d8f105fc406c2310cfd415a8f9", @typed={0x8, 0xa, @uid=r3}, @typed={0x8, 0x10, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}}, @generic="e6468b8bb11b06e6a8d170a54c894d9c0e1bd9676eaef3ebf9c8335cd778ed817152d56f82e5a28cc2222ae36c2a9ffc483e73e7ab373de235b373914a346391c69306b6a129fd9571183567a3397979aa6af07e8a32e47b5ab9d29f0a145b132bdaca5b9ea78b6937e2", @generic="02629fbcc8565ec63b87b02ef933a3f4526d7c46bff31575c82afd678c416d1fcc1108d88bff314624b7f069b0746515b78afa902c472714e1b632f24aaa919df51be552464a4c2b76ed4ba86f446873bdc17d063da71622ea181c3ba98970e6b049ca30ad9bd93aead1a53151b564d7943c7ca860fd3b8a626a172d9f8f80f3c004574749766039eb6d5f5810887c1aa577871a8f60220ae70500762333dcbc851d4c3eab537fc96d4fb2b576377415ee2468331c314a23ec", @typed={0x8, 0x6d, @fd=r0}]}, 0x350}}, 0x4000) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x30000, 0x0) [ 1275.027647] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.067766] gfs2: can't parse mount arguments [ 1275.097688] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.108416] SELinux: policydb string SE Linu% does not match my string SE Linux [ 1275.116927] gfs2: can't parse mount arguments [ 1275.134306] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:42 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x20001, 0x0) r1 = dup2(r0, r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000280)) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x0, 0x30, 0x0, 0xfffffffffffffffc}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={r2, 0x400}, &(0x7f0000000240)=0x8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x3, {0x2, 0x4e24}, {0x2, 0x4e21, @multicast2}, {0x2, 0x4e22}, 0x100, 0x4, 0x3, 0x3, 0x9, &(0x7f0000000080)='team_slave_1\x00', 0x4f85, 0xc39, 0x7}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0xc34) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1275.149039] gfs2: can't parse mount arguments 07:53:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75782e000000000000000800000007000000"], 0x20) 07:53:42 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="0f01cf3f0fd19cb53ef3edbaf80c66b824e9b78666efbafc0cb8c8b4efbaa10066b8a000000066ef0f01dfbaf80c66b8d80b318e66efbafc0ced0f005f06baf80c66b88c4eb88366efbafc0c66ed", 0x4e}], 0x1, 0x1, &(0x7f0000000100)=[@dstype3={0x7, 0x5}, @vmwrite={0x8, 0x0, 0x9, 0x0, 0x1, 0x0, 0x6, 0x0, 0x5}], 0x2) [ 1275.195766] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.205813] gfs2: can't parse mount arguments 07:53:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00001609d117d3dce62cbed3ed8c9f8d82632b9d9934dbb1654d9c0d02fbb0ccc4711b529ac62a1550de707b2990f29c52936dfa138db39f92d139d8f37b014342a533ef55662693e59b3f94680d9bcf943a6a88aef9eb916cfd9f43d36a424fbaaf8bbec86bac9aca1c74692df5d94c219608e3138769d768df70e03a27914240039314c210a8b65a63"], 0x1) 07:53:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1275.263678] SELinux: policydb version 46 does not match my version range 15-31 07:53:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000800000007000000"], 0x20) 07:53:42 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x2, 0xfffffffffffffff7, 0x1, 0x3f, 0x0, r1}) write$P9_RLINK(r0, &(0x7f00000001c0)={0x7, 0x47, 0x2}, 0x7) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) [ 1275.359624] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.380493] gfs2: can't parse mount arguments 07:53:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8c54e4d8e7d9769ee012958da63e94cc9b6c322c55f6def005033f615bfc7f982a4df3d2660c5608346d6c1e410514c8cc2898e597bbf233a68665b5fe281826f5e6dcca45b23c8240f3d243d08929249149d4901be475c865e647a265c15a71ad3b645ddfcd0c4991253025fa45458cb30f41d2dbfe727b606440647243c082f7f2ec190559b57ba80a3e6d38a8e9c69a07b9a5feb57185e274a70482eee1973842bc237b3b1696fd59529d6296c5a475419e9cc228636b11cba18a8f988f023d917eeb7a9bf934dfef079372780b18a4fadd96833027c40473a2a881ffa00d04e0da495727c5b3425e47e93ce633b6f43fa8004ded9a"], 0x1) [ 1275.408261] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.415983] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:42 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:53:42 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x2, 0x100000001}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000001c0)={0x2, 0x1, 0x5, 0x6, r2}, 0x10) [ 1275.456460] gfs2: can't parse mount arguments [ 1275.466480] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.472664] gfs2: can't parse mount arguments [ 1275.477866] gfs2: can't parse mount arguments 07:53:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1275.602011] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.608356] gfs2: can't parse mount arguments 07:53:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:43 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0xc0100, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x240, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f00000002c0)={0x3, r2}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)=0x3) 07:53:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757810000000000000000800000007000000"], 0x20) [ 1275.655465] SELinux: policydb table sizes (8,7) do not match mine (5,6) [ 1275.672057] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.678392] gfs2: can't parse mount arguments 07:53:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1275.811475] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.817944] gfs2: can't parse mount arguments [ 1275.847651] SELinux: policydb table sizes (8,7) do not match mine (6,6) 07:53:43 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000001440)={0x7}, 0x7) ioctl$RTC_AIE_ON(r0, 0x7001) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x400000) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x80) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000001400)={0x3, &(0x7f0000000080)=""/255, &(0x7f0000001380)=[{0x7, 0xd3, 0x7ff, &(0x7f0000000180)=""/211}, {0x6e, 0x1000, 0x7f, &(0x7f0000000280)=""/4096}, {0x40, 0xe6, 0x0, &(0x7f0000001280)=""/230}]}) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000001480)='trusted.overlay.opaque\x00', &(0x7f00000014c0)='y\x00', 0x2, 0x1) [ 1275.862207] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.876657] gfs2: can't parse mount arguments [ 1275.888090] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.897069] gfs2: can't parse mount arguments 07:53:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757811000000000000000800000007000000"], 0x20) 07:53:43 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write(r0, &(0x7f0000000040)="d3a14b9970e60aa1f3c95348717ff8ed1bd5023f1b7c1d1c7f4a325a4ba15e2d0ad9a38dee1d0883a2876073011fa262ec0902cae109aed77cc10f40b3a81edd7d96fd52893603905f1c41bd3944c77b0dc10e9bfa1a44aefbbe8dd79b0bd017eaa4669731af2930c9e97b424e7e04a81f377353491725940a8742ca870e94bc79d8784ccb101cf121bb6ffb462f68445813b5a531cf8a9d3df30897ff03eccb7af1da4920df8a", 0xffffffffffffff1c) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140), 0x10) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x200) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r1 = semget(0x1, 0x3, 0x2) semctl$GETPID(r1, 0x4, 0xb, &(0x7f00000001c0)=""/139) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000100)=0x1, 0x4) [ 1275.967481] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1275.982477] gfs2: can't parse mount arguments [ 1275.989680] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.007333] gfs2: can't parse mount arguments 07:53:43 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\t', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:43 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000080)=0x7) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e24, 0xfff, @mcast2, 0x4}, {0xa, 0x4e24, 0x1b28e3c5, @mcast1, 0x10001}, 0x80000000, [0x8, 0x100000001, 0x7ff, 0x7, 0x4, 0x9, 0x81, 0x6]}, 0x5c) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @broadcast, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@remote, 0x1f, r1}) [ 1276.125195] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.133955] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.140297] gfs2: can't parse mount arguments [ 1276.145819] gfs2: can't parse mount arguments [ 1276.162963] SELinux: policydb table sizes (8,7) do not match mine (6,7) 07:53:43 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0xf50057494b548660) 07:53:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757812000000000000000800000007000000"], 0x20) 07:53:43 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7}, 0x7) [ 1276.288742] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.302337] gfs2: can't parse mount arguments [ 1276.312817] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:43 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff56e92dafca5b4d4a6fa82424dd1164688b9324063467e3bb70fb2b3957fe4de90062b62ca9cbdd7116620bf8c0951db3340d4c4643f505c06c82f5e295f8781de186abe1096d5fd0e227c67b35d0f7ebc9889b34836786fb6423198e71732f1af2d4b19da8215b943d48ee0a"], 0x1) 07:53:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1276.338960] SELinux: policydb table sizes (8,7) do not match mine (6,7) [ 1276.366508] gfs2: can't parse mount arguments 07:53:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757813000000000000000800000007000000"], 0x20) 07:53:43 executing program 2: socketpair(0x7, 0xe1a785281a82f08e, 0xdff, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000000)) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000000c0)=0x9) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0xffffffffffffff66) 07:53:43 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x80) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r1, 0x7}, &(0x7f00000001c0)=0x8) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r2, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:43 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:43 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1276.529044] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.547119] gfs2: can't parse mount arguments 07:53:43 executing program 2: socket$pptp(0x18, 0x1, 0x2) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757814000000000000000800000007000000"], 0x20) 07:53:43 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) 07:53:43 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733203", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1276.626879] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.660184] gfs2: can't parse mount arguments 07:53:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815020000000000000800000007000000"], 0x20) 07:53:44 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0x440000, 0x0) fadvise64(r0, 0x0, 0x80000000, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:restorecond_exec_t:s0\x00', 0x28, 0x1) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000080)=""/151) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0xfffffffffffffffd}, 0x7) 07:53:44 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2#', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1276.761298] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1276.782971] gfs2: can't parse mount arguments [ 1276.797589] SELinux: policydb version 533 does not match my version range 15-31 07:53:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)=r2) 07:53:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815070000000000000800000007000000"], 0x20) [ 1276.807985] SELinux: policydb version 533 does not match my version range 15-31 07:53:44 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x3c, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\f', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\a', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1276.952522] SELinux: policydb version 1813 does not match my version range 15-31 [ 1276.991492] QAT: Invalid ioctl 07:53:44 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0104, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39, 0x47, 0x2}, 0xffffffffffffff31) [ 1277.000005] SELinux: policydb version 1813 does not match my version range 15-31 [ 1277.007307] QAT: Invalid ioctl 07:53:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000600000000000800000007000000"], 0x20) 07:53:44 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/pid_for_children\x00') r3 = creat(&(0x7f0000000100)='./file0\x00', 0x92) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x109000, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000180)={r3, r4, 0x2}) r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000240)={r6, 0x3}, &(0x7f0000000280)=0x8) write$P9_RLINK(r5, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:44 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2L', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x2) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1277.196816] SELinux: policydb version 393237 does not match my version range 15-31 07:53:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:44 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x1, @loopback, 0x5}}, 0x115c, 0x3, 0x3, 0x90, 0x6}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={r1, 0x10000, 0x30}, &(0x7f0000000200)=0xc) sendmsg$xdp(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000240)="eb06d21fe77483eb6e25605a0be248af886d01c4667e3af38dc25ef0fb9cd7fb0dfbfe393d4207", 0x27}, {&(0x7f0000000280)="dab2a35254503e6268537bd2521c723310f29c12f256b8ede7448556076791f1661b3b0ccc70aa10d97742acf432c251ba9bcff2563eeeeecafc4b64884e841daf91d7b3d8e4e577448094eed04972504888355656d12f636f37e6de868df2868b060b1c2b09cc476b8f", 0x6a}, {&(0x7f0000000300)="1656a067763426836c4f5cbe395435de5689c86e2b8daa98", 0x18}], 0x3, 0x0, 0x0, 0x20008010}, 0x4040000) ioctl$NBD_DISCONNECT(r0, 0xab08) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x2000, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f00000003c0)) write$P9_RLINK(r2, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) socket$bt_rfcomm(0x1f, 0x1, 0x3) 07:53:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000040000000007000000"], 0x20) 07:53:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="accc5ecb78b556739f01507c76f366b7cf2d877d7374c35af3dea3b46d575296d53e4a8f4b9f7985409debda"], 0x1) [ 1277.355486] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1277.362954] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1277.372148] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1277.375611] gfs2: can't parse mount arguments 07:53:44 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200200, 0x80) [ 1277.417976] gfs2: can't parse mount arguments 07:53:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815600000000000000800000007000000"], 0x20) 07:53:44 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="17"], 0x1) [ 1277.503013] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1277.517961] gfs2: can't parse mount arguments [ 1277.525750] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:44 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x100, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={0x0, 0xffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={r2, 0xc7, "8610d02d67d008bdc5e326e2b864424c6e7bb90111eba22ab162ed4a3e207c02fdb70aa190bd5be8c5d95e755e04e19bbb7e748ec03dca54fe5d75a0345ad2ca6d6a02beda1a59f6bcab2108c41459b885527453bb0212efefeb61232211416fc78d62d44bfad2e8be8ccf59b1606eb6d557d28081418e19aa0167de8f7e868e66ecee9fcf63e2c88d17fc46f42e5ac3f92045fb6adce301c9c636b8a1eec94655f13503a760372948ba1ec6d186e380f82d77ac50cc7fb2eeb5ac2b3f2f2388366d84c8e3d3be"}, &(0x7f0000000200)=0xcf) [ 1277.552185] gfs2: can't parse mount arguments [ 1277.564440] SELinux: policydb version 24597 does not match my version range 15-31 07:53:44 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000020000000800000007000000"], 0x20) [ 1277.610781] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:44 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) 07:53:44 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:44 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1277.657980] gfs2: can't parse mount arguments 07:53:45 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1277.726806] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 07:53:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000050000000800000007000000"], 0x20) [ 1277.770808] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1277.784986] gfs2: can't parse mount arguments [ 1277.796393] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1277.802951] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1277.808705] gfs2: can't parse mount arguments 07:53:45 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) [ 1277.809744] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1277.832641] gfs2: can't parse mount arguments [ 1277.835202] CPU: 0 PID: 29722 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1277.844411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1277.853756] Call Trace: [ 1277.856330] dump_stack+0x1c4/0x2b4 [ 1277.859949] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1277.865132] ? kasan_check_read+0x11/0x20 [ 1277.869269] warn_alloc.cold.119+0xb7/0x1bd [ 1277.873594] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1277.878424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.883958] __vmalloc_node_range+0x472/0x750 [ 1277.888450] ? graph_lock+0x170/0x170 [ 1277.892241] ? __lock_is_held+0xb5/0x140 [ 1277.896286] ? sel_write_load+0x1d1/0x460 [ 1277.900428] vmalloc+0x6f/0x80 [ 1277.903608] ? sel_write_load+0x1d1/0x460 [ 1277.907737] sel_write_load+0x1d1/0x460 [ 1277.911697] __vfs_write+0x119/0x9f0 [ 1277.915396] ? check_preemption_disabled+0x48/0x200 [ 1277.920402] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1277.925327] ? kernel_read+0x120/0x120 [ 1277.929205] ? __lock_is_held+0xb5/0x140 [ 1277.933267] ? rcu_read_lock_sched_held+0x108/0x120 [ 1277.938270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1277.943795] ? __sb_start_write+0x1b2/0x370 [ 1277.948097] vfs_write+0x1fc/0x560 [ 1277.951624] ksys_write+0x101/0x260 [ 1277.955235] ? __ia32_sys_read+0xb0/0xb0 [ 1277.959281] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1277.964725] __x64_sys_write+0x73/0xb0 [ 1277.968596] do_syscall_64+0x1b9/0x820 [ 1277.972465] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1277.977812] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1277.982725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1277.987565] ? trace_hardirqs_on_caller+0x310/0x310 [ 1277.992573] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1277.997571] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1278.002569] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1278.007409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1278.012582] RIP: 0033:0x457569 [ 1278.015753] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1278.034644] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1278.042337] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1278.049587] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1278.056872] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1278.064118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1278.071377] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff 07:53:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1278.097651] Mem-Info: [ 1278.100182] active_anon:156986 inactive_anon:110 isolated_anon:0 [ 1278.100182] active_file:21407 inactive_file:38374 isolated_file:0 [ 1278.100182] unevictable:0 dirty:312 writeback:0 unstable:0 [ 1278.100182] slab_reclaimable:14402 slab_unreclaimable:104378 [ 1278.100182] mapped:55540 shmem:136 pagetables:1552 bounce:0 [ 1278.100182] free:1209809 free_pcp:767 free_cma:0 07:53:45 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xe0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1278.134565] Node 0 active_anon:630048kB inactive_anon:440kB active_file:85628kB inactive_file:153496kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222160kB dirty:1248kB writeback:0kB shmem:544kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 364544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1278.163415] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1278.207993] lowmem_reserve[]: 0 2819 6323 6323 [ 1278.212701] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:68kB free_cma:0kB [ 1278.212740] lowmem_reserve[]: 0 0 3503 3503 [ 1278.212767] Node 0 Normal free:1933868kB min:37352kB low:46688kB high:56024kB active_anon:627772kB inactive_anon:440kB active_file:85628kB inactive_file:153496kB unevictable:0kB writepending:1248kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6496kB pagetables:6060kB bounce:0kB free_pcp:2156kB local_pcp:1192kB free_cma:0kB [ 1278.212803] lowmem_reserve[]: 0 0 0 0 [ 1278.212830] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB [ 1278.245016] (U) [ 1278.293657] 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB 07:53:45 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) fremovexattr(r0, &(0x7f0000000040)=@random={'btrfs.', '\x00'}) [ 1278.318245] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB 07:53:45 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1278.356239] Node 0 Normal: 4285*4kB (UE) 295*8kB (UME) 66*16kB (UE) 1285*32kB (UME) 576*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 4*2048kB (ME) 434*4096kB (M) = 1932908kB [ 1278.375378] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1278.384436] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.385111] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1278.406894] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.413614] gfs2: can't parse mount arguments [ 1278.420330] gfs2: can't parse mount arguments [ 1278.420657] 59916 total pagecache pages [ 1278.438181] 0 pages in swap cache [ 1278.450502] Swap cache stats: add 0, delete 0, find 0/0 [ 1278.463599] Free swap = 0kB [ 1278.466809] Total swap = 0kB 07:53:45 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1278.470000] 1965979 pages RAM [ 1278.473347] 0 pages HighMem/MovableOnly [ 1278.477667] 342307 pages reserved [ 1278.501479] 0 pages cma reserved [ 1278.506226] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:45 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x400000000200, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r1}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=@canfd={{0x3, 0xfd78, 0x400}, 0x3b, 0x0, 0x0, 0x0, "af0721b13d1bbef10497aeb67c2dd1975e5a3742a97eea8913479bbbce160116305e621d51af67c4d4dd60964f5dd7b54268567f9d884d004a85ccc567b18b4e"}, 0x48}}, 0x80) [ 1278.520754] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.527924] sel_write_load: 42 callbacks suppressed [ 1278.527929] SELinux: failed to load policy [ 1278.547473] gfs2: can't parse mount arguments [ 1278.566593] gfs2: can't parse mount arguments 07:53:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet(0x2, 0xe, 0x10001) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000000)={0x7, [0x1, 0x5, 0x5, 0xffffffff, 0xe8da, 0x3, 0x8001]}, 0x12) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:45 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000500000000000800000007000000"], 0x20) [ 1278.576991] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.608695] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.617137] gfs2: can't parse mount arguments 07:53:45 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000140)) accept$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000200)=0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) fgetxattr(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="736563b37f7e27766a5bd3656c696e75782f637170726f7400000000000000"], &(0x7f0000000080)=""/68, 0x44) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000180)=0x5) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) [ 1278.624058] gfs2: can't parse mount arguments 07:53:45 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:45 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20101, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1278.660379] SELinux: failed to load policy [ 1278.671142] SELinux: policydb version 327701 does not match my version range 15-31 [ 1278.679316] SELinux: failed to load policy 07:53:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815002000000000000800000007000000"], 0x20) 07:53:46 executing program 4: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000540)=""/105, 0x69}, {&(0x7f00000005c0)=""/109, 0x6d}, {&(0x7f0000000640)=""/241, 0xf1}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x4, &(0x7f0000001740)=""/163, 0xa3, 0x8}, 0x12000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000001840)={0x9, [0x137, 0x6, 0x9, 0x1ff, 0x6, 0x5, 0xff, 0x577, 0x9]}, &(0x7f0000001880)=0x16) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/checkreqprot\x00', 0x203, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0xffffff2f) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000180)={&(0x7f0000001b40)=""/255, 0x1000002, 0x800, 0x83}, 0x232) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r3, 0xb7af, 0x10}, 0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001940)={0x0, @in={{0x2, 0x4e21, @broadcast}}, 0xe7, 0xfe}, &(0x7f0000001a00)=0x90) setsockopt$inet6_buf(r0, 0x29, 0x2f, &(0x7f0000001b40), 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001a40)={r5, @in6={{0xa, 0x4e21, 0x7, @mcast2, 0x1000}}, 0x3ff, 0x8001}, 0x90) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000400)=""/139) fstat(r4, &(0x7f0000000280)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001b00)=0x13d, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x80, 0x100, 0x8, 0x7fff800, 0xfffffffffffffffa, 0x7, 0x400, 0x39829dfb, 0x0}, &(0x7f0000000300)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x3ff, 0x20c, 0x2, 0x101, r6}, 0x10) fstat(r2, &(0x7f00000018c0)) [ 1278.715564] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.754878] gfs2: can't parse mount arguments 07:53:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2#', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1278.771222] SELinux: policydb version 2097173 does not match my version range 15-31 [ 1278.804855] SELinux: failed to load policy [ 1278.809706] SELinux: failed to load policy 07:53:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10400, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRES32=0x0], @ANYBLOB="bd9e4c9fbcd2947c3aec4bfea19f13978513e55f65090a1aafce8eb8f0fd45318277027142dbd2f4833aba1ecaa0d0c63ee34c958b1a973ce2853b83955b3d507b573aa9543853cc199c30a19751d5be5b6a37d8748bb97990af45bb85f678d32a9d4e90daef6e1a60054f56085bd8c3a0eccc4e476728e0605ac92871adc024902cad8a9cfa019c78a9fed76e579359d89d451bcdd6c872ed25898f03e601a7c15323ea4fdc580b26cadb57a51409586e058e100bb45c29e881cd5aa202406df89e9d3c16ba529e3a2cbf15c16642510a78acb1330c74d0100d07546a", @ANYRES64=0x0, @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYBLOB="62c3423754b8c7cc8e1bec42c7da91491392f5e43de0213446b89b9a81daa7ae408e52b1cee50178f10a510ca057622c4c7fde4003a07db4e0c6ef2afc18c3ee10cc780e7337316ee10d2e47a5dcd35a7fa551c421b5575b50809daa7f167dad97e2afa9c1854af9811ecd944116c65ddbbb0401589772f16c4ae8e6cc75f01a1b796ed5b33cf7683e82f137e8c57e91e2cfd08fe354ae11f53e2cd37e7fe44cc1750cd01b831bc92e23f51c729bc84a71fd8d0b9c6d64ab07bd7c71290889269f939b01698d8ccb48f870da779b4b01c117", @ANYRES32=r0], @ANYRESDEC], 0x137) 07:53:46 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1278.819968] SELinux: failed to load policy 07:53:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000500000007000000"], 0x20) 07:53:46 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x6}, 0x7) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000140)={0x1eee, 0x2, 0x8, 0x9, [], [], [], 0xf7, 0x100000001, 0xb524, 0x0, "e317254c329d1bc2f5d96704e40c76ce"}) write$P9_RREAD(r0, &(0x7f0000000080)={0x99, 0x75, 0x1, {0x8e, "39a03080d52c3d08981b704074a2b8141afcee448fc0e0e57cc6d812de4be383b47c8ffba87ac938a198ca7cdcc02232e9133b0ea9445c8007c1d06c61b0120f9a1d07f956e8b5a00a1c423b1a06e242cd540b7276908a7b33059e202556a4d9b707074c9381e3a9239407ee70edf16da16ce186ba8b940005cfa36cc184d80e96f618c89f26275b93b17776256f"}}, 0x99) [ 1278.887921] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.910101] gfs2: can't parse mount arguments [ 1278.949147] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 1278.963668] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1278.987631] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:46 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) pipe2(&(0x7f0000000040), 0x4000) [ 1278.999885] gfs2: can't parse mount arguments [ 1279.015252] gfs2: can't parse mount arguments [ 1279.023529] SELinux: failed to load policy [ 1279.037655] SELinux: policydb table sizes (5,7) do not match mine (8,7) [ 1279.046049] SELinux: failed to load policy 07:53:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1279.051677] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 1279.062785] SELinux: failed to load policy 07:53:46 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000900000007000000"], 0x20) 07:53:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffc000/0x2000)=nil, 0x1, 0x3, 0x6a, &(0x7f0000ffc000/0x1000)=nil, 0xfffffffffffffffe}) [ 1279.131138] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.137790] gfs2: can't parse mount arguments 07:53:46 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x600000, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7}, 0x7) [ 1279.176836] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.199847] gfs2: can't parse mount arguments [ 1279.218461] SELinux: failed to load policy 07:53:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733218", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:46 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000500)) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffff39}, 0x64e) recvmsg(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000140)=""/127, 0x7f}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/44, 0x2c}, {&(0x7f0000000280)=""/142, 0x8e}, {&(0x7f0000000340)=""/61, 0x3d}], 0x5, &(0x7f0000000400)=""/116, 0x74, 0xd2}, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f00000004c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000540)={0x798, 0x9, 0x0, 0x5, r2}, 0x10) [ 1279.234612] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.239778] SELinux: policydb table sizes (9,7) do not match mine (8,7) [ 1279.256148] gfs2: can't parse mount arguments 07:53:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815040000000000000800000007000000"], 0x20) 07:53:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000001280)={0x0, 0x208, 0x3, 0x8, 0x0}, &(0x7f00000012c0)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001100)={r2, @in6={{0xa, 0x4e20, 0x5, @local, 0x5}}}, &(0x7f00000011c0)=0xea11afa1106e056f) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000001200)={r3, 0x7, 0x10, 0x6, 0x5}, &(0x7f0000001240)=0x18) getsockopt(r1, 0x0, 0x400000000000, &(0x7f00000000c0)=""/4096, &(0x7f0000001300)=0x1000) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1279.311323] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.335160] gfs2: can't parse mount arguments [ 1279.348141] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.362600] gfs2: can't parse mount arguments 07:53:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000040000000800000007000000"], 0x20) 07:53:46 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2b4d48c6e3d2740fa1aee4bee1"], 0x1) 07:53:46 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x46b) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) [ 1279.398646] SELinux: policydb version 1045 does not match my version range 15-31 07:53:46 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1279.545346] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:46 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000300000000000800000007000000"], 0x20) [ 1279.586283] gfs2: can't parse mount arguments 07:53:46 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:46 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="00e8ff00d9"], 0x1) 07:53:46 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)=0x0) ptrace$getenv(0x4201, r0, 0x4, &(0x7f00000001c0)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f00000004c0)=""/143) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000200)=""/163) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f00000003c0)=0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0x6, 0x40, 0x9, 0x0, 0x0, [], [], [], 0x9, 0xfffffffffffff380}) syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaa9aaaaf44337778cfa86dd6050a09c00082f00fe800000000000000000e1ffffffffbafe803bd6429ddaf0"], &(0x7f0000000100)) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@ipv4={[], [], @remote}, 0x61, r2}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000002c0)) [ 1279.668322] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.676208] SELinux: policydb version 196629 does not match my version range 15-31 [ 1279.692846] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.699176] gfs2: can't parse mount arguments [ 1279.707636] gfs2: can't parse mount arguments 07:53:47 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[], 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000000c0)={0x2, 0x1}, 0x2) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="0102bf29d59b000000000006000000"]) 07:53:47 executing program 4: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e23, 0x8, @mcast1, 0x8}}, 0x7, 0x6}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r1, 0x8}, 0x8) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x8180) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x101000, 0x0) flistxattr(r2, &(0x7f0000000080)=""/149, 0x95) write$P9_RLINK(r2, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:47 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815006000000000000800000007000000"], 0x20) 07:53:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="676673321b", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1279.785509] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1279.809142] gfs2: can't parse mount arguments [ 1279.815773] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:47 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1279.847881] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1279.852497] gfs2: can't parse mount arguments [ 1279.869626] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1279.875873] CPU: 1 PID: 29939 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1279.883159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1279.892511] Call Trace: [ 1279.895117] dump_stack+0x1c4/0x2b4 [ 1279.898767] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1279.903967] ? kasan_check_read+0x11/0x20 [ 1279.908129] warn_alloc.cold.119+0xb7/0x1bd [ 1279.912461] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1279.917318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.922892] __vmalloc_node_range+0x472/0x750 [ 1279.927393] ? graph_lock+0x170/0x170 [ 1279.931203] ? __lock_is_held+0xb5/0x140 [ 1279.935284] ? sel_write_load+0x1d1/0x460 [ 1279.939437] vmalloc+0x6f/0x80 [ 1279.942637] ? sel_write_load+0x1d1/0x460 [ 1279.946792] sel_write_load+0x1d1/0x460 [ 1279.950779] __vfs_write+0x119/0x9f0 [ 1279.954501] ? check_preemption_disabled+0x48/0x200 [ 1279.959538] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1279.964472] ? kernel_read+0x120/0x120 [ 1279.968379] ? __lock_is_held+0xb5/0x140 [ 1279.972460] ? rcu_read_lock_sched_held+0x108/0x120 [ 1279.977485] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1279.983041] ? __sb_start_write+0x1b2/0x370 [ 1279.987386] vfs_write+0x1fc/0x560 [ 1279.990955] ksys_write+0x101/0x260 [ 1279.994611] ? __ia32_sys_read+0xb0/0xb0 [ 1279.998682] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1280.004149] __x64_sys_write+0x73/0xb0 [ 1280.008047] do_syscall_64+0x1b9/0x820 [ 1280.011938] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1280.017309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1280.022244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1280.027090] ? trace_hardirqs_on_caller+0x310/0x310 [ 1280.032111] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1280.037148] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1280.042176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1280.047034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.052224] RIP: 0033:0x457569 [ 1280.055418] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1280.074309] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1280.074324] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1280.074332] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 1280.074347] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1280.074355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1280.074364] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1280.076505] Mem-Info: [ 1280.090097] active_anon:157487 inactive_anon:111 isolated_anon:0 [ 1280.090097] active_file:21407 inactive_file:38397 isolated_file:0 [ 1280.090097] unevictable:0 dirty:335 writeback:0 unstable:0 [ 1280.090097] slab_reclaimable:14401 slab_unreclaimable:104676 07:53:47 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="6d0000007e7bb894cbc4c4be67acd5166384c5fbe1b660e26d3e924161f4cad44db7173bbb6e2c92f619cd3df1ce4e76325f98bc5fa61472a3d93f60572f7f014cf5623698a5d9d56847a3c91e145c595d785dd3abcacc4275a0d6deedfe9eb05b2e6726c8d5c79c44983a6f5e51540d93"], &(0x7f00000000c0)=0x75) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000180)={0x3, 0x8, 0x3}) unlinkat(r0, &(0x7f0000000140)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000100)={r1, 0x1, 0x1ff}, 0x8) [ 1280.090097] mapped:55574 shmem:137 pagetables:1543 bounce:0 [ 1280.090097] free:1209068 free_pcp:733 free_cma:0 [ 1280.172112] Node 0 active_anon:627684kB inactive_anon:444kB active_file:85628kB inactive_file:153588kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222196kB dirty:1340kB writeback:0kB shmem:548kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 364544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1280.201633] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1280.228155] lowmem_reserve[]: 0 2819 6323 6323 [ 1280.233049] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1280.276576] lowmem_reserve[]: 0 0 3503 3503 [ 1280.282545] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:47 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$void(r0, 0x0) [ 1280.288993] Node 0 Normal free:1930424kB min:37352kB low:46688kB high:56024kB active_anon:629764kB inactive_anon:444kB active_file:85628kB inactive_file:153588kB unevictable:0kB writepending:1340kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6528kB pagetables:6320kB bounce:0kB free_pcp:1748kB local_pcp:716kB free_cma:0kB [ 1280.319325] gfs2: can't parse mount arguments [ 1280.334884] lowmem_reserve[]: 0 0 0 0 07:53:47 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:47 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000000c0)={0x15, 0x110, 0xfa00, {r1, 0xffffffff80000001, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x2, @empty, 0x10001}, @in={0x2, 0x4e21, @loopback}}}, 0x118) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1280.339250] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1280.356400] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1280.371891] Node 0 Normal: 4331*4kB (UME) 273*8kB (UME) 44*16kB (UE) 1279*32kB (UME) 578*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 3*2048kB (ME) 434*4096kB (M) = 1930452kB [ 1280.403256] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1280.420369] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1280.427011] gfs2: can't parse mount arguments [ 1280.440881] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 07:53:47 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:47 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x7, 0xaf6, 0x2, 0x5f71, 0x3}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x7ff, 0x7, 0xfffffffffffffffc, 0x1000, 0xfffffffffffffffa}, &(0x7f0000000180)=0x14) r2 = dup2(r0, r0) write$P9_RLINK(r2, &(0x7f0000000040)={0xffffffffffffff39}, 0xffffffffffffff6f) [ 1280.459422] 59940 total pagecache pages [ 1280.471399] 0 pages in swap cache [ 1280.474862] Swap cache stats: add 0, delete 0, find 0/0 [ 1280.480215] Free swap = 0kB [ 1280.486867] Total swap = 0kB [ 1280.490051] 1965979 pages RAM [ 1280.493506] 0 pages HighMem/MovableOnly [ 1280.497471] 342307 pages reserved 07:53:47 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332f6", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1280.522914] 0 pages cma reserved [ 1280.526614] SELinux: policydb version 6291477 does not match my version range 15-31 [ 1280.561625] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1280.582380] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1280.590210] gfs2: can't parse mount arguments [ 1280.604793] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1280.611488] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1280.627277] gfs2: can't parse mount arguments [ 1280.639600] CPU: 1 PID: 29939 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1280.646889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1280.656245] Call Trace: [ 1280.656274] dump_stack+0x1c4/0x2b4 [ 1280.656307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1280.662495] ? kasan_check_read+0x11/0x20 [ 1280.662518] warn_alloc.cold.119+0xb7/0x1bd [ 1280.662534] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1280.662555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1280.662592] __vmalloc_node_range+0x472/0x750 [ 1280.691051] ? graph_lock+0x170/0x170 [ 1280.694860] ? __lock_is_held+0xb5/0x140 [ 1280.698934] ? sel_write_load+0x1d1/0x460 [ 1280.703100] vmalloc+0x6f/0x80 [ 1280.706326] ? sel_write_load+0x1d1/0x460 [ 1280.710474] sel_write_load+0x1d1/0x460 [ 1280.714463] __vfs_write+0x119/0x9f0 [ 1280.718186] ? check_preemption_disabled+0x48/0x200 [ 1280.723204] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1280.728136] ? kernel_read+0x120/0x120 [ 1280.732043] ? __lock_is_held+0xb5/0x140 [ 1280.736116] ? rcu_read_lock_sched_held+0x108/0x120 [ 1280.741135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1280.746675] ? __sb_start_write+0x1b2/0x370 [ 1280.751007] vfs_write+0x1fc/0x560 [ 1280.754556] ksys_write+0x101/0x260 [ 1280.758189] ? __ia32_sys_read+0xb0/0xb0 [ 1280.762264] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1280.767740] __x64_sys_write+0x73/0xb0 [ 1280.771635] do_syscall_64+0x1b9/0x820 [ 1280.775547] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1280.780922] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1280.786351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1280.791201] ? trace_hardirqs_on_caller+0x310/0x310 [ 1280.796227] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1280.801335] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1280.806364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1280.811219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1280.816412] RIP: 0033:0x457569 [ 1280.819605] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1280.838508] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1280.846229] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1280.853501] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005 [ 1280.860774] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1280.868041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1280.875311] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff 07:53:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r0], 0x14) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000080)={'veth1_to_bond\x00', {0x2, 0x4e23, @loopback}}) write$eventfd(r1, &(0x7f0000000100)=0xfff, 0x8) 07:53:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000700000007000000"], 0x20) 07:53:48 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0xc0100, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1280.926261] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1280.932870] gfs2: can't parse mount arguments [ 1280.938080] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1280.950446] gfs2: can't parse mount arguments 07:53:48 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0x401, 0x0) write$P9_RLINK(r0, &(0x7f00000000c0)={0xfffffffffffffc72}, 0x7) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)=0x4000) 07:53:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000300000007000000"], 0x20) [ 1280.982943] SELinux: policydb table sizes (7,7) do not match mine (8,7) 07:53:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1281.031240] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c [ 1281.042121] SELinux: policydb magic number 0x30303030 does not match expected magic number 0xf97cff8c 07:53:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='A'], 0x1) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x4, &(0x7f00000022c0)=[{&(0x7f0000000200)="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", 0x1000, 0x7}, {&(0x7f0000000100)="d7a238bd8857c5b3f22ad2e6d12d1b982129d86281c811ba50179ddd78408eaba52151f52bf3cee14a671f4f4ef5812fff51516a38093839b90f9e973599fe5c2ca58f812383d080", 0x48, 0x5}, {&(0x7f0000001200)="2d25f5e9d230168b8635fff83123940abeb74b4d52f74617b6cf3c57a2ac94ded48aa8d1185a531aae6ae92458340f4e50325bebca513cf982ccc186cd294b8e567974aa1b66a0a45579682d6661788bd40b51508ee008887aaca75d2f4467c75a2f25771d8d9b4f312842e59fc3748afa6964d3c486076817fd524adfe606b57f5c449d4b3454cf240eaeb84477d189d40d6899b1d665e18c6375e950997d5cb4de8cf31727e971", 0xa8, 0x44f6}, {&(0x7f00000012c0)="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", 0x1000, 0xa9b2}], 0x120000, &(0x7f0000000180)='ppp1\'wlan0\x00') [ 1281.113428] SELinux: policydb table sizes (3,7) do not match mine (8,7) [ 1281.129762] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.155865] gfs2: can't parse mount arguments 07:53:48 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\b', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000030000000800000007000000"], 0x20) 07:53:48 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000001c0)=""/57) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0x12) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000040)=0xc3fa, &(0x7f0000000080)=0x2) [ 1281.177842] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.206087] gfs2: can't parse mount arguments 07:53:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000010000000800000007000000"], 0x20) [ 1281.247335] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.267368] gfs2: can't parse mount arguments [ 1281.273192] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.279602] gfs2: can't parse mount arguments 07:53:48 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) accept$nfc_llcp(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x60) 07:53:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYRES64=r0], 0x8) 07:53:48 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:48 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f00000001c0)="18e061885776f066188eb996f20e2e3439e1f36e92959c1372c695240c0286351abab2a0b07f20448c51f33b06d5dfd62464c43e7dd84956fb06138d1e0ff488efd309ec1820c61101b7aaf847808fd4eb30016d77e0e874a627be48b704214e7ccda04c47cb258072edca01e29df4795964db243c2d2bc894") 07:53:48 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000200000000800000007000000"], 0x20) [ 1281.458165] SELinux: policydb magic number 0x3 does not match expected magic number 0xf97cff8c 07:53:48 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x8, r1, 0x401, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}]}, 0x20}}, 0x4000000) 07:53:48 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000700000000000800000007000000"], 0x20) 07:53:48 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733218", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:48 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) [ 1281.563392] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.569743] gfs2: can't parse mount arguments [ 1281.582988] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1281.609022] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.616548] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1281.623572] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1281.629980] gfs2: can't parse mount arguments [ 1281.635898] gfs2: can't parse mount arguments [ 1281.656960] CPU: 0 PID: 30104 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1281.664248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1281.673599] Call Trace: [ 1281.676197] dump_stack+0x1c4/0x2b4 [ 1281.679843] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1281.685044] ? kasan_check_read+0x11/0x20 [ 1281.689216] warn_alloc.cold.119+0xb7/0x1bd [ 1281.693540] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1281.698396] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.703965] __vmalloc_node_range+0x472/0x750 [ 1281.708484] ? graph_lock+0x170/0x170 [ 1281.712288] ? __lock_is_held+0xb5/0x140 [ 1281.716364] ? sel_write_load+0x1d1/0x460 [ 1281.720519] vmalloc+0x6f/0x80 [ 1281.723718] ? sel_write_load+0x1d1/0x460 [ 1281.727874] sel_write_load+0x1d1/0x460 [ 1281.731873] __vfs_write+0x119/0x9f0 [ 1281.735595] ? check_preemption_disabled+0x48/0x200 [ 1281.740626] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1281.745577] ? kernel_read+0x120/0x120 [ 1281.749474] ? __lock_is_held+0xb5/0x140 [ 1281.753551] ? rcu_read_lock_sched_held+0x108/0x120 [ 1281.758575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1281.764111] ? __sb_start_write+0x1b2/0x370 [ 1281.768437] vfs_write+0x1fc/0x560 [ 1281.772005] ksys_write+0x101/0x260 [ 1281.775643] ? __ia32_sys_read+0xb0/0xb0 [ 1281.779711] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1281.785170] __x64_sys_write+0x73/0xb0 [ 1281.789087] do_syscall_64+0x1b9/0x820 [ 1281.792973] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1281.798340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1281.803271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1281.808099] ? trace_hardirqs_on_caller+0x310/0x310 07:53:48 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x7ff, 0x4) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000000)=[0x236ffe23, 0x5, 0xffffffff80000000, 0x6, 0x1], 0x5, 0x7f, 0x7, 0xffffffff, 0xaff, 0x7, {0x5, 0x2f4, 0x448, 0x16, 0x5, 0x100000001, 0xa5, 0x6, 0x5, 0x8, 0x3, 0x6, 0x100, 0x5, "1e9afc3452cfeb5220af4fa38af5f78d127bcfc2dbfb371b74900737c0c16422"}}) ioctl(r0, 0x1008, &(0x7f0000000040)="53b78c869a7399a07fd1740b34d6fe17504de99b4835970a602d89ae7a7a52fad567c293afc8c785536e9556716df98cfe93044daf3525396922f94af1") 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x2200, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000080)={0x20}) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000200)={0x0, 'bpq0\x00', 0x1}, 0x18) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1281.813108] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1281.818119] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1281.823121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1281.827969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1281.833154] RIP: 0033:0x457569 [ 1281.836364] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1281.836373] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1281.836388] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1281.836396] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1281.836404] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1281.836412] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1281.836420] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1281.847745] warn_alloc_show_mem: 1 callbacks suppressed [ 1281.847749] Mem-Info: [ 1281.877475] active_anon:157497 inactive_anon:110 isolated_anon:0 07:53:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2h', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) [ 1281.877475] active_file:21407 inactive_file:38421 isolated_file:0 [ 1281.877475] unevictable:0 dirty:369 writeback:0 unstable:0 [ 1281.877475] slab_reclaimable:14403 slab_unreclaimable:104774 [ 1281.877475] mapped:55549 shmem:137 pagetables:1554 bounce:0 [ 1281.877475] free:1209020 free_pcp:676 free_cma:0 [ 1281.885498] Node 0 active_anon:629988kB inactive_anon:440kB active_file:85628kB inactive_file:153684kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222196kB dirty:1476kB writeback:0kB shmem:548kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 368640kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1281.953447] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1282.052583] lowmem_reserve[]: 0 2819 6323 6323 [ 1282.069937] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:68kB free_cma:0kB [ 1282.098666] lowmem_reserve[]: 0 0 3503 3503 [ 1282.113053] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.121099] gfs2: can't parse mount arguments [ 1282.126283] Node 0 Normal free:1929880kB min:37352kB low:46688kB high:56024kB active_anon:629948kB inactive_anon:440kB active_file:85628kB inactive_file:153684kB unevictable:0kB writepending:1476kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6560kB pagetables:6216kB bounce:0kB free_pcp:2168kB local_pcp:1388kB free_cma:0kB 07:53:49 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0x40000000c0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) [ 1282.178876] lowmem_reserve[]: 0 0 0 0 [ 1282.184667] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1282.199544] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) r3 = geteuid() write$P9_RSTATu(r0, &(0x7f00000001c0)={0x8c, 0x7d, 0x1, {{0x0, 0x6b, 0x100000000, 0x3, {0x44, 0x0, 0x8}, 0x1000000, 0x5, 0x6, 0xfb, 0x0, "", 0x16, '/selinux/checkreqprot\x00', 0x21, 'security%posix_acl_access-md5sum]', 0x1, '.'}, 0xc, 'wlan0em1em1\'', r1, r2, r3}}, 0x8c) [ 1282.215268] Node 0 Normal: 4266*4kB (UME) 343*8kB (UME) 114*16kB (UE) 1262*32kB (UME) 579*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 4*2048kB (ME) 434*4096kB (M) = 1933440kB [ 1282.234440] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1282.244561] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1282.256306] 59964 total pagecache pages [ 1282.260937] 0 pages in swap cache [ 1282.264396] Swap cache stats: add 0, delete 0, find 0/0 [ 1282.269748] Free swap = 0kB [ 1282.273258] Total swap = 0kB [ 1282.276280] 1965979 pages RAM [ 1282.279365] 0 pages HighMem/MovableOnly [ 1282.285561] 342307 pages reserved [ 1282.289014] 0 pages cma reserved [ 1282.294000] SELinux: policydb version 458773 does not match my version range 15-31 07:53:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000010000000007000000"], 0x20) 07:53:49 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2"', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x5, 0x0, [], [{0x26, 0x1, 0x1, 0x7, 0xc7, 0x1ff}, {0x4, 0x7, 0x6, 0x9, 0xfff, 0x4}], [[], [], [], [], []]}) 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x16, &(0x7f0000000040)='/selinux/checkreqprot\x00'}, 0x30) write$P9_RGETLOCK(r0, &(0x7f00000000c0)={0x3a, 0x37, 0x1, {0x0, 0x0, 0x1, r1, 0x1c, "2e7070703076626f786e6574307b5c27295c6367726f7570d85b6c6f"}}, 0x3a) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 1282.423317] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1282.441808] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1282.452809] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.459155] gfs2: can't parse mount arguments 07:53:49 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0x5, 0x4) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:49 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000001000000007000000"], 0x20) 07:53:49 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000040)=0x3ff) [ 1282.549438] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.559678] gfs2: can't parse mount arguments [ 1282.586179] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:49 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1282.625678] gfs2: can't parse mount arguments [ 1282.630842] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.637177] gfs2: can't parse mount arguments [ 1282.651222] SELinux: policydb table sizes (16,7) do not match mine (8,7) 07:53:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7042374be8ebcef5bcd059cec34f6ded3ae76f17a97c5cccca3e6be99fe536584e7fd445a29394ee13000ac1657636b181998b8007c12681a9f7129d17cc5d0fdffa47"], 0x1) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xc4) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x141082, 0x110) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 07:53:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000600000007000000"], 0x20) 07:53:50 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = gettid() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)={r0, r0, 0x7}) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:50 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x65) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0xffffffffffffffff, 0x8202, 0x8000, 0x10001, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000140)={r2, 0x89, "efc4913644b6bcc8f1d8918519b3db7d9be2592fc4083657ea68897ec8be66c85b1399777397ca83f13d2ab48c98695872601e1f0294084f03e4673eabb4a3dfd414690143a30e0da3198f3dfd563e3a4255359a80cc3362c4c2c8b270f562a0f642a12bd44f13f39361703926406bf5ca3215130cd35091e3cd7d6dac22316bff6cde1fb74de3f14f"}, &(0x7f0000000200)=0x91) 07:53:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000070000000800000007000000"], 0x20) 07:53:50 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xb4, 0x8001) write$P9_RMKDIR(r0, &(0x7f0000000080)={0xffffffffffffffa4, 0x49, 0x1, {0x18, 0x1, 0x5}}, 0x399866301cb03d82) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1282.826870] SELinux: policydb table sizes (6,7) do not match mine (8,7) [ 1282.907163] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.919362] gfs2: can't parse mount arguments [ 1282.924942] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.949290] gfs2: can't parse mount arguments [ 1282.971484] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1282.992850] gfs2: can't parse mount arguments [ 1282.998083] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) 07:53:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000020000000007000000"], 0x20) 07:53:50 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x80) [ 1283.028228] gfs2: can't parse mount arguments 07:53:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1283.093992] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1283.104951] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1283.131242] gfs2: can't parse mount arguments [ 1283.136052] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1283.143818] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1283.165662] gfs2: can't parse mount arguments 07:53:50 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\t', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:50 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getegid() ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000000c0)={0x1, 0x0, 0x2080, {0x14000, 0x0, 0x1}, [], "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", "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"}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000002140)={@empty, 0x0}, &(0x7f0000002180)=0x14) connect$can_bcm(r0, &(0x7f00000021c0)={0x1d, r2}, 0x10) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8d"], 0x1) 07:53:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000008000000007000000"], 0x20) 07:53:50 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x5, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) 07:53:50 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:50 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RWRITE(r0, &(0x7f0000000040)={0xb, 0x77, 0x2, 0x9c}, 0xb) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1283.272976] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1283.279321] gfs2: can't parse mount arguments [ 1283.309191] SELinux: policydb table sizes (128,7) do not match mine (8,7) 07:53:50 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) 07:53:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000200000007000000"], 0x20) [ 1283.363433] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1283.370033] gfs2: can't parse mount arguments 07:53:50 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xe0101, 0x0) r1 = add_key$user(&(0x7f0000001180)='user\x00', &(0x7f0000001140)={'syz', 0x1}, &(0x7f00000000c0)="24aa63722231c5d6b494f7552d7822558f7649224123dca55d1d7d32e474a14309fd5196c0d3ce6ca348362bc0177748f436c23ca707292ecfc519ad60f55ef2f0aa9dae176b063217ac8de3a275bb3263f8d912c6441fa032fbec92546a40223e9160dbfbd42f62fcfa89fbc3f4464891a00b8b9c144742580d2fd57a5f9502a2c696c6b075a31242b21dd3a06fc1188b3866b3e92bd8d0c983ba72365caee5017d6d33cd79ca16b88fc9c89e626f534c9726520d0b28f95393cd366918f0d1801e3888423712f95e6b5e16cd3f08610da3438a51c5305fe132fbbd04bf5f2a1e384093881d33b3ec3dbc955936f95c4f9a78e10913de93ce305edccb2761e8415d4e9aa1eb6aabe3813fbf2b377ac09ed762e3bfda0b1da1551d1705d64ec435dce7d27129eaedd254047c2fe39837fb9f11c5a9c9235580a4b5b839def1c959532d4969d3a5236802cd6e87f1a59cdf6f68b6ee14871fef1bcb35b130e2f6d6a4bbd5cf03f5ea8279a5034bc643dca92e39541062d80a1c376bc1267da13f1150023d6feb19a323c5ad9b052fca100fb3b98e85653544e68a3368bc76221690def74cd792694b56f209d50bc838abce79d31984ab57c7f88fd0d1d682575dcbe75b5e07f21b7d55a76f55f76c440ca86feb75bf0d1cf624e29e1df792b0cbdcb4687be7e50bc93d66e8690b1d2c0e77222b0790ae20658df0a085f2de8645a078887e1ac407ad15a3fd20dcb51e8be7291fe746162b76b1c3461b1bce22cf44ce7f6a8fb36172e7a9478042938a17802e362d32a6d2b4cbe9d3af0a05391bbc0c7123d73fb3218bb139a1fe686ffa11115400ca94fdc14d2a21de780f3dc94742e28be7b4eb3bb4e671f8aed386716c20c6fcf9aca85207ffab8978ec094dd9fbc4f928decf7c5253632cd89dc69576d38caa45981ae9683c730d916421babaac61d0f98c974df0746dd6de78a9850f6af0be91f6339c4643845e404cea763c2e54ceeeb40d54c2828b93c61ccbe9fed672f8724f35738a847ce9b48d6ee6d33f369beb621f5ea841b53e8db8ab3b04426851a6c0b6d44cf7d91fc5b9022d8ce556f9815bc4d8f456b93ee86131d3dcc7cb958942be5b40e2d96738cd869faa20b2611e590f89e210da145a242f2f728859d02fbf1243a4e2664c3fa1bda84fc0c2bf4b6659bff2887f2ce6046188b634ed7b37b5d38151ea8e05c96051b05860abf6ec353fe0428cea4c16f2d0dca1aa26a166f2d18c90d1fd76cffc98bc4d54f23826e39a7ba70c7bda6c102405edebc16ec34b345020070b9c0aca6720e9a31df67debbc83ec36abfbff3600012a236350e581ac8768bba91e07c06e802aca40c0c287e1b515eb46d024832894a476836531c7be2a8c2e43b211675cdc390014e1e38cf25839382082197f9d7e9a8ccdbb0020a605e8dcaa72b5afcf3b1afb8f3fe4100b0cc656cde5e7fe65d0a65fffdba4d923bc68c42890c13fbffcba3825d288a5bf1302af38d1d37cd92f0e9695716e3a50346c802dd1a70bef0ce4da0340b63b8950aa8d4b72696cb035cb7bc8526d6bcbe7af920d710b6c4902013eb2083f3f63e9254f0b6bbae8ec39da7747f20d17abf1a489a8051a38c214aa2014b655c765b835d851400a591318ea848125def99865657abb86e0a62be0125e0f98ae776dbf025aa90a057ac479313ea3e88a7bac09ad0e15230a3c0048430daf4a04d1bc606ddab457f18d31daa0f1c7396c6adae8b5c075bebd2ed10290696fab430044117def5a1c50d8fcd2afc5ab597afd765b95ad46b2e63b39582afc5cc748986d977956b288ea5e35dea60aba203617ac51504bb40d31d275a1fffb2dee90b22de53ef458eeac8c28bdd32c309822bd194a987f99ed5f4163ac6f443281d38d99f87522beba895247f34f4c2caa016c0fd64783ac112c6c993c1a227449ad3244c03d69d0f5d33d3f26caccd43c4afd9aa4ccffb64338418797598cd9664c1da18d017e9d03294a68359c04f14475680b0a9a9c2591e1c80163d8ac43cc8b38b88aeee5a7a18b422ee21400da464e82f8beaa905f736a572b1dd9dc348f1dc95bee96985a2b16da19a2f36aae153dd55d4d316b51835489497f2f9229ee1d06e681f5319be2cfe133beed51d833f777506419898c65e6b8f8e676cdbb29443780639141a845e9e73c647c8e4c4249f41fd6532374b94958df5fa9e6cb7ca717cdc23d971cd9915a671a1782605eb54fddb91381a66a56096862bee70e142514165283b901b36cfcbffe393d0032a17a9382d42094736a598e61efde8c11ba0c79d62c15689410913d409c1afd1922d0eead8566f99235923afa5ef09f5ce20a119d5404d189c01171962deffd48a19c510d0e2e4f440f19564c10a045a77fffb8b598e60e8efd92fdcddea0feb138561f681cfb56b20ed4453020c7081986b16b1e0eb5fc1a5b5790059421cf41a7c9baff783f9e7563d8efc4c2072004dda38d932683ab5bdd67a23303b0b707e7b56c4bfbb0b87c88fac1451dfcea86aa643752bfc39391dfab3129241ab546a4f1402e71a664b282ea2f80712bd9501305548db1087b66477a337f51701f37e781008282b255d907625cf783872ea45ff9605aa86d9ef74253db1827694189129c6fac00c96be8eea555eafa960548cb0f120dd887a97ed29f38346ca9fec228675eca22e1229a6785323c3cc9088dcc50b62da1dd55a61e5e500d278f89c11afb55a91dedf130cb24bee0db5f70d1d63a95c730cce9d996570ca5993c4b46148fd5003845f73afb97cf18ef53eaace37c165dd2edf12aef4efa0ffdf50452172155381dc5f9345be3eeea916d871b5f4957bb7d1543c7bfcb0d8cc8b34c966ce8ad28304b148d23deca7ae0477d433fa03f5a30a25243bfb7ddd645f7433808a323e2e31e36fee80ac80b0659aad30f00dfd7c7cbd27b8d9b8c23ea20411626715386f8028ccff090f962127a5f3d3ecd02f5b41e9525bb3b2149495bbb251bb05e7ae434d284af3b3952e6e39386c093ff01eda80f55cf2b0ad17946d84e3cebe666304c40f2d7b1ffe11b3825a5daf6299b613fbab3f4ce9f4abf9c28bddda909c9af4848abaf86c00ef536a4aed5304ed8631fa15d2d8b22f71edb92124c69bc69e7c43f533225b9fc83254e05538e650115a1d907cc38d76b32ec6d0c7dd2299bc3cb7f26bd294859009c51e75d28beaa3cef4fba46cc791bd98fb528b7b05765eacd5a52e115181e2d0e5bcb95259d460e3fda121f21aba91bdef8b5995f095c568755611704e8fd9e4d11c9ea74c13197df389155790f5c2cd59b519dca005816654035537d5f4e2a0b241ebab4047909a35e693692c4fd13ca8247f2ab19fea66c9a1d1f7c803e4633e2658953021d3d77c6b22fe0645d6c9b29387701c270a8515b913fffab7bfc5297ec549178976eacb3876c0b3150523b700c27da78ac4eb618c11650c523d2ed4188b73d04b2364d3f8aff8b9fe77836bfb74b45dc4ea1cf078f0382761d8d23245d225e7694f1904311f36a5925a582e8766db15888e2383c408dff7513353b7a395c3300cb7919719d840d376fe9895d6ce2b2d2dc972e1f1ade05ad557b49618b634c778731d3a6f1aaeebab15b7855705b6a26d58b067ad5a9ef3a9bfc068adc32b0bcdb4a47b245af1214e5f2a3a028ea40acdff6911394754463a1cab3f1fa9af4867e6e592d00016109280277a1900668dc35c51e318147010da444910dc2e7320649a0f9af59d5fd53c6368a6ceb09ac35e63c7476afbcf8eb6bb6166f393957d8893c7acce92dcb22969b3d68bd5da7187199fa7ba318666e43cbb178aeda29d02ccae3dbd3fd379a0f7f8d125c3816b8e8e709d1efc538dd85cb0bbc804a4a46caf7b124d7ba0d54ef646671614908c4a7e132821bc3f34c755dcb27c26c974cb9c79dec300f2c4935b05ef957e266fcaf13c1c42024451c2ca58e38339d318a36fb398c4da601fccc310d5cadf51fb65f4b7127d91663ea3ed7a97ea8fec16c3c77650e460e805a6d87691307af5b4c80a7c96d6f6ff86c1481448afe51a9eae9ce464b5a61ef603c3180dca9aaf15a704bc8ac0e151a7f37365e4337b6a4aeea74a03051a3f3aa29833d47a621f18e5cd1f65bc75ebdfaf21447545760cbddcdc57506cb28cc55174051670c0339afefee7db020668d1a4da1bf5c227162212214f863b235dd63820d4df86a5af32877996501fb507e76e14361f39bb03b33f660aebb01cf2a954921f44434810dbbef1c524363d666895141fb52c5f3c1a0335395baef26f4449eb0cdd84f9de5439b70e05f0281d5501c22f1e6b095e71933fc534cc3abc32d9463654583787a802c0503c890d01d1f8aef566b7e0b6cb4a8f08e831b4470898fc0bf20eb5957494f74b3a69b4583948fa802a3703baf26c6991967f27da667569edfb16db024858218ee612a5f0f44db86920c3ff622788b44f2ba56fcd0cbdbaf8bce9ea1dc7a39f1ee75d940dd8ea72f0e1a7957ddcdd8a3833b0ada73a2ed95b5703f970caad45ed9097b0f8b6e1fcb324b02008ab71d481c7db28270b51dc44250628b4e97e7404679abb34382a8131a0fe09d603dc87049bfd6f8a444ad6bb04dfc48e521706ad65d78f9bb954c5f902e7d8b5a96f769e93b702ff9fc258faab9b06d0b323a2dcf38d25694370f50287cb2796e120e7e4cb45c3a1ce4cfa9354e1ec74dcf003cce4212fc8949f8a01fe590cdbf4477dd29da839e240c83f161b7b487d01496da73a9460f90e5e65be8828d83a61110ec60e4b5c78fb845eda15a86d6375e3a875e398c3799d30de4d6124e9e3a5a81bba43c072c5cdb76e9e33f025fad81c4fd6cccd1b9e60fa2842d33cd5f0e19f19fff35845a9a4b16114216c9d4a35d75a211f3aa02468723321fb3c2e882f6791aa9346b6b6fc89fa0a7dbf6f45afa03e6f52a93cc02a7ec7b0879070639380c8771971d9f5e6c06e55ac131d22bbc0ebecb101d94f39659f5c007adc725b2e7e571a286444ed3d69dc79c32b63a4985751a09a1fd49469ee5ebcd2a128e2d473291816eb0ba16455d4993d6a5a1e5ab74804804dab1fe28319dd1ff5afb4430aef8d0123c91d26aede453679d89ae60ca208db1ea27764e7e4326aa762703672b9463d03a532f95b433371f72c74181f14c63668b18abdb36d352f06def6b5b8dd421e550642e367229598bc81f67608484340c244be7cacc55614b6e13557253808810414276cf62a4198d25a95e8da5459a7a08ef29f319b4b25178fb69f78e0a0471506a9c2602e38d64e66e040e687bd4937aaf4b4f32ade7d1186ce63ff6a04b266397dd56774aa61be481732afbfd4bd7fb2e059b14ffd4180fa0046092fad6eb9036e12b0f65ff9fba72fa11c1efecb111b26e9e08e9c99dbc6e5892a1f2cc8c12b3670be1354e5878aa756d8dac3c35b133622a5f6d2a3037e36a56f4335741a81f5f69d87e9a19e47c6bae060c70cacdd1de31fa1b62dfc1348018490591bcaae74c05f937f494b5a96131366367b965726280be31e5b08d85d6c0cea5a89e826fe7551185f2193e3df0a82ad0e61e6e995dce5558b9274b0d9645895e08d23131cfd82b8309e81c82a92fe5fdc797a12729d1b8e4319c3436ba4bee89fb620ac0341795733a8989d736f155c8963c0b237881fc15322c9e41efc0b3a48300ef5526343271af467e9a31e4abc272050d723a6184ab18062afd7212293081a571464416dd2bc9a9bc6d15a77286a4d932185a14", 0x1000, 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f00000010c0)='keyring\x00', &(0x7f0000001100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$negate(0xd, r1, 0xcc6, r2) seccomp(0x0, 0x1, &(0x7f00000013c0)={0xa, &(0x7f0000000040)=[{0x7, 0x2, 0x6, 0x9}, {0x7, 0x9, 0x0, 0xea}, {0x4, 0x6, 0x3f, 0x4}, {0x380000, 0x5, 0xffffffff, 0x6}, {0x0, 0x1ff, 0x1, 0x7}, {0x7a, 0x2cb6, 0x200}, {0x20, 0x1, 0x4, 0x2}, {0x1, 0x8000, 0x6, 0x4}, {0xfffffffffffffe00, 0x9af0, 0x7, 0xc2b4}, {0x755, 0x21f5532, 0x10001, 0x7f}]}) r3 = fanotify_init(0x4, 0x400) write$selinux_create(r0, &(0x7f00000012c0)=ANY=[@ANYBLOB="73797374656d5f753afa9cffffff98b94d48593aad6f625f6563745f7276be73685f657865635f743a7330202f7573722f6c69622f74656c65706f6e2d636f6374726f6c2d3520303030303030303030303030303030343735353000f2e2844d14826d9fa0fae222b041034ab3a9bf57b0f96d6065160ff2faa7804e05522e800f20ead5e1910000ead0bdde04ef04a46476b8ab9752ef867ab58c6bebe763a779f432c3c577aee6a13959ebaa55a0fb4b06a17444e8b1a84cd720f28994bd1e59d40c846534d3b34784429c069d395626bf55918f89d43eaf888b1758c4ab89959b3abc2db6f82adef66800000000000000000000"], 0x5a) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) readlinkat(r3, &(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)=""/184, 0xb8) [ 1283.432968] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1283.439417] gfs2: can't parse mount arguments [ 1283.462431] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 07:53:50 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1283.488264] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1283.496702] gfs2: can't parse mount arguments 07:53:50 executing program 4: lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x16, 0x3) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x6) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000100)={0x80, 0x8, 0x2}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000140)) [ 1283.538575] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1283.545396] CPU: 0 PID: 30306 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1283.552678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.562018] Call Trace: [ 1283.564598] dump_stack+0x1c4/0x2b4 [ 1283.568219] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1283.573395] ? kasan_check_read+0x11/0x20 [ 1283.577529] warn_alloc.cold.119+0xb7/0x1bd [ 1283.581842] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1283.586679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.592215] __vmalloc_node_range+0x472/0x750 [ 1283.596697] ? graph_lock+0x170/0x170 [ 1283.600481] ? __lock_is_held+0xb5/0x140 [ 1283.604523] ? sel_write_load+0x1d1/0x460 [ 1283.608653] vmalloc+0x6f/0x80 [ 1283.611828] ? sel_write_load+0x1d1/0x460 [ 1283.615984] sel_write_load+0x1d1/0x460 [ 1283.619946] __vfs_write+0x119/0x9f0 [ 1283.623642] ? check_preemption_disabled+0x48/0x200 [ 1283.628634] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1283.633545] ? kernel_read+0x120/0x120 [ 1283.637426] ? __lock_is_held+0xb5/0x140 [ 1283.641486] ? rcu_read_lock_sched_held+0x108/0x120 [ 1283.646504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.652020] ? __sb_start_write+0x1b2/0x370 [ 1283.656326] vfs_write+0x1fc/0x560 [ 1283.659851] ksys_write+0x101/0x260 [ 1283.663459] ? __ia32_sys_read+0xb0/0xb0 [ 1283.667505] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1283.672940] __x64_sys_write+0x73/0xb0 [ 1283.676812] do_syscall_64+0x1b9/0x820 [ 1283.680701] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1283.686062] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1283.691066] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1283.695890] ? trace_hardirqs_on_caller+0x310/0x310 [ 1283.700888] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1283.705884] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1283.710892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1283.715718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.720886] RIP: 0033:0x457569 [ 1283.724072] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.742950] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1283.750639] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1283.757888] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1283.765136] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1283.772472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1283.779719] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff 07:53:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733205", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733211", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1283.788858] Mem-Info: [ 1283.791517] active_anon:156997 inactive_anon:109 isolated_anon:0 [ 1283.791517] active_file:21407 inactive_file:38445 isolated_file:0 [ 1283.791517] unevictable:0 dirty:394 writeback:0 unstable:0 [ 1283.791517] slab_reclaimable:14408 slab_unreclaimable:104415 [ 1283.791517] mapped:55535 shmem:138 pagetables:1567 bounce:0 [ 1283.791517] free:1209774 free_pcp:783 free_cma:0 [ 1283.825821] Node 0 active_anon:625864kB inactive_anon:436kB active_file:85628kB inactive_file:153780kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222140kB dirty:1576kB writeback:0kB shmem:552kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 368640kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1283.854350] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1283.880646] lowmem_reserve[]: 0 2819 6323 6323 [ 1283.885278] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:68kB free_cma:0kB [ 1283.922612] lowmem_reserve[]: 0 0 3503 3503 [ 1283.945465] Node 0 Normal free:1933776kB min:37352kB low:46688kB high:56024kB active_anon:625464kB inactive_anon:436kB active_file:85628kB inactive_file:153780kB unevictable:0kB writepending:1576kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6464kB pagetables:6120kB bounce:0kB free_pcp:1708kB local_pcp:552kB free_cma:0kB 07:53:51 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8e7, 0x200000) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:51 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x60}) write$P9_RLINK(r0, &(0x7f0000000000)={0xfffffffffffffd41}, 0x6ac) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "76f2045a84789ef9c241f28e7afd90752b152352083d5776"}, 0x1c) [ 1284.077802] lowmem_reserve[]: 0 0 0 0 [ 1284.088504] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1284.111899] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB 07:53:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1284.128173] Node 0 Normal: 4223*4kB (UME) 325*8kB (UME) 66*16kB (UE) 1269*32kB (UME) 582*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 1*2048kB (E) 435*4096kB (M) = 1930724kB [ 1284.147124] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1284.156300] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1284.170167] 59989 total pagecache pages [ 1284.174958] 0 pages in swap cache [ 1284.179244] Swap cache stats: add 0, delete 0, find 0/0 [ 1284.197909] Free swap = 0kB [ 1284.211314] Total swap = 0kB [ 1284.224943] 1965979 pages RAM 07:53:51 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x9, 0x3, 0x6, 0xf7f, 'syz0\x00', 0x7fe00000}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000000a70000001d7f55bb3d02bc16f239da248f72f068c65516e1f2a46f6ce9a83e54b34c3eaa0bb66191f61b57c8da83fb7dca38c66bb66818905a9fcee6195ad1678572798d4188e508e41cb2a5a5fca4bd3ecda7c375a953105d77e12e66904d702ec9bdb61527a10f44eac8ca45a6c5e1dc5fc4c7a317984414c68f8e4d55433a0e5158e4afce800211f74c65f1ddfe10898bdff59454c6b44e1c26c2d3d182aed2e383475ef82da8a8149c"], &(0x7f0000000180)=0xcb) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e20, 0x7, @empty, 0x8001}}, [0x8001, 0x9, 0x5, 0x0, 0x7, 0x1, 0x5, 0x4, 0x100000000000, 0xfffffffffffffffc, 0x7fffffff, 0x1, 0x5, 0x1f, 0x7]}, &(0x7f0000000580)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000640)={r1, 0x7a, 0x10}, &(0x7f0000000680)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000005c0)=@sack_info={r1, 0x3, 0x8}, &(0x7f0000000600)=0xc) write$P9_RLINK(r0, &(0x7f0000000040)={0x6d0c6afd68ccd466}, 0x6) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r2) r3 = semget$private(0x0, 0x4, 0x0) semtimedop(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1, &(0x7f0000000080)) r4 = semget$private(0x0, 0x400000000003, 0x0) semtimedop(r4, &(0x7f0000000100)=[{0x0, 0x0, 0x1800}], 0x117, &(0x7f0000000140)) semtimedop(r3, &(0x7f0000000240)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000300)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000006c0)) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x9000000000, 0x7fff, 0x3}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e22, 0x7, @mcast1, 0x3}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000380)=@assoc_value, &(0x7f00000003c0)=0x8) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f00000001c0)={0x7, 0x3}) 07:53:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733215", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYPTR, @ANYRESOCT=r0], 0x36) 07:53:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000400000007000000"], 0x20) 07:53:51 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1284.236669] 0 pages HighMem/MovableOnly [ 1284.246631] 342307 pages reserved [ 1284.254230] 0 pages cma reserved [ 1284.260664] SELinux: policydb table sizes (2,7) do not match mine (8,7) [ 1284.268176] sel_write_load: 40 callbacks suppressed [ 1284.268180] SELinux: failed to load policy [ 1284.389785] SELinux: policydb magic number 0x37373130 does not match expected magic number 0xf97cff8c 07:53:51 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000140)={0x5, [0x6, 0xfffffffffffffffb, 0x3, 0xa2, 0x85ec]}, &(0x7f0000000180)=0xe) write$P9_RLINK(r1, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x34) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000040)=""/249) 07:53:51 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0xffffffffffff836e}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000140)={r2, 0x47, "282851f661fb2bf26eae9a393dc7652cb1832200762168d048861bd8598f3c4dad2e1ad1c64d0dd8c2b06a0dc4b7e6b0baf1a53a5b51c779677be61f83ab3292633d8b4d949c85"}, &(0x7f00000001c0)=0x4f) socket$rds(0x15, 0x5, 0x0) 07:53:51 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:51 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815030000000000000800000007000000"], 0x20) [ 1284.455283] SELinux: failed to load policy [ 1284.460258] SELinux: policydb table sizes (4,7) do not match mine (8,7) [ 1284.483682] SELinux: failed to load policy 07:53:51 executing program 2: r0 = socket$kcm(0x29, 0x7, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000000)=ANY=[@ANYPTR64], 0x8) [ 1284.532122] SELinux: failed to load policy [ 1284.538427] SELinux: failed to load policy [ 1284.579098] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1284.607097] gfs2: can't parse mount arguments [ 1284.627144] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1284.646644] SELinux: failed to load policy [ 1284.668615] SELinux: policydb version 789 does not match my version range 15-31 07:53:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) sendmmsg$inet_sctp(r0, &(0x7f00000038c0)=[{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000011c0)=[{&(0x7f00000000c0)="83", 0x1}], 0x1, &(0x7f0000001280)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}], 0x20}], 0x1, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1284.682571] SELinux: failed to load policy 07:53:51 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfff, 0x40400) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) write$P9_RATTACH(r1, &(0x7f00000001c0)={0x14, 0x69, 0x2, {0x0, 0x2, 0x2}}, 0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r2, 0x400}, &(0x7f0000000180)=0x8) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1284.704473] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1284.724864] gfs2: can't parse mount arguments [ 1284.738680] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000600000000800000007000000"], 0x20) 07:53:52 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x4102, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0xffffffffffffffe8}, 0x6ac) [ 1284.758662] gfs2: can't parse mount arguments [ 1284.776930] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1284.793455] SELinux: failed to load policy [ 1284.798919] gfs2: can't parse mount arguments 07:53:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0x9) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000100)=ANY=[@ANYBLOB='\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) [ 1284.819682] SELinux: failed to load policy 07:53:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1284.885390] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1284.926119] gfs2: can't parse mount arguments 07:53:52 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'cpu'}, {0x2d, 'memory'}]}, 0xd) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400000, 0x0) [ 1284.951776] SELinux: failed to load policy [ 1284.968193] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1284.977543] gfs2: can't parse mount arguments 07:53:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578157fffffff0000000800000007000000"], 0x20) [ 1285.011597] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.017968] gfs2: can't parse mount arguments [ 1285.048955] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="d35db3f8003a298c0000"], 0xa) 07:53:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000060000000800000007000000"], 0x20) [ 1285.057107] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.062547] SELinux: policydb version -33003 does not match my version range 15-31 [ 1285.069838] gfs2: can't parse mount arguments [ 1285.077210] gfs2: can't parse mount arguments 07:53:52 executing program 4: getegid() r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x3e, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) 07:53:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @dev}, &(0x7f0000000100)=0xc) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESDEC=0x0, @ANYRESHEX=r1]], 0xcf) [ 1285.179384] SELinux: policydb magic number 0xf8b35dd3 does not match expected magic number 0xf97cff8c [ 1285.189964] SELinux: policydb magic number 0xf8b35dd3 does not match expected magic number 0xf97cff8c 07:53:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002000000007000000"], 0x20) [ 1285.253559] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.262647] gfs2: can't parse mount arguments [ 1285.288393] SELinux: policydb magic number 0x20000000 does not match expected magic number 0xf97cff8c 07:53:52 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0xc0100, 0x0) write$P9_RLINK(r0, &(0x7f0000000080)={0x1f6, 0x47, 0xfffffffffffffffc}, 0x76ea4451252c686f) [ 1285.335508] SELinux: policydb magic number 0x20000000 does not match expected magic number 0xf97cff8c [ 1285.355544] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.364575] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.376771] gfs2: can't parse mount arguments 07:53:52 executing program 2: write$selinux_load(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="98f991baf58c39a561440300000000000000a25584f85979f1ee0f1bbc605c60d54b665e5347f40f"], 0x1) timer_create(0x7, &(0x7f0000000000)={0x0, 0x24, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) timer_gettime(r0, &(0x7f00000000c0)) [ 1285.377106] SELinux: policydb table sizes (32,7) do not match mine (8,7) [ 1285.381709] gfs2: can't parse mount arguments 07:53:52 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 07:53:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002e00000007000000"], 0x20) [ 1285.455604] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.469514] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.477100] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.484723] gfs2: can't parse mount arguments [ 1285.499428] gfs2: can't parse mount arguments 07:53:52 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000100000000007000000"], 0x20) 07:53:52 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) [ 1285.522141] gfs2: can't parse mount arguments [ 1285.526944] SELinux: policydb table sizes (46,7) do not match mine (8,7) 07:53:52 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733211", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:52 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f0000000000)='/selinux/load\x00', 0x2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x11) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) socket$inet(0x2, 0x80f, 0xffffffffffff9270) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x6, 0x12, &(0x7f00000000c0)=""/128) [ 1285.693004] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1285.701105] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) munlockall() write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000100000007000000"], 0x20) [ 1285.744011] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.752607] gfs2: can't parse mount arguments [ 1285.785818] gfs2: can't parse mount arguments 07:53:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="67667332f6", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080), 0x4) pwrite64(r0, &(0x7f00000000c0)="c588b82742d603b4180427c962bed53762c15a3b38b2bc4b570a7df961a0755c4944d69ad068e15aac9e8230b3c7690e5c13f1b1c55fcf8e9d3c0f0088d8dbd867d60c9a3292962840d7cbeaf70a297d2e4c8f5714cdbc641c6c5509315dfb8d14517f89b7c10295e521c450332d5f1e8f041ad69e666481f6115d7cbba7c7a4c5de2183ede96cae2b966494dfd66c078f52bf635ce6c1a38c3339cf8953e6c5ab6174785ac1c7f58faa39174678bca2cdacd4e681f0201a0cd3a260544b3f1fd7299d4a1167fa34e8dbffbc64f96bff6fb9378c414d43fd2eb382af8ecf1194f025815489a2d66260fcf5", 0xeb, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7}, 0x7) write$P9_RLINK(r0, &(0x7f0000000000)={0x7, 0x47, 0x2}, 0x7) 07:53:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=0x0, @ANYRESHEX=r0, @ANYRESHEX=0x0, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYPTR64, @ANYRESOCT=r0]], 0x1cc) 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815060000000000000800000007000000"], 0x20) [ 1285.821481] SELinux: policydb table sizes (1,7) do not match mine (8,7) 07:53:53 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0x80, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='3ecurity.SMACK64EXEC\x00', &(0x7f0000000080)='systemselfnodevselinux%\x00', 0xfffffffffffffd73, 0x1) write$P9_RLINK(r0, &(0x7f0000000000)={0xffffffffffffff39}, 0x6ac) [ 1285.878221] SELinux: policydb magic number 0x200000c0 does not match expected magic number 0xf97cff8c [ 1285.916948] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1285.941588] gfs2: can't parse mount arguments [ 1285.969211] SELinux: policydb version 1557 does not match my version range 15-31 07:53:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2l', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="8000000000000000000095d09da1cf0c73ea9ab8d28c8458c32b1934fe88d9355ea3ee0e41eec97b48a8479ed135650a66a644e31ca8cfe432f4b1cd472477bcce0a291158b9e3f7134eb05285525c3eed23777bbb0dd757f8b78a4a6003cbaf3085ca0776ac255ba5f99e683aaeb919e09857cbd74f9685efef0b30dbb7f0c22a59372acdb6b3bb1b3ac80bf518728247829f51326b7493b5443fb3d9b33186b9bf164cce35812796f357d3f819313512ed81c4680c1a7188555ad130b5ad3096f711"], 0x1) r1 = memfd_create(&(0x7f0000000000)="bc262c5c5e2d2d776c616e3070707030707070302e00", 0x5) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000040)=""/34) 07:53:53 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) write$P9_RLINK(r0, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x8004, 0x52) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0x80000, 0x0) write$P9_RLINK(r1, &(0x7f0000000000)={0x7}, 0x7) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)=0x5, 0x4) 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815050000000000000800000007000000"], 0x20) 07:53:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) setfsuid(r1) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="16"], 0x1) 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000005000000000800000007000000"], 0x20) [ 1286.117195] SELinux: policydb version 1301 does not match my version range 15-31 [ 1286.128217] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.148147] gfs2: can't parse mount arguments 07:53:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/checkreqprot\x00', 0xc0101, 0x0) setsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000040)=0x8, 0x4) write$P9_RLINK(r0, &(0x7f0000000000)={0xfffffffffffffd40}, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) [ 1286.202276] SELinux: policydb version 83886101 does not match my version range 15-31 07:53:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000700000000000800000007000000"], 0x20) [ 1286.255766] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.287831] gfs2: can't parse mount arguments 07:53:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x10000) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x210000) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000140)=0xffffeffffffffc01) userfaultfd(0x800) 07:53:53 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815600000000000000800000007000000"], 0x20) [ 1286.386255] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.398300] SELinux: policydb version 24597 does not match my version range 15-31 [ 1286.407217] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.423919] gfs2: can't parse mount arguments 07:53:53 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = shmget(0x2, 0x2000, 0x2, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) [ 1286.437288] gfs2: can't parse mount arguments [ 1286.446758] SELinux: policydb version 458773 does not match my version range 15-31 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000300000800000007000000"], 0x20) 07:53:53 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000600000000000800000007000000"], 0x20) [ 1286.537685] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.556892] gfs2: can't parse mount arguments [ 1286.568642] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.573189] SELinux: policydb version 393237 does not match my version range 15-31 [ 1286.583610] gfs2: can't parse mount arguments 07:53:53 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000002000000800000007000000"], 0x20) 07:53:53 executing program 2: setxattr$security_smack_entry(&(0x7f0000000000)='\x00', &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000100)='/selinux/load\x00', 0xe, 0x2) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1286.591861] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.604102] gfs2: can't parse mount arguments 07:53:53 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1286.695796] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.702343] gfs2: can't parse mount arguments 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000400000800000007000000"], 0x20) 07:53:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\n', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1286.754228] SELinux: policydb table sizes (8,7) do not match mine (5,6) 07:53:54 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1286.796165] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.832209] gfs2: can't parse mount arguments 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000600000800000007000000"], 0x20) 07:53:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200000000000, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'tunl0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@gettclass={0x24, 0x2a, 0x201, 0x70bd2b, 0x25dfdbfc, {0x0, r2, {0xfff7, 0xffff}, {0xffef, 0xfff2}, {0x9, 0xfff7}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40) [ 1286.861463] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1286.898783] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000500000000000800000007000000"], 0x20) [ 1286.911786] gfs2: can't parse mount arguments [ 1286.918612] gfs2: can't parse mount arguments [ 1286.931528] SELinux: policydb table sizes (8,7) do not match mine (5,6) 07:53:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:54 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:53:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000100)="e5344833e5fdf357a75d8a876a74a211266263bf74") ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = getpid() fcntl$lock(r0, 0x6, &(0x7f00000000c0)={0x3, 0x3, 0x4, 0xe00000000, r2}) setsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000004c0)="5c424df2b99d7c27726cf9db737f3da9aa71425ca1aa4fdd642a57eb68776e2dba61a2374db92d582daf931600eee442f316a4f61d357ca8ff7f000000000000a066935c7a898d65a598cd5ad2b63e0accd8aad6adfa82c57ad3ac6d085bc6ab059d4a02b1e8a55a5246630afcdc2270eeb78b36884757894505a3f03b48967288fd65de3ed29e6fd54a987f98074e1c1affeb5a6dd417aaac535e5e1371f7c6091835a202e5cffdc4c43026f9b4962de015e08911acab98b747a9c5444199f7280306b0a5ee7fdd523fe927066ebd44c9576cdb167756dfd2b7d5d019022813c6e482b2276a82fe295fee06e1b7f3dba89420ef00e03515bb4d29b096cdd973acceed5f327336b407a6b9ade0aa96377a930dfa5b4a6f86e1961add6db723", 0x11f) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000040)={&(0x7f0000ff7000/0x6000)=nil, 0x6000}) 07:53:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733206", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733219", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1287.147967] SELinux: policydb table sizes (8,7) do not match mine (5,6) 07:53:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x408001, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) [ 1287.188584] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1287.203956] gfs2: can't parse mount arguments [ 1287.209312] SELinux: policydb version 327701 does not match my version range 15-31 07:53:54 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000200000800000007000000"], 0x20) [ 1287.252906] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1287.259244] gfs2: can't parse mount arguments 07:53:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80000001, 0x100) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000100)={0xf, 0x8, 0xfa00, {r2, 0x8}}, 0x10) write$selinux_load(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000140)=0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000380)={r3, 0x4, 0x1}, 0x8) 07:53:54 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:53:54 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000006000000000800000007000000"], 0x20) 07:53:54 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733297", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) r1 = dup3(r0, r0, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000000)=0x86) getuid() 07:53:54 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733214", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:54 executing program 4: write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1287.487847] SELinux: policydb version 100663317 does not match my version range 15-31 07:53:54 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000700000800000007000000"], 0x20) 07:53:54 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) getsockopt$netlink(r1, 0x10e, 0xf, &(0x7f00000000c0)=""/5, &(0x7f0000000100)=0x5) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:54 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000007000000000800000007000000"], 0x20) 07:53:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2350276a506121f43ffb9fa0f87ac66786df2698f7cb5723d9a68e5550c8de536c34672a20c9deffb77a5c2fdc6a4b2c8167ef7cc10aa69d7acf7bc504a03f399f741a97cb108fed57f7065cc0ca57825eb82daddff122d514c6f400116e29bb752d56a13f7f88f345efce9f80ebecc66380fb19dcad87babf898404540a9aa8239c7c86ac94485e6aef946733284879a0869afaa6c0"], 0x1) 07:53:55 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:53:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="676673321d", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733219", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000020000000000800000007000000"], 0x20) [ 1287.874279] SELinux: policydb version 117440533 does not match my version range 15-31 07:53:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="ced3e1caed634f0d297cf8b8ff7f218e6b5f83ad91744e9464a9b890a67e4851a70e661ebc3b2229d177d5582e67f224cb2e622fb851df0024a539842f90fdb32bc6dc9b034ac526286f5a20f37634ccee346365ecb7a30d9141336a559a80de884f13ed031da5d655d8edf06e45e1b3ca66d3b9fd3be846e31d48074ac20b7f1eaa70687bfce97382bde3ad699045171ab84c61cbeab652886f"], 0x1) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000040)={0x1b, 0x4}) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f00000000c0)="f1eacfd13a1a4dbaf6803e2be58d78e0c8a89a1b3417bba93648f78a2ebfdaeeba451aa7d8b25c4c1c2ec42ab4db5ea87a5302570bedf229cc1253334c111e49bc1895663803e92534a04dc71f1796dea8a2c78bd1801ab0c619fd8ac06f663df50cefcfc7499a65514b54125c3cc0", 0x6f) [ 1287.954822] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1287.962348] SELinux: policydb version 536870933 does not match my version range 15-31 07:53:55 executing program 4: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1288.008003] gfs2: can't parse mount arguments 07:53:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000400000000000800000007000000"], 0x20) 07:53:55 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x100, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x10) sendfile(r0, r1, &(0x7f00000000c0), 0x4) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRES16=r2, @ANYPTR=&(0x7f00000000c0)=ANY=[], @ANYRESOCT=r2, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESDEC=r0, @ANYPTR, @ANYRESOCT=r0, @ANYRESHEX=r1, @ANYRES32=r0, @ANYPTR, @ANYRES16, @ANYRESOCT=r1], @ANYRES16=r1, @ANYRESOCT=r1, @ANYRES16=r1, @ANYRES32=r2]], 0x34f) 07:53:55 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) [ 1288.063439] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1288.069809] gfs2: can't parse mount arguments 07:53:55 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:55 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1288.198173] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 07:53:55 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) vmsplice(r0, &(0x7f0000000280)=[{}, {&(0x7f00000000c0)}, {&(0x7f0000000100)="384e924d364da14bf0c710f83f603d64ba570bcb10849b12c07f1be4a64ca9ca6f97d0e9f49232775050ee7edfb5ddaa81c5cbc011330c4f", 0x38}, {&(0x7f0000000140)="1f90777b5c551e0a0e14c38d20349e4eec70f9a6aa2e73df7968caabd26b6f6569944370766a9bc35445634b26c7505ae7a06397ac88780360c34dd42cdb0cedf518fe7932226b5814362c3d069ec48ce5a964df4d5bcf611c037ec7d0222954a459192a5eac7d20eb0689136458", 0x6e}, {&(0x7f00000001c0)="5a75f97722959a4ad8d6", 0xa}, {&(0x7f0000000200)='\t w7w"', 0x6}, {&(0x7f0000000240)="ca64df76850a8ea3", 0x8}], 0x7, 0x6) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:53:55 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1288.244101] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1288.256752] CPU: 1 PID: 30848 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1288.264180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1288.273533] Call Trace: [ 1288.276129] dump_stack+0x1c4/0x2b4 [ 1288.279757] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1288.284947] ? kasan_check_read+0x11/0x20 [ 1288.289096] warn_alloc.cold.119+0xb7/0x1bd [ 1288.293413] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1288.298258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.303904] __vmalloc_node_range+0x472/0x750 [ 1288.308402] ? graph_lock+0x170/0x170 [ 1288.312202] ? __lock_is_held+0xb5/0x140 [ 1288.316260] ? sel_write_load+0x1d1/0x460 [ 1288.320411] vmalloc+0x6f/0x80 [ 1288.323604] ? sel_write_load+0x1d1/0x460 [ 1288.327752] sel_write_load+0x1d1/0x460 [ 1288.331731] __vfs_write+0x119/0x9f0 [ 1288.335445] ? check_preemption_disabled+0x48/0x200 [ 1288.340460] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1288.345396] ? kernel_read+0x120/0x120 [ 1288.349282] ? __lock_is_held+0xb5/0x140 [ 1288.353350] ? rcu_read_lock_sched_held+0x108/0x120 [ 1288.358366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1288.363900] ? __sb_start_write+0x1b2/0x370 [ 1288.368227] vfs_write+0x1fc/0x560 [ 1288.371773] ksys_write+0x101/0x260 [ 1288.375406] ? __ia32_sys_read+0xb0/0xb0 [ 1288.379483] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1288.384939] __x64_sys_write+0x73/0xb0 [ 1288.388832] do_syscall_64+0x1b9/0x820 [ 1288.392716] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1288.398077] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1288.403005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1288.407851] ? trace_hardirqs_on_caller+0x310/0x310 [ 1288.412863] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1288.417881] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1288.422896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1288.427743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1288.432928] RIP: 0033:0x457569 [ 1288.436122] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1288.455018] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1288.462737] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1288.470001] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1288.477271] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1288.484537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1288.491802] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1288.500361] Mem-Info: [ 1288.526249] active_anon:155856 inactive_anon:108 isolated_anon:0 [ 1288.526249] active_file:21407 inactive_file:38492 isolated_file:0 [ 1288.526249] unevictable:0 dirty:78 writeback:0 unstable:0 [ 1288.526249] slab_reclaimable:14419 slab_unreclaimable:104875 [ 1288.526249] mapped:55529 shmem:142 pagetables:1453 bounce:0 [ 1288.526249] free:1210418 free_pcp:969 free_cma:0 [ 1288.587378] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1288.608506] gfs2: can't parse mount arguments [ 1288.630838] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1288.646318] gfs2: can't parse mount arguments [ 1288.654416] Node 0 active_anon:630020kB inactive_anon:436kB active_file:85628kB inactive_file:153980kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222260kB dirty:324kB writeback:0kB shmem:564kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 364544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1288.683902] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1288.690226] gfs2: can't parse mount arguments [ 1288.696005] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1288.754603] lowmem_reserve[]: 0 2819 6323 6323 07:53:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1288.779790] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB 07:53:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1288.844133] lowmem_reserve[]: 0 0 3503 3503 [ 1288.853066] Node 0 Normal free:1933408kB min:37352kB low:46688kB high:56024kB active_anon:625564kB inactive_anon:436kB active_file:85628kB inactive_file:153980kB unevictable:0kB writepending:324kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6400kB pagetables:5932kB bounce:0kB free_pcp:2288kB local_pcp:1128kB free_cma:0kB [ 1288.921444] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1288.946824] gfs2: can't parse mount arguments [ 1288.977250] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1288.982494] lowmem_reserve[]: 0 0 0 0 [ 1289.012633] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1289.012827] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.034430] gfs2: can't parse mount arguments [ 1289.041480] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.048006] gfs2: can't parse mount arguments [ 1289.055878] gfs2: can't parse mount arguments [ 1289.063234] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1289.078786] Node 0 Normal: 4319*4kB (UME) 282*8kB (UME) 60*16kB (UE) 1243*32kB (UME) 584*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 2*2048kB (ME) 434*4096kB (M) = 1927916kB [ 1289.096798] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1289.105908] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1289.114561] 60042 total pagecache pages [ 1289.114578] 0 pages in swap cache [ 1289.114587] Swap cache stats: add 0, delete 0, find 0/0 07:53:56 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1289.114592] Free swap = 0kB [ 1289.114597] Total swap = 0kB [ 1289.114648] 1965979 pages RAM [ 1289.134560] 0 pages HighMem/MovableOnly [ 1289.154122] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.161316] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.167835] gfs2: can't parse mount arguments [ 1289.178197] gfs2: can't parse mount arguments [ 1289.183924] 342307 pages reserved [ 1289.187558] 0 pages cma reserved [ 1289.201818] SELinux: policydb version 262165 does not match my version range 15-31 07:53:56 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733203", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:56 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) 07:53:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000600000000000800000007000000"], 0x20) 07:53:56 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:56 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x40) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'sit0\x00', 0xfff}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0x0, 0x5, 0x0, &(0x7f0000ff7000/0x9000)=nil, 0x2}) [ 1289.278742] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.314056] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1289.321426] gfs2: can't parse mount arguments [ 1289.369802] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1289.386680] CPU: 1 PID: 30910 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1289.393999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1289.403354] Call Trace: [ 1289.403381] dump_stack+0x1c4/0x2b4 [ 1289.403403] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1289.403420] ? kasan_check_read+0x11/0x20 [ 1289.403439] warn_alloc.cold.119+0xb7/0x1bd [ 1289.409638] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1289.409662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1289.409704] __vmalloc_node_range+0x472/0x750 [ 1289.417961] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.419023] ? graph_lock+0x170/0x170 [ 1289.419037] ? __lock_is_held+0xb5/0x140 [ 1289.419054] ? sel_write_load+0x1d1/0x460 [ 1289.419071] vmalloc+0x6f/0x80 [ 1289.419085] ? sel_write_load+0x1d1/0x460 [ 1289.424026] gfs2: can't parse mount arguments [ 1289.428335] sel_write_load+0x1d1/0x460 [ 1289.428358] __vfs_write+0x119/0x9f0 [ 1289.428378] ? check_preemption_disabled+0x48/0x200 [ 1289.428391] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1289.428409] ? kernel_read+0x120/0x120 [ 1289.438426] ? __lock_is_held+0xb5/0x140 [ 1289.438453] ? rcu_read_lock_sched_held+0x108/0x120 [ 1289.438470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1289.438482] ? __sb_start_write+0x1b2/0x370 [ 1289.438499] vfs_write+0x1fc/0x560 [ 1289.448597] ksys_write+0x101/0x260 [ 1289.448616] ? __ia32_sys_read+0xb0/0xb0 [ 1289.448637] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1289.448658] __x64_sys_write+0x73/0xb0 [ 1289.448674] do_syscall_64+0x1b9/0x820 [ 1289.448695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1289.538563] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1289.543483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1289.548319] ? trace_hardirqs_on_caller+0x310/0x310 [ 1289.553324] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1289.558334] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1289.563339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1289.568177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1289.573353] RIP: 0033:0x457569 [ 1289.576536] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1289.595422] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1289.603137] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1289.610395] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1289.617654] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1289.625114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1289.632371] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1289.642310] Mem-Info: [ 1289.644967] active_anon:158034 inactive_anon:111 isolated_anon:0 [ 1289.644967] active_file:21407 inactive_file:38507 isolated_file:0 [ 1289.644967] unevictable:0 dirty:94 writeback:0 unstable:0 [ 1289.644967] slab_reclaimable:14419 slab_unreclaimable:104927 [ 1289.644967] mapped:55561 shmem:141 pagetables:1571 bounce:0 [ 1289.644967] free:1208151 free_pcp:781 free_cma:0 [ 1289.679065] Node 0 active_anon:632136kB inactive_anon:444kB active_file:85628kB inactive_file:154028kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222244kB dirty:376kB writeback:0kB shmem:564kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1289.692135] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:53:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1289.707631] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1289.746180] lowmem_reserve[]: 0 2819 6323 6323 [ 1289.752722] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1289.774275] gfs2: can't parse mount arguments [ 1289.788271] lowmem_reserve[]: 0 0 3503 3503 [ 1289.792898] Node 0 Normal free:1928692kB min:37352kB low:46688kB high:56024kB active_anon:630032kB inactive_anon:444kB active_file:85628kB inactive_file:154028kB unevictable:0kB writepending:376kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6592kB pagetables:6284kB bounce:0kB free_pcp:1952kB local_pcp:1132kB free_cma:0kB [ 1289.823058] lowmem_reserve[]: 0 0 0 0 [ 1289.826905] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1289.843084] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB 07:53:57 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1289.858078] Node 0 Normal: 4321*4kB (UE) 327*8kB (UME) 50*16kB (UE) 1230*32kB (UME) 585*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 2*2048kB (ME) 435*4096kB (M) = 1931868kB [ 1289.876911] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1289.886873] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1289.896529] 60054 total pagecache pages [ 1289.900618] 0 pages in swap cache [ 1289.904072] Swap cache stats: add 0, delete 0, find 0/0 [ 1289.911950] Free swap = 0kB [ 1289.915059] Total swap = 0kB [ 1289.918175] 1965979 pages RAM [ 1289.929492] 0 pages HighMem/MovableOnly [ 1289.937017] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.943640] 342307 pages reserved [ 1289.948864] gfs2: can't parse mount arguments [ 1289.954378] 0 pages cma reserved [ 1289.962414] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1289.974029] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1289.995643] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1290.002247] gfs2: can't parse mount arguments [ 1290.017991] CPU: 1 PID: 30919 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1290.025273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.025299] Call Trace: [ 1290.037261] dump_stack+0x1c4/0x2b4 [ 1290.040899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1290.046094] ? kasan_check_read+0x11/0x20 [ 1290.046117] warn_alloc.cold.119+0xb7/0x1bd [ 1290.046132] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1290.046168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1290.054621] __vmalloc_node_range+0x472/0x750 [ 1290.054638] ? graph_lock+0x170/0x170 [ 1290.054653] ? __lock_is_held+0xb5/0x140 [ 1290.064998] ? sel_write_load+0x1d1/0x460 [ 1290.065018] vmalloc+0x6f/0x80 [ 1290.065030] ? sel_write_load+0x1d1/0x460 [ 1290.065044] sel_write_load+0x1d1/0x460 [ 1290.080001] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.081480] __vfs_write+0x119/0x9f0 [ 1290.081501] ? check_preemption_disabled+0x48/0x200 [ 1290.081515] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1290.081529] ? kernel_read+0x120/0x120 [ 1290.081571] ? __lock_is_held+0xb5/0x140 [ 1290.081595] ? rcu_read_lock_sched_held+0x108/0x120 [ 1290.081609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1290.081626] ? __sb_start_write+0x1b2/0x370 [ 1290.095300] gfs2: can't parse mount arguments [ 1290.099242] vfs_write+0x1fc/0x560 [ 1290.099263] ksys_write+0x101/0x260 [ 1290.099279] ? __ia32_sys_read+0xb0/0xb0 [ 1290.151280] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1290.156739] __x64_sys_write+0x73/0xb0 [ 1290.160649] do_syscall_64+0x1b9/0x820 [ 1290.164549] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1290.169918] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1290.174868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1290.179728] ? trace_hardirqs_on_caller+0x310/0x310 [ 1290.184777] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1290.189821] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1290.194852] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1290.199708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.204901] RIP: 0033:0x457569 [ 1290.208101] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:53:57 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:57 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[], 0x0) [ 1290.227007] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1290.234729] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1290.242000] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1290.249266] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.256544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1290.263818] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1290.275651] SELinux: policydb version 393237 does not match my version range 15-31 [ 1290.293279] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.299994] gfs2: can't parse mount arguments [ 1290.304299] sel_write_load: 60 callbacks suppressed [ 1290.304304] SELinux: failed to load policy [ 1290.317538] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.319072] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1290.338559] gfs2: can't parse mount arguments [ 1290.345337] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1290.352826] CPU: 1 PID: 30958 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1290.360113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.369478] Call Trace: [ 1290.372074] dump_stack+0x1c4/0x2b4 [ 1290.375712] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1290.380905] ? kasan_check_read+0x11/0x20 [ 1290.380928] warn_alloc.cold.119+0xb7/0x1bd [ 1290.380941] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1290.380960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1290.389414] __vmalloc_node_range+0x472/0x750 [ 1290.404216] ? graph_lock+0x170/0x170 [ 1290.408019] ? __lock_is_held+0xb5/0x140 [ 1290.412092] ? sel_write_load+0x1d1/0x460 [ 1290.416243] vmalloc+0x6f/0x80 [ 1290.416258] ? sel_write_load+0x1d1/0x460 [ 1290.416272] sel_write_load+0x1d1/0x460 [ 1290.423584] __vfs_write+0x119/0x9f0 07:53:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000300000000000800000007000000"], 0x20) [ 1290.423601] ? check_preemption_disabled+0x48/0x200 [ 1290.423614] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1290.423627] ? kernel_read+0x120/0x120 [ 1290.423642] ? __lock_is_held+0xb5/0x140 [ 1290.431369] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.436305] ? rcu_read_lock_sched_held+0x108/0x120 [ 1290.436322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1290.436340] ? __sb_start_write+0x1b2/0x370 [ 1290.441700] gfs2: can't parse mount arguments [ 1290.445133] vfs_write+0x1fc/0x560 [ 1290.445151] ksys_write+0x101/0x260 [ 1290.445175] ? __ia32_sys_read+0xb0/0xb0 [ 1290.485981] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1290.491540] __x64_sys_write+0x73/0xb0 [ 1290.495419] do_syscall_64+0x1b9/0x820 [ 1290.499294] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1290.504644] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1290.509555] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1290.514413] ? trace_hardirqs_on_caller+0x310/0x310 [ 1290.519542] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1290.524562] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1290.529577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1290.534422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.539599] RIP: 0033:0x457569 [ 1290.542777] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1290.561659] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1290.569351] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1290.576599] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1290.583849] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.591100] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1290.598358] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1290.617445] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 07:53:57 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:57 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 1290.644643] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.651274] gfs2: can't parse mount arguments [ 1290.655925] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1290.661366] CPU: 1 PID: 30919 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1290.668645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1290.677996] Call Trace: [ 1290.680599] dump_stack+0x1c4/0x2b4 [ 1290.684245] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1290.689444] ? kasan_check_read+0x11/0x20 07:53:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1290.693605] warn_alloc.cold.119+0xb7/0x1bd [ 1290.697927] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1290.702782] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1290.708357] __vmalloc_node_range+0x472/0x750 [ 1290.712867] ? graph_lock+0x170/0x170 [ 1290.716683] ? __lock_is_held+0xb5/0x140 [ 1290.720754] ? sel_write_load+0x1d1/0x460 [ 1290.724906] vmalloc+0x6f/0x80 [ 1290.728103] ? sel_write_load+0x1d1/0x460 [ 1290.732253] sel_write_load+0x1d1/0x460 [ 1290.736236] __vfs_write+0x119/0x9f0 [ 1290.739959] ? check_preemption_disabled+0x48/0x200 [ 1290.744976] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1290.749906] ? kernel_read+0x120/0x120 [ 1290.749927] ? __lock_is_held+0xb5/0x140 [ 1290.749953] ? rcu_read_lock_sched_held+0x108/0x120 [ 1290.749970] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1290.749984] ? __sb_start_write+0x1b2/0x370 [ 1290.757909] vfs_write+0x1fc/0x560 [ 1290.757929] ksys_write+0x101/0x260 [ 1290.757946] ? __ia32_sys_read+0xb0/0xb0 [ 1290.757966] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1290.758003] __x64_sys_write+0x73/0xb0 [ 1290.768525] do_syscall_64+0x1b9/0x820 [ 1290.768542] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1290.768559] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1290.768572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1290.768588] ? trace_hardirqs_on_caller+0x310/0x310 [ 1290.768604] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1290.776431] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1290.776452] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1290.776477] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1290.776495] RIP: 0033:0x457569 [ 1290.776508] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1290.776520] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 [ 1290.782847] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.784685] ORIG_RAX: 0000000000000001 [ 1290.784696] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1290.784706] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000004 07:53:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2k', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1290.784715] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1290.784724] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1290.784734] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1290.823104] warn_alloc_show_mem: 2 callbacks suppressed [ 1290.823108] Mem-Info: [ 1290.826816] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1290.835083] gfs2: can't parse mount arguments [ 1290.851978] active_anon:157974 inactive_anon:111 isolated_anon:0 [ 1290.851978] active_file:21407 inactive_file:38519 isolated_file:0 [ 1290.851978] unevictable:0 dirty:106 writeback:0 unstable:0 [ 1290.851978] slab_reclaimable:14412 slab_unreclaimable:105041 [ 1290.851978] mapped:55561 shmem:141 pagetables:1533 bounce:0 [ 1290.851978] free:1208140 free_pcp:732 free_cma:0 [ 1290.863506] gfs2: can't parse mount arguments [ 1290.895683] Node 0 active_anon:629804kB inactive_anon:444kB active_file:85628kB inactive_file:154076kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222244kB dirty:424kB writeback:0kB shmem:564kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 372736kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1291.002344] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1291.043612] lowmem_reserve[]: 0 2819 6323 6323 [ 1291.048280] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1291.048952] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.076647] lowmem_reserve[]: 0 0 3503 3503 07:53:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1291.095911] Node 0 Normal free:1928244kB min:37352kB low:46688kB high:56024kB active_anon:629904kB inactive_anon:444kB active_file:85628kB inactive_file:154076kB unevictable:0kB writepending:572kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6496kB pagetables:6280kB bounce:0kB free_pcp:1932kB local_pcp:1320kB free_cma:0kB [ 1291.154184] gfs2: can't parse mount arguments [ 1291.167666] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.176939] lowmem_reserve[]: 0 0 0 0 [ 1291.181753] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1291.184367] gfs2: can't parse mount arguments 07:53:58 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1291.195487] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1291.195614] Node 0 Normal: 4339*4kB (UME) 268*8kB (UE) 58*16kB (UME) 1201*32kB (UME) 585*64kB [ 1291.234063] (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 2*2048kB (ME) 434*4096kB (M) = 1926572kB [ 1291.245240] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1291.277637] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.280724] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1291.284877] gfs2: can't parse mount arguments [ 1291.317924] 60066 total pagecache pages [ 1291.322320] 0 pages in swap cache [ 1291.328114] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.335080] Swap cache stats: add 0, delete 0, find 0/0 [ 1291.346182] gfs2: can't parse mount arguments [ 1291.354865] Free swap = 0kB [ 1291.357948] Total swap = 0kB [ 1291.361205] 1965979 pages RAM [ 1291.375156] 0 pages HighMem/MovableOnly [ 1291.383052] 342307 pages reserved [ 1291.387317] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.395002] gfs2: can't parse mount arguments [ 1291.399582] 0 pages cma reserved [ 1291.413446] SELinux: policydb version 196629 does not match my version range 15-31 07:53:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) ioctl$FICLONE(r0, 0x40049409, r0) 07:53:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\r', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:53:58 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1291.424342] SELinux: failed to load policy [ 1291.434636] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1291.456095] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1291.487032] CPU: 0 PID: 30981 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1291.494424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.503792] Call Trace: [ 1291.506395] dump_stack+0x1c4/0x2b4 [ 1291.510042] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1291.515242] ? kasan_check_read+0x11/0x20 [ 1291.519406] warn_alloc.cold.119+0xb7/0x1bd [ 1291.523744] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1291.528608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1291.534178] __vmalloc_node_range+0x472/0x750 [ 1291.538685] ? graph_lock+0x170/0x170 [ 1291.542492] ? __lock_is_held+0xb5/0x140 [ 1291.546567] ? sel_write_load+0x1d1/0x460 [ 1291.550726] vmalloc+0x6f/0x80 [ 1291.553947] ? sel_write_load+0x1d1/0x460 [ 1291.558102] sel_write_load+0x1d1/0x460 [ 1291.562088] __vfs_write+0x119/0x9f0 [ 1291.565809] ? check_preemption_disabled+0x48/0x200 [ 1291.570825] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1291.575762] ? kernel_read+0x120/0x120 [ 1291.579661] ? __lock_is_held+0xb5/0x140 [ 1291.583742] ? rcu_read_lock_sched_held+0x108/0x120 [ 1291.588769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1291.594308] ? __sb_start_write+0x1b2/0x370 [ 1291.598638] vfs_write+0x1fc/0x560 [ 1291.602186] ksys_write+0x101/0x260 [ 1291.605824] ? __ia32_sys_read+0xb0/0xb0 [ 1291.609889] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1291.615752] __x64_sys_write+0x73/0xb0 [ 1291.619647] do_syscall_64+0x1b9/0x820 [ 1291.623543] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1291.628911] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1291.633839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1291.638687] ? trace_hardirqs_on_caller+0x310/0x310 [ 1291.643707] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1291.648723] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1291.653745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1291.658599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1291.663788] RIP: 0033:0x457569 [ 1291.666988] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:53:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815006000000000000800000007000000"], 0x20) 07:53:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1291.685888] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1291.693605] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1291.700871] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1291.708139] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1291.715437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1291.722722] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1291.745575] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.788905] gfs2: can't parse mount arguments [ 1291.797291] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.809634] gfs2: can't parse mount arguments [ 1291.815760] SELinux: failed to load policy [ 1291.820618] SELinux: policydb version 6291477 does not match my version range 15-31 [ 1291.828719] SELinux: failed to load policy 07:53:59 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 1291.835365] SELinux: failed to load policy 07:53:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815007fffffff00000800000007000000"], 0x20) 07:53:59 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0xbd, "34158247f280809ab2e4a65361ade18709a6e5d44d09a0fedab38b83391cf8b1194000ec93346955f5950bdbe61bac84cf0447907b63b9c6a755f7268101dc311188fe08a8edd2df4b50d18c82d9be9efcef15f72685644a4f8bd38af7baacf4532518d94f8bb200b3cd49800c26102f5884620687ac8a3c1fb8cb2b7b78402283e2b3f18033cc1483aef53516df51eaec154841e4071951e27918d03d28fc9cec7abf1c949f9748cee32856a49416d30e8d700bdda43a88d734bd7347"}, &(0x7f00000002c0)=0xc5) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1c98, 0x800) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) ioctl$LOOP_CLR_FD(r0, 0x4c01) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r2, 0x8001}, &(0x7f0000000340)=0x8) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="d5fcfc230b"], 0x1) [ 1291.873409] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.879741] gfs2: can't parse mount arguments [ 1291.884802] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1291.884809] gfs2: can't parse mount arguments [ 1291.899248] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) 07:53:59 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2"', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1291.924342] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1291.943854] CPU: 1 PID: 31065 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1291.951140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1291.960502] Call Trace: [ 1291.963105] dump_stack+0x1c4/0x2b4 [ 1291.966747] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1291.971942] ? kasan_check_read+0x11/0x20 [ 1291.976105] warn_alloc.cold.119+0xb7/0x1bd [ 1291.980433] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1291.985274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1291.990830] __vmalloc_node_range+0x472/0x750 [ 1291.995325] ? graph_lock+0x170/0x170 [ 1291.999110] ? __lock_is_held+0xb5/0x140 [ 1292.003161] ? sel_write_load+0x1d1/0x460 [ 1292.007294] vmalloc+0x6f/0x80 [ 1292.010478] ? sel_write_load+0x1d1/0x460 [ 1292.014626] sel_write_load+0x1d1/0x460 [ 1292.018599] __vfs_write+0x119/0x9f0 [ 1292.022326] ? check_preemption_disabled+0x48/0x200 [ 1292.027320] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1292.032238] ? kernel_read+0x120/0x120 [ 1292.036111] ? __lock_is_held+0xb5/0x140 [ 1292.040161] ? rcu_read_lock_sched_held+0x108/0x120 [ 1292.045162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.050693] ? __sb_start_write+0x1b2/0x370 [ 1292.054999] vfs_write+0x1fc/0x560 [ 1292.058526] ksys_write+0x101/0x260 [ 1292.062147] ? __ia32_sys_read+0xb0/0xb0 [ 1292.066193] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1292.071640] __x64_sys_write+0x73/0xb0 [ 1292.075517] do_syscall_64+0x1b9/0x820 [ 1292.079414] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1292.084768] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1292.089678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1292.094502] ? trace_hardirqs_on_caller+0x310/0x310 [ 1292.099512] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1292.104510] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1292.109511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1292.114368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.119555] RIP: 0033:0x457569 [ 1292.122740] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1292.141629] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1292.149324] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1292.156580] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1292.163834] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1292.171091] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1292.178358] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1292.186829] warn_alloc_show_mem: 1 callbacks suppressed [ 1292.186833] Mem-Info: [ 1292.194687] active_anon:157583 inactive_anon:111 isolated_anon:0 [ 1292.194687] active_file:21407 inactive_file:38534 isolated_file:0 [ 1292.194687] unevictable:0 dirty:113 writeback:0 unstable:0 [ 1292.194687] slab_reclaimable:14411 slab_unreclaimable:105027 [ 1292.194687] mapped:55560 shmem:141 pagetables:1566 bounce:0 07:53:59 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\b', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1292.194687] free:1208486 free_pcp:717 free_cma:0 [ 1292.228856] Node 0 active_anon:630332kB inactive_anon:444kB active_file:85628kB inactive_file:154136kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222240kB dirty:452kB writeback:0kB shmem:564kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 366592kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1292.257271] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1292.283603] lowmem_reserve[]: 0 2819 6323 6323 [ 1292.288205] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1292.316847] lowmem_reserve[]: 0 0 3503 3503 [ 1292.321237] Node 0 Normal free:1930384kB min:37352kB low:46688kB high:56024kB active_anon:628152kB inactive_anon:444kB active_file:85628kB inactive_file:154136kB unevictable:0kB writepending:452kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6560kB pagetables:6116kB bounce:0kB free_pcp:1884kB local_pcp:940kB free_cma:0kB [ 1292.351212] lowmem_reserve[]: 0 0 0 0 [ 1292.355018] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1292.368745] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1292.383709] Node 0 Normal: 4360*4kB (UME) 309*8kB (UE) 96*16kB (UE) 1188*32kB (UME) 581*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 2*2048kB (ME) 435*4096kB (M) = 1931016kB [ 1292.401668] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1292.410540] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1292.419117] 60081 total pagecache pages [ 1292.423140] 0 pages in swap cache 07:53:59 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) [ 1292.426581] Swap cache stats: add 0, delete 0, find 0/0 [ 1292.431979] Free swap = 0kB [ 1292.434990] Total swap = 0kB [ 1292.438001] 1965979 pages RAM [ 1292.441904] 0 pages HighMem/MovableOnly [ 1292.445864] 342307 pages reserved [ 1292.449293] 0 pages cma reserved [ 1292.453314] SELinux: failed to load policy [ 1292.458088] SELinux: policydb version -8454123 does not match my version range 15-31 07:53:59 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1292.486059] SELinux: failed to load policy [ 1292.492807] SELinux: failed to load policy [ 1292.497143] syz-executor4: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1292.508380] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1292.525770] CPU: 1 PID: 31078 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 07:53:59 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@nfc, &(0x7f0000000180)=0x80, 0x80000) connect$pptp(r0, 0xfffffffffffffffd, 0x0) r1 = semget$private(0x0, 0x1, 0x101) semtimedop(r1, &(0x7f00000001c0)=[{0x4, 0x7a3e, 0x800}, {0x7, 0x4, 0x1000}, {0x0, 0x0, 0x1000}, {0x4, 0x4, 0x800}, {0x0, 0x9, 0x1000}, {0x1, 0x500000000000}, {0x0, 0x5d, 0x800}], 0x7, &(0x7f0000000200)) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0)=0xffffffffffffff82, 0x4) 07:53:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000060000000000800000007000000"], 0x20) [ 1292.533053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1292.542401] Call Trace: [ 1292.545035] dump_stack+0x1c4/0x2b4 [ 1292.548680] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1292.553879] ? kasan_check_read+0x11/0x20 [ 1292.558035] warn_alloc.cold.119+0xb7/0x1bd [ 1292.558052] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1292.567198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.572752] __vmalloc_node_range+0x472/0x750 [ 1292.577253] ? graph_lock+0x170/0x170 [ 1292.581055] ? __lock_is_held+0xb5/0x140 [ 1292.581073] ? sel_write_load+0x1d1/0x460 [ 1292.581090] vmalloc+0x6f/0x80 [ 1292.581103] ? sel_write_load+0x1d1/0x460 [ 1292.581115] sel_write_load+0x1d1/0x460 [ 1292.581134] __vfs_write+0x119/0x9f0 [ 1292.581152] ? check_preemption_disabled+0x48/0x200 [ 1292.589321] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1292.589338] ? kernel_read+0x120/0x120 [ 1292.589363] ? __lock_is_held+0xb5/0x140 [ 1292.622195] ? rcu_read_lock_sched_held+0x108/0x120 [ 1292.627206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1292.632742] ? __sb_start_write+0x1b2/0x370 [ 1292.637045] vfs_write+0x1fc/0x560 [ 1292.640579] ksys_write+0x101/0x260 [ 1292.644203] ? __ia32_sys_read+0xb0/0xb0 [ 1292.648261] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1292.653708] __x64_sys_write+0x73/0xb0 [ 1292.657596] do_syscall_64+0x1b9/0x820 [ 1292.661487] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1292.666841] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1292.671770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1292.676594] ? trace_hardirqs_on_caller+0x310/0x310 [ 1292.681607] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1292.686624] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1292.691651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1292.696510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1292.701694] RIP: 0033:0x457569 [ 1292.704871] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1292.723757] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1292.731458] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1292.738729] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1292.745988] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1292.753237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1292.760593] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1292.776403] SELinux: policydb version 1610612757 does not match my version range 15-31 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x10) [ 1292.785686] SELinux: failed to load policy [ 1292.801152] SELinux: failed to load policy 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:54:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000200000000000800000007000000"], 0x20) [ 1292.881796] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1292.888493] gfs2: can't parse mount arguments 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x10) [ 1292.929095] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1292.943394] gfs2: can't parse mount arguments 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20080, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc000c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x114, r2, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4629}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x114}, 0x1, 0x0, 0x0, 0x40800}, 0x40) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:54:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1292.978086] SELinux: policydb version 131093 does not match my version range 15-31 07:54:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1293.034372] SELinux: policydb version 131093 does not match my version range 15-31 07:54:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\t', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000006000000800000007000000"], 0x20) 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x10) 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cc5d76cbc0fdc769749da6136ed60e14d7bfc9e8b4d58b2ca58ae552dbd5c62a3f761a0deba91aae4d7b795075c34d7be18bbb686eeca71c6b0f1b3d13913157ddf19d76a64740627d90fc352bc003eb6397a2dfc5be782089a2cfa71598f24a4e98649ee64bb1259c86f7425ac1b0d81a4746175eba05c738ed9f0cee5e4141af558fdeb60042074bdb60727e4f1d0cfcdd06f4d"], 0x1) [ 1293.220999] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1293.240991] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000000000"], 0x18) 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x3ac, 0x2) [ 1293.268149] gfs2: can't parse mount arguments [ 1293.277621] gfs2: can't parse mount arguments 07:54:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000100000800000007000000"], 0x20) [ 1293.315472] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1293.325565] gfs2: can't parse mount arguments [ 1293.343885] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1293.354225] gfs2: can't parse mount arguments 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000000000"], 0x18) 07:54:00 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xa3, 0x340) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0x401}, &(0x7f0000000180)=0x8) 07:54:00 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:00 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733204", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000500000800000007000000"], 0x20) 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000000000"], 0x18) 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x8, 0x80000) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f00000000c0)={0x3, 0x0, 0x2080, {0x0, 0x1, 0x3}, [], "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", "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"}) 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f0000000000000008000000"], 0x1c) 07:54:00 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="dc740241898a33dcdfdffd560c0b45cb9418699f8aea6f755ceca9d585ba9fc2456aa4fabbe694012a11b02285f6f2c8dd073265b8734e217d41b865c6f3ea1e02bb2b95671761ff3b736d05e0d8b7336a0c38fb0d41f99e8c91eda612ee31e37c513538ca00e78da0084db63b826317009f3fe44df2216cbd72a350"], 0x1) 07:54:00 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f0000000000000008000000"], 0x1c) [ 1293.643220] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1293.651712] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000003000000000800000007000000"], 0x20) [ 1293.698002] gfs2: can't parse mount arguments [ 1293.705267] gfs2: can't parse mount arguments 07:54:01 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x80201) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000080)={'syzkaller0\x00', @random="5c7d8807104f"}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1293.774503] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1293.788891] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1293.801185] gfs2: can't parse mount arguments [ 1293.809531] gfs2: can't parse mount arguments [ 1293.829125] SELinux: policydb version 50331669 does not match my version range 15-31 07:54:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:01 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f0000000000000008000000"], 0x1c) 07:54:01 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000003000000000800000007000000"], 0x20) 07:54:01 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x0) 07:54:01 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000000000080000000700"], 0x1e) [ 1294.000107] SELinux: policydb version 50331669 does not match my version range 15-31 07:54:01 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000060000000000800000007000000"], 0x20) 07:54:01 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000000000080000000700"], 0x1e) [ 1294.073800] syz-executor2: vmalloc: allocation failure: 0 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1294.089053] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.099207] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.113279] gfs2: can't parse mount arguments [ 1294.118002] gfs2: can't parse mount arguments [ 1294.125029] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1294.130551] CPU: 1 PID: 31243 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1294.137832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1294.147187] Call Trace: [ 1294.148794] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.149793] dump_stack+0x1c4/0x2b4 [ 1294.149815] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1294.149833] ? kasan_check_read+0x11/0x20 [ 1294.161842] gfs2: can't parse mount arguments [ 1294.164935] warn_alloc.cold.119+0xb7/0x1bd [ 1294.164951] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1294.164971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.188255] __vmalloc_node_range+0x472/0x750 [ 1294.192748] ? graph_lock+0x170/0x170 [ 1294.196534] ? __lock_is_held+0xb5/0x140 [ 1294.200591] ? sel_write_load+0x1d1/0x460 [ 1294.204721] vmalloc+0x6f/0x80 [ 1294.207896] ? sel_write_load+0x1d1/0x460 [ 1294.212025] sel_write_load+0x1d1/0x460 [ 1294.216016] __vfs_write+0x119/0x9f0 [ 1294.219725] ? check_preemption_disabled+0x48/0x200 [ 1294.224718] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1294.229640] ? kernel_read+0x120/0x120 [ 1294.233511] ? __lock_is_held+0xb5/0x140 [ 1294.237571] ? rcu_read_lock_sched_held+0x108/0x120 [ 1294.242585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1294.248105] ? __sb_start_write+0x1b2/0x370 [ 1294.252413] vfs_write+0x1fc/0x560 [ 1294.255935] ksys_write+0x101/0x260 [ 1294.259682] ? __ia32_sys_read+0xb0/0xb0 [ 1294.263742] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1294.269176] __x64_sys_write+0x73/0xb0 [ 1294.273071] do_syscall_64+0x1b9/0x820 [ 1294.276950] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1294.282300] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1294.287217] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1294.292042] ? trace_hardirqs_on_caller+0x310/0x310 [ 1294.297037] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1294.302044] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1294.307064] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1294.311904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1294.317081] RIP: 0033:0x457569 [ 1294.320254] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1294.339147] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1294.346837] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1294.354090] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 1294.361338] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1294.368586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1294.375833] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1294.384821] warn_alloc_show_mem: 1 callbacks suppressed [ 1294.384826] Mem-Info: [ 1294.393959] active_anon:158017 inactive_anon:109 isolated_anon:0 [ 1294.393959] active_file:21407 inactive_file:38558 isolated_file:0 [ 1294.393959] unevictable:0 dirty:140 writeback:0 unstable:0 [ 1294.393959] slab_reclaimable:14412 slab_unreclaimable:104964 [ 1294.393959] mapped:55555 shmem:142 pagetables:1541 bounce:0 [ 1294.393959] free:1208194 free_pcp:668 free_cma:0 [ 1294.430567] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.436904] gfs2: can't parse mount arguments [ 1294.437091] Node 0 active_anon:632068kB inactive_anon:436kB active_file:85628kB inactive_file:154232kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222220kB dirty:560kB writeback:0kB shmem:568kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 362496kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1294.470681] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1294.497997] lowmem_reserve[]: 0 2819 6323 6323 07:54:01 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1294.502726] Node 0 DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1294.540310] lowmem_reserve[]: 0 0 3503 3503 [ 1294.544733] Node 0 Normal free:1929744kB min:37352kB low:46688kB high:56024kB active_anon:630016kB inactive_anon:452kB active_file:85628kB inactive_file:154232kB unevictable:0kB writepending:560kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6464kB pagetables:6076kB bounce:0kB free_pcp:1524kB local_pcp:924kB free_cma:0kB 07:54:01 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1294.574941] lowmem_reserve[]: 0 0 0 0 [ 1294.578752] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1294.592514] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB [ 1294.619816] Node 0 Normal: 4436*4kB (UME) 236*8kB (UME) 83*16kB (UME) 1201*32kB (UME) 584*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 4*2048kB (ME) 434*4096kB (M) = 1931136kB [ 1294.638087] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1294.651928] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.656114] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1294.677419] gfs2: can't parse mount arguments [ 1294.694640] 60118 total pagecache pages [ 1294.705453] 0 pages in swap cache [ 1294.708966] Swap cache stats: add 0, delete 0, find 0/0 [ 1294.715197] Free swap = 0kB [ 1294.718234] Total swap = 0kB 07:54:02 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1294.730656] 1965979 pages RAM [ 1294.733767] 0 pages HighMem/MovableOnly [ 1294.737882] 342307 pages reserved [ 1294.741473] 0 pages cma reserved [ 1294.745039] SELinux: policydb version 1610612757 does not match my version range 15-31 [ 1294.765003] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:02 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x20ff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x3, 0x0, 0x8000, 0x2, 0x4, 0x40, 0x4, 0x20, r1}, &(0x7f0000000180)=0x20) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x800, 0x0) [ 1294.782222] gfs2: can't parse mount arguments 07:54:02 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f00000000000000080000000700"], 0x1e) 07:54:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000003000800000007000000"], 0x20) [ 1294.839791] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.852779] gfs2: can't parse mount arguments [ 1294.858896] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1294.888140] gfs2: can't parse mount arguments 07:54:02 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f0000000000000008000000070000"], 0x1f) 07:54:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000004000800000007000000"], 0x20) 07:54:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x2e1) 07:54:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2t', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:02 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f0000000000000008000000070000"], 0x1f) [ 1295.077842] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.089097] gfs2: can't parse mount arguments [ 1295.099202] SELinux: policydb magic number 0x8c does not match expected magic number 0xf97cff8c 07:54:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000005000000000800000007000000"], 0x20) 07:54:02 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f0000000000000008000000070000"], 0x1f) 07:54:02 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00'], 0x1) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x623, 0x4e0000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) sendmmsg$nfc_llcp(r1, &(0x7f0000000780)=[{&(0x7f0000000180)={0x27, 0x1, 0x1, 0x7, 0xfffffffffffffff9, 0x3ff, "de7a051253f75e08dac09b5d626c75204c2e3b96958f6b37732af68116c3300bd8e811bd037fd955789bf00c9dcc19d773ab8e483402a2327e5ca61a6a0075", 0xb}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000200)="2d96f3de4a1d869226bd5ed814bc75300fe41dc3979cbabca38862989049772198b301b2c1fd101d2567cca5f39553663c1e888c6951a7c652be0c4e7038e5e026b8cc4945c7f479f089c057d568af78018f892c0ef6706d189e0e457fd2530b2ac4950181c51949e0dbc0405f6c970c83c9c9650e7de9a103b1d94c0cef6eb244d0fa8b39e962909d201528bc62956c727bd5c6f389f61af8ba6c999fbd6b1b9da6306dfcc0aff04c54", 0xaa}, {&(0x7f00000002c0)="94fe9e4beef6149a1ac1a44ce49355378117d45498ea7c3ab5d29c4e2c9aa389910c6530378079316614711358d32d06f4f5", 0x32}], 0x2, 0x0, 0x0, 0x800}, {&(0x7f0000000340)={0x27, 0x0, 0x0, 0x7, 0x8, 0x8, "bea883351beac9500a303e900f1a357c0c68b4f10b376b9c453a159f1f233374000f08c5ee6d9e2ca7fe7fe024391c55179ed6f34530e47716671e1ebc114d", 0x1}, 0x60, &(0x7f0000000680)=[{&(0x7f00000003c0)="a3f571de513984ab3cb6ab53687a06b9774972c980f906535278dda314cd2f1e8987ccd35568ade6436b24504ccaeb3bad606e128a3d0957662b9cebeb14cd6c8fcb8deafce41d8f3d0a8913e5e33d39c3d84b429fd9fda8d2288cad5e39b164b3878166c9d37d22a73e6931c69230e6fc8b6f9b1425c75c6e20ace926a7ea92dfd8720ce04f60405ab01cb40be9af643e625d652deb62", 0x97}, {&(0x7f0000000480)="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", 0xfe}, {&(0x7f0000000580)="b2217e64842a31eb548026a6cebe5dbba6be90", 0x13}, {&(0x7f00000005c0)="76cec46b46c0454760d47f329e735a88732a449cc92ee0be1865e3049dbad3535b46415f0903c71d7b351d0cbed87dfd6ce8beb812a254a475d2bc2857008a459761cd2a9a5eb2f1947a0f81e10979a63a9018856e212577b57572103608d127973ec0208c87bc1020d3c07b450d5fad8157c7e97caf627fc98b88c0a39c92977d1feef27391209694e14136eae69e", 0x8f}], 0x4, &(0x7f00000006c0)={0xa8, 0x113, 0x9f, "739b3530e0504415e1fd39dd5862291409a8708f27b3e4bae898a9949267dbb3919fea11d79b4fb4b60bca85cbf50fade7a787cf3208a2045e8ff3a98658f8cb29850a5aba1e9396466f3dcd4566fb2e6ad706afaa03beb8ba0dad80f22af8955fb8285d76748a2d7ece79f74a0a1adf70f5546811dc9798e8696884b0929a12628470e6f80f3f6963269d006b028b8aee2f99acc567"}, 0xa8, 0x40000}], 0x2, 0x40000) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x5, 0x2, 0x20b, 0x3, 0x9ec, 0xb62c, 0x3, 0x8, r2}, 0x20) [ 1295.208029] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.220800] gfs2: can't parse mount arguments [ 1295.248257] SELinux: policydb version 83886101 does not match my version range 15-31 [ 1295.288583] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.298171] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.308234] gfs2: can't parse mount arguments [ 1295.317270] sel_write_load: 40 callbacks suppressed [ 1295.317281] SELinux: failed to load policy [ 1295.325215] gfs2: can't parse mount arguments 07:54:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000007000000000800000007000000"], 0x20) 07:54:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733213", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2, 0x0, 0x0) [ 1295.335265] SELinux: failed to load policy [ 1295.340480] SELinux: failed to load policy [ 1295.348166] SELinux: failed to load policy 07:54:02 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2`', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:02 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff7fffffff, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1295.442452] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.451816] SELinux: policydb version 117440533 does not match my version range 15-31 [ 1295.470654] gfs2: can't parse mount arguments [ 1295.506712] SELinux: failed to load policy 07:54:02 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:02 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000002000800000007000000"], 0x20) [ 1295.575898] SELinux: failed to load policy 07:54:02 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) rt_sigaction(0x2b, 0x0, &(0x7f0000000600)={&(0x7f0000000580)="65f0fe410040dde2f3ad79058fe830875daf2dc4a16e59942d91300000263e66660f38257900c481f557d2f3446fc4a259ac45fe", {}, 0x0, &(0x7f00000005c0)="c4e141db616b42de39c46135685b6ff30f52b0ab1ef7e426660f38156baf2e67420f1854b5d2f3dbecc462b2f57f07f30f11423e8fa858cc2a76"}, 0x8, &(0x7f0000000640)) [ 1295.639310] SELinux: failed to load policy [ 1295.657489] SELinux: failed to load policy 07:54:02 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="000100d0e56f5cd07cf13f4c5740054db36e9904a50036b2758bec52"], 0x1) r1 = dup3(r0, r0, 0x80000) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x1000000000042, 0x3e) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x58, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e20, 0xa8e6, @ipv4={[], [], @remote}, 0x1}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e22, 0x2, @loopback, 0x2}]}, &(0x7f0000000140)=0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000280)=0x68) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0x3}, 0x8) 07:54:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1295.728021] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.747539] gfs2: can't parse mount arguments 07:54:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000007000800000007000000"], 0x20) 07:54:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r2, 0x40001) sendfile(r0, r2, &(0x7f0000000240), 0x100000000002) [ 1295.779222] SELinux: failed to load policy [ 1295.837201] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.838906] SELinux: failed to load policy [ 1295.849212] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1295.857145] gfs2: can't parse mount arguments 07:54:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) r1 = dup(r0) acct(0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@ipv4={[], [], @multicast1}, 0x0}, &(0x7f00000000c0)=0x322) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x3, {0x4, 0x2, "4351d52287dfc19d9f151376acd9b907182f4693755cfb1e9be6dc9f11800393244ae6f863cd02e6158cf4daa84ccb6965dae8636805c63a55e326d3fa118036a7727e40690c7d75932a5491ebcd449883bb43412805e12ed0588f15b87ce73acd99fa24f08d17a64fd5a18f1bea74492892b63afa3333ef7a81a799b111761a75d3ca37d5b283981b5ec9333b1321effb9cec2ffab8ee1efc451c57a87bbe06c1c438db9d8b7486c4eb647b50d6ab3297b99bc35a93f279efdc9303dbaf18af0d5be4c5241ed77657a86fa9cf55638ad89590c9f6e299815ac695d36a8ccc42ffa634d8c75a3ffd8dd7d260bf5046751ac1f41529b2491937cc46c386bdf0b4", 0xa3, 0x5, 0xff, 0x2, 0x4, 0x1, 0x100000000, 0x1}, r3}}, 0x128) epoll_pwait(r1, &(0x7f0000000400)=[{}, {}], 0x2, 0x2, &(0x7f0000000440)={0xef}, 0x8) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000100)={r2, 0x80000000, 0xfffffffffffffeff, 0x7fffffff, 0xfffffffffffffff8, 0x3, 0x9}) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) syz_kvm_setup_cpu$x86(r1, r0, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="66ba4000b8a0b40000ef660fe36f8fc4a3396d385b400f0018c74424006d000000c744240200000100ff1c2466baf80cb8e8cee58bef66bafc0cb00cee47d897f1ffffff470f4e7bd90f3801d30f0179d0", 0x51}], 0x1, 0x22, &(0x7f0000000200)=[@vmwrite={0x8, 0x0, 0x8, 0x0, 0x35f, 0x0, 0x100000000}, @cr4={0x1, 0x20000}], 0x2) 07:54:03 executing program 4: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@broute={"62726f6c7465000000000000000000000500", 0x20, 0x1, 0x148, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, &(0x7f0000000300), &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ipddp0\x00', 'ifb0\x00', 'veth1\x00', 'syzkaller1\x00', @empty, [], @random="584f77360a0f", [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"4a50f44d53a0d5560219369fb3db90dae4633da87bfc24904d1320d5f42b"}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}]}, 0x1c0) 07:54:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000030000000800000007000000"], 0x20) 07:54:03 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1295.904309] gfs2: can't parse mount arguments [ 1296.005622] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.018766] gfs2: can't parse mount arguments 07:54:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000200000000800000007000000"], 0x20) [ 1296.064674] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1296.100354] SELinux: policydb magic number 0x8 does not match expected magic number 0xf97cff8c 07:54:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332c0", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:03 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000740), 0x0, 0x0, 0x10d}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='net/raw6\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 1296.116464] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1296.125839] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.146880] gfs2: can't parse mount arguments 07:54:03 executing program 4: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x5, 0x2, 0x7, {}, 0x10000, 0x6}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000380)={0x0, 0x0, 0x2, @local, 'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) fallocate(r1, 0x0, 0x0, 0x1000f4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x663, 0x8, 0x5, 0x1, 0x0, 0x3183, 0x200, 0x0, 0x2, 0x80000000, 0x1, 0x40, 0x7, 0x0, 0x9, 0x6, 0x1, 0x400, 0x0, 0x20, 0x1, 0xffffffffffffffe0, 0x7fff, 0x3, 0x6, 0x3, 0x100000000, 0x4, 0x1000000000000, 0xfff, 0x8, 0x2, 0x696, 0x0, 0xf747, 0x1a3, 0x0, 0x9479, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff9}, 0x80, 0x20000, 0x0, 0x2, 0x73, 0x7fffffff, 0x800}) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='syzkaller0\x00', 0x10) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000005c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x5, 0x0, 0x3ff, 'queue0\x00'}) sendfile(r0, r3, &(0x7f0000d83ff8)=0x2400, 0x8000ffffff7e) [ 1296.169958] SELinux: policydb magic number 0x8 does not match expected magic number 0xf97cff8c 07:54:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x33e, 0x4) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) 07:54:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000004000000000800000007000000"], 0x20) [ 1296.241275] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.247651] gfs2: can't parse mount arguments [ 1296.255600] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.291683] gfs2: can't parse mount arguments [ 1296.306876] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.316827] gfs2: can't parse mount arguments [ 1296.332040] overlayfs: missing 'lowerdir' 07:54:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000060000800000007000000"], 0x20) 07:54:03 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1296.334896] SELinux: policydb version 67108885 does not match my version range 15-31 07:54:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400400, 0x0) [ 1296.376741] audit: type=1804 audit(1539590043.654:1055): pid=31470 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1784/bus" dev="sda1" ino=16530 res=1 07:54:03 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:03 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1296.454888] audit: type=1804 audit(1539590043.714:1056): pid=31479 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1784/bus" dev="sda1" ino=16530 res=1 [ 1296.561369] overlayfs: missing 'lowerdir' 07:54:03 executing program 4: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x5, 0x2, 0x7, {}, 0x10000, 0x6}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000380)={0x0, 0x0, 0x2, @local, 'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) fallocate(r1, 0x0, 0x0, 0x1000f4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x663, 0x8, 0x5, 0x1, 0x0, 0x3183, 0x200, 0x0, 0x2, 0x80000000, 0x1, 0x40, 0x7, 0x0, 0x9, 0x6, 0x1, 0x400, 0x0, 0x20, 0x1, 0xffffffffffffffe0, 0x7fff, 0x3, 0x6, 0x3, 0x100000000, 0x4, 0x1000000000000, 0xfff, 0x8, 0x2, 0x696, 0x0, 0xf747, 0x1a3, 0x0, 0x9479, 0x0, @perf_config_ext={0x2, 0xfffffffffffffff9}, 0x80, 0x20000, 0x0, 0x2, 0x73, 0x7fffffff, 0x800}) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000003c0)='syzkaller0\x00', 0x10) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000005c0)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x5, 0x0, 0x3ff, 'queue0\x00'}) sendfile(r0, r3, &(0x7f0000d83ff8)=0x2400, 0x8000ffffff7e) [ 1296.583441] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.597582] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.602264] gfs2: can't parse mount arguments 07:54:03 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="ace0002160d25e25f58b7ebb3c108ea82d47e459c81d64e80c15406c6145294a0b5eb8eacd1ba21073ec0a6e1a4684309777ad9be37c108a2745ddbde6f06a4e55d5413617a88635c62f794610375d299b893d4ab1efd04b9098104510970ae0c5d03ac6bdbd2ed0511610af281767a5109ecd2a0c476d5657f7aea926dc68d59d4b61cb7bbce43cedab66590c58fa035505982add84fadb068c3f"], 0x1) 07:54:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000020000800000007000000"], 0x20) 07:54:03 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1296.640100] gfs2: can't parse mount arguments [ 1296.653198] audit: type=1804 audit(1539590043.804:1057): pid=31470 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1784/bus" dev="sda1" ino=16530 res=1 [ 1296.680155] audit: type=1804 audit(1539590043.834:1058): pid=31470 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1784/bus" dev="sda1" ino=16530 res=1 [ 1296.706792] audit: type=1804 audit(1539590043.854:1059): pid=31479 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1784/bus" dev="sda1" ino=16530 res=1 [ 1296.744280] audit: type=1804 audit(1539590043.854:1060): pid=31470 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1784/bus" dev="sda1" ino=16530 res=1 [ 1296.776105] overlayfs: missing 'lowerdir' 07:54:04 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cb46a3301b2ea4b61a49d565dded90092595d750c0191ae281988154748a06b424d20852a8d4f93a000002821f49d52c286f970997d942e86c6eae22c85c1417b92f5a700b85907c62f20d780dc00b06739a69613379edd8e1f54e6ba00f72f1c084926cdd7895e0bf61f1f4b06c88a29c73beef9cd831583a2240b12b21ec418bb2e815ad39fe33f492fe7e3ecc2fc1cd5d25fa1e6d9e62670a389790fb76bab989c977f693f"], 0x1) 07:54:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000006000800000007000000"], 0x20) [ 1296.823839] audit: type=1804 audit(1539590044.104:1061): pid=31512 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1785/bus" dev="sda1" ino=16541 res=1 [ 1296.851057] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1296.857386] gfs2: can't parse mount arguments 07:54:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="676673321a", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f00000000c0)={0x1b, 0x5, 0xeb, 0x1, 0x5}) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c"], 0x1) [ 1296.893641] audit: type=1804 audit(1539590044.154:1062): pid=31526 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir739210326/syzkaller.AexO6j/1785/bus" dev="sda1" ino=16541 res=1 07:54:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1297.023106] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.042855] gfs2: can't parse mount arguments [ 1297.052827] Unknown ioctl 1077980786 07:54:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000600000000800000007000000"], 0x20) [ 1297.084242] Unknown ioctl 1077980786 07:54:04 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2z', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x2bcd}}, 0x1c) 07:54:04 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/load\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0xfd4, 0x100000000, 0x1000, 0xfffffffffffffffc, 0x2}) r1 = syz_open_dev$vcsa(&(0x7f0000003cc0)='/dev/vcsa#\x00', 0x3ff, 0x460800) getsockopt$inet_tcp_int(r1, 0x6, 0xc, &(0x7f0000000000), &(0x7f00000000c0)=0x4) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000003d00)=0x2, 0x4) 07:54:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000050000000800000007000000"], 0x20) [ 1297.168718] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.177085] gfs2: can't parse mount arguments 07:54:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 2: 07:54:04 executing program 4: 07:54:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000002000000000800000007000000"], 0x20) 07:54:04 executing program 2: [ 1297.361683] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.394616] gfs2: can't parse mount arguments 07:54:04 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 4: 07:54:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000006000000000800000007000000"], 0x20) [ 1297.462484] SELinux: policydb version 33554453 does not match my version range 15-31 [ 1297.491879] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.537487] gfs2: can't parse mount arguments 07:54:04 executing program 2: 07:54:04 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="676673320e", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 4: 07:54:04 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:04 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500007fffffff000800000007000000"], 0x20) [ 1297.584376] SELinux: policydb version 100663317 does not match my version range 15-31 07:54:04 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") rt_sigaction(0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000580)="65f0fe410040dde2f3ad79058fe830875daf2dc4a16e59942d91300000263e66660f38257900c481f557d2f3446fc4a259ac45fe", {}, 0x0, &(0x7f00000005c0)="c4e141db616b42de39c46135685b6ff30f52b0ab1ef7e426660f38156baf2e67420f1854b5d2f3dbecc462b2f57f07f30f11423e8fa858cc2a76"}, 0x8, &(0x7f0000000640)) [ 1297.640716] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.663672] gfs2: can't parse mount arguments [ 1297.733708] SELinux: policydb version 2130706453 does not match my version range 15-31 [ 1297.747358] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.773125] gfs2: can't parse mount arguments 07:54:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f00000001c0), 0x0, 0x200007fc, &(0x7f0000000200)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, &(0x7f0000000500)={0x2, 0x0, @multicast2}, 0x10) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000000)=""/247, 0xf7}], 0x1) recvfrom(r0, &(0x7f0000000380)=""/239, 0xff4e, 0x0, 0x0, 0x307) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 07:54:05 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, r0) 07:54:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000001000800000007000000"], 0x20) 07:54:05 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1297.861384] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.878664] gfs2: can't parse mount arguments 07:54:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000005000800000007000000"], 0x20) 07:54:05 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000001d40)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa0000004e2311b580fbf902bf40e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3abe483a608e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb"], 0x74) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) r2 = socket$inet6(0xa, 0x1000000000003, 0x4) ioctl(r2, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") [ 1297.979757] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1297.992244] gfs2: can't parse mount arguments [ 1298.007592] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.062964] gfs2: can't parse mount arguments 07:54:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000060000000800000007000000"], 0x20) 07:54:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1298.194647] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.234031] gfs2: can't parse mount arguments 07:54:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000070000000800000007000000"], 0x20) 07:54:05 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1298.267850] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.282853] gfs2: can't parse mount arguments 07:54:05 executing program 2: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x5, 0x2, 0x7, {}, 0x10000}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000380)={0x0, 0x0, 0x2, @local, 'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) fallocate(r1, 0x0, 0x0, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="776f7200000000000036b775"]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000003c0)='syzkaller0\x00', 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x5, 0x0, 0x3ff, 'queue0\x00'}) sendfile(r0, r3, &(0x7f0000d83ff8)=0x2400, 0x8000ffffff7e) 07:54:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000700000800000007000000"], 0x20) [ 1298.353818] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.360177] gfs2: can't parse mount arguments [ 1298.372842] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.379188] gfs2: can't parse mount arguments [ 1298.421278] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.428002] gfs2: can't parse mount arguments 07:54:05 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:05 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000050800000007000000"], 0x20) [ 1298.474044] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.489887] overlayfs: unrecognized mount option "wor" or missing value [ 1298.497809] gfs2: can't parse mount arguments 07:54:05 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1298.507702] audit: type=1804 audit(1539590045.784:1063): pid=31705 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir377498192/syzkaller.cEVoSp/1843/bus" dev="sda1" ino=16550 res=1 [ 1298.562378] audit: type=1804 audit(1539590045.834:1064): pid=31711 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor2" name="/root/syzkaller-testdir377498192/syzkaller.cEVoSp/1843/bus" dev="sda1" ino=16550 res=1 [ 1298.648109] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.659675] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.662380] gfs2: can't parse mount arguments 07:54:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000060800000007000000"], 0x20) [ 1298.716145] gfs2: can't parse mount arguments [ 1298.765405] overlayfs: unrecognized mount option "wor" or missing value [ 1298.779486] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.809693] gfs2: can't parse mount arguments [ 1298.821811] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.837796] gfs2: can't parse mount arguments 07:54:06 executing program 2: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x5, 0x2, 0x7, {}, 0x10000}) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000380)={0x0, 0x0, 0x2, @local, 'bond_slave_1\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) fallocate(r1, 0x0, 0x0, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="776f7200000000000036b775"]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000003c0)='syzkaller0\x00', 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000002c0)={0x5, 0x0, 0x3ff, 'queue0\x00'}) sendfile(r0, r3, &(0x7f0000d83ff8)=0x2400, 0x8000ffffff7e) 07:54:06 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000600000800000007000000"], 0x20) 07:54:06 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:06 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1298.967875] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1298.986851] gfs2: can't parse mount arguments 07:54:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000002000000800000007000000"], 0x20) [ 1299.023807] overlayfs: unrecognized mount option "wor" or missing value [ 1299.072784] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.080327] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.087691] gfs2: can't parse mount arguments [ 1299.111575] gfs2: can't parse mount arguments 07:54:06 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1299.120321] FAULT_INJECTION: forcing a failure. [ 1299.120321] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.162925] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.172888] CPU: 1 PID: 31761 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1299.180195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.189546] Call Trace: [ 1299.190120] gfs2: can't parse mount arguments [ 1299.192145] dump_stack+0x1c4/0x2b4 [ 1299.192168] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1299.192190] ? lock_acquire+0x1ed/0x520 [ 1299.192211] should_fail.cold.4+0xa/0x17 [ 1299.213509] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1299.218615] ? print_usage_bug+0xc0/0xc0 [ 1299.218632] ? graph_lock+0x170/0x170 [ 1299.218647] ? graph_lock+0x170/0x170 [ 1299.230264] ? graph_lock+0x170/0x170 [ 1299.234068] ? __mutex_lock+0x85e/0x1700 [ 1299.238140] ? sel_write_load+0xaa/0x460 [ 1299.242209] ? find_held_lock+0x36/0x1c0 [ 1299.246270] ? __lock_is_held+0xb5/0x140 [ 1299.246297] ? ___might_sleep+0x1ed/0x300 [ 1299.246310] ? arch_local_save_flags+0x40/0x40 [ 1299.246326] ? kasan_check_read+0x11/0x20 [ 1299.263212] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1299.268499] ? rcu_bh_qs+0xc0/0xc0 [ 1299.272050] __should_failslab+0x124/0x180 [ 1299.276290] should_failslab+0x9/0x14 [ 1299.280103] kmem_cache_alloc_node_trace+0x270/0x740 [ 1299.285221] __get_vm_area_node+0x130/0x3a0 [ 1299.289552] __vmalloc_node_range+0xc4/0x750 [ 1299.293963] ? sel_write_load+0x1d1/0x460 [ 1299.298115] ? graph_lock+0x170/0x170 [ 1299.301931] ? __lock_is_held+0xb5/0x140 [ 1299.305995] ? sel_write_load+0x1d1/0x460 [ 1299.310136] vmalloc+0x6f/0x80 [ 1299.313310] ? sel_write_load+0x1d1/0x460 [ 1299.317435] sel_write_load+0x1d1/0x460 [ 1299.321394] __vfs_write+0x119/0x9f0 [ 1299.325092] ? check_preemption_disabled+0x48/0x200 [ 1299.330089] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1299.335015] ? kernel_read+0x120/0x120 [ 1299.338885] ? __lock_is_held+0xb5/0x140 [ 1299.342935] ? rcu_read_lock_sched_held+0x108/0x120 [ 1299.347937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.353470] ? __sb_start_write+0x1b2/0x370 [ 1299.357774] vfs_write+0x1fc/0x560 [ 1299.361314] ksys_write+0x101/0x260 [ 1299.364924] ? __ia32_sys_read+0xb0/0xb0 [ 1299.368976] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1299.374416] __x64_sys_write+0x73/0xb0 [ 1299.378288] do_syscall_64+0x1b9/0x820 [ 1299.382177] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1299.387532] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1299.392442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1299.397281] ? trace_hardirqs_on_caller+0x310/0x310 [ 1299.402280] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1299.407290] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1299.412290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1299.417118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.422301] RIP: 0033:0x457569 [ 1299.425475] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.444390] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1299.452081] RAX: ffffffffffffffda RBX: 00007f9b9be41c90 RCX: 0000000000457569 [ 1299.459329] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000003 [ 1299.466579] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 07:54:06 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000300000800000007000000"], 0x20) 07:54:06 executing program 2 (fault-call:11 fault-nth:0): openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:06 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1299.473838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1299.481096] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 0000000000000004 [ 1299.493321] syz-executor4: vmalloc: allocation failure: 32 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 1299.503516] syz-executor4 cpuset=syz4 mems_allowed=0 [ 1299.511860] CPU: 0 PID: 31761 Comm: syz-executor4 Not tainted 4.19.0-rc8+ #63 [ 1299.519139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.528482] Call Trace: [ 1299.531060] dump_stack+0x1c4/0x2b4 [ 1299.534680] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1299.539865] warn_alloc.cold.119+0xb7/0x1bd [ 1299.544168] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 1299.548993] ? __get_vm_area_node+0x130/0x3a0 [ 1299.553472] ? rcu_read_lock_sched_held+0x108/0x120 [ 1299.558478] ? __get_vm_area_node+0x2e5/0x3a0 [ 1299.562965] __vmalloc_node_range+0x472/0x750 [ 1299.567449] ? graph_lock+0x170/0x170 [ 1299.571245] ? __lock_is_held+0xb5/0x140 [ 1299.575303] ? sel_write_load+0x1d1/0x460 [ 1299.579433] vmalloc+0x6f/0x80 [ 1299.582605] ? sel_write_load+0x1d1/0x460 [ 1299.586732] sel_write_load+0x1d1/0x460 [ 1299.590689] __vfs_write+0x119/0x9f0 [ 1299.594394] ? check_preemption_disabled+0x48/0x200 [ 1299.599390] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1299.604389] ? kernel_read+0x120/0x120 [ 1299.608261] ? __lock_is_held+0xb5/0x140 [ 1299.612319] ? rcu_read_lock_sched_held+0x108/0x120 [ 1299.617320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1299.622846] ? __sb_start_write+0x1b2/0x370 [ 1299.627161] vfs_write+0x1fc/0x560 [ 1299.630685] ksys_write+0x101/0x260 [ 1299.634303] ? __ia32_sys_read+0xb0/0xb0 [ 1299.638357] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1299.643810] __x64_sys_write+0x73/0xb0 [ 1299.647683] do_syscall_64+0x1b9/0x820 [ 1299.651565] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1299.656922] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1299.661843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1299.666675] ? trace_hardirqs_on_caller+0x310/0x310 [ 1299.671674] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1299.676680] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1299.681696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1299.686537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1299.691732] RIP: 0033:0x457569 [ 1299.694913] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1299.713803] RSP: 002b:00007f9b9be41c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1299.721509] RAX: ffffffffffffffda RBX: 00007f9b9be41c90 RCX: 0000000000457569 [ 1299.728770] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000003 [ 1299.736027] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1299.743274] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9b9be426d4 [ 1299.750520] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 0000000000000004 [ 1299.762998] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.781410] gfs2: can't parse mount arguments [ 1299.788796] Mem-Info: [ 1299.794861] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.795079] active_anon:156360 inactive_anon:111 isolated_anon:0 [ 1299.795079] active_file:21407 inactive_file:38620 isolated_file:0 [ 1299.795079] unevictable:0 dirty:317 writeback:0 unstable:0 [ 1299.795079] slab_reclaimable:14402 slab_unreclaimable:104784 [ 1299.795079] mapped:55531 shmem:145 pagetables:1558 bounce:0 [ 1299.795079] free:1209295 free_pcp:860 free_cma:0 [ 1299.807358] gfs2: can't parse mount arguments 07:54:07 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733204", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1299.879531] FAULT_INJECTION: forcing a failure. [ 1299.879531] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.890811] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.890818] gfs2: can't parse mount arguments [ 1299.894642] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1299.915511] CPU: 0 PID: 31777 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1299.922887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1299.927598] gfs2: can't parse mount arguments [ 1299.932255] Call Trace: [ 1299.932284] dump_stack+0x1c4/0x2b4 [ 1299.932303] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1299.932319] ? mark_held_locks+0x130/0x130 [ 1299.932344] should_fail.cold.4+0xa/0x17 [ 1299.932361] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1299.940513] Node 0 active_anon:630084kB inactive_anon:444kB active_file:85628kB inactive_file:154480kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:222224kB dirty:1268kB writeback:0kB shmem:580kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 366592kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1299.943027] ? print_usage_bug+0xc0/0xc0 [ 1299.943048] ? mark_held_locks+0xc7/0x130 [ 1299.943070] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1299.943085] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1299.943103] ? retint_kernel+0x2d/0x2d [ 1299.948371] Node 0 [ 1299.952494] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1299.952509] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1299.952523] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1299.952539] ? trace_hardirqs_off+0x310/0x310 [ 1299.952557] ? find_held_lock+0x36/0x1c0 [ 1299.952579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1299.952599] ? retint_kernel+0x2d/0x2d [ 1299.957347] DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1299.961726] ? __should_failslab+0xea/0x180 [ 1299.961747] __should_failslab+0x124/0x180 07:54:07 executing program 2 (fault-call:11 fault-nth:1): openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1299.961773] should_failslab+0x9/0x14 [ 1299.961790] kmem_cache_alloc_trace+0x2d7/0x750 [ 1299.961807] ? rcu_dynticks_curr_cpu_in_eqs+0x9f/0x160 [ 1299.961832] alloc_pipe_info+0x16b/0x590 [ 1299.990622] lowmem_reserve[]: [ 1299.994133] ? pipe_read+0x940/0x940 [ 1299.994153] ? ___might_sleep+0x1ed/0x300 [ 1299.994169] ? arch_local_save_flags+0x40/0x40 [ 1299.994199] splice_direct_to_actor+0x6fc/0x8f0 [ 1299.998430] 0 [ 1300.003063] ? __inode_security_revalidate+0xd9/0x120 [ 1300.003081] ? pipe_to_sendpage+0x400/0x400 [ 1300.003099] ? selinux_file_permission+0x90/0x540 [ 1300.003118] ? do_splice_to+0x190/0x190 [ 1300.003134] ? security_file_permission+0x1c2/0x230 [ 1300.003155] ? rw_verify_area+0x118/0x360 [ 1300.003173] do_splice_direct+0x2d4/0x420 [ 1300.008221] 2819 [ 1300.011633] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1300.011657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.011672] ? __sb_start_write+0x1b2/0x370 [ 1300.011693] do_sendfile+0x62a/0xe20 [ 1300.011719] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1300.011743] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1300.014347] 6323 [ 1300.018875] ? _copy_from_user+0xdf/0x150 [ 1300.018898] __x64_sys_sendfile64+0x15d/0x250 [ 1300.018921] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1300.018948] do_syscall_64+0x1b9/0x820 [ 1300.024238] 6323 [ 1300.028615] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1300.028633] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1300.028646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1300.028664] ? trace_hardirqs_on_caller+0x310/0x310 [ 1300.028679] ? prepare_exit_to_usermode+0x3b0/0x3b0 07:54:07 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1300.037198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.037214] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1300.037234] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1300.037257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.037271] RIP: 0033:0x457569 [ 1300.042367] Node 0 [ 1300.045869] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1300.045877] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1300.045893] RAX: ffffffffffffffda RBX: 00007f58a0a03c90 RCX: 0000000000457569 [ 1300.045907] RDX: 0000000020000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 1300.045915] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1300.045924] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1300.045935] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000008 [ 1300.072110] DMA32 free:2889372kB min:30060kB low:37572kB high:45084kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2890736kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1364kB local_pcp:1296kB free_cma:0kB [ 1300.098940] lowmem_reserve[]: [ 1300.106656] 0 [ 1300.174636] 0 [ 1300.183220] 3503 [ 1300.302298] FAULT_INJECTION: forcing a failure. [ 1300.302298] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.305952] 3503 [ 1300.312848] CPU: 0 PID: 31794 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1300.346700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1300.346707] Call Trace: [ 1300.346743] dump_stack+0x1c4/0x2b4 [ 1300.346759] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1300.346777] ? __kernel_text_address+0xd/0x40 [ 1300.346798] should_fail.cold.4+0xa/0x17 [ 1300.346816] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1300.346834] ? print_usage_bug+0xc0/0xc0 [ 1300.346850] ? graph_lock+0x170/0x170 [ 1300.346862] ? save_stack+0x43/0xd0 [ 1300.346871] ? kasan_kmalloc+0xc7/0xe0 [ 1300.346893] ? kmem_cache_alloc_trace+0x152/0x750 [ 1300.350130] Node 0 [ 1300.351765] ? alloc_pipe_info+0x16b/0x590 [ 1300.351779] ? graph_lock+0x170/0x170 [ 1300.351794] ? __x64_sys_sendfile64+0x15d/0x250 [ 1300.351811] ? do_syscall_64+0x1b9/0x820 [ 1300.351827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.351847] ? find_held_lock+0x36/0x1c0 [ 1300.351863] ? __lock_is_held+0xb5/0x140 [ 1300.353781] Normal free:1931036kB min:37352kB low:46688kB high:56024kB active_anon:627996kB inactive_anon:744kB active_file:85628kB inactive_file:154480kB unevictable:0kB writepending:1268kB present:4718592kB managed:3588044kB mlocked:0kB kernel_stack:6528kB pagetables:6084kB bounce:0kB free_pcp:1860kB local_pcp:1176kB free_cma:0kB [ 1300.355703] ? ___might_sleep+0x1ed/0x300 [ 1300.355719] ? arch_local_save_flags+0x40/0x40 [ 1300.355754] __should_failslab+0x124/0x180 [ 1300.355775] should_failslab+0x9/0x14 [ 1300.367067] lowmem_reserve[]: [ 1300.368987] __kmalloc+0x2d4/0x760 [ 1300.369009] ? alloc_pipe_info+0x29e/0x590 [ 1300.369031] alloc_pipe_info+0x29e/0x590 [ 1300.369050] ? pipe_read+0x940/0x940 [ 1300.369068] ? ___might_sleep+0x1ed/0x300 [ 1300.376441] 0 [ 1300.385658] ? arch_local_save_flags+0x40/0x40 [ 1300.385680] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1300.385706] splice_direct_to_actor+0x6fc/0x8f0 [ 1300.385730] ? __inode_security_revalidate+0xd9/0x120 [ 1300.385745] ? pipe_to_sendpage+0x400/0x400 [ 1300.388423] 0 [ 1300.391927] ? selinux_file_permission+0x90/0x540 [ 1300.391946] ? do_splice_to+0x190/0x190 [ 1300.391961] ? security_file_permission+0x1c2/0x230 [ 1300.391981] ? rw_verify_area+0x118/0x360 [ 1300.392012] do_splice_direct+0x2d4/0x420 [ 1300.392030] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1300.397285] 0 [ 1300.401670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1300.401683] ? __sb_start_write+0x1b2/0x370 [ 1300.401703] do_sendfile+0x62a/0xe20 [ 1300.401736] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1300.401759] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1300.405902] 0 [ 1300.410889] ? _copy_from_user+0xdf/0x150 [ 1300.410909] __x64_sys_sendfile64+0x15d/0x250 [ 1300.410927] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1300.410952] do_syscall_64+0x1b9/0x820 [ 1300.410971] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1300.418787] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1300.418800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1300.418816] ? trace_hardirqs_on_caller+0x310/0x310 [ 1300.418831] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1300.418843] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1300.418860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1300.422582] Node 0 [ 1300.426334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1300.426345] RIP: 0033:0x457569 [ 1300.426361] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1300.426369] RSP: 002b:00007f58a09e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1300.426382] RAX: ffffffffffffffda RBX: 00007f58a09e2c90 RCX: 0000000000457569 [ 1300.426392] RDX: 0000000020000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 1300.431328] DMA: [ 1300.433429] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1300.433437] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f58a09e36d4 [ 1300.433445] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000009 [ 1300.442425] 1*4kB [ 1300.450499] (U) [ 1300.459858] 0*8kB [ 1300.493581] 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 1300.760175] Node 0 DMA32: 3*4kB (M) 0*8kB 3*16kB (M) 3*32kB (M) 4*64kB (M) 4*128kB (M) 3*256kB (M) 2*512kB (M) 3*1024kB (M) 2*2048kB (M) 703*4096kB (M) = 2889372kB 07:54:08 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1300.778946] Node 0 Normal: 4418*4kB (UME) 324*8kB (UME) 123*16kB (UE) 1160*32kB (UME) 583*64kB (UME) 189*128kB (UME) 43*256kB (UM) 20*512kB (UM) 3*1024kB (UM) 2*2048kB (ME) 435*4096kB (M) = 1931032kB [ 1300.800791] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1300.809721] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1300.828469] 60194 total pagecache pages [ 1300.834330] 0 pages in swap cache [ 1300.837778] Swap cache stats: add 0, delete 0, find 0/0 [ 1300.843207] Free swap = 0kB [ 1300.846454] Total swap = 0kB [ 1300.849461] 1965979 pages RAM [ 1300.889404] 0 pages HighMem/MovableOnly 07:54:08 executing program 2 (fault-call:11 fault-nth:2): openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1300.915978] 342307 pages reserved [ 1300.920814] 0 pages cma reserved [ 1300.924711] sel_write_load: 36 callbacks suppressed [ 1300.924716] SELinux: failed to load policy [ 1300.935547] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1300.959601] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1300.965094] gfs2: can't parse mount arguments 07:54:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000006000000800000007000000"], 0x20) 07:54:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1300.987381] gfs2: can't parse mount arguments 07:54:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000030000000800000007000000"], 0x20) [ 1301.033786] SELinux: failed to load policy [ 1301.073931] SELinux: policydb table sizes (8,7) do not match mine (5,6) [ 1301.098198] FAULT_INJECTION: forcing a failure. [ 1301.098198] name failslab, interval 1, probability 0, space 0, times 0 07:54:08 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1301.125726] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1301.125730] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1301.125740] gfs2: can't parse mount arguments [ 1301.137487] gfs2: can't parse mount arguments [ 1301.152960] SELinux: failed to load policy [ 1301.164398] CPU: 1 PID: 31829 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 07:54:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000040000000800000007000000"], 0x20) [ 1301.171700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.174122] SELinux: failed to load policy [ 1301.181050] Call Trace: [ 1301.181082] dump_stack+0x1c4/0x2b4 [ 1301.181105] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1301.181127] ? rcu_bh_qs+0xc0/0xc0 [ 1301.181142] ? unwind_dump+0x190/0x190 [ 1301.181167] should_fail.cold.4+0xa/0x17 [ 1301.181183] ? is_bpf_text_address+0xd3/0x170 [ 1301.181203] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1301.217843] ? __kernel_text_address+0xd/0x40 [ 1301.222333] ? unwind_get_return_address+0x61/0xa0 [ 1301.227254] ? graph_lock+0x170/0x170 [ 1301.231046] ? graph_lock+0x170/0x170 [ 1301.234834] ? find_held_lock+0x36/0x1c0 [ 1301.238878] ? __lock_is_held+0xb5/0x140 [ 1301.242951] ? ___might_sleep+0x1ed/0x300 [ 1301.247083] ? arch_local_save_flags+0x40/0x40 [ 1301.251648] ? graph_lock+0x170/0x170 [ 1301.255454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1301.261223] __should_failslab+0x124/0x180 [ 1301.265469] should_failslab+0x9/0x14 [ 1301.269279] __kmalloc+0x2d4/0x760 [ 1301.272825] ? iter_file_splice_write+0x260/0x1050 [ 1301.277751] iter_file_splice_write+0x260/0x1050 [ 1301.282507] ? generic_file_splice_read+0x653/0x9a0 [ 1301.287505] ? __might_sleep+0x95/0x190 [ 1301.292346] ? page_cache_pipe_buf_steal+0x860/0x860 [ 1301.297451] ? rw_verify_area+0x118/0x360 [ 1301.301582] ? page_cache_pipe_buf_steal+0x860/0x860 [ 1301.306675] direct_splice_actor+0x128/0x190 [ 1301.311070] splice_direct_to_actor+0x318/0x8f0 [ 1301.315722] ? __inode_security_revalidate+0xd9/0x120 [ 1301.320892] ? pipe_to_sendpage+0x400/0x400 [ 1301.325198] ? do_splice_to+0x190/0x190 [ 1301.329166] ? security_file_permission+0x1c2/0x230 [ 1301.334180] ? rw_verify_area+0x118/0x360 [ 1301.338346] do_splice_direct+0x2d4/0x420 [ 1301.342491] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1301.347363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1301.352886] ? __sb_start_write+0x1b2/0x370 [ 1301.357194] do_sendfile+0x62a/0xe20 [ 1301.360899] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1301.365466] ? copy_user_generic_unrolled+0x89/0xc0 [ 1301.370474] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1301.376017] ? _copy_from_user+0xdf/0x150 [ 1301.380164] __x64_sys_sendfile64+0x15d/0x250 [ 1301.384652] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1301.389231] do_syscall_64+0x1b9/0x820 [ 1301.393114] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1301.398466] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1301.403379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1301.408221] ? trace_hardirqs_on_caller+0x310/0x310 [ 1301.413232] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1301.418316] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1301.423324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1301.428160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1301.433349] RIP: 0033:0x457569 [ 1301.436525] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1301.455433] RSP: 002b:00007f58a09e2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1301.463142] RAX: ffffffffffffffda RBX: 00007f58a09e2c90 RCX: 0000000000457569 07:54:08 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf94c0000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:08 executing program 2 (fault-call:11 fault-nth:3): openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1301.470405] RDX: 0000000020000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 1301.477673] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1301.485042] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f58a09e36d4 [ 1301.492295] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000005 07:54:08 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:08 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000050000000800000007000000"], 0x20) [ 1301.578078] SELinux: failed to load policy 07:54:08 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733204", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1301.639846] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1301.654274] gfs2: can't parse mount arguments [ 1301.659787] SELinux: policydb string length 76 does not match expected length 8 07:54:09 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000600800000007000000"], 0x20) 07:54:09 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9090000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1301.691377] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1301.697731] gfs2: can't parse mount arguments [ 1301.702844] SELinux: failed to load policy [ 1301.717366] SELinux: failed to load policy 07:54:09 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1301.770746] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1301.777256] gfs2: can't parse mount arguments [ 1301.790218] FAULT_INJECTION: forcing a failure. [ 1301.790218] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.819825] SELinux: failed to load policy [ 1301.866723] SELinux: policydb string length 9 does not match expected length 8 [ 1301.874765] CPU: 1 PID: 31863 Comm: syz-executor2 Not tainted 4.19.0-rc8+ #63 [ 1301.882054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1301.891414] Call Trace: [ 1301.894033] dump_stack+0x1c4/0x2b4 [ 1301.897758] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1301.897777] ? is_bpf_text_address+0xd3/0x170 [ 1301.897803] should_fail.cold.4+0xa/0x17 [ 1301.897821] ? __save_stack_trace+0x8d/0xf0 [ 1301.911538] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1301.920945] ? save_stack+0xa9/0xd0 [ 1301.924581] ? kasan_kmalloc+0xc7/0xe0 [ 1301.928484] ? kasan_slab_alloc+0x12/0x20 [ 1301.932646] ? kmem_cache_alloc+0x12e/0x730 [ 1301.932664] ? mempool_alloc_slab+0x44/0x60 [ 1301.932676] ? mempool_alloc+0x193/0x4a0 [ 1301.932696] ? bio_alloc_bioset+0x3a8/0x700 [ 1301.939550] SELinux: failed to load policy [ 1301.941314] ? mpage_alloc.isra.9+0x3d/0x270 [ 1301.941328] ? __mpage_writepage+0x15e4/0x1d30 07:54:09 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9020000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:09 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000040800000007000000"], 0x20) [ 1301.941344] ? write_cache_pages+0xd8e/0x1e50 [ 1301.941356] ? mpage_writepages+0x14c/0x320 [ 1301.941369] ? fat_writepages+0x24/0x30 [ 1301.941382] ? do_writepages+0x9a/0x1a0 [ 1301.941398] ? __filemap_fdatawrite_range+0x364/0x4a0 [ 1301.941409] ? file_write_and_wait_range+0x98/0x100 [ 1301.941424] ? __generic_file_fsync+0x78/0x200 [ 1301.941440] ? generic_file_fsync+0x77/0x120 [ 1301.949794] ? fat_file_fsync+0x77/0x180 [ 1301.949812] ? graph_lock+0x170/0x170 [ 1301.949829] ? __kernel_write+0x10c/0x370 [ 1301.949847] ? write_pipe_buf+0x180/0x240 [ 1302.014997] ? __splice_from_pipe+0x38b/0x7c0 [ 1302.019475] ? splice_from_pipe+0x1ec/0x340 [ 1302.023778] ? default_file_splice_write+0x3c/0x90 [ 1302.028693] ? direct_splice_actor+0x128/0x190 [ 1302.033262] ? splice_direct_to_actor+0x318/0x8f0 [ 1302.038086] ? do_splice_direct+0x2d4/0x420 [ 1302.042388] ? do_sendfile+0x62a/0xe20 [ 1302.046263] ? __x64_sys_sendfile64+0x15d/0x250 [ 1302.050930] ? do_syscall_64+0x1b9/0x820 [ 1302.054979] ? graph_lock+0x170/0x170 [ 1302.058789] ? __lock_is_held+0xb5/0x140 [ 1302.062844] __should_failslab+0x124/0x180 [ 1302.067062] ? mempool_free+0x370/0x370 [ 1302.071022] should_failslab+0x9/0x14 [ 1302.074821] kmem_cache_alloc+0x47/0x730 [ 1302.078898] ? mempool_free+0x370/0x370 [ 1302.082887] mempool_alloc_slab+0x44/0x60 [ 1302.087026] mempool_alloc+0x193/0x4a0 [ 1302.090901] ? mempool_destroy+0x30/0x30 [ 1302.094942] ? kasan_check_write+0x14/0x20 [ 1302.099161] ? bio_init+0x13c/0x270 [ 1302.102778] ? bio_add_page+0x130/0x130 [ 1302.106759] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.111506] bvec_alloc+0x12a/0x2d0 [ 1302.115123] bio_alloc_bioset+0x47a/0x700 [ 1302.119258] ? bvec_alloc+0x2d0/0x2d0 [ 1302.123050] ? __mpage_writepage+0x138e/0x1d30 [ 1302.127617] mpage_alloc.isra.9+0x3d/0x270 [ 1302.131835] __mpage_writepage+0x15e4/0x1d30 [ 1302.136247] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.141773] ? clear_page_dirty_for_io+0x58d/0x18f0 [ 1302.146774] ? clean_buffers+0x340/0x340 [ 1302.150822] ? trace_hardirqs_on+0xbd/0x310 [ 1302.155135] ? kasan_check_read+0x11/0x20 [ 1302.159265] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1302.164705] ? graph_lock+0x170/0x170 [ 1302.168500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.174021] ? check_preemption_disabled+0x48/0x200 [ 1302.179037] ? check_preemption_disabled+0x48/0x200 [ 1302.184062] ? __lock_is_held+0xb5/0x140 [ 1302.188116] write_cache_pages+0xd8e/0x1e50 [ 1302.192427] ? clean_buffers+0x340/0x340 [ 1302.196482] ? clear_page_dirty_for_io+0x18f0/0x18f0 [ 1302.201575] ? lock_release+0x4d2/0x970 [ 1302.205554] ? __lock_acquire+0x7ec/0x4ec0 [ 1302.209778] ? kasan_check_read+0x11/0x20 [ 1302.213917] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1302.218338] ? mark_held_locks+0x130/0x130 [ 1302.222571] ? mark_held_locks+0xc7/0x130 [ 1302.226709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.231449] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1302.236021] ? retint_kernel+0x2d/0x2d [ 1302.239917] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1302.244851] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.249597] ? trace_hardirqs_off+0x310/0x310 [ 1302.254098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1302.258849] ? trace_hardirqs_off+0x310/0x310 [ 1302.263354] ? blk_start_plug+0xcc/0x370 [ 1302.267418] ? blk_lld_busy+0x70/0x70 [ 1302.271216] ? retint_kernel+0x2d/0x2d [ 1302.275178] ? fat_add_cluster+0x160/0x160 [ 1302.279437] ? mpage_writepages+0x7e/0x320 [ 1302.283668] ? fat_add_cluster+0x160/0x160 [ 1302.287885] mpage_writepages+0x14c/0x320 [ 1302.292012] ? mpage_end_io+0x1e0/0x1e0 [ 1302.296000] ? fat_add_cluster+0x160/0x160 [ 1302.300231] ? __filemap_fdatawrite_range+0x31d/0x4a0 [ 1302.305407] ? _raw_spin_unlock+0x2c/0x50 [ 1302.309535] ? wbc_attach_and_unlock_inode+0x675/0xa30 [ 1302.314794] fat_writepages+0x24/0x30 [ 1302.318578] ? fat_readpages+0x40/0x40 [ 1302.322446] do_writepages+0x9a/0x1a0 [ 1302.326234] __filemap_fdatawrite_range+0x364/0x4a0 [ 1302.331253] ? delete_from_page_cache_batch+0x11f0/0x11f0 [ 1302.336780] ? find_held_lock+0x36/0x1c0 [ 1302.340834] ? lock_downgrade+0x900/0x900 [ 1302.344967] file_write_and_wait_range+0x98/0x100 [ 1302.349794] __generic_file_fsync+0x78/0x200 [ 1302.354187] generic_file_fsync+0x77/0x120 [ 1302.358418] fat_file_fsync+0x77/0x180 [ 1302.362285] ? fat_free_clusters.cold.16+0x32/0x32 [ 1302.367195] vfs_fsync_range+0x140/0x220 [ 1302.371262] generic_file_write_iter+0x604/0x870 [ 1302.376015] ? __generic_file_write_iter+0x630/0x630 [ 1302.381114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1302.386767] ? iov_iter_init+0xc2/0x1e0 [ 1302.390729] __vfs_write+0x6b8/0x9f0 [ 1302.394424] ? kernel_read+0x120/0x120 [ 1302.398302] ? __lock_is_held+0xb5/0x140 [ 1302.402359] ? ___might_sleep+0x1ed/0x300 [ 1302.406506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1302.412028] __kernel_write+0x10c/0x370 [ 1302.415998] write_pipe_buf+0x180/0x240 [ 1302.419953] ? ___might_sleep+0x1ed/0x300 [ 1302.424088] ? trace_hardirqs_on_caller+0xc0/0x310 [ 1302.428996] ? do_splice_direct+0x420/0x420 [ 1302.433300] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.438820] ? splice_from_pipe_next.part.10+0x296/0x340 [ 1302.444256] __splice_from_pipe+0x38b/0x7c0 [ 1302.448568] ? do_splice_direct+0x420/0x420 [ 1302.452878] splice_from_pipe+0x1ec/0x340 [ 1302.457011] ? do_splice_direct+0x420/0x420 [ 1302.461340] ? splice_shrink_spd+0xd0/0xd0 [ 1302.465577] default_file_splice_write+0x3c/0x90 [ 1302.470312] ? generic_splice_sendpage+0x50/0x50 [ 1302.475050] direct_splice_actor+0x128/0x190 [ 1302.479458] splice_direct_to_actor+0x318/0x8f0 [ 1302.484111] ? __inode_security_revalidate+0xd9/0x120 [ 1302.489282] ? pipe_to_sendpage+0x400/0x400 [ 1302.493588] ? do_splice_to+0x190/0x190 [ 1302.497543] ? security_file_permission+0x1c2/0x230 [ 1302.502546] ? rw_verify_area+0x118/0x360 [ 1302.506719] do_splice_direct+0x2d4/0x420 [ 1302.510865] ? splice_direct_to_actor+0x8f0/0x8f0 [ 1302.515695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1302.521219] ? __sb_start_write+0x1b2/0x370 [ 1302.525540] do_sendfile+0x62a/0xe20 [ 1302.529247] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1302.533818] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1302.539334] ? _copy_from_user+0xdf/0x150 [ 1302.543463] __x64_sys_sendfile64+0x15d/0x250 [ 1302.547942] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 1302.552505] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1302.558027] do_syscall_64+0x1b9/0x820 [ 1302.561901] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1302.567247] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1302.572174] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1302.577021] ? trace_hardirqs_on_caller+0x310/0x310 [ 1302.582040] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1302.587068] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1302.592070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1302.596901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1302.602075] RIP: 0033:0x457569 07:54:09 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1302.605260] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1302.624153] RSP: 002b:00007f58a0a03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1302.631852] RAX: ffffffffffffffda RBX: 00007f58a0a03c90 RCX: 0000000000457569 [ 1302.639149] RDX: 0000000020000000 RSI: 0000000000000005 RDI: 0000000000000005 [ 1302.646398] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1302.653650] R10: 00008080fffffffe R11: 0000000000000246 R12: 00007f58a0a046d4 [ 1302.660901] R13: 00000000004c34d0 R14: 00000000004d5298 R15: 0000000000000008 07:54:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1302.714149] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1302.726893] gfs2: can't parse mount arguments [ 1302.744725] SELinux: policydb string length 2 does not match expected length 8 07:54:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000070800000007000000"], 0x20) 07:54:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90a0000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1302.760964] SELinux: failed to load policy [ 1302.847609] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1302.857277] gfs2: can't parse mount arguments 07:54:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000060000000800000007000000"], 0x20) [ 1302.950929] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1302.987385] gfs2: can't parse mount arguments [ 1302.998485] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf92e0000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1303.031524] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.038007] gfs2: can't parse mount arguments [ 1303.044019] gfs2: can't parse mount arguments 07:54:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1303.109331] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.127369] SELinux: policydb string length 46 does not match expected length 8 [ 1303.130950] gfs2: can't parse mount arguments [ 1303.140344] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.177322] gfs2: can't parse mount arguments 07:54:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000020000000800000007000000"], 0x20) 07:54:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf92f0000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1303.199126] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.237596] gfs2: can't parse mount arguments [ 1303.351964] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.368153] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.378419] SELinux: policydb string length 47 does not match expected length 8 [ 1303.392253] gfs2: can't parse mount arguments [ 1303.394068] gfs2: can't parse mount arguments [ 1303.512683] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.519045] gfs2: can't parse mount arguments 07:54:10 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x20000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:10 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:10 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000600000000800000007000000"], 0x20) 07:54:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9050000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:10 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:10 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:10 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9100000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1303.654880] SELinux: policydb string length 5 does not match expected length 8 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000020800000007000000"], 0x20) [ 1303.718758] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.726590] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.745780] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.749415] SELinux: policydb string length 16 does not match expected length 8 [ 1303.763150] gfs2: can't parse mount arguments [ 1303.773938] gfs2: can't parse mount arguments [ 1303.778618] gfs2: can't parse mount arguments 07:54:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9060000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1303.822927] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.838245] gfs2: can't parse mount arguments [ 1303.849806] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.849847] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1303.861863] gfs2: can't parse mount arguments 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000030800000007000000"], 0x20) 07:54:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9070000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1303.883092] SELinux: policydb string length 6 does not match expected length 8 [ 1303.890011] gfs2: can't parse mount arguments 07:54:11 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x40000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:11 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000007fffffff0800000007000000"], 0x20) 07:54:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9030000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000010800000007000000"], 0x20) [ 1304.039335] SELinux: policydb string length 7 does not match expected length 8 [ 1304.141729] SELinux: policydb string length 3 does not match expected length 8 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000200800000007000000"], 0x20) 07:54:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9040000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1304.198333] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.229135] gfs2: can't parse mount arguments [ 1304.239830] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.251505] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.264729] SELinux: policydb string length 4 does not match expected length 8 [ 1304.277860] gfs2: can't parse mount arguments 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000070000000800000007000000"], 0x20) 07:54:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000000145204c696e75780f000000000000000800000007000000"], 0x20) 07:54:11 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffe, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1304.304334] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.307628] gfs2: can't parse mount arguments [ 1304.332934] gfs2: can't parse mount arguments 07:54:11 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\f', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000500000800000007000000"], 0x20) [ 1304.446654] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.453299] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.459627] gfs2: can't parse mount arguments [ 1304.473656] gfs2: can't parse mount arguments 07:54:11 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:11 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9087400005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:11 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:11 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000040000000007000000"], 0x20) [ 1304.659671] SELinux: policydb string length 29704 does not match expected length 8 07:54:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x4b8, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1304.709646] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1304.719452] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.722019] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.742078] gfs2: can't parse mount arguments 07:54:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000600000800000007000000"], 0x20) 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080003005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000700000007000000"], 0x20) [ 1304.768559] gfs2: can't parse mount arguments [ 1304.849234] SELinux: policydb string length 196616 does not match expected length 8 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e75780f000000000000000800000007000000"], 0x20) [ 1304.901563] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1304.907913] gfs2: can't parse mount arguments 07:54:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332fd", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673321c", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1304.947679] SELinux: policydb table sizes (7,7) do not match mine (8,7) [ 1304.987495] SELinux: policydb string [ 1304.987495] E Linux does not match my string SE Linux 07:54:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x25c, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000100000007000000"], 0x20) 07:54:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080700005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1305.088036] SELinux: policydb table sizes (1,7) do not match mine (8,7) 07:54:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000400000800000007000000"], 0x20) 07:54:12 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9084c00005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1305.192104] SELinux: policydb string length 1800 does not match expected length 8 [ 1305.200999] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.217994] gfs2: can't parse mount arguments 07:54:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332fd", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080400005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1305.285615] SELinux: policydb string length 19464 does not match expected length 8 [ 1305.345866] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.357446] gfs2: can't parse mount arguments 07:54:12 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xd00000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000900000007000000"], 0x20) 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080007005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1305.449939] SELinux: policydb string length 1032 does not match expected length 8 [ 1305.506196] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.523481] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.529827] gfs2: can't parse mount arguments [ 1305.536335] SELinux: policydb table sizes (9,7) do not match mine (8,7) [ 1305.587562] gfs2: can't parse mount arguments 07:54:12 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080005005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:12 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000300000800000007000000"], 0x20) 07:54:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x8a03000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:12 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1305.619871] SELinux: policydb string length 458760 does not match expected length 8 [ 1305.700521] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.706683] SELinux: policydb string length 327688 does not match expected length 8 [ 1305.731126] gfs2: can't parse mount arguments [ 1305.754006] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.764384] gfs2: can't parse mount arguments 07:54:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:13 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908007a005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000006000800000007000000"], 0x20) 07:54:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:13 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9087a00005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1305.897320] SELinux: policydb string length 7995400 does not match expected length 8 [ 1305.906689] SELinux: policydb string length 7995400 does not match expected length 8 [ 1305.924325] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1305.954653] SELinux: policydb string length 31240 does not match expected length 8 [ 1305.965222] gfs2: can't parse mount arguments [ 1306.002335] sel_write_load: 39 callbacks suppressed [ 1306.002341] SELinux: failed to load policy [ 1306.032721] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:13 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfa0c0000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000020000000007000000"], 0x20) 07:54:13 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9084800005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1306.050225] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.059839] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.069178] gfs2: can't parse mount arguments [ 1306.075145] gfs2: can't parse mount arguments [ 1306.083546] SELinux: failed to load policy [ 1306.095320] gfs2: can't parse mount arguments [ 1306.214810] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1306.223006] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.229715] gfs2: can't parse mount arguments 07:54:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\f', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:13 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9086800005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000100000000007000000"], 0x20) 07:54:13 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1306.261423] SELinux: failed to load policy [ 1306.271206] SELinux: policydb string length 18440 does not match expected length 8 [ 1306.279874] SELinux: failed to load policy [ 1306.349426] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.367145] gfs2: can't parse mount arguments 07:54:13 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1500, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1306.406293] SELinux: policydb string length 26632 does not match expected length 8 [ 1306.432256] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.444814] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.459537] SELinux: failed to load policy [ 1306.469106] gfs2: can't parse mount arguments [ 1306.485117] gfs2: can't parse mount arguments [ 1306.492404] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1306.505161] SELinux: failed to load policy 07:54:13 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080006005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:13 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:13 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000500000800000007000000"], 0x20) [ 1306.512692] SELinux: policydb string length 26632 does not match expected length 8 [ 1306.531542] SELinux: failed to load policy [ 1306.537374] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1306.546823] SELinux: failed to load policy 07:54:13 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2`', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1306.645775] SELinux: policydb string length 393224 does not match expected length 8 [ 1306.686778] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.698735] gfs2: can't parse mount arguments [ 1306.726101] SELinux: failed to load policy 07:54:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xa00, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1306.733364] SELinux: failed to load policy 07:54:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908006c005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000001000000007000000"], 0x20) [ 1306.839957] SELinux: policydb string length 7077896 does not match expected length 8 [ 1306.849300] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1306.883881] gfs2: can't parse mount arguments 07:54:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080020005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002000000007000000"], 0x20) [ 1306.905763] SELinux: policydb table sizes (16,7) do not match mine (8,7) 07:54:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1306.987329] SELinux: policydb table sizes (32,7) do not match mine (8,7) [ 1307.000683] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.008020] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9086c00005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002e00000007000000"], 0x20) [ 1307.033903] gfs2: can't parse mount arguments [ 1307.045328] gfs2: can't parse mount arguments 07:54:14 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x280e000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2z', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1307.213488] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.220039] gfs2: can't parse mount arguments 07:54:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000006000000800000007000000"], 0x20) [ 1307.265848] SELinux: policydb table sizes (46,7) do not match mine (8,7) [ 1307.287657] SELinux: policydb string length 27656 does not match expected length 8 07:54:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080068005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1307.316958] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.346625] gfs2: can't parse mount arguments [ 1307.353646] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.386729] SELinux: policydb string length 6815752 does not match expected length 8 [ 1307.388533] gfs2: can't parse mount arguments [ 1307.422984] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000003000800000007000000"], 0x20) [ 1307.438210] gfs2: can't parse mount arguments 07:54:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080074005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:14 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x5c020000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:14 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:14 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000060000800000007000000"], 0x20) 07:54:14 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:14 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9081000005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1307.591121] SELinux: policydb string length 7602184 does not match expected length 8 [ 1307.608554] SELinux: policydb string length 7602184 does not match expected length 8 [ 1307.740125] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.755281] SELinux: policydb string length 4104 does not match expected length 8 [ 1307.773222] gfs2: can't parse mount arguments [ 1307.779447] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.780860] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000200000007000000"], 0x20) [ 1307.823523] gfs2: can't parse mount arguments 07:54:15 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080200005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1307.858160] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.860095] gfs2: can't parse mount arguments [ 1307.884240] gfs2: can't parse mount arguments 07:54:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf0ffffff, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1307.911299] SELinux: policydb table sizes (2,7) do not match mine (8,7) [ 1307.933518] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1307.939873] gfs2: can't parse mount arguments 07:54:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000007000800000007000000"], 0x20) 07:54:15 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:15 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908003f005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1307.978630] SELinux: policydb string length 520 does not match expected length 8 [ 1308.021066] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.030529] gfs2: can't parse mount arguments [ 1308.116158] SELinux: policydb string length 4128776 does not match expected length 8 [ 1308.128163] SELinux: policydb string length 4128776 does not match expected length 8 07:54:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000020000800000007000000"], 0x20) 07:54:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:15 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e75780f000000000000000800000007000000"], 0x20) [ 1308.267511] SELinux: policydb string %E Linux does not match my string SE Linux [ 1308.292691] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x20000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000500000007000000"], 0x20) 07:54:15 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080500005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1308.315484] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.326060] gfs2: can't parse mount arguments [ 1308.332556] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.354492] gfs2: can't parse mount arguments [ 1308.361602] gfs2: can't parse mount arguments [ 1308.435526] SELinux: policydb table sizes (5,7) do not match mine (8,7) [ 1308.446335] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.464178] gfs2: can't parse mount arguments [ 1308.475132] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:15 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673327f", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x4000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000005000800000007000000"], 0x20) [ 1308.485100] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.497228] gfs2: can't parse mount arguments [ 1308.504495] gfs2: can't parse mount arguments [ 1308.516816] SELinux: policydb string length 1288 does not match expected length 8 07:54:15 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080600005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:15 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:15 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:15 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000200000800000007000000"], 0x20) [ 1308.715281] SELinux: policydb string length 1544 does not match expected length 8 [ 1308.724230] SELinux: policydb string length 1544 does not match expected length 8 07:54:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080040005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1308.793588] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.814564] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000700000800000007000000"], 0x20) [ 1308.849992] gfs2: can't parse mount arguments [ 1308.853239] gfs2: can't parse mount arguments [ 1308.886898] SELinux: policydb string length 4194312 does not match expected length 8 07:54:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080060005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:16 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf00, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:16 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000300000007000000"], 0x20) [ 1308.992142] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.994663] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1308.998594] gfs2: can't parse mount arguments 07:54:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1309.036857] gfs2: can't parse mount arguments [ 1309.044042] SELinux: policydb string length 6291464 does not match expected length 8 07:54:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1309.097335] SELinux: policydb table sizes (3,7) do not match mine (8,7) 07:54:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000040045204c696e75780f000000000000000800000007000000"], 0x20) 07:54:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000400000007000000"], 0x20) [ 1309.165763] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.211221] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.218763] gfs2: can't parse mount arguments [ 1309.236413] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.245498] SELinux: policydb string length 67108872 does not match expected length 8 07:54:16 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x300, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000600000007000000"], 0x20) [ 1309.274661] gfs2: can't parse mount arguments [ 1309.285260] gfs2: can't parse mount arguments [ 1309.290757] SELinux: policydb table sizes (4,7) do not match mine (8,7) 07:54:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080048005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1309.358098] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.389183] gfs2: can't parse mount arguments [ 1309.394699] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000003000800000007000000"], 0x20) 07:54:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908004c005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1309.402599] SELinux: policydb table sizes (6,7) do not match mine (8,7) [ 1309.404798] gfs2: can't parse mount arguments [ 1309.447449] SELinux: policydb string length 4718600 does not match expected length 8 07:54:16 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:16 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:16 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:16 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000020045204c696e75780f000000000000000800000007000000"], 0x20) [ 1309.563412] SELinux: policydb string length 4980744 does not match expected length 8 07:54:16 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000005000800000007000000"], 0x20) 07:54:16 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x15, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1309.649202] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.685383] gfs2: can't parse mount arguments [ 1309.694435] SELinux: policydb string length 33554440 does not match expected length 8 [ 1309.704122] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.739001] gfs2: can't parse mount arguments 07:54:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000600800000007000000"], 0x20) [ 1309.756887] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.786289] gfs2: can't parse mount arguments 07:54:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080300005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1309.811982] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.825554] gfs2: can't parse mount arguments [ 1309.838591] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.853116] gfs2: can't parse mount arguments 07:54:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000050800000007000000"], 0x20) 07:54:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9086000005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1309.874504] SELinux: policydb string length 776 does not match expected length 8 [ 1309.901327] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1309.908686] gfs2: can't parse mount arguments 07:54:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:17 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1310.042563] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1310.072256] SELinux: policydb string length 24584 does not match expected length 8 [ 1310.113630] gfs2: can't parse mount arguments 07:54:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000002000800000007000000"], 0x20) [ 1310.137269] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1310.168996] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080006005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1310.184460] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1310.203800] gfs2: can't parse mount arguments [ 1310.218867] gfs2: can't parse mount arguments [ 1310.238807] gfs2: can't parse mount arguments 07:54:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908004c005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="676673321c", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1310.268149] SELinux: policydb string length 393224 does not match expected length 8 [ 1310.344860] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1310.363446] gfs2: can't parse mount arguments [ 1310.372562] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1310.378889] gfs2: can't parse mount arguments [ 1310.451208] SELinux: policydb string length 4980744 does not match expected length 8 07:54:17 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x3, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:17 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000004000800000007000000"], 0x20) 07:54:17 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:17 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:17 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080060005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:17 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\b', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1310.707746] SELinux: policydb string length 6291464 does not match expected length 8 [ 1310.741489] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000006000800000007000000"], 0x20) 07:54:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000065345204c696e75780f000000000000000800000007000000"], 0x20) [ 1310.767695] gfs2: can't parse mount arguments 07:54:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000007000800000007000000"], 0x20) [ 1310.839473] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1310.863607] gfs2: can't parse mount arguments [ 1310.876010] SELinux: policydb string length 100663304 does not match expected length 8 07:54:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000485345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:18 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1310.968462] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1310.990397] FAT-fs (loop2): Filesystem has been set read-only [ 1310.999177] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1311.038186] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1311.059788] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1311.066845] SELinux: policydb string length 1207959560 does not match expected length 8 [ 1311.076999] sel_write_load: 51 callbacks suppressed [ 1311.077003] SELinux: failed to load policy 07:54:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000030800000007000000"], 0x20) 07:54:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x42080000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:18 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000075345204c696e75780f000000000000000800000007000000"], 0x20) [ 1311.162756] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.187702] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.194764] SELinux: failed to load policy [ 1311.218803] gfs2: can't parse mount arguments [ 1311.223927] gfs2: can't parse mount arguments [ 1311.246479] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.249134] SELinux: policydb string length 117440520 does not match expected length 8 07:54:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000060800000007000000"], 0x20) [ 1311.281801] gfs2: can't parse mount arguments [ 1311.292769] SELinux: failed to load policy 07:54:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000405345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:18 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1311.358563] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.378417] gfs2: can't parse mount arguments [ 1311.383913] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.390362] gfs2: can't parse mount arguments [ 1311.392052] SELinux: policydb string length 1073741832 does not match expected length 8 07:54:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1f00, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000070800000007000000"], 0x20) 07:54:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080048005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:18 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:18 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733206", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1311.435767] SELinux: failed to load policy [ 1311.441028] SELinux: failed to load policy [ 1311.461545] SELinux: policydb string length 1073741832 does not match expected length 8 [ 1311.470134] SELinux: failed to load policy 07:54:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080005005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1311.565513] SELinux: policydb string length 4718600 does not match expected length 8 [ 1311.574288] SELinux: failed to load policy [ 1311.580715] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.593443] gfs2: can't parse mount arguments [ 1311.604176] SELinux: failed to load policy 07:54:18 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000200800000007000000"], 0x20) [ 1311.666323] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.677210] gfs2: can't parse mount arguments [ 1311.688660] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.706123] SELinux: policydb string length 327688 does not match expected length 8 07:54:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000035345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="67667332c0", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000060000800000007000000"], 0x20) [ 1311.716525] gfs2: can't parse mount arguments [ 1311.729844] SELinux: failed to load policy [ 1311.738408] SELinux: failed to load policy [ 1311.825638] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1311.835614] gfs2: can't parse mount arguments 07:54:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="676673321a", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1311.868758] SELinux: policydb string length 50331656 does not match expected length 8 07:54:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x12e, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:19 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080003005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000050800000007000000"], 0x20) 07:54:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002e00000007000000"], 0x20) [ 1312.046045] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1312.048429] SELinux: policydb string length 196616 does not match expected length 8 [ 1312.069019] gfs2: can't parse mount arguments 07:54:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800004c5345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733214", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x8000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1312.187958] SELinux: policydb table sizes (46,7) do not match mine (8,7) [ 1312.201384] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1312.222867] gfs2: can't parse mount arguments [ 1312.258666] SELinux: policydb string length 1275068424 does not match expected length 8 07:54:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800006c5345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:19 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000500000007000000"], 0x20) [ 1312.360832] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1312.390085] gfs2: can't parse mount arguments [ 1312.423102] SELinux: policydb string length 1811939336 does not match expected length 8 [ 1312.456698] SELinux: policydb table sizes (5,7) do not match mine (8,7) [ 1312.469535] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1312.484623] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908006c005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:19 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733215", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:19 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf0, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000900000007000000"], 0x20) [ 1312.521989] gfs2: can't parse mount arguments [ 1312.528362] gfs2: can't parse mount arguments 07:54:19 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000605345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:19 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1312.579218] SELinux: policydb string length 7077896 does not match expected length 8 07:54:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000600000007000000"], 0x20) [ 1312.668929] SELinux: policydb table sizes (9,7) do not match mine (8,7) [ 1312.697830] SELinux: policydb string length 1610612744 does not match expected length 8 [ 1312.706830] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000205345204c696e75780f000000000000000800000007000000"], 0x20) [ 1312.727670] gfs2: can't parse mount arguments [ 1312.767357] SELinux: policydb table sizes (6,7) do not match mine (8,7) [ 1312.807751] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1312.835002] gfs2: can't parse mount arguments 07:54:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673321d", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000100000000007000000"], 0x20) 07:54:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080004005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1312.858857] SELinux: policydb string length 536870920 does not match expected length 8 07:54:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1312.977610] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1312.995939] SELinux: policydb string length 262152 does not match expected length 8 [ 1313.021223] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.027582] gfs2: can't parse mount arguments 07:54:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080068005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000300000007000000"], 0x20) [ 1313.183546] SELinux: policydb string length 6815752 does not match expected length 8 [ 1313.218100] SELinux: policydb table sizes (3,7) do not match mine (8,7) [ 1313.260778] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.306323] gfs2: can't parse mount arguments [ 1313.365915] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.393289] gfs2: can't parse mount arguments 07:54:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x5e6, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080007005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:20 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:20 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\f', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000600800000007000000"], 0x20) 07:54:20 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1313.585403] SELinux: policydb string length 458760 does not match expected length 8 07:54:20 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000055345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000060800000007000000"], 0x20) [ 1313.657540] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.665658] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.669982] gfs2: can't parse mount arguments [ 1313.703860] gfs2: can't parse mount arguments [ 1313.716179] SELinux: policydb string length 83886088 does not match expected length 8 [ 1313.735684] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.754103] gfs2: can't parse mount arguments 07:54:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x200000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002000000007000000"], 0x20) 07:54:21 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000745345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1313.799859] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1313.813453] gfs2: can't parse mount arguments 07:54:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000020800000007000000"], 0x20) 07:54:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1313.909378] SELinux: policydb table sizes (32,7) do not match mine (8,7) [ 1313.946820] SELinux: policydb string length 1946157064 does not match expected length 8 07:54:21 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800007a5345204c696e75780f000000000000000800000007000000"], 0x20) [ 1313.956115] SELinux: policydb string length 1946157064 does not match expected length 8 [ 1314.022886] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.029258] gfs2: can't parse mount arguments [ 1314.087229] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.088599] SELinux: policydb string length 2046820360 does not match expected length 8 [ 1314.104460] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.111257] gfs2: can't parse mount arguments 07:54:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000070800000007000000"], 0x20) 07:54:21 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080074005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1314.141218] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.160579] gfs2: can't parse mount arguments [ 1314.162404] gfs2: can't parse mount arguments 07:54:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1407000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000040800000007000000"], 0x20) [ 1314.265747] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.280361] gfs2: can't parse mount arguments [ 1314.299860] SELinux: policydb string length 7602184 does not match expected length 8 07:54:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000020000000007000000"], 0x20) 07:54:21 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800003f5345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:21 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1314.323210] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.333685] gfs2: can't parse mount arguments 07:54:21 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1314.442827] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1314.450953] SELinux: policydb table sizes (0,7) do not match mine (8,7) 07:54:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000700000007000000"], 0x20) [ 1314.493410] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.499134] SELinux: policydb string length 1056964616 does not match expected length 8 [ 1314.499741] gfs2: can't parse mount arguments [ 1314.526613] SELinux: policydb string length 1056964616 does not match expected length 8 07:54:21 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x714, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:21 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000685345204c696e75780f000000000000000800000007000000"], 0x20) [ 1314.618457] SELinux: policydb table sizes (7,7) do not match mine (8,7) [ 1314.671632] SELinux: policydb string length 1744830472 does not match expected length 8 [ 1314.691981] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.692319] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.698317] gfs2: can't parse mount arguments 07:54:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000040000000007000000"], 0x20) 07:54:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080002005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1314.727196] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.738690] gfs2: can't parse mount arguments [ 1314.757664] gfs2: can't parse mount arguments [ 1314.790773] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.797563] gfs2: can't parse mount arguments [ 1314.839367] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.844685] SELinux: policydb table sizes (0,7) do not match mine (8,7) [ 1314.857396] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1314.867529] gfs2: can't parse mount arguments 07:54:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000030800000007000000"], 0x20) [ 1314.889645] SELinux: policydb string length 131080 does not match expected length 8 [ 1314.896111] gfs2: can't parse mount arguments 07:54:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080010005345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000300000007000000"], 0x20) 07:54:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908007a005345204c696e75780f000000000000000800000007000000"], 0x20) [ 1315.050921] SELinux: policydb string length 1048584 does not match expected length 8 07:54:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000001000000007000000"], 0x20) [ 1315.117396] SELinux: policydb table sizes (3,7) do not match mine (8,7) [ 1315.184737] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.210802] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.224919] SELinux: policydb string length 7995400 does not match expected length 8 [ 1315.228618] gfs2: can't parse mount arguments [ 1315.251766] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.255217] gfs2: can't parse mount arguments [ 1315.266700] gfs2: can't parse mount arguments 07:54:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfa0c000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1315.281734] SELinux: policydb table sizes (16,7) do not match mine (8,7) 07:54:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800004c5345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000002e00000007000000"], 0x20) [ 1315.312424] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.318764] gfs2: can't parse mount arguments [ 1315.326958] SELinux: policydb table sizes (16,7) do not match mine (8,7) 07:54:22 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:22 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1315.381708] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.415000] gfs2: can't parse mount arguments [ 1315.418590] SELinux: policydb string length 1275068424 does not match expected length 8 07:54:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000605345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000700000007000000"], 0x20) 07:54:22 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1315.454951] SELinux: policydb table sizes (46,7) do not match mine (8,7) [ 1315.558040] SELinux: policydb string length 1610612744 does not match expected length 8 [ 1315.595904] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xe605000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1315.604579] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.624203] gfs2: can't parse mount arguments [ 1315.629580] SELinux: policydb table sizes (7,7) do not match mine (8,7) [ 1315.650722] gfs2: can't parse mount arguments 07:54:22 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e75780f000000000000000800000007000000"], 0x20) 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000200000007000000"], 0x20) [ 1315.722961] SELinux: policydb string %E Linux does not match my string SE Linux [ 1315.732026] SELinux: policydb string %E Linux does not match my string SE Linux [ 1315.742604] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.765367] gfs2: can't parse mount arguments 07:54:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000045345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1315.788316] SELinux: policydb table sizes (2,7) do not match mine (8,7) [ 1315.802714] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.809066] gfs2: can't parse mount arguments 07:54:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000600000007000000"], 0x20) [ 1315.874653] SELinux: policydb string length 67108872 does not match expected length 8 [ 1315.982582] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.982947] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1315.989055] gfs2: can't parse mount arguments [ 1316.001994] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.008325] gfs2: can't parse mount arguments [ 1316.022878] SELinux: policydb table sizes (6,7) do not match mine (8,7) 07:54:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800006c5345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x14070000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000500000007000000"], 0x20) [ 1316.033716] gfs2: can't parse mount arguments [ 1316.042505] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.055719] gfs2: can't parse mount arguments [ 1316.095259] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.102997] gfs2: can't parse mount arguments [ 1316.106588] SELinux: policydb string length 1811939336 does not match expected length 8 [ 1316.121504] sel_write_load: 52 callbacks suppressed [ 1316.121508] SELinux: failed to load policy [ 1316.131798] SELinux: policydb table sizes (5,7) do not match mine (8,7) [ 1316.139796] SELinux: failed to load policy 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000900000007000000"], 0x20) 07:54:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1316.144892] SELinux: policydb string length 1811939336 does not match expected length 8 [ 1316.158265] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.166060] gfs2: can't parse mount arguments [ 1316.174536] SELinux: failed to load policy 07:54:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800007a5345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:23 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1316.257310] SELinux: policydb table sizes (9,7) do not match mine (8,7) [ 1316.264625] SELinux: failed to load policy [ 1316.269698] SELinux: policydb table sizes (9,7) do not match mine (8,7) [ 1316.308867] SELinux: failed to load policy [ 1316.339336] SELinux: policydb string length 2046820360 does not match expected length 8 [ 1316.372639] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.376129] SELinux: failed to load policy 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000400000007000000"], 0x20) [ 1316.393500] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.394054] gfs2: can't parse mount arguments [ 1316.411096] SELinux: policydb string length 2046820360 does not match expected length 8 [ 1316.429402] SELinux: failed to load policy [ 1316.429808] gfs2: can't parse mount arguments 07:54:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfeffffff, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1316.451134] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.464477] gfs2: can't parse mount arguments [ 1316.464958] SELinux: policydb table sizes (4,7) do not match mine (8,7) 07:54:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000025345204c696e75780f000000000000000800000007000000"], 0x20) [ 1316.504623] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.504774] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.515922] gfs2: can't parse mount arguments [ 1316.518332] gfs2: can't parse mount arguments [ 1316.539807] SELinux: failed to load policy 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000080000002e000000"], 0x20) 07:54:23 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733212", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1316.560918] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.567258] gfs2: can't parse mount arguments [ 1316.597452] SELinux: policydb string length 33554440 does not match expected length 8 07:54:23 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000485345204c696e75780f000000000000000800000007000000"], 0x20) [ 1316.614902] SELinux: failed to load policy 07:54:23 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000802000007000000"], 0x20) [ 1316.655896] SELinux: policydb table sizes (8,46) do not match mine (8,7) [ 1316.663950] SELinux: failed to load policy 07:54:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1316.839461] SELinux: policydb string length 1207959560 does not match expected length 8 [ 1316.854920] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1316.871991] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xbcc, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:24 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000685345204c696e75780f000000000000000800000007000000"], 0x20) [ 1316.896752] gfs2: can't parse mount arguments [ 1316.903609] SELinux: policydb table sizes (520,7) do not match mine (8,7) [ 1316.905441] gfs2: can't parse mount arguments 07:54:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000803000007000000"], 0x20) [ 1317.010739] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1317.039609] gfs2: can't parse mount arguments [ 1317.047390] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:24 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000055345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673328c", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000400000000"], 0x20) [ 1317.057261] SELinux: policydb string length 1744830472 does not match expected length 8 [ 1317.060524] gfs2: can't parse mount arguments [ 1317.093752] SELinux: policydb table sizes (776,7) do not match mine (8,7) 07:54:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfeffffff00000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1317.299646] SELinux: policydb string length 83886088 does not match expected length 8 [ 1317.312806] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1317.326636] gfs2: can't parse mount arguments [ 1317.338926] SELinux: policydb table sizes (67108872,0) do not match mine (8,7) 07:54:24 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e75780f000000000000000800000007000000"], 0x20) 07:54:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000006000000"], 0x20) [ 1317.441748] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1317.448112] gfs2: can't parse mount arguments 07:54:24 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1317.485025] SELinux: policydb string [ 1317.485025] E Linux does not match my string SE Linux [ 1317.519910] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:24 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332fc", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1317.544748] gfs2: can't parse mount arguments 07:54:24 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000020045204c696e75780f000000000000000800000007000000"], 0x20) 07:54:24 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2H', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000805000007000000"], 0x20) [ 1317.576074] SELinux: policydb table sizes (8,6) do not match mine (8,7) 07:54:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x3f000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1317.676193] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1317.684192] SELinux: policydb string length 33554440 does not match expected length 8 [ 1317.704359] gfs2: can't parse mount arguments 07:54:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000745345204c696e75780f000000000000000800000007000000"], 0x20) [ 1317.723294] SELinux: policydb table sizes (1288,7) do not match mine (8,7) 07:54:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000860000007000000"], 0x20) 07:54:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1317.846053] SELinux: policydb table sizes (24584,7) do not match mine (8,7) [ 1317.899638] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1317.938393] SELinux: policydb string length 1946157064 does not match expected length 8 07:54:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800060007000000"], 0x20) 07:54:25 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000065345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1317.950375] gfs2: can't parse mount arguments 07:54:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x2000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1318.040327] SELinux: policydb table sizes (393224,7) do not match mine (8,7) 07:54:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800070007000000"], 0x20) [ 1318.095689] SELinux: policydb string length 100663304 does not match expected length 8 [ 1318.132881] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.139459] gfs2: can't parse mount arguments 07:54:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000075345204c696e75780f000000000000000800000007000000"], 0x20) [ 1318.162949] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.176074] SELinux: policydb table sizes (458760,7) do not match mine (8,7) [ 1318.185423] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.195740] gfs2: can't parse mount arguments [ 1318.220679] gfs2: can't parse mount arguments 07:54:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733217", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800600007000000"], 0x20) 07:54:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000040045204c696e75780f000000000000000800000007000000"], 0x20) [ 1318.251501] SELinux: policydb string length 117440520 does not match expected length 8 [ 1318.261996] SELinux: policydb string length 117440520 does not match expected length 8 07:54:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xa9e, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1318.338032] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.345756] gfs2: can't parse mount arguments [ 1318.353062] SELinux: policydb table sizes (6291464,7) do not match mine (8,7) [ 1318.361629] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.369219] gfs2: can't parse mount arguments 07:54:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000020000000"], 0x20) 07:54:25 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000035345204c696e75780f000000000000000800000007000000"], 0x20) [ 1318.383686] SELinux: policydb string length 67108872 does not match expected length 8 07:54:25 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:25 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1318.551373] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.559566] gfs2: can't parse mount arguments [ 1318.578267] SELinux: policydb string length 50331656 does not match expected length 8 07:54:25 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\v', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1318.601947] SELinux: policydb table sizes (8,32) do not match mine (8,7) [ 1318.623674] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.640680] gfs2: can't parse mount arguments 07:54:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xa00000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000105345204c696e75780f000000000000000800000007000000"], 0x20) 07:54:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000008000000"], 0x20) [ 1318.659335] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1318.695350] gfs2: can't parse mount arguments 07:54:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e75780f000000000000000800000007000000"], 0x20) [ 1318.772372] SELinux: policydb string length 268435464 does not match expected length 8 [ 1318.797670] SELinux: policydb table sizes (8,8) do not match mine (8,7) 07:54:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000804000007000000"], 0x20) 07:54:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1318.942420] SELinux: policydb string %E Linux does not match my string SE Linux [ 1318.964024] SELinux: policydb table sizes (1032,7) do not match mine (8,7) [ 1318.984671] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:26 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x200000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e75780f000000000000000800000007000000"], 0x20) 07:54:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800200007000000"], 0x20) [ 1318.992782] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.003686] gfs2: can't parse mount arguments [ 1319.014395] gfs2: can't parse mount arguments 07:54:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000010000000"], 0x20) [ 1319.052873] SELinux: policydb table sizes (2097160,7) do not match mine (8,7) [ 1319.084312] SELinux: policydb string [ 1319.084312] E Linux does not match my string SE Linux 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908000000530a204c696e75780f000000000000000800000007000000"], 0x20) [ 1319.153132] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.159572] gfs2: can't parse mount arguments [ 1319.164424] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.180781] gfs2: can't parse mount arguments [ 1319.190555] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005325204c696e75780f000000000000000800000007000000"], 0x20) [ 1319.222516] gfs2: can't parse mount arguments [ 1319.224714] SELinux: policydb string S [ 1319.224714] Linux does not match my string SE Linux [ 1319.242116] SELinux: policydb table sizes (8,16) do not match mine (8,7) 07:54:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1319.276067] SELinux: policydb table sizes (8,16) do not match mine (8,7) [ 1319.285548] SELinux: policydb string S% Linux does not match my string SE Linux 07:54:26 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000009000000"], 0x20) 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf908000000534c204c696e75780f000000000000000800000007000000"], 0x20) 07:54:26 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xcc0b0000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1319.389687] SELinux: policydb string SL Linux does not match my string SE Linux [ 1319.401528] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.407876] gfs2: can't parse mount arguments 07:54:26 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345154c696e75780f000000000000000800000007000000"], 0x20) 07:54:26 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000200000000"], 0x20) [ 1319.459592] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.471291] SELinux: policydb table sizes (8,9) do not match mine (8,7) [ 1319.492592] gfs2: can't parse mount arguments [ 1319.534621] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.568310] gfs2: can't parse mount arguments [ 1319.584406] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.603853] gfs2: can't parse mount arguments [ 1319.611398] SELinux: policydb table sizes (33554440,0) do not match mine (8,7) 07:54:26 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1319.636183] SELinux: policydb string SELinux does not match my string SE Linux 07:54:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000806000007000000"], 0x20) 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053450d4c696e75780f000000000000000800000007000000"], 0x20) [ 1319.695962] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.702621] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.715488] gfs2: can't parse mount arguments [ 1319.741496] gfs2: can't parse mount arguments 07:54:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x560f, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1319.783702] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.784247] SELinux: policydb table sizes (1544,7) do not match mine (8,7) [ 1319.816171] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1319.821002] gfs2: can't parse mount arguments 07:54:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000807000007000000"], 0x20) 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053450c4c696e75780f000000000000000800000007000000"], 0x20) 07:54:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1319.832221] gfs2: can't parse mount arguments [ 1319.837598] SELinux: policydb string SE Linux does not match my string SE Linux [ 1319.961731] SELinux: policydb string SE Linux does not match my string SE Linux [ 1319.999067] SELinux: policydb table sizes (1800,7) do not match mine (8,7) 07:54:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1320.018582] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.058506] gfs2: can't parse mount arguments 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053451a4c696e75780f000000000000000800000007000000"], 0x20) 07:54:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800050007000000"], 0x20) 07:54:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x2e01, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1320.073943] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053450a4c696e75780f000000000000000800000007000000"], 0x20) [ 1320.141384] gfs2: can't parse mount arguments [ 1320.155353] SELinux: policydb string SELinux does not match my string SE Linux [ 1320.163714] SELinux: policydb table sizes (327688,7) do not match mine (8,7) [ 1320.183861] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.192738] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.199074] gfs2: can't parse mount arguments [ 1320.214804] gfs2: can't parse mount arguments 07:54:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800030007000000"], 0x20) 07:54:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345094c696e75780f000000000000000800000007000000"], 0x20) [ 1320.251712] SELinux: policydb string SE [ 1320.251712] Linux does not match my string SE Linux [ 1320.291516] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.338463] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.345047] SELinux: policydb table sizes (196616,7) do not match mine (8,7) [ 1320.345490] gfs2: can't parse mount arguments [ 1320.362583] gfs2: can't parse mount arguments 07:54:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffffffffff0, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1320.400399] SELinux: policydb string SE Linux does not match my string SE Linux 07:54:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000004000000"], 0x20) 07:54:27 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:27 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053450e4c696e75780f000000000000000800000007000000"], 0x20) [ 1320.441553] SELinux: policydb string SE Linux does not match my string SE Linux 07:54:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800002007000000"], 0x20) 07:54:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332f6", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1320.602577] SELinux: policydb table sizes (8,4) do not match mine (8,7) [ 1320.616954] SELinux: policydb string SELinux does not match my string SE Linux 07:54:27 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345024c696e75780f000000000000000800000007000000"], 0x20) [ 1320.660131] SELinux: policydb table sizes (536870920,7) do not match mine (8,7) [ 1320.670344] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.709961] gfs2: can't parse mount arguments [ 1320.715967] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.738762] gfs2: can't parse mount arguments 07:54:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf4ffffff00000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000307000000"], 0x20) [ 1320.759977] SELinux: policydb string SELinux does not match my string SE Linux 07:54:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053451b4c696e75780f000000000000000800000007000000"], 0x20) [ 1320.827088] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.839996] gfs2: can't parse mount arguments [ 1320.861981] SELinux: policydb table sizes (50331656,7) do not match mine (8,7) [ 1320.876695] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1320.897224] gfs2: can't parse mount arguments 07:54:28 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800050007000000"], 0x20) 07:54:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345084c696e75780f000000000000000800000007000000"], 0x20) [ 1320.921416] SELinux: policydb string SELinux does not match my string SE Linux 07:54:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733216", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345034c696e75780f000000000000000800000007000000"], 0x20) [ 1321.011296] SELinux: policydb string SELinux does not match my string SE Linux 07:54:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733213", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1f000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1321.128576] SELinux: policydb table sizes (327688,7) do not match mine (8,7) [ 1321.146588] sel_write_load: 52 callbacks suppressed [ 1321.146592] SELinux: failed to load policy [ 1321.157370] SELinux: policydb string SELinux does not match my string SE Linux [ 1321.169283] SELinux: failed to load policy 07:54:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800020007000000"], 0x20) [ 1321.188608] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345114c696e75780f000000000000000800000007000000"], 0x20) 07:54:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000607000000"], 0x20) [ 1321.235271] gfs2: can't parse mount arguments [ 1321.247762] SELinux: policydb table sizes (131080,7) do not match mine (8,7) [ 1321.255993] SELinux: failed to load policy 07:54:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:28 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1321.367680] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.386171] SELinux: policydb string SELinux does not match my string SE Linux [ 1321.393948] gfs2: can't parse mount arguments [ 1321.418416] SELinux: failed to load policy [ 1321.423618] SELinux: policydb table sizes (100663304,7) do not match mine (8,7) [ 1321.434891] SELinux: failed to load policy 07:54:28 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733203", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000707000000"], 0x20) 07:54:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345044c696e75780f000000000000000800000007000000"], 0x20) [ 1321.473883] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.480298] gfs2: can't parse mount arguments [ 1321.522061] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.562228] gfs2: can't parse mount arguments 07:54:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x4000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1321.572828] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.579421] gfs2: can't parse mount arguments [ 1321.602353] SELinux: policydb string SELinux does not match my string SE Linux [ 1321.612891] SELinux: failed to load policy 07:54:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800600007000000"], 0x20) 07:54:28 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:28 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053451d4c696e75780f000000000000000800000007000000"], 0x20) [ 1321.617587] SELinux: policydb table sizes (117440520,7) do not match mine (8,7) [ 1321.629421] SELinux: failed to load policy 07:54:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673320e", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1321.765937] SELinux: policydb string SELinux does not match my string SE Linux [ 1321.790366] SELinux: failed to load policy [ 1321.795783] SELinux: policydb table sizes (6291464,7) do not match mine (8,7) [ 1321.806900] SELinux: failed to load policy [ 1321.826512] SELinux: policydb table sizes (6291464,7) do not match mine (8,7) [ 1321.836152] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.853394] SELinux: failed to load policy [ 1321.858709] gfs2: can't parse mount arguments 07:54:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000507000000"], 0x20) 07:54:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345074c696e75780f000000000000000800000007000000"], 0x20) 07:54:29 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xa000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1321.893056] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.922712] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1321.928941] gfs2: can't parse mount arguments [ 1321.931857] gfs2: can't parse mount arguments 07:54:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800006007000000"], 0x20) 07:54:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345124c696e75780f000000000000000800000007000000"], 0x20) [ 1321.959317] SELinux: policydb string SELinux does not match my string SE Linux [ 1321.988758] SELinux: policydb table sizes (83886088,7) do not match mine (8,7) 07:54:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800040007000000"], 0x20) [ 1322.089889] SELinux: policydb table sizes (1610612744,7) do not match mine (8,7) [ 1322.098940] SELinux: policydb table sizes (1610612744,7) do not match mine (8,7) 07:54:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:29 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x2000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1322.242761] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.251697] SELinux: policydb string SELinux does not match my string SE Linux [ 1322.263738] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.270088] gfs2: can't parse mount arguments [ 1322.271173] gfs2: can't parse mount arguments [ 1322.281168] SELinux: policydb table sizes (262152,7) do not match mine (8,7) 07:54:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053451c4c696e75780f000000000000000800000007000000"], 0x20) 07:54:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800060007000000"], 0x20) [ 1322.342792] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.368716] gfs2: can't parse mount arguments [ 1322.374682] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.383774] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.390097] gfs2: can't parse mount arguments 07:54:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053450b4c696e75780f000000000000000800000007000000"], 0x20) 07:54:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800070007000000"], 0x20) 07:54:29 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1322.415498] SELinux: policydb string SELinux does not match my string SE Linux [ 1322.420718] gfs2: can't parse mount arguments [ 1322.448505] SELinux: policydb table sizes (393224,7) do not match mine (8,7) 07:54:29 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:29 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345164c696e75780f000000000000000800000007000000"], 0x20) [ 1322.508569] SELinux: policydb string SE Linux does not match my string SE Linux 07:54:29 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:29 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xd, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1322.642173] SELinux: policydb string SELinux does not match my string SE Linux [ 1322.661674] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.686589] gfs2: can't parse mount arguments 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345054c696e75780f000000000000000800000007000000"], 0x20) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800030007000000"], 0x20) [ 1322.694640] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.702001] gfs2: can't parse mount arguments [ 1322.705560] SELinux: policydb table sizes (458760,7) do not match mine (8,7) [ 1322.774845] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.786324] SELinux: policydb string SELinux does not match my string SE Linux [ 1322.795422] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1322.813856] gfs2: can't parse mount arguments 07:54:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1322.822674] gfs2: can't parse mount arguments 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452e4c696e75780f000000000000000800000007000000"], 0x20) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000400000000"], 0x20) 07:54:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1322.853813] SELinux: policydb table sizes (196616,7) do not match mine (8,7) [ 1322.904272] SELinux: policydb table sizes (67108872,0) do not match mine (8,7) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000020000000"], 0x20) [ 1322.953779] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1322.967644] FAT-fs (loop2): Filesystem has been set read-only [ 1322.984325] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.006903] gfs2: can't parse mount arguments [ 1323.012456] SELinux: policydb string SE.Linux does not match my string SE Linux [ 1323.025425] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF [ 1323.046096] SELinux: policydb table sizes (8,32) do not match mine (8,7) 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345604c696e75780f000000000000000800000007000000"], 0x20) 07:54:30 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000507000000"], 0x20) 07:54:30 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xcc0b000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1323.077140] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.083082] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.090295] gfs2: can't parse mount arguments [ 1323.098273] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1323.106755] gfs2: can't parse mount arguments [ 1323.119347] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053454c4c696e75780f000000000000000800000007000000"], 0x20) [ 1323.173549] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.180202] gfs2: can't parse mount arguments [ 1323.186389] SELinux: policydb string SE`Linux does not match my string SE Linux 07:54:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733212", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000407000000"], 0x20) [ 1323.223616] SELinux: policydb table sizes (83886088,7) do not match mine (8,7) [ 1323.233612] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.245400] gfs2: can't parse mount arguments 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053450f4c696e75780f000000000000000800000007000000"], 0x20) [ 1323.302151] SELinux: policydb string SELLinux does not match my string SE Linux [ 1323.339429] SELinux: policydb table sizes (67108872,7) do not match mine (8,7) 07:54:30 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800006007000000"], 0x20) [ 1323.377152] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.398638] gfs2: can't parse mount arguments [ 1323.412815] SELinux: policydb string SELinux does not match my string SE Linux 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345194c696e75780f000000000000000800000007000000"], 0x20) 07:54:30 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1500000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1323.484557] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.495362] gfs2: can't parse mount arguments [ 1323.517237] SELinux: policydb table sizes (1610612744,7) do not match mine (8,7) 07:54:30 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:30 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733219", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000207000000"], 0x20) [ 1323.545156] SELinux: policydb table sizes (1610612744,7) do not match mine (8,7) 07:54:30 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345104c696e75780f000000000000000800000007000000"], 0x20) [ 1323.645378] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.656953] gfs2: can't parse mount arguments [ 1323.662273] SELinux: policydb string SELinux does not match my string SE Linux [ 1323.671212] SELinux: policydb table sizes (33554440,7) do not match mine (8,7) 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000200000000"], 0x20) [ 1323.728155] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.741856] gfs2: can't parse mount arguments [ 1323.750329] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.759141] gfs2: can't parse mount arguments [ 1323.771548] SELinux: policydb string SELinux does not match my string SE Linux 07:54:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345174c696e75780f000000000000000800000007000000"], 0x20) 07:54:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000080000002e000000"], 0x20) [ 1323.806123] SELinux: policydb table sizes (33554440,0) do not match mine (8,7) 07:54:31 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673321b", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1323.897495] SELinux: policydb string SELinux does not match my string SE Linux 07:54:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x4000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1323.970204] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1323.986514] SELinux: policydb table sizes (8,46) do not match mine (8,7) [ 1323.993107] gfs2: can't parse mount arguments 07:54:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345144c696e75780f000000000000000800000007000000"], 0x20) 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000607000000"], 0x20) [ 1324.022141] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.038481] gfs2: can't parse mount arguments 07:54:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733218", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000707000000"], 0x20) [ 1324.116158] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.124712] SELinux: policydb table sizes (100663304,7) do not match mine (8,7) [ 1324.139307] gfs2: can't parse mount arguments [ 1324.152745] SELinux: policydb string SELinux does not match my string SE Linux 07:54:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345254c696e75780f000000000000000800000007000000"], 0x20) 07:54:31 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000307000000"], 0x20) [ 1324.252513] SELinux: policydb table sizes (117440520,7) do not match mine (8,7) [ 1324.263672] SELinux: policydb table sizes (117440520,7) do not match mine (8,7) 07:54:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1324.362156] SELinux: policydb table sizes (50331656,7) do not match mine (8,7) [ 1324.386675] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.393754] gfs2: can't parse mount arguments [ 1324.400186] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000009000000"], 0x20) 07:54:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345134c696e75780f000000000000000800000007000000"], 0x20) [ 1324.419609] SELinux: policydb string SE%Linux does not match my string SE Linux [ 1324.428210] gfs2: can't parse mount arguments [ 1324.480025] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.498935] gfs2: can't parse mount arguments 07:54:31 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\r', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000006000000"], 0x20) 07:54:31 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345064c696e75780f000000000000000800000007000000"], 0x20) [ 1324.525763] SELinux: policydb string SELinux does not match my string SE Linux [ 1324.536483] SELinux: policydb table sizes (8,9) do not match mine (8,7) 07:54:31 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:31 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1324.652165] SELinux: policydb string SELinux does not match my string SE Linux [ 1324.662173] SELinux: policydb string SELinux does not match my string SE Linux 07:54:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452f4c696e75780f000000000000000800000007000000"], 0x20) 07:54:32 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x9, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053451e4c696e75780f000000000000000800000007000000"], 0x20) 07:54:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000004000000"], 0x20) [ 1324.775264] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.782964] SELinux: policydb string SE/Linux does not match my string SE Linux [ 1324.792106] gfs2: can't parse mount arguments [ 1324.798433] SELinux: policydb table sizes (8,6) do not match mine (8,7) 07:54:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2!', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1324.864657] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.880888] gfs2: can't parse mount arguments [ 1324.894473] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1324.911272] SELinux: policydb string SELinux does not match my string SE Linux [ 1324.911473] gfs2: can't parse mount arguments 07:54:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345184c696e75780f000000000000000800000007000000"], 0x20) [ 1324.962474] SELinux: policydb table sizes (8,4) do not match mine (8,7) 07:54:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000000000080000002e000000"], 0x20) 07:54:32 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:32 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:32 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1325.130978] SELinux: policydb string SELinux does not match my string SE Linux [ 1325.157749] SELinux: policydb table sizes (8,46) do not match mine (8,7) 07:54:32 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452034696e75780f000000000000000800000007000000"], 0x20) 07:54:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000008000000"], 0x20) [ 1325.211395] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.220324] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.221604] gfs2: can't parse mount arguments [ 1325.248917] gfs2: can't parse mount arguments [ 1325.311987] SELinux: policydb table sizes (8,8) do not match mine (8,7) [ 1325.328949] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.340826] gfs2: can't parse mount arguments [ 1325.349594] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:32 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000010000000"], 0x20) [ 1325.370055] gfs2: can't parse mount arguments [ 1325.370532] SELinux: policydb string SE 4inux does not match my string SE Linux [ 1325.410473] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.431219] gfs2: can't parse mount arguments [ 1325.473493] SELinux: policydb table sizes (8,16) do not match mine (8,7) [ 1325.544105] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.564469] gfs2: can't parse mount arguments 07:54:33 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xfffffffb, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452022696e75780f000000000000000800000007000000"], 0x20) 07:54:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:33 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000009000000"], 0x20) 07:54:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1325.748219] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.755384] gfs2: can't parse mount arguments [ 1325.763118] SELinux: policydb table sizes (8,9) do not match mine (8,7) [ 1325.778114] SELinux: policydb string SE "inux does not match my string SE Linux 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000006000000"], 0x20) 07:54:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345200b696e75780f000000000000000800000007000000"], 0x20) [ 1325.804988] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.815453] gfs2: can't parse mount arguments [ 1325.824357] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.832610] gfs2: can't parse mount arguments [ 1325.833264] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.843721] gfs2: can't parse mount arguments [ 1325.856749] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1325.878978] gfs2: can't parse mount arguments 07:54:33 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007070000"], 0x20) 07:54:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1325.911194] SELinux: policydb table sizes (8,6) do not match mine (8,7) [ 1325.923130] SELinux: policydb string SE inux does not match my string SE Linux [ 1325.941334] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452028696e75780f000000000000000800000007000000"], 0x20) [ 1325.961435] gfs2: can't parse mount arguments [ 1326.053508] SELinux: policydb table sizes (8,1799) do not match mine (8,7) [ 1326.067147] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.084056] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.086517] gfs2: can't parse mount arguments 07:54:33 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xb804000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\n', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1326.096890] SELinux: policydb string SE (inux does not match my string SE Linux [ 1326.130590] gfs2: can't parse mount arguments 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452026696e75780f000000000000000800000007000000"], 0x20) [ 1326.232857] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.239338] gfs2: can't parse mount arguments [ 1326.245898] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.258121] sel_write_load: 54 callbacks suppressed [ 1326.258126] SELinux: failed to load policy [ 1326.269739] SELinux: policydb string SE &inux does not match my string SE Linux [ 1326.272985] gfs2: can't parse mount arguments 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1326.282255] SELinux: failed to load policy 07:54:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452003696e75780f000000000000000800000007000000"], 0x20) 07:54:33 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007050000"], 0x20) [ 1326.383257] SELinux: failed to load policy 07:54:33 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:33 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733202", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:33 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x800000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1326.485712] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.485984] SELinux: policydb string SE inux does not match my string SE Linux [ 1326.492694] gfs2: can't parse mount arguments 07:54:33 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1326.535497] SELinux: failed to load policy [ 1326.543333] SELinux: policydb table sizes (8,1287) do not match mine (8,7) [ 1326.555007] SELinux: failed to load policy 07:54:33 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345202f696e75780f000000000000000800000007000000"], 0x20) 07:54:33 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1326.621889] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.628230] gfs2: can't parse mount arguments [ 1326.633870] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.640847] gfs2: can't parse mount arguments [ 1326.665526] SELinux: failed to load policy [ 1326.673991] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.680988] gfs2: can't parse mount arguments [ 1326.697274] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.703981] gfs2: can't parse mount arguments 07:54:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:34 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452039696e75780f000000000000000800000007000000"], 0x20) 07:54:34 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x4, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2!', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1326.753981] SELinux: policydb string SE /inux does not match my string SE Linux [ 1326.762324] SELinux: failed to load policy 07:54:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:34 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1326.989418] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1326.990561] SELinux: failed to load policy [ 1326.996427] gfs2: can't parse mount arguments [ 1327.006125] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.013359] gfs2: can't parse mount arguments [ 1327.029247] SELinux: policydb string SE 9inux does not match my string SE Linux [ 1327.050149] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.057716] SELinux: failed to load policy [ 1327.076755] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.086369] gfs2: can't parse mount arguments 07:54:34 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452027696e75780f000000000000000800000007000000"], 0x20) 07:54:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000300"], 0x20) [ 1327.097301] gfs2: can't parse mount arguments 07:54:34 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:34 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:34 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452038696e75780f000000000000000800000007000000"], 0x20) [ 1327.188207] SELinux: policydb string SE 'inux does not match my string SE Linux [ 1327.198753] SELinux: failed to load policy 07:54:34 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:34 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007060000"], 0x20) [ 1327.246905] SELinux: policydb table sizes (8,196615) do not match mine (8,7) [ 1327.361353] SELinux: policydb string SE 8inux does not match my string SE Linux [ 1327.377713] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.396537] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.404100] SELinux: policydb table sizes (8,1543) do not match mine (8,7) 07:54:34 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452030696e75780f000000000000000800000007000000"], 0x20) [ 1327.406332] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.411972] gfs2: can't parse mount arguments [ 1327.436308] gfs2: can't parse mount arguments [ 1327.470134] gfs2: can't parse mount arguments [ 1327.503595] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.513992] gfs2: can't parse mount arguments [ 1327.520302] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.527885] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.536512] gfs2: can't parse mount arguments [ 1327.541576] SELinux: policydb string SE 0inux does not match my string SE Linux [ 1327.557030] gfs2: can't parse mount arguments 07:54:35 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x3d, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="676673327f", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345201e696e75780f000000000000000800000007000000"], 0x20) 07:54:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="6766733210", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1327.893756] SELinux: policydb string SE inux does not match my string SE Linux [ 1327.924968] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1327.937103] gfs2: can't parse mount arguments 07:54:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452048696e75780f000000000000000800000007000000"], 0x20) [ 1327.997643] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.014840] gfs2: can't parse mount arguments 07:54:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:35 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1328.108477] SELinux: policydb string SE Hinux does not match my string SE Linux 07:54:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452037696e75780f000000000000000800000007000000"], 0x20) [ 1328.164431] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1328.173742] FAT-fs (loop2): Filesystem has been set read-only [ 1328.180337] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1328.213073] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1328.223491] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1328.237720] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1328.248581] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1328.276565] SELinux: policydb string SE 7inux does not match my string SE Linux [ 1328.302263] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:35 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x300000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:35 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452004696e75780f000000000000000800000007000000"], 0x20) [ 1328.329837] gfs2: can't parse mount arguments [ 1328.341602] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.389370] gfs2: can't parse mount arguments [ 1328.399352] SELinux: policydb string SE inux does not match my string SE Linux 07:54:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452017696e75780f000000000000000800000007000000"], 0x20) [ 1328.430480] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.436823] gfs2: can't parse mount arguments [ 1328.458087] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007006000"], 0x20) [ 1328.488031] gfs2: can't parse mount arguments [ 1328.515103] SELinux: policydb string SE inux does not match my string SE Linux [ 1328.533245] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.539603] gfs2: can't parse mount arguments 07:54:35 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452011696e75780f000000000000000800000007000000"], 0x20) 07:54:35 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2k', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:35 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1328.591247] SELinux: policydb table sizes (8,6291463) do not match mine (8,7) 07:54:35 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x3d000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1328.642089] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.650030] gfs2: can't parse mount arguments 07:54:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1328.713929] SELinux: policydb string SE inux does not match my string SE Linux 07:54:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345202b696e75780f000000000000000800000007000000"], 0x20) [ 1328.827955] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.857439] gfs2: can't parse mount arguments 07:54:36 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x9e0a, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1328.890201] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.901830] SELinux: policydb string SE +inux does not match my string SE Linux [ 1328.918921] gfs2: can't parse mount arguments 07:54:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452044696e75780f000000000000000800000007000000"], 0x20) [ 1328.954420] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1328.971137] gfs2: can't parse mount arguments 07:54:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1329.109256] SELinux: policydb string SE Dinux does not match my string SE Linux 07:54:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452009696e75780f000000000000000800000007000000"], 0x20) [ 1329.153105] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.175281] gfs2: can't parse mount arguments 07:54:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578150000000000000008000000077fffff"], 0x20) [ 1329.213524] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.235183] SELinux: policydb string SE inux does not match my string SE Linux [ 1329.236857] gfs2: can't parse mount arguments [ 1329.254567] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:36 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x42c, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:36 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1329.287520] gfs2: can't parse mount arguments 07:54:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452035696e75780f000000000000000800000007000000"], 0x20) 07:54:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000600"], 0x20) [ 1329.327686] SELinux: policydb table sizes (8,-33017) do not match mine (8,7) [ 1329.416967] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.428825] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.429198] gfs2: can't parse mount arguments [ 1329.446794] SELinux: policydb table sizes (8,393223) do not match mine (8,7) [ 1329.454394] gfs2: can't parse mount arguments 07:54:36 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452007696e75780f000000000000000800000007000000"], 0x20) 07:54:36 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:36 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007002000"], 0x20) [ 1329.483367] SELinux: policydb string SE 5inux does not match my string SE Linux 07:54:36 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:36 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x38a, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1329.644065] SELinux: policydb string SE inux does not match my string SE Linux [ 1329.652961] SELinux: policydb table sizes (8,2097159) do not match mine (8,7) 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345203d696e75780f000000000000000800000007000000"], 0x20) 07:54:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1329.808708] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.816885] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.825315] gfs2: can't parse mount arguments [ 1329.846719] gfs2: can't parse mount arguments [ 1329.883503] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.902213] SELinux: policydb string SE =inux does not match my string SE Linux 07:54:37 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x280e0000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1329.931515] gfs2: can't parse mount arguments 07:54:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452047696e75780f000000000000000800000007000000"], 0x20) [ 1329.969176] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1329.994388] gfs2: can't parse mount arguments [ 1330.005904] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1330.019507] gfs2: can't parse mount arguments [ 1330.078609] SELinux: policydb string SE Ginux does not match my string SE Linux 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345200a696e75780f000000000000000800000007000000"], 0x20) 07:54:37 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000700"], 0x20) [ 1330.173972] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.188408] SELinux: policydb string SE [ 1330.188408] inux does not match my string SE Linux [ 1330.202733] gfs2: can't parse mount arguments 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452015696e75780f000000000000000800000007000000"], 0x20) 07:54:37 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x4208, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:37 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1330.252121] SELinux: policydb table sizes (8,458759) do not match mine (8,7) [ 1330.261020] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.267344] gfs2: can't parse mount arguments 07:54:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1330.323959] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.331558] gfs2: can't parse mount arguments [ 1330.341532] SELinux: policydb string SE inux does not match my string SE Linux 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204a696e75780f000000000000000800000007000000"], 0x20) [ 1330.399905] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.419204] gfs2: can't parse mount arguments [ 1330.424730] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007030000"], 0x20) 07:54:37 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452032696e75780f000000000000000800000007000000"], 0x20) [ 1330.446971] SELinux: policydb string SE Jinux does not match my string SE Linux [ 1330.461048] gfs2: can't parse mount arguments [ 1330.471158] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.479724] gfs2: can't parse mount arguments 07:54:37 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:37 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007040000"], 0x20) [ 1330.535986] SELinux: policydb table sizes (8,775) do not match mine (8,7) [ 1330.566920] SELinux: policydb string SE 2inux does not match my string SE Linux 07:54:37 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452042696e75780f000000000000000800000007000000"], 0x20) [ 1330.621381] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.632258] gfs2: can't parse mount arguments 07:54:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:38 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452019696e75780f000000000000000800000007000000"], 0x20) 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1330.695401] SELinux: policydb string SE Binux does not match my string SE Linux [ 1330.711140] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.717484] gfs2: can't parse mount arguments [ 1330.722814] SELinux: policydb table sizes (8,1031) do not match mine (8,7) [ 1330.772904] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.786533] gfs2: can't parse mount arguments 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007020000"], 0x20) [ 1330.844962] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.860956] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1330.865631] SELinux: policydb string SE inux does not match my string SE Linux [ 1330.867308] gfs2: can't parse mount arguments [ 1330.874226] gfs2: can't parse mount arguments [ 1330.888780] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2,', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:38 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345201c696e75780f000000000000000800000007000000"], 0x20) 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1330.924171] gfs2: can't parse mount arguments [ 1330.932579] SELinux: policydb table sizes (8,519) do not match mine (8,7) 07:54:38 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1331.028743] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.043027] gfs2: can't parse mount arguments [ 1331.055751] SELinux: policydb string SE inux does not match my string SE Linux [ 1331.122787] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1331.134586] FAT-fs (loop2): Filesystem has been set read-only [ 1331.141276] FAT-fs (loop2): error, fat_free_clusters: deleting FAT entry beyond EOF 07:54:38 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452045696e75780f000000000000000800000007000000"], 0x20) 07:54:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1331.172839] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 1331.187634] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 1331.207145] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.217201] SELinux: policydb string SE Einux does not match my string SE Linux 07:54:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xcfa, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1331.244867] gfs2: can't parse mount arguments [ 1331.265096] sel_write_load: 47 callbacks suppressed [ 1331.265101] SELinux: failed to load policy 07:54:38 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)="676673321d", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:38 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452049696e75780f000000000000000800000007000000"], 0x20) [ 1331.326093] SELinux: failed to load policy 07:54:38 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1331.410218] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.455895] gfs2: can't parse mount arguments [ 1331.469617] SELinux: policydb string SE Iinux does not match my string SE Linux [ 1331.483369] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.525637] gfs2: can't parse mount arguments [ 1331.526224] SELinux: failed to load policy [ 1331.535542] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.554637] gfs2: can't parse mount arguments [ 1331.567423] SELinux: failed to load policy 07:54:38 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452025696e75780f000000000000000800000007000000"], 0x20) 07:54:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1000000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:38 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000500"], 0x20) 07:54:38 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1331.670707] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.680624] gfs2: can't parse mount arguments [ 1331.689602] SELinux: policydb string SE %inux does not match my string SE Linux [ 1331.715592] SELinux: failed to load policy 07:54:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452043696e75780f000000000000000800000007000000"], 0x20) 07:54:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007600000"], 0x20) [ 1331.727927] SELinux: policydb table sizes (8,327687) do not match mine (8,7) [ 1331.745453] SELinux: failed to load policy 07:54:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1331.834893] SELinux: policydb string SE Cinux does not match my string SE Linux [ 1331.843109] SELinux: failed to load policy [ 1331.858672] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.881338] gfs2: can't parse mount arguments 07:54:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452046696e75780f000000000000000800000007000000"], 0x20) 07:54:39 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf4ffffff, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1331.927879] SELinux: policydb table sizes (8,24583) do not match mine (8,7) [ 1331.948389] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.967382] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1331.984010] SELinux: failed to load policy [ 1331.996318] gfs2: can't parse mount arguments [ 1332.002688] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.005390] SELinux: policydb string SE Finux does not match my string SE Linux [ 1332.016427] gfs2: can't parse mount arguments [ 1332.024117] gfs2: can't parse mount arguments [ 1332.024872] SELinux: failed to load policy 07:54:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345201b696e75780f000000000000000800000007000000"], 0x20) [ 1332.055361] SELinux: policydb table sizes (8,24583) do not match mine (8,7) [ 1332.065296] SELinux: failed to load policy 07:54:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000300"], 0x20) 07:54:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)="6766733211", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1332.141462] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.179768] gfs2: can't parse mount arguments [ 1332.193055] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.222156] gfs2: can't parse mount arguments 07:54:39 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xf56, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:39 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x1600000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345202a696e75780f000000000000000800000007000000"], 0x20) 07:54:39 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1332.249290] SELinux: policydb table sizes (8,196615) do not match mine (8,7) [ 1332.280238] SELinux: policydb string SE inux does not match my string SE Linux [ 1332.289346] SELinux: policydb string SE inux does not match my string SE Linux 07:54:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1332.449545] SELinux: policydb string SE *inux does not match my string SE Linux [ 1332.458247] SELinux: policydb string SE *inux does not match my string SE Linux 07:54:39 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1332.510835] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.517351] gfs2: can't parse mount arguments 07:54:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345201d696e75780f000000000000000800000007000000"], 0x20) 07:54:39 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x560f000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1332.603682] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.610042] gfs2: can't parse mount arguments [ 1332.629471] SELinux: policydb string SE inux does not match my string SE Linux [ 1332.638791] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:39 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:39 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452024696e75780f000000000000000800000007000000"], 0x20) [ 1332.666386] gfs2: can't parse mount arguments 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000020"], 0x20) 07:54:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:40 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452029696e75780f000000000000000800000007000000"], 0x20) 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000400"], 0x20) 07:54:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="6766733210", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1332.765224] SELinux: policydb string SE $inux does not match my string SE Linux [ 1332.802634] SELinux: policydb table sizes (8,536870919) do not match mine (8,7) [ 1332.867210] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.886977] gfs2: can't parse mount arguments [ 1332.896111] SELinux: policydb table sizes (8,262151) do not match mine (8,7) 07:54:40 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x9000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1332.931782] SELinux: policydb string SE )inux does not match my string SE Linux [ 1332.938306] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1332.953825] gfs2: can't parse mount arguments 07:54:40 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345202c696e75780f000000000000000800000007000000"], 0x20) 07:54:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0xa, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:40 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452018696e75780f000000000000000800000007000000"], 0x20) 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1333.074074] SELinux: policydb string SE ,inux does not match my string SE Linux [ 1333.132064] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1333.139606] gfs2: can't parse mount arguments [ 1333.164954] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="67667332ff", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1333.202739] SELinux: policydb string SE inux does not match my string SE Linux [ 1333.232378] gfs2: can't parse mount arguments [ 1333.241380] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:40 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x1f00000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:40 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345202d696e75780f000000000000000800000007000000"], 0x20) [ 1333.264745] gfs2: can't parse mount arguments 07:54:40 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:40 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x6b6b6b00, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1333.421487] SELinux: policydb string SE -inux does not match my string SE Linux [ 1333.472063] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:40 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452008696e75780f000000000000000800000007000000"], 0x20) 07:54:40 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000007"], 0x20) [ 1333.523385] gfs2: can't parse mount arguments [ 1333.542158] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:40 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2h', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:40 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x2c040000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1333.615766] gfs2: can't parse mount arguments [ 1333.619424] SELinux: policydb string SE inux does not match my string SE Linux [ 1333.656246] SELinux: policydb table sizes (8,117440519) do not match mine (8,7) [ 1333.661883] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1333.673589] gfs2: can't parse mount arguments 07:54:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000200"], 0x20) 07:54:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452033696e75780f000000000000000800000007000000"], 0x20) 07:54:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x1c, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:41 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x5c02, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)="676673320f", &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1333.877787] SELinux: policydb string SE 3inux does not match my string SE Linux [ 1333.911006] SELinux: policydb table sizes (8,131079) do not match mine (8,7) 07:54:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452005696e75780f000000000000000800000007000000"], 0x20) [ 1333.969459] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1333.990944] gfs2: can't parse mount arguments [ 1333.996986] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.007982] gfs2: can't parse mount arguments [ 1334.043141] SELinux: policydb string SE inux does not match my string SE Linux 07:54:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452013696e75780f000000000000000800000007000000"], 0x20) 07:54:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1334.092804] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.102303] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.108910] gfs2: can't parse mount arguments [ 1334.115002] gfs2: can't parse mount arguments 07:54:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:41 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x6, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:41 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xe605, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345201a696e75780f000000000000000800000007000000"], 0x20) 07:54:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) [ 1334.284720] SELinux: policydb string SE inux does not match my string SE Linux 07:54:41 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452006696e75780f000000000000000800000007000000"], 0x20) [ 1334.364263] SELinux: policydb string SE inux does not match my string SE Linux [ 1334.384545] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.395755] gfs2: can't parse mount arguments [ 1334.451163] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.457563] gfs2: can't parse mount arguments [ 1334.496479] SELinux: policydb string SE inux does not match my string SE Linux [ 1334.506882] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.515309] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:41 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000003"], 0x20) [ 1334.541304] gfs2: can't parse mount arguments [ 1334.546198] gfs2: can't parse mount arguments 07:54:41 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345202e696e75780f000000000000000800000007000000"], 0x20) 07:54:41 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x900, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:41 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000006"], 0x20) [ 1334.650648] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.657159] SELinux: policydb table sizes (8,50331655) do not match mine (8,7) [ 1334.682405] gfs2: can't parse mount arguments [ 1334.689777] SELinux: policydb string SE .inux does not match my string SE Linux 07:54:42 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204b696e75780f000000000000000800000007000000"], 0x20) 07:54:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x22, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000700"], 0x20) [ 1334.757824] SELinux: policydb table sizes (8,100663303) do not match mine (8,7) [ 1334.766738] SELinux: policydb table sizes (8,100663303) do not match mine (8,7) [ 1334.774722] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1334.787354] gfs2: can't parse mount arguments 07:54:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1334.917178] SELinux: policydb table sizes (8,458759) do not match mine (8,7) [ 1334.938646] SELinux: policydb string SE Kinux does not match my string SE Linux 07:54:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:42 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345203b696e75780f000000000000000800000007000000"], 0x20) [ 1334.983529] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1335.004536] gfs2: can't parse mount arguments [ 1335.023870] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1335.031008] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:42 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xffffffffffffffff, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) [ 1335.069831] gfs2: can't parse mount arguments [ 1335.075156] gfs2: can't parse mount arguments 07:54:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000000"], 0x20) 07:54:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\f', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1335.122154] SELinux: policydb string SE ;inux does not match my string SE Linux 07:54:42 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345203e696e75780f000000000000000800000007000000"], 0x20) [ 1335.189034] gfs2: invalid mount option: smackfsfloor=/selinux/load 07:54:42 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1335.231055] gfs2: can't parse mount arguments 07:54:42 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0xe28, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1335.266615] SELinux: policydb string SE >inux does not match my string SE Linux 07:54:42 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345200d696e75780f000000000000000800000007000000"], 0x20) [ 1335.409740] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1335.411124] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1335.442127] SELinux: policydb string SE inux does not match my string SE Linux [ 1335.463225] gfs2: can't parse mount arguments [ 1335.495301] gfs2: can't parse mount arguments 07:54:42 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf90800000053452041696e75780f000000000000000800000007000000"], 0x20) 07:54:42 executing program 1: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\a', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:42 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000000000000000000008000000000000000000001c3adde6863809aa000040e2ce65d65659f358dc1ab7332d0ef55ec2eed78c43937aad9a85afe827389338a0ddbe9f63e9b1a3ab02000000e2d94fcadcb572c54f42bb8c0d7de02d9bf774a2d8fa246a1f22796dbb1ceeb7bd438081598f12acde0bf8cde4f051b6a442f46e96203526564fc79e6a1ef2fc533e4c9b0036d4f4443a273f0ec003ff00eb19b4edc7de349788b9d32057b1debb18bb1ba5a2bf444de396e22c120de2b1364d46d43f250bd4af93df457849d2fd2d28e72ca1c7016a6366dd6b0c3b1ccd5b2bf2f3dff10c991fa4f0ba9d933655313f7f85252e8e6cb5205c4054a5f10c991317f8dc4350804fb04bcb13dd2505fc549529eb40354c549c019c742cae85d23600e30503eb5ebc1a7f8e00010124"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x100000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:42 executing program 5: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x2100, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) 07:54:42 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007007fff"], 0x20) [ 1335.645313] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1335.654288] gfs2: can't parse mount arguments [ 1335.663084] SELinux: policydb string SE Ainux does not match my string SE Linux 07:54:43 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345203c696e75780f000000000000000800000007000000"], 0x20) 07:54:43 executing program 3: syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f00000006c0)={[{@meta='meta'}, {@spectator='spectator'}, {@lockproto_nolock='lockproto=lock_nolock'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/load\x00'}}, {@hash='hash'}]}) [ 1335.719965] gfs2: invalid mount option: smackfsfloor=/selinux/load [ 1335.739464] SELinux: policydb table sizes (8,-8454137) do not match mine (8,7) [ 1335.753556] gfs2: can't parse mount arguments 07:54:43 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x12e) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@xdp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14, 0x0) fsync(r0) sendfile(r1, r1, &(0x7f0000000000)=0x7009000000000000, 0x8080fffffffe) poll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x400}], 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r2 = semget(0xffffffffffffffff, 0x0, 0x0) semop(r2, &(0x7f0000000080)=[{}, {0x7}], 0x2) 07:54:43 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815000000000000000800000007000005"], 0x20) [ 1335.813720] SELinux: policydb string SE 0b 5d c3 48 8b 04 c5 a0 aa 00 89 5d c3 66 90 66 2e 0f 1f 84 00 [ 1349.723361] RSP: 0018:ffff880187daf2a8 EFLAGS: 00010246 [ 1349.728722] RAX: 0000000000000000 RBX: 00000000616f6c2f RCX: ffffc90001ee0000 [ 1349.735972] RDX: 0000000000001cbf RSI: 0000000000000000 RDI: 00000000616f6c30 [ 1349.743221] RBP: ffff880187daf2a8 R08: ffff88018b8f2700 R09: ffffed0030fb5e81 [ 1349.750472] R10: ffffed0030fb5e81 R11: ffff880187daf40f R12: 00000000006000c0 [ 1349.757721] R13: ffff880187daf938 R14: ffff880187daf3c8 R15: 00000000006000c0 [ 1349.764989] __kmalloc+0x25/0x760 [ 1349.768427] ? user_read+0xec/0x590 [ 1349.772035] ? rcu_read_lock_sched_held+0x108/0x120 [ 1349.777033] ? str_read+0x48/0x160 [ 1349.780553] str_read+0x48/0x160 [ 1349.783900] user_read+0x328/0x590 [ 1349.787423] ? perm_read.isra.10+0x3c0/0x3c0 [ 1349.791817] ? policydb_read+0x8f7/0x5f30 [ 1349.795951] policydb_read+0xef9/0x5f30 [ 1349.799906] ? save_stack+0xa9/0xd0 [ 1349.803634] ? perm_read.isra.10+0x3c0/0x3c0 [ 1349.808022] ? string_to_av_perm+0xb0/0xb0 [ 1349.812236] ? find_held_lock+0x36/0x1c0 [ 1349.816279] ? graph_lock+0x170/0x170 [ 1349.820063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.825581] ? check_preemption_disabled+0x48/0x200 [ 1349.830575] ? check_preemption_disabled+0x48/0x200 [ 1349.835579] ? security_load_policy+0x174/0x1630 [ 1349.840314] ? rcu_read_lock_sched_held+0x108/0x120 [ 1349.845312] ? kmem_cache_alloc_trace+0x353/0x750 [ 1349.850138] ? check_preemption_disabled+0x48/0x200 [ 1349.855136] ? check_preemption_disabled+0x48/0x200 [ 1349.860148] security_load_policy+0x23b/0x1630 [ 1349.864713] ? __lock_is_held+0xb5/0x140 [ 1349.868762] ? security_change_sid+0x50/0x50 [ 1349.873181] ? __alloc_pages_nodemask+0xb5a/0xde0 [ 1349.878029] ? graph_lock+0x170/0x170 [ 1349.881832] ? graph_lock+0x170/0x170 [ 1349.885625] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1349.890631] ? vmap_page_range_noflush+0x7fc/0xa80 [ 1349.895557] ? __might_fault+0x12b/0x1e0 [ 1349.899616] ? lock_downgrade+0x900/0x900 [ 1349.903753] ? lock_release+0x970/0x970 [ 1349.907720] ? arch_local_save_flags+0x40/0x40 [ 1349.912283] ? usercopy_warn+0x110/0x110 [ 1349.916332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1349.921849] ? _copy_from_user+0xdf/0x150 [ 1349.925984] sel_write_load+0x24d/0x460 [ 1349.929950] __vfs_write+0x119/0x9f0 [ 1349.933647] ? check_preemption_disabled+0x48/0x200 [ 1349.938643] ? sel_make_policy_nodes+0x1f20/0x1f20 [ 1349.943553] ? kernel_read+0x120/0x120 [ 1349.947526] ? __lock_is_held+0xb5/0x140 [ 1349.951574] ? rcu_read_lock_sched_held+0x108/0x120 [ 1349.956585] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1349.962105] ? __sb_start_write+0x1b2/0x370 [ 1349.966409] vfs_write+0x1fc/0x560 [ 1349.969933] ksys_write+0x101/0x260 [ 1349.973541] ? __ia32_sys_read+0xb0/0xb0 [ 1349.977600] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 1349.983134] __x64_sys_write+0x73/0xb0 [ 1349.987022] do_syscall_64+0x1b9/0x820 [ 1349.990904] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1349.996254] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1350.001162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1350.005986] ? trace_hardirqs_on_caller+0x310/0x310 [ 1350.010980] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1350.015984] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1350.020991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1350.025816] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1350.030992] RIP: 0033:0x457569 [ 1350.034179] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1350.053059] RSP: 002b:00007fe984351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1350.060750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 1350.068005] RDX: 0000000000000060 RSI: 0000000020000040 RDI: 0000000000000003 [ 1350.075251] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1350.082501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9843526d4 [ 1350.089766] R13: 00000000004c5632 R14: 00000000004d8fb8 R15: 00000000ffffffff [ 1350.098587] Kernel Offset: disabled [ 1350.102216] Rebooting in 86400 seconds..