truncate(r2, 0x200004) r4 = socket(0x10, 0x80002, 0x0) sendfile(r4, r2, 0x0, 0x80001d00c0d0) 15:46:21 executing program 3: sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x4}, 0x1c}}, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4000000000000070, 0x28841) ioctl$USBDEVFS_GETDRIVER(r0, 0x41045508, &(0x7f00000000c0)={0x8, "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"}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000280)={0x6, &(0x7f0000000040)=[{0xff, 0x80, 0x7, 0x6}, {0x95, 0x0, 0x20, 0x2}, {0xfff, 0x5, 0x7f, 0x140}, {0x4, 0xff, 0x3, 0x2a715cf8}, {0x80c, 0x1, 0xc1, 0x401}, {0xc439, 0x5, 0x7, 0xfff}]}) io_submit(0x0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xffffffffffffff1c}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r5, 0x4008550d, &(0x7f00000002c0)) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 15:46:21 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x1000) 15:46:21 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/4043], 0xfca) 15:46:21 executing program 1: prlimit64(0x0, 0x0, 0x0, 0x0) symlink(0x0, &(0x7f0000000400)='./file0/file0\x00') getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, &(0x7f00000002c0), 0x0, &(0x7f00000006c0)) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="93e5d84419b1d7b41ea30b3919cab5446bb221cb52d148eab358624807c12eea941a0bbbed19d57dab8774a97b234725b2c155b12898b2ecef2d07459810f5f09db202cd1d0b22323c8351a4528c0baa0f4e87ff68760bf7e4b9f00b75aa86c420f26ffa015701157ff6a70f269008da55664105825664d0f83fe34e37c4b35c40067f8fb828cfeffce2af486d5fb7a0a5782ab03aa37f012a78e3f27f073ee9ba4d0948242304c99ca5835dbbe265d164cec474596d07e91c3ef68bdda1904c"], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000003c0)=0xc) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000380), 0x4) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001200)=ANY=[@ANYBLOB], 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000140)) [ 93.880937][ T4573] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev fuse, type fuse) errno=-22 [ 93.909893][ T4579] SELinux: security_context_str_to_sid(sysadm_u) failed for (dev fuse, type fuse) errno=-22 15:46:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r0 = creat(0x0, 0x10) setresuid(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000402) socket$inet6(0xa, 0x80000, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002ec0), 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x4000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = dup2(r3, r4) getpid() socket(0x0, 0x2, 0x0) setresuid(0x0, 0x0, 0x0) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = dup2(r7, r8) r10 = getpid() r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, 0x0, r12) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmmsg$unix(r9, &(0x7f0000000640)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {0x0, r12, r14}}}], 0x20}], 0x1, 0x0) ioctl$TIOCSPGRP(r5, 0x5410, &(0x7f0000000040)=r10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)="a2e6", 0x2) bind(0xffffffffffffffff, 0x0, 0x0) [ 93.931139][ T4571] EXT4-fs (loop3): feature flags set on rev 0 fs, running e2fsck is recommended [ 93.938147][ T4574] SELinux: ebitmap: truncated map [ 93.940797][ T4571] EXT4-fs (loop3): Couldn't mount because of unsupported optional features (8100000) [ 93.948091][ T4574] SELinux: failed to load policy 15:46:21 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xf0, 0x3f, 0xc0, 0xe3, 0x0, 0x1, 0x82041, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x5b67, 0xfffffffffffffffe}, 0x80, 0xff, 0x1, 0x9, 0xfffffffeffffffff, 0x1, 0x80}, 0xffffffffffffffff, 0xb, r0, 0x1) fstat(0xffffffffffffffff, 0x0) [ 93.973356][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 93.990345][ T4582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 94.003697][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 94.018787][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 15:46:21 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r6 = dup3(r5, r3, 0x80000) ioctl$TUNGETIFF(r6, 0x800454d2, &(0x7f0000000240)) [ 94.056100][ T4582] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 94.124519][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 15:46:21 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c0000000203010400000000e7ff00000a00ffff0800010001000000"], 0x1c}}, 0x0) r1 = socket(0x0, 0xa, 0x81) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c1400000103010400000000e7ff00000a00ff8e7744190001000000da3a05fba511b15f5451bd90280f1ed2a0bcb15ba88508000000895a2b3f5b1277d75af64d4323669329547d63e767d38a552c6706219428286c3183f34ec5bf8943aa"], 0x1}}, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_EPOCH_SET(r5, 0x4008700e, 0x3e) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$IPSET_CMD_LIST(r6, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x7, 0x6, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x8011}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0xff3b, 0x6, 0x1, 0x0, 0x800}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4010}, 0x8001) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc) [ 94.165325][ T4602] SELinux: ebitmap: truncated map [ 94.173990][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 94.189836][ T4602] SELinux: failed to load policy 15:46:21 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) dup3(r5, r3, 0x80000) [ 94.216249][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 94.253944][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 15:46:21 executing program 5: sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, r0, 0xce5a3000) syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000004000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:46:21 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x8000000004) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000040)=0x4) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="580000001500add427323b472545b45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) prctl$PR_GET_SECUREBITS(0x1b) [ 94.323343][ T4614] SELinux: ebitmap: truncated map [ 94.330552][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 94.343577][ T4617] loop5: p2 < > p3 p4 [ 94.355939][ T4617] loop5: p2 size 2 extends beyond EOD, truncated [ 94.366057][ T4614] SELinux: failed to load policy [ 94.366392][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 94.393953][ T4617] loop5: p3 start 225 is beyond EOD, truncated [ 94.406784][ T4585] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=4585 comm=syz-executor.0 [ 94.428754][ T4617] loop5: p4 size 3657465856 extends beyond EOD, truncated [ 94.569841][ T4635] loop5: p2 < > p3 p4 [ 94.574155][ T4635] loop5: p2 size 2 extends beyond EOD, truncated [ 94.600131][ T4635] loop5: p3 start 225 is beyond EOD, truncated [ 94.613234][ T4635] loop5: p4 size 3657465856 extends beyond EOD, truncated 15:46:22 executing program 0: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x2) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$inet6(0xa, 0x400000000803, 0x5f) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x1867f, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_getevents(r1, 0x4, 0x6, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000000)) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000200)=@req3={0x8000, 0x400, 0x101, 0xc0000000, 0x8, 0x2, 0xffff}, 0x1c) r2 = open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) r3 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x3, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000240)={'nat\x00'}, &(0x7f0000000180)=0x54) ftruncate(r2, 0x200004) r4 = socket(0x10, 0x80002, 0x0) sendfile(r4, r2, 0x0, 0x80001d00c0d0) 15:46:22 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:22 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback}, {@in6=@rand_addr="02ed4d73062b85e8a45dfa2e6a347805", 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x60, "b2dcae3f"}}]}, 0x140}}, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xac, 0x0, 0x2, 0x70bd2a, 0x6, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}]}, 0xac}}, 0x20008805) 15:46:22 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x2, 0xc) write(0xffffffffffffffff, &(0x7f0000000140)="1f0000000104ff", 0x7) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 94.802682][ T4647] SELinux: ebitmap: truncated map [ 96.104330][ T4704] cgroup1: Unknown subsys name 'perf_event' [ 96.110451][ T4704] cgroup1: Unknown subsys name 'net_cls' [ 97.126826][ T5100] FAT-fs (loop1): bogus number of reserved sectors [ 97.133578][ T5100] FAT-fs (loop1): Can't find a valid FAT filesystem 15:46:27 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, 0x3, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x40) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 15:46:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"]) read$FUSE(r4, &(0x7f0000000580), 0xefee) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0) r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r7, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:46:27 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{&(0x7f0000000340)=@pppoe, 0x80, 0x0}}, {{&(0x7f0000001b00)=@generic, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000002580)=""/249, 0xf9}], 0x1}}], 0x3, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x10, 0x2, 0x0) sendto(r4, &(0x7f0000000040)="120000001200e7ef007b1a3fd800000000a3", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000200)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x1d0}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000140)=""/77, 0x21}, {&(0x7f0000000280)=""/141, 0x8d}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xfffffffffffffe6c}}], 0x1c6, 0x6, &(0x7f0000003700)={0x77359400}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r7, @ANYBLOB="00000000000000001800120008000100767469000c00020008000100", @ANYRES32=r7, @ANYBLOB="8014d350d222f279af0d78ae2ad00f524014f9dd39aa8c6a8a31e01bd55c0629fa7c13b24ce4e5da415ad7e753001596f63a00801763ae464465bd23e16ad948668e1a6c15f261cc209070df1d452e6a5a57a519ecdc5276ac95ab82942c0e83fba71d6581f342f79c721a7b0c621f4791b6547e11cfe366"], 0x38}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFA_ADDRESS={0x8, 0x9, @multicast1}]}, 0x28}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000640)) fcntl$setpipe(r3, 0x407, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r8, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000580)={&(0x7f0000001780)={0x13c, r8, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0x10c, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x4d, 0x0, "676170681707db9148849649d5dd20887c9084bebe057215682fc89dd937d03708d197db2ec1d1dd67c15a8cd05209335be0d2c2b2a307e56add3a233ccea5a8099628fe61a572139a"}, @NL80211_BAND_5GHZ={0xa1, 0x1, "620df30c1f05c28f85717b77805b766798757ed61ed74aa073979c33e8816d179ceb218236cd6c7d485a349987a2628fb1f715c7fa4e5f7472f42cfe053953b067c3999b53a733817aebfcf2d4a938cc1980c790e452a691e6d0b2959e9e31fb792bdbb92754602cab23f45de3ac6b919a893b72d95737e884fe473ea4b3ddef425799c78211babbfc66da97e7950a2a240cf81ba893241edf87d7c00a"}, @NL80211_BAND_6GHZ={0x14, 0x3, "2a4c02649d2668fce277199a49e4c587"}]}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_SCAN_FREQUENCIES={0x14, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x8}, {0x8, 0x0, 0x2ab}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x4851}, 0xc0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x1, 0x72, 0x3, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000402) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000000)={0x4, 0xffffffffffffffff, 0x20000000083}) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaaad7, &(0x7f0000000480)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a5c8802a9d8aea872943afd874e2f98b579a7086270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6a6f30481c4c5f0000000000000000"]) 15:46:27 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a9ffffff00090000ff07000080ffffffa6ffffff0000000100000001000100ff81000004800000000a00000000050000eeffffff000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r1, &(0x7f0000000040)="dbe33f0f81951507d9907b5c29a1418adbd5c9ab3e27ff31d503ca39238e041f4224ce67d101", 0x26, 0xc9e560b3c3a9e508, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 15:46:27 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="2800000010005fba060000000000000000000b00", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fstatfs(r4, &(0x7f0000000180)) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r4, 0x0, r5) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000008c0)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980700009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff0000000000000000000000000300000007000000000000000000000000000000480043540000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000ee00000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000010020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r7, 0x0, r7) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r9 = fcntl$dupfd(r5, 0x406, r8) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) setsockopt$CAN_RAW_RECV_OWN_MSGS(r11, 0x65, 0x4, &(0x7f0000000240), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000340)={0x3, 0x70, 0x1, 0x3f, 0x20, 0x7f, 0x0, 0x7ff, 0x40000, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x5, 0x4, 0x6, 0x0, 0x5838, 0x3ff}, r2, 0x9, r11, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$tun(r0, &(0x7f00000002c0)={@void, @val, @mpls={[], @ipv4=@tipc={{0x6, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @rand_addr=0x5e3, {[@ssrr={0x89, 0x3}]}}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa, 0xb, 0x2, 0x0, 0x30f}}}}}, 0x4a) 15:46:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x6af) [ 99.959344][ T22] kauditd_printk_skb: 281 callbacks suppressed [ 99.959353][ T22] audit: type=1326 audit(1580485587.446:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 99.968138][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 100.005195][ T5120] SELinux: ebitmap: truncated map [ 100.005725][ T22] audit: type=1326 audit(1580485587.446:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 100.032403][ T5133] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 100.035919][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 100.048644][ T5120] sel_write_load: 1 callbacks suppressed 15:46:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) [ 100.048646][ T5120] SELinux: failed to load policy [ 100.052557][ T22] audit: type=1326 audit(1580485587.446:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 100.085145][ T5123] SELinux: ebitmap: truncated map [ 100.088613][ T22] audit: type=1326 audit(1580485587.446:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 100.103293][ T5123] SELinux: failed to load policy [ 100.120846][ T5143] fuse: Bad value for 'group_id' [ 100.129621][ T5144] netlink: 'syz-executor.1': attribute type 274 has an invalid length. [ 100.140186][ T22] audit: type=1326 audit(1580485587.446:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 100.165961][ T22] audit: type=1326 audit(1580485587.446:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 100.298298][ T22] audit: type=1326 audit(1580485587.446:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:46:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x88, r4, 0x2, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:auditd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:initrc_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team0\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x48005}, 0x80) [ 100.326914][ T22] audit: type=1326 audit(1580485587.446:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=72 compat=0 ip=0x45b349 code=0x7ffc0000 [ 100.358028][ T22] audit: type=1326 audit(1580485587.446:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:46:27 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c000000010a00000001000000000000000000000900010073797a30000000000900010073797a31000000001fa810d371a6efc59ed68fdaf2512938be3ed88bad07167ae60596db4bf71017a73f8eedf541b0"], 0x2c}}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x12) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 100.383712][ T22] audit: type=1326 audit(1580485587.446:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5116 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:27 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') 15:46:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4008550d, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='+s '], 0x6) [ 100.544662][ T5164] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 100.556806][ T5164] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 100.567154][ T5164] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 100.578314][ T5164] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:46:28 executing program 5: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000100)={0x50, 0xfffffffffffffff5, 0x0, [{0x0, 0x0, 0x5, 0x3f, 'vfat\x00'}, {0x0, 0x179, 0x5, 0x8, 'vfat\x00'}]}, 0x50) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0xfa) sendfile(r1, r0, 0x0, 0xa198) 15:46:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) timer_create(0x8, 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.current\x00', 0x26e1, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080)=0x28, 0x87f1a7) [ 100.590845][ T5164] EXT4-fs error (device loop1): ext4_fill_super:4518: inode #2: comm syz-executor.1: iget: root inode unallocated [ 100.603152][ T5164] EXT4-fs (loop1): get root inode failed [ 100.609510][ T5164] EXT4-fs (loop1): mount failed [ 100.846434][ T5143] fuse: Bad value for 'group_id' 15:46:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"]) read$FUSE(r4, &(0x7f0000000580), 0xefee) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0) r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r7, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:46:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') 15:46:28 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000240)='c\xba(\x06\x01\t6(\x00\xbbk\xad%\xf3\xf6_|S\x93>\x94\x15#b\x91\xecr\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o*\xbd}EV\xba6\xae\xee\xe4\x8d\xae\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x03\x98Pm\x0f(\x98\xff\x05\xff\x0f\xad|\xa3\xc9Y>\xed\xfe\x8cK.\xa7N.+{\x95\x18\x87?~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 15:46:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x8, 0x0, 0x0, {{@in=@remote, @in=@multicast1=0xe0000002, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x0, 0x0, 0x0, 0x2}}, 0xb8}}, 0x0) 15:46:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"]) read$FUSE(r4, &(0x7f0000000580), 0xefee) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0) r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r7, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:46:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$packet(0x11, 0x0, 0x300) socket$packet(0x11, 0x3, 0x300) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0xf7, 0x6, @dev={[], 0x21}}, 0x14) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="21007b53a8c27830eeb66d0c1171c4e676c5592859d9063bd58c341c4335c16952f417562fb0c37dacba9027ee0a41bd80d44e8b02a2383fa02b122ba5cafe34a1b62ca78305f49acb65aa4aaaa7632c02e023bc8b2328d19f31c3db629e3936a01acf020ddfcb074f8a49d574c823b48776aa9f5dd5e427a9238f3f67861bb728f367cb3e61dc2097ac9e06a1"]) read$FUSE(r4, &(0x7f0000000580), 0xefee) write$FUSE_CREATE_OPEN(r4, &(0x7f0000000380)={0xa0}, 0xa0) r5 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) r6 = memfd_create(&(0x7f0000000280)='t\x05\x00\x00\x00\x8c\x00\x822@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xcb\xe8\xfe\xd6\xa6\xea', 0x0) pwritev(r6, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x2000005) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r6) r7 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r7, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r8) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[]}}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:46:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 15:46:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) 15:46:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) waitid(0x5, 0x0, 0x0, 0x2, &(0x7f00000006c0)) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, &(0x7f00000001c0)={0x3, 0x1800, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x10) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="6f73322e737973741ae22e736f636b706d6b0437e45bcbd892877376d96500"], 0x0, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x219) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000200)={0x3f, 0x3f, [0x0, 0x8001, 0x7, 0x803], 0x3}) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') r9 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r9, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r12}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) getsockname$packet(r15, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r13, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) getsockname$packet(r19, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r17, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r20}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) r21 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r21, 0x0, r21) getsockname(r21, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x80) sendmsg$TEAM_CMD_OPTIONS_GET(r7, &(0x7f0000000500)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000c00)={0x1cc, r8, 0x100, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r12}, {0x128, 0x2, 0x0, 0x1, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r20}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x800}, 0x24000000) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r23 = dup2(r5, r5) ioctl$RTC_IRQP_SET(r23, 0x4008700c, 0x1d96) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0x34) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x80) 15:46:28 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 101.159575][ T5217] fuse: Bad value for 'group_id' 15:46:29 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000200)={0x3}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) link(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) 15:46:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280), 0x2a7) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80008000}) sendmsg$IPVS_CMD_DEL_DAEMON(r1, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() tkill(r4, 0x3c) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000040)=r4) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$PPPIOCSMRU(r3, 0x40047452, &(0x7f0000000340)=0x3) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x44, r7, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000009}, 0x4001) 15:46:29 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) 15:46:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x6, 'veth0_to_hsr\x00', {0x3}, 0x2}) r1 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000280)=[{{0x0, 0xfffffffffffffff3, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1400000000000000290000003e00000000000000000000d49065d3d7278d3bbd6db68317e100005eabbeef26226997e6563fe7b466c9a151d6b764be76904efc6a1e15b4ca9fd6cab31c3d90dcdd8283f69cc01b2083caafb8a33f6aae307ecfe4a14f23183171779dcdaa"], 0x18, 0xf401}}], 0x4000011, 0x0) 15:46:29 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) 15:46:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="4400000010001fff00"/20, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="4b8030255e42ead0a303d1588726cbe91430a5fd1e5eae3bfc774dc24efff17aa3fb4966d1361530dc728c04e91d2a12f210cee7f3cd71b269f35f75ec95d7a34dd6005cb83c0640570738335c2eeceefe4d06ae2d5bdb53fe604803f199f74c29dee7733f6a36e46f1c61e8fc1bcb3ee7971540329ae33ce5f587a1b6b15fa15aeb47be63ce75b9382f"], 0x5}}, 0x0) [ 101.685309][ T5235] overlayfs: './file0' not a directory 15:46:29 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) [ 102.091269][ T1937] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 102.099908][ T1937] FAT-fs (loop0): Filesystem has been set read-only [ 102.871672][ T5252] cgroup1: Unknown subsys name 'perf_event' [ 102.877897][ T5252] cgroup1: Unknown subsys name 'net_cls' [ 103.835424][ T5649] fuse: Bad value for 'group_id' 15:46:32 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_create(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x280000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f00000002c0)={0x525, 0x1, "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"}) bind(0xffffffffffffffff, &(0x7f00000000c0)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c954"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x2008002) sendfile(r0, r2, 0x0, 0x200fff) r3 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @empty, 0x5}, 0x1c) r4 = dup(r3) r5 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 15:46:32 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="020185ffffff16a40000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c30000fdfdffff80000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f00000000c0)={0x0, 'veth1_to_team\x00', {0x4}, 0x5}) 15:46:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000007b40)) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000003c0)=""/160) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320c) r5 = socket$packet(0x11, 0x3, 0x300) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x0, 0x803, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r13 = socket$unix(0x1, 0x2, 0x0) r14 = fcntl$dupfd(r13, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f00000002c0)={'batadv_slave_1\x00', r12}) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000700)=@bridge_getneigh={0x0, 0x1e, 0x400, 0x70bd2c, 0x0, {0x7, 0x0, 0x0, r15, 0x40, 0x8400}, [@IFLA_NET_NS_PID, @IFLA_IFALIAS={0x0, 0x14, 'vlan0\x00'}, @IFLA_EXT_MASK={0x0, 0x1d, 0x4}, @IFLA_LINK_NETNSID, @IFLA_MAP={0x0, 0xe, {0x7, 0x7, 0x9, 0x4, 0x0, 0x8}}, @IFLA_IFALIAS={0x0, 0x14, 'veth1_to_hsr\x00'}, @IFLA_LINKMODE={0x0, 0x11, 0x1f}]}, 0x114}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYRES32=r8, @ANYBLOB="007c00000000000008000400", @ANYRES32=r12, @ANYRES32=0x0, @ANYBLOB="476e3a81"], 0x5}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:32 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000}) 15:46:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x3, &(0x7f00000000c0)=0x0) io_getevents(r2, 0x2, 0x8000000000002b9, &(0x7f0000d83f60), 0x0) r3 = memfd_create(&(0x7f0000000140)='sec]ritynodev:ppp1bdev\x00', 0x0) io_submit(r2, 0xd8, &(0x7f0000000280)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 104.598338][ T5655] SELinux: ebitmap: truncated map [ 104.621555][ T5655] SELinux: failed to load policy 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:32 executing program 3: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0000002498515fd8ddff00c5e17e000000000000000000"], 0x1c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffc1) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r5, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x8}]}, 0x1c}}, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x1c, r7, 0xf2b, 0x0, 0x0, {}, [@NL80211_ATTR_AIRTIME_WEIGHT={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000200)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0xfffffffffffffd9a, r7, 0x8, 0x70bd2d, 0x25dfdbff}, 0x54}, 0x1, 0x0, 0x0, 0x4000800}, 0x804) pipe2$9p(&(0x7f0000000040), 0x4000) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffde, 0x0) [ 104.642329][ T5655] SELinux: ebitmap: truncated map [ 104.659130][ T5651] loop5: p1 < > p2 p3 < p5 > p4 [ 104.664812][ T5651] loop5: partition table partially beyond EOD, truncated [ 104.676616][ T5655] SELinux: failed to load policy 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 104.687760][ T5651] loop5: p1 start 42006 is beyond EOD, truncated [ 104.711113][ T5655] SELinux: ebitmap: truncated map [ 104.720540][ T5651] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 104.729888][ T5655] SELinux: failed to load policy 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 104.737896][ T5651] loop5: p3 size 2 extends beyond EOD, truncated [ 104.752538][ T5651] loop5: p4 start 4294835456 is beyond EOD, truncated [ 104.767191][ T5651] loop5: p5 size 1073741824 extends beyond EOD, truncated [ 104.795037][ T5667] SELinux: ebitmap: truncated map [ 104.810685][ T5667] SELinux: failed to load policy [ 104.817660][ T5655] SELinux: ebitmap: truncated map [ 104.823741][ T5678] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 104.824147][ T5655] SELinux: failed to load policy 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 104.839659][ T5677] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 104.854107][ T5651] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 104.854231][ T5680] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 104.873953][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 104.884908][ T137] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 104.892931][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 104.903806][ T137] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 104.911828][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 104.922694][ T137] Buffer I/O error on dev loop5p5, logical block 0, async page read [ 104.930754][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 104.941680][ T137] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 104.949711][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 104.950141][ T5675] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 104.960591][ T137] Buffer I/O error on dev loop5p5, logical block 0, async page read [ 104.960628][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 15:46:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r1) ioctl$TIOCGSERIAL(r2, 0x541e, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000000c0)=ANY=[@ANYBLOB="d1b7ef19a336e7dd95b2ba44f92b8d6fbcab9868e78f3a0f990217cfe94996a6d3b6b47e5ce1230968498cb22e8fad5000207c6aa6666baf8cd3d0acf5e1ffec9a20738549f65f8b32b7cf3bd48e8e1f6b8a5fd33fd582bfd03f01336d1321d8708ea908d4acf8622c14afc555f33845ba6f58b2835a49353717fd0e7819a533293df817310c57f8ebe35af9a305f90d30262a868473a7873ee48c6b3088bec279a377ce96a4e021d40e597f7fc73bee6dd20cda090455bca11a092a01dd112bffd52c20fe0c643ec000c792650000"]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x38142, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r3 = socket$inet6(0xa, 0x3, 0xe3) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @empty}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r5, 0x8954, &(0x7f0000000200)={{0x2, 0x4e23, @rand_addr=0x7f}, {0x1, @random="386df98e87c7"}, 0x0, {0x2, 0x4e24, @broadcast}, 'bond_slave_0\x00'}) dup2(r4, r4) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fcntl$setsig(0xffffffffffffffff, 0xa, 0x1) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r6, 0x8955, &(0x7f0000000340)={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x1}, 0x8, {0x2, 0x4e20, @broadcast}, 'nr0\x00'}) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$TIOCL_UNBLANKSCREEN(r7, 0x541c, &(0x7f00000002c0)) [ 104.989034][ T137] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 104.997049][ T137] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 105.007922][ T137] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 105.015968][ T137] Buffer I/O error on dev loop5p5, logical block 0, async page read [ 105.024000][ T137] Buffer I/O error on dev loop5p2, logical block 0, async page read [ 105.032040][ T137] Buffer I/O error on dev loop5p3, logical block 0, async page read [ 105.036401][ T5675] SELinux: failed to load policy 15:46:32 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 105.045285][ T22] kauditd_printk_skb: 171 callbacks suppressed [ 105.045294][ T22] audit: type=1326 audit(1580485592.526:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5686 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 105.118971][ T22] audit: type=1326 audit(1580485592.526:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5686 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 105.162985][ T22] audit: type=1326 audit(1580485592.526:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5686 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 105.188783][ T22] audit: type=1326 audit(1580485592.636:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 105.214470][ T22] audit: type=1326 audit(1580485592.636:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 105.239962][ T22] audit: type=1326 audit(1580485592.636:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 105.265509][ T22] audit: type=1326 audit(1580485592.636:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 105.290970][ T22] audit: type=1326 audit(1580485592.636:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 105.320993][ T22] audit: type=1326 audit(1580485592.636:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=5699 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 106.464821][ T5708] cgroup1: Unknown subsys name 'perf_event' [ 106.470904][ T5708] cgroup1: Unknown subsys name 'net_cls' [ 106.760110][ T5845] cgroup1: Unknown subsys name 'perf_event' [ 106.766472][ T5845] cgroup1: Unknown subsys name 'net_cls' 15:46:35 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:35 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0201a5ffffff00090000ff07000080ffffff00000000000000010000000000ffffff81000004800000000affffff8005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x3) 15:46:35 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000}) 15:46:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fdatasync(r6) socket$tipc(0x1e, 0x2, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) 15:46:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) getsockopt$IP_SET_OP_GET_BYINDEX(r5, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x4}, &(0x7f00000002c0)=0x28) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newlink={0x48, 0x10, 0x705, 0x0, 0x200000, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9, 0x1, 'vcan\x00'}, {0x4}}}, @IFLA_VF_PORTS={0x4}, @IFLA_CARRIER={0x5, 0x21, 0x4}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xf98}]}, 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@ipv4_delrule={0x24, 0x21, 0x1, 0x70bd2d, 0x25dfdbfb, {0x2, 0x34, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0xd}, [@FRA_DST={0x8, 0x1, @local}]}, 0x24}, 0x1, 0xf0ffffff}, 0x0) [ 108.095785][ T6508] netlink: 'syz-executor.3': attribute type 274 has an invalid length. [ 108.126993][ T6508] netlink: 'syz-executor.3': attribute type 274 has an invalid length. [ 108.136127][ T22] audit: type=1326 audit(1580485595.626:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=6511 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 108.137503][ T6508] selinux_nlmsg_perm: 1174 callbacks suppressed [ 108.137556][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=38948 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.163033][ T6515] SELinux: ebitmap: truncated map [ 108.168262][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.195685][ T6515] SELinux: failed to load policy [ 108.218311][ T6519] SELinux: ebitmap: truncated map [ 108.220282][ T6516] loop5: p1 p3 [ 108.227436][ T6516] loop5: p1 start 2304 is beyond EOD, truncated [ 108.234460][ T6519] SELinux: failed to load policy [ 108.248557][ T6516] loop5: p3 start 128 is beyond EOD, truncated [ 108.253185][ T6515] SELinux: ebitmap: truncated map [ 108.261523][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.262824][ T6515] SELinux: failed to load policy [ 108.275176][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.293270][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.297859][ T6526] SELinux: ebitmap: truncated map [ 108.311917][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.321682][ T6526] SELinux: failed to load policy [ 108.325373][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.342518][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.355300][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.368210][ T6525] SELinux: ebitmap: truncated map [ 108.368374][ T6508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=6508 comm=syz-executor.3 [ 108.377042][ T6525] SELinux: failed to load policy [ 108.391384][ T6516] loop5: p1 p3 15:46:35 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="ceff9ae4010000007456"], 0x9) close(r2) socket$netlink(0x10, 0x3, 0x4) bind(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x2, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 15:46:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$tipc(0x1e, 0x1b01abcffcc525c0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000100)=@generic={0x0, 0x4, 0x3}) tee(r0, r1, 0x4, 0x0) pwrite64(r3, &(0x7f0000000140)="d5eb53be51c3bca80d4a75706150fb67073410c4c92660d929a105deafceb8db9c242cfc1d7ac9d149f4d192a76d19c45795c95157c498a42d99eaef30505bb1e8ba476e54a7be147ecaa415ebea9d4780a5193c260695be91e3526e4d95f87ee966e8ceb3243fe80721ba", 0x6b, 0x1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x800000003, 0x0) ioctl$sock_inet_SIOCDARP(r6, 0x8953, &(0x7f0000000040)={{}, {}, 0x38, {0x2, 0x0, @empty}, 'vcan0\x00'}) 15:46:35 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 108.393261][ T6508] netlink: 'syz-executor.3': attribute type 274 has an invalid length. [ 108.396200][ T6516] loop5: p1 start 2304 is beyond EOD, truncated [ 108.404298][ T6532] netlink: 'syz-executor.3': attribute type 274 has an invalid length. [ 108.411995][ T6516] loop5: p3 start 128 is beyond EOD, truncated 15:46:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x35}, [@ldst={0x6, 0x0, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000140)={0x11, 0xa9, &(0x7f0000000080)="0427f3284a16e8a5b3199dd1aa043b7a98474355cedbf3e91e2dc98b5c8ae93eadf339ed7e6465950e3a80a6418bac46df95c09eeeb2b3b1558f02339d654c3a35106dc4ce4e0e2ab63cbb3d8fc358db47ccf8121c8958d2ddbd31eff825b09397cc24b06617286b0907ea9138558c207f71947a54f67fd575cc1f8b329b7b57833e395a01458de1f30484545f748903ec94c6b022a4ea880255730cfb2e8beba7cb7df111a3af6020"}) 15:46:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:36 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg$inet6(r0, &(0x7f0000004b80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000001440)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000001880)=[{&(0x7f0000001480)="103697a04d07b0cfd7f260e105ec5411008f3bf249f074e131960b16e28936492674db4bf5da23a486cd223f34d53ea5d81aae81fccb7e72d05c6d12316ad2cdb43ad18812c5757283686db13fe379ec3d22dc1e554e8c5f55318441993307fd04b8dac74b5bfa4585fb3537e911df81fdf2fbb71753044f20c487575980c3713011a11ca45a989ee39c3fe3c92160fdacea63e8cbe408fbe6a80fc6d41a74c7a48a051ec0328f58b023b4d813ec9fdff5e36aa3111b174e6e9ec07bf072c6eba02dfabdce3d61a4cbb9f061593b44ae1b39c9cf89fbf56b438667fc0842f1580eb2c994beeb9ae95b3c4411d320db3d49b6daaf", 0xf4}, {&(0x7f0000001580)="1e767ea5b81fc5524ed99e276fc364f695315e8acb1c4b562aa44a619c75065f4797f7b031aa88f1ed7a018ffff67cb8d384221b5c1aabe2f5430ebab80f78f3dd44f7976a596525fc079e67643df445a66dee0b3da591c15a9e846bef824d3aaad8d2885c4ac87f9b33e8256e01aa2b3e14261864e834f5c5c50f7e7aa950cc94c229aa3504cfe3bb0fe2b83e1c4f30bfd0a6a8d7f1abae58e912041e21b457848b7e0ee3f8553d0ffa23795638ceb0a1d29d6cbc106fcc8b36d783cd0630a6531ecd09f98f1e54352898a2e157c41cde2aa706c259f183c33fe48a7db767d47a27a5e09fccb9435a93d3b61f61af4ff20610", 0xf3}, {&(0x7f0000001680)="359c240f01860a65410fc81d8170ad0a087ffb72af9c4fb52691009d2094058575781b6046fe441141e073aff553808cc54dd2aa", 0x34}, {&(0x7f00000016c0)="280c147569a714c38c72b3ccfc3c39508aa02dad352e104c77f471b33940a4a8b58646a0648fe16030a3981db64b3d45535b44cb5cdd3ba6a46285d2903525b9f7321c119c38b38d489fd97f2a6eda6f5e768b5cd4203dfbed1f7d1b", 0x5c}, {&(0x7f0000001740)="7354ccf45261e569df0b4374bcd6be64b50a9ac1001b3eb9d941c4796292ba9a17e39726dbecf9304dc771427a31d742cea5c42d06d257df05ef186dd144109fce2800752b4e5304f20a6fa052282350b9345b143da2b1fe5f42", 0x5a}, {&(0x7f00000017c0)="d4e0002ed75005b8176688aac12db7ef45f7bc81046aaa359a16d6c8fea8fc41ae151f473df49ac0ecd25a839aaae774dfdc52ae6bcc75009f5e9b85784c6018485b04cd8173e5ac2d9f56adbcd073680b74ab28571d7757fcd1a31c057ecbc27ec6d0f83c258988ea7a3fe46d5332ba6a14ef432ea9a5bc1e0947002583f172bbdebb00a949f07629e6a858f2fa8c291cf2d19ac0567ab4094d6a5e163a8d5480ba6ed0eb1749107f", 0xa9}], 0x6, &(0x7f0000001a40), 0x0, 0x2}}, {{0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000002bc0)="11983dafef07a41d3107f68b456c792484c3ee79b8c7287c8730a49ea2d77b22e41ecd18e8608c7ea480af6ec90ee93e5e71431bb7ed014a24628f20847b9a03c530f29e988ebdebe46d338696ebf90bfc67c10b8fdf656c06c2b0c6346fd03d0b5ec4f50d94df2efd08f94a22917bffba1b01620ae0e42d9baa168a0ea78cf134047b8288b285bbfbae59f45511376bec", 0x91}, {&(0x7f0000002c80)="63b41f8bfd6c6a4120c352c06f540e84c3734d161fc70dec33e176343b0eebfe0c9e91aa7e6287ada29bfc2b4ddc61a4fbe7229eb432b63ea5a0737d07f9789d48cac1dadca5ba7b89fb822ba751d79f889b1af3775a4dac0cb5b0790d4091701bef69df5d67e929d20d106b0d9a927cc4bdf4a8a53876c14b670f574b26c34eebab7382cb09c3ae95003b29f5173e3e0f9eba9154e8ed96", 0x98}, {&(0x7f0000002d40)="0f1d6c63f6a7222e1f914d77f118c533090b5533c01beb6c2f935e4d9a7e0c5a0f1770bceb51b424215b6e65ff9a522ad486bc5723dcba928fedc751a05d4e", 0x3f}, {&(0x7f0000002d80)="749f3545c18a6747891052582b386b67f4879c5c50d4aeac", 0x18}, {&(0x7f0000000040)="209d45b4865d4650356a62f720c98ef8a7b0cf37675c22ed766a3b9f92afdf9bd8902f52f84a6216d312e9cb958862ebd4204566c37f1cb17b69c057690ab977b73e3f51cc1686e0fdae057562060588536b6257a1cfc866cc2c9890b3963b7cd4c0a1b872b887963356", 0x6a}], 0x5}}, {{&(0x7f0000002f40)={0xa, 0x0, 0x0, @loopback}, 0x1c, &(0x7f00000032c0)=[{0x0}, {0x0}, {&(0x7f00000030c0)="c4ac64e906cd89460e5ffcf211c3c4a6d55d1c4d30999b8fd17f986b499e0209d8005f8865eb42c54d0a6fd6d8e2178ef1e3", 0x32}], 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="140000000000000029001600003400000000000000000000001400000000000000290000003e0000000005000000000000930a49ad1909b4c03045f456d7ed4c8151183dd0af347796de96f295b7f6fd854418516d40ad2a7bc385063cb1c5ea721519ada6be9dd4b5878dc73d59ebabde002de0544040a2780501b2f035142231537099172c51de67"], 0x30}}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f0000003580)="e6", 0x1}], 0xfd}}], 0x5, 0x400d000) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000180)) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_BSS(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x78, r5, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_STA_WME_MAX_SP={0x11, 0x2, "996954aa737b2aeb4893f3b699"}, @NL80211_STA_WME_MAX_SP={0x23, 0x2, "6e0a6cee061f0cad109c1e985b6eb5c0e3a8676d041d00dcfbe5c4276b9460"}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x1}}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0xf9}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x2}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x40}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x5}]}, 0x78}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 15:46:36 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000}) 15:46:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 108.615547][ T6553] SELinux: ebitmap: truncated map 15:46:36 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x100000000000019, &(0x7f0000000000)=0x5, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000140)) getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f0000000440)) socket(0x10, 0x80002, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r4 = gettid() tkill(r4, 0x3c) write$cgroup_pid(r3, &(0x7f0000000100)=r4, 0x12) r5 = socket$netlink(0x10, 0x3, 0xd) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8697071") sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x199}, 0x80000000002100) [ 108.643221][ T6553] SELinux: failed to load policy 15:46:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 108.710025][ T6564] SELinux: ebitmap: truncated map [ 108.724319][ T6564] SELinux: failed to load policy [ 108.742704][ T6553] SELinux: ebitmap: truncated map [ 108.748040][ T6553] SELinux: failed to load policy 15:46:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fdatasync(r6) socket$tipc(0x1e, 0x2, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) 15:46:36 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000200)='system_u:system_r:kernel_t:s0\x00', 0x1e) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) lseek(r4, 0xfffffffffffff800, 0x2) socket$inet(0x2, 0x6, 0x6a) ioctl$KDDELIO(r3, 0x4b35, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BLKBSZSET(r6, 0x40081271, &(0x7f0000000080)) 15:46:36 executing program 5: clone3(&(0x7f0000001240)={0xf0000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x96f60ba188302d1f, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x2}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004814}, 0x4014) INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes [ 110.134146][ T6600] cgroup1: Unknown subsys name 'perf_event' [ 110.140228][ T6600] cgroup1: Unknown subsys name 'net_cls' 15:46:38 executing program 4: sched_setattr(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x1c1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x42100, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, r0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x10, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, 0x0}, 0x2004c000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) getpid() r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x70, 0x0, 0x429cacbd) write$P9_RWALK(r1, &(0x7f0000000000)={0x30, 0x6f, 0x1, {0x3, [{0x10, 0x2, 0x7}, {0x20, 0x2, 0x1}, {0x4, 0x2, 0x6}]}}, 0x30) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_TP_METER(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x24) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) write$evdev(0xffffffffffffffff, &(0x7f0000057fa0)=[{}], 0x18) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 15:46:38 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r16, 0x3, r13, &(0x7f0000000280)={0x10000000}) 15:46:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fdatasync(r6) socket$tipc(0x1e, 0x2, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) 15:46:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)={0x0, r0}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80800) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x0) timer_create(0x0, 0x0, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[@ANYBLOB="0721deef00008000000000000000000003965f43c4a2fb6d50840620049dada720f897f650b0d13b730f001604aa6cf7f0c2208aee57ca1999dfc1743c7e7f8cf204341d459e4331e96e29e80f5e3d21559ddc574d8d2e4752ea0c2842c3a787004af1ba9aecfd7bb7bb912c15a2fbb240cbb20265515428529b23fe3048f89de8d61a51f58d4e"], 0x87) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r1, 0x10, 0x8003, 0x8020001) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000200)) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x81) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) fdatasync(0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280), 0x1033b) fdatasync(r5) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) fdatasync(r6) socket$tipc(0x1e, 0x2, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x15, 0x55f2ce6, 0x2, 0x0, 0x10, 0xffffffffffffffff, 0x1000, [], 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x3c) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r7, &(0x7f0000000280), 0x1033b) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) fdatasync(0xffffffffffffffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280), 0x1033b) 15:46:38 executing program 1: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x422200, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(r0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c80, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0xc) [ 111.037726][ T7004] SELinux: ebitmap: truncated map [ 111.043499][ T22] kauditd_printk_skb: 27 callbacks suppressed [ 111.043507][ T22] audit: type=1326 audit(1580485598.526:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 111.044165][ T7004] SELinux: failed to load policy 15:46:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) socket$packet(0x11, 0x0, 0x300) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) sendfile(r2, r3, 0x0, 0x280900) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') lseek(0xffffffffffffffff, 0x0, 0x2) r4 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x280900) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x4010) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pivot_root(0x0, &(0x7f0000000340)='./file0\x00') [ 111.051262][ T22] audit: type=1326 audit(1580485598.536:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 111.131351][ T22] audit: type=1326 audit(1580485598.596:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 111.155948][ T7011] SELinux: ebitmap: truncated map [ 111.167435][ T7011] SELinux: failed to load policy [ 111.168759][ T22] audit: type=1326 audit(1580485598.596:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 111.198029][ T22] audit: type=1326 audit(1580485598.596:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 111.208318][ T7004] SELinux: ebitmap: truncated map 15:46:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 111.238984][ T22] audit: type=1326 audit(1580485598.596:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7000 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 111.266438][ T22] audit: type=1326 audit(1580485598.746:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 111.299115][ T22] audit: type=1326 audit(1580485598.746:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000600), 0x0) writev(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000140)=ANY=[@ANYBLOB="0a65be5195ffcd4f"]) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) dup2(r4, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet6_opts(r5, 0x29, 0x39, 0x0, &(0x7f0000000040)) sendmsg$IPSET_CMD_DEL(r5, &(0x7f0000000680)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000780)={0x30, 0xa, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x30}}, 0x4000000) socket$packet(0x11, 0x2, 0x300) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x40000, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f0000000400), 0x0) 15:46:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 111.328328][ T22] audit: type=1326 audit(1580485598.746:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 111.356405][ T22] audit: type=1326 audit(1580485598.816:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7029 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:46:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:38 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000001c0)={0x1, {0x1, 0xd23f, 0xfffffffa, 0x4, 0x9, 0x20}}) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\a\x00\x00', @ANYRES16=r0, @ANYBLOB="2b0f0000000000000000110000000800120100000000"], 0x1c}}, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2800, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2c, r5, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}]}, 0x2c}}, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_PEER_GET(r7, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x108, r5, 0x0, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x40, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf7a8}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xb05}]}, @TIPC_NLA_BEARER={0x7c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff6a79}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1be5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100009}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4, 0x1, @dev={0xfe, 0x80, [], 0x1d}, 0x5}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8cf}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x20008801}, 0x20) 15:46:38 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) r15 = socket$unix(0x1, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) 15:46:38 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x38) vmsplice(r1, &(0x7f0000000140)=[{&(0x7f0000000080)="84a25ad80169306c86f60c4733bf0f67ef5f4ec4c5c242ff35d1b82f52a4df8a408e8eff7b7e274d3fe6c241b2fc51", 0x2f}], 0x1, 0x4) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x3, &(0x7f0000000100)=0x0) io_submit(r3, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fallocate(r0, 0x3, 0x0, 0x2000) ioctl$EXT4_IOC_MIGRATE(r0, 0x6628) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:39 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f7765726469723d69723dac2168fe14206ffc9d890a382e2f66696c6530"]) chdir(&(0x7f00000002c0)='./bus\x00') setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x73, 0x1, 0x5, "6716c4093bfd6d516ea7324110c914c9", "8fd719631012ff661e4d940f29b36e0efe899c55a784825d277cedcda5463c0b698b709d4496cb6c3230b46183cb65140f918a22b0f021672614db11adcbb7ebd27bba7f3477e286ec17d92dbdb0198963f16ec4938ba00bc87230971054"}, 0x73, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) dup(0xffffffffffffffff) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB='q'], 0x1) sendfile(r1, r0, 0x0, 0xa198) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80008000}) fchdir(0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x20940, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='q'], 0x1) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 111.520999][ T7058] SELinux: ebitmap: truncated map [ 111.526936][ T7058] SELinux: ebitmap: truncated map [ 111.539507][ T7058] SELinux: ebitmap: truncated map [ 111.546032][ T7059] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 446494720) [ 111.558750][ T7062] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 111.715941][ T7067] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 446494720) 15:46:39 executing program 1: unshare(0x600) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0x54a1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:39 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) r15 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r15, 0x0, r15) 15:46:39 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8800, &(0x7f0000000000)=ANY=[@ANYBLOB="f8e8fce35d92cb00"]) 15:46:39 executing program 1: sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x11020102}, 0xc, 0x0}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x111102, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f00000002c0)=""/215) pwritev(r2, &(0x7f00000000c0)=[{&(0x7f0000000080)="80fd01009341", 0x6}], 0x1000000000000006, 0x0) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 111.991622][ T7081] SELinux: ebitmap: truncated map [ 111.997173][ T7081] SELinux: ebitmap: truncated map [ 112.004160][ T7081] SELinux: ebitmap: truncated map 15:46:39 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) chmod(&(0x7f0000000000)='./file0\x00', 0x2) personality(0x5000004) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6c2e2f6275732c776f726b6469723d9c15d78e66696c653000000000000000005b0b3325851bd0d44efacf4dbd29adf1888e3526b5d71018bbdd0d1053dc70a70010426e14350d7d3953ce42547420be8d78b4c213643118f9b93949c79c11b40dec4189c1ebb4a3afb3e225abd2266d7160e6dfa8bb13e115dc1890c2bc3ace04f40f74371c3f1205638e15578f897298b2d625b68ea452c1459fb7d55509bf056a85027f022320bd745c915d32c00dcc406646354923f4"]) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @local}, &(0x7f0000000140)=0xc) r4 = socket(0xb, 0x4, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r5) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="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", @ANYRES32=r3, @ANYRES32, @ANYBLOB], 0x7}}, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @local}, &(0x7f0000000140)=0xc) r9 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="f0000000000000000000ffff7f000001000004d632000000e000000200000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000009d1dad858458064500000000000000000000000000000a0000fd9600000000000000e40006000000006400000000000000000000000000007fff0000000000000000000000004e2300004e2100000a03dba1af46d753db6e8886135f78a066e3059792b8fb225fdb7a6abee93d9b1b78e6fd20fcc6d9b8d116275807a4e7cfac1aef5420ca767a189c26a46ba92bd9a372e5254840830f1cc4dc04", @ANYRES32=r8, @ANYRES32, @ANYBLOB], 0x7}}, 0x0) r11 = socket$nl_xfrm(0x10, 0x3, 0x6) r12 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194) getsockopt$inet_pktinfo(r12, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @local}, &(0x7f0000000140)=0xc) r14 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r15) sendmsg$nl_xfrm(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r15, @ANYBLOB="f0000000000000000000ffff7f000001000004d632000000e000000200000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000009d1dad858458064500000000000000000000000000000a0000fd9600000000000000e40006000000006400000000000000000000000000007fff0000000000000000000000004e2300004e2100000a03dba1af46d753db6e8886135f78a066e3059792b8fb225fdb7a6abee93d9b1b78e6fd20fcc6d9b8d116275807a4e7cfac1aef5420ca767a189c26a46ba92bd9a372e5254840830f1cc4dc04", @ANYRES32=r13, @ANYRES32, @ANYBLOB], 0x7}}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./bus\x00', &(0x7f0000000380)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {}, [{0x2, 0x2, r0}, {0x2, 0x1, r5}, {0x2, 0x0, r0}, {0x2, 0x3, r10}, {0x2, 0xc203530f960c5078, r15}]}, 0x4c, 0x0) 15:46:39 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x94) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='affs\x00', 0x2082000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000880)='sysfs\x00', 0x0, 0x0) [ 112.094952][ T7095] overlayfs: unrecognized mount option "l./bus" or missing value [ 112.118143][ T7100] overlayfs: unrecognized mount option "l./bus" or missing value [ 112.197610][ T7108] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 112.240078][ T7121] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:46:39 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) socket$unix(0x1, 0x2, 0x0) 15:46:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r5, 0x4004556d, 0xd) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x7ffff000) 15:46:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b660100666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x26100, 0x0) sendmsg$IPSET_CMD_TEST(r1, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0x8c, 0xb, 0x6, 0x201, 0x0, 0x0, {0x3, 0x0, 0x9}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x1f}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x6}, @IPSET_ATTR_ADT={0x68, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x5}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x2}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e23}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @dev={0xfe, 0x80, [], 0x29}}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x1ff}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0x7}}]}]}, 0x8c}}, 0x20000000) fchdir(r0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x80000000}) write$cgroup_int(r2, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) 15:46:39 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) chmod(&(0x7f0000000000)='./file0\x00', 0x2) personality(0x5000004) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000480)="ae17c373bb47424e2231db2e30253f601fd488660735a3480e1d8ba8777b116e6c8995e83ed70900000000000000ee131da2137f3e7013ae547ca6bc2f5c4e0e49e3a55b7cbbc8e5795f251572394dd6c70b23d6469a3e03dad96fcd84d4c2f7aab40ea31c2c35532214df7c914aa29e5d812275db7d9205db7bf99af1b39fa92282c9eedf1e5ffdc476bd2356dc3ae0361c4e5961de6b12b545085210b6d59b1228bffdf80ec780ee97ce3b753958bdb10b457424e65e61b6787c2da2df961c5b8df7c3268473d7fb78d427a87f73bef1560e086d15", 0xd6}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) socket$key(0xf, 0x3, 0x2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000004c00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000006e40)=[{0x10, 0x29}], 0x10}}], 0x2, 0x0) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, 0x0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f00000003c0)=""/160) pipe(0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320c) bind$unix(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r5 = socket(0x11, 0x0, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r6 = socket$can_raw(0x1d, 0x3, 0x1) bind(r6, 0x0, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000140)) socket(0x10, 0x0, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB='0', @ANYRES32, @ANYBLOB="f9", @ANYRES32, @ANYBLOB='\b\x00\n\x00', @ANYRES32=0x0], 0x6}}, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 112.373759][ T7135] SELinux: ebitmap: truncated map 15:46:39 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFQNL_MSG_VERDICT_BATCH(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x7c, 0x3, 0x3, 0x0, 0x0, 0x0, {0x0, 0x0, 0xa}, [@NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x20}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x6}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x101}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0xfffffff8}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x5}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x9}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0x7}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x8}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x4}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0x100}}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x41) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = socket$inet6(0x10, 0x400000000000002, 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000700)='security.selinux\x00', &(0x7f0000000740)='/sbin/dhclient\x00', 0xfd03, 0x0) 15:46:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 112.399719][ T7137] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 112.420531][ T7135] SELinux: ebitmap: truncated map [ 112.441065][ T7135] SELinux: ebitmap: truncated map 15:46:39 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) chmod(&(0x7f0000000000)='./file0\x00', 0x2) personality(0x5000004) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) 15:46:40 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)=0x0) io_submit(r14, 0x4, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000), 0x40000}]) 15:46:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000840)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000480)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="2400001400000000000018000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x28}}], 0x2, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff0000b28b749300000000f89c1aa51b69cad51e55e96accc446d428f7de16449f90050b48692ec2223deef4370735ac0751051b008834e210e6850792d5d1d1de443393f953879769685f1c9828a80f21b01f2ed41aa4f8894a0bb1d565bd9048fa405dcbbbfab7c8aeb626"], 0x38) r2 = syz_open_dev$usbfs(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x1000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000100)={{0x1, 0x0, @identifier="77cfff7c0dd0a997080feca21a38f93c"}}) fcntl$setpipe(r1, 0x407, 0x10000) [ 112.518591][ T7164] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) [ 112.563197][ T7173] SELinux: ebitmap: truncated map [ 112.572014][ T7173] SELinux: ebitmap: truncated map [ 112.580116][ T7175] SELinux: ebitmap: truncated map [ 112.586985][ T7173] SELinux: ebitmap: truncated map [ 112.596844][ T7175] SELinux: ebitmap: truncated map 15:46:40 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @mss={0x2, 0x9e}], 0x3) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000002c0000002c00000002000000e4b0b07966000000000100000d0300000000000000030000000000003d05d6c00d00000000000000000000000202"], &(0x7f0000003580)=""/4096, 0x46, 0x1000, 0x1041}, 0x20) write(r0, &(0x7f0000000000)="3a34523b3c528e8f0c7502566b3320cb477e6e9c06d6e177995a27b22b26be6dec067d23a84efc0c47890d060348f11436", 0x31) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) 15:46:40 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) chmod(&(0x7f0000000000)='./file0\x00', 0x2) personality(0x5000004) [ 112.709198][ T6600] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 112.718569][ T6600] FAT-fs (loop4): Filesystem has been set read-only [ 112.734858][ T7191] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:46:40 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) io_setup(0x40000000008, &(0x7f0000000240)) 15:46:40 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10, 0x80000) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xb, 0x172, r2, 0x0) llistxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000580)=""/104, 0x68) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_open_dev$ttys(0xc, 0x2, 0x1) pipe2(&(0x7f0000000600), 0x800) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000640)={0x0, 0x1, 0x8, 0x3, 0x105, &(0x7f0000000180)="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"}) mremap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000003000/0x3000)=nil) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000000)) 15:46:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2808}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r3, &(0x7f0000000340)="556c133537389541fb27ab1b131c0d5f05076645488cc9c07c0d8188ef7bff52bf8226f1f80e089b6fd789f774d359b905abbac1219e7a8b4fb5de60d0dd5a4d93c3ff23dff8493fae85682059614641b08668eda3d88fce21b2e6588a9d82e350b9a9601c99bab327e5b59308af75fc1133058e7f551efd321a77fbcb71f7595a30c3d7e81e64352cc043c2558ea2d8a5b1f45c70b30157c675c994d2cd6f500aef783a2ae1690b3d8c4b457443bfaad74b5cffb67a2aa28bb81f4e8b99d6c2bb207b16624dc19cd335706a346a2707dd3391b3c18df8b397e76b7fb2d4ed5e2efb32998d5d7701f5b9321f46781f", 0xef, 0x10000, &(0x7f00000000c0)={0x2, 0x4e22, @remote}, 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x500c0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r6) getsockopt$CAN_RAW_JOIN_FILTERS(r6, 0x65, 0x6, &(0x7f0000000140), &(0x7f0000000240)=0x4) r7 = socket(0x10, 0x803, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000280), &(0x7f0000000440)=0x4) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000010000d0400"/20, @ANYRES32, @ANYBLOB="00000000000000001800120008000100767469000c00020008000400", @ANYRES32, @ANYBLOB="14000400677265df5b3ec9000000000000000000"], 0x4c}}, 0x0) 15:46:40 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r3, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r6}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r6, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r7, 0x28, &(0x7f0000000180)}, 0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = fcntl$dupfd(r1, 0x0, r8) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) write$tun(r0, &(0x7f0000000040)={@void, @val={0x0, 0x0, 0x505}, @mpls={[], @ipv4=@generic={{0x5, 0x4, 0x0, 0x0, 0xfde5, 0x0, 0x0, 0x0, 0x84, 0x0, @loopback, @empty}, "919de81e6d27a81b30e714120e95ba22"}}}, 0xfdef) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) socket$unix(0x1, 0x2, 0x0) 15:46:40 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) chmod(&(0x7f0000000000)='./file0\x00', 0x2) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) socket$unix(0x1, 0x2, 0x0) [ 113.227577][ T7210] SELinux: ebitmap: truncated map [ 113.239659][ T7210] sel_write_load: 17 callbacks suppressed [ 113.239661][ T7210] SELinux: failed to load policy [ 113.252850][ T7213] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 113.255330][ T7210] SELinux: ebitmap: truncated map [ 113.266795][ T7210] SELinux: failed to load policy 15:46:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000) socket$packet(0x11, 0x0, 0x300) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) sendfile(r3, r4, 0x0, 0x280900) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') lseek(0xffffffffffffffff, 0x0, 0x2) r5 = open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) r6 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x800) lseek(0xffffffffffffffff, 0x0, 0x2) r7 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x280900) r8 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r8, 0x800) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x4010) open(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000000001000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000906995df4557769ca4c4e09bc97950d0c92d1c153e2a9102a4c5f0da712314431253c456d2769b4d8998196611ec0c2cd00b7b1f204f97136a9d72e72d9be546b9b7c413637c8f25f3084bc4dcb7109e464c1ad425974b9029a862e9431565c364e197311b5f45ab96654fac4a16684abf3f1b4e80a642f796533372ced176507a2f2434148f061a16e1b6886b"]}}, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x8000, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe2(&(0x7f00000001c0), 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='./file0\x00') [ 113.269851][ T7212] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 113.288270][ T7216] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 113.292039][ T7210] SELinux: ebitmap: truncated map [ 113.304140][ T7222] netlink: 'syz-executor.5': attribute type 4 has an invalid length. [ 113.314661][ T7210] SELinux: failed to load policy 15:46:40 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) socket$unix(0x1, 0x2, 0x0) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) socket$unix(0x1, 0x2, 0x0) 15:46:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) socket$unix(0x1, 0x2, 0x0) 15:46:40 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x3, 0x11, [], 0x4, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f0000000100)=""/17}, &(0x7f0000000200)=0x78) 15:46:40 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 113.401765][ T7235] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:46:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, &(0x7f00000001c0)}) socket$unix(0x1, 0x2, 0x0) [ 113.487159][ T7250] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 113.500827][ T7253] SELinux: ebitmap: truncated map [ 113.514117][ T7253] SELinux: failed to load policy [ 113.526545][ T7253] SELinux: ebitmap: truncated map 15:46:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) ftruncate(r0, 0x400) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x2, 0x0) memfd_create(&(0x7f0000000280)='batadv_slave_1\x00', 0x7) r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r3, 0x400, 0x0, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0xb8, r3, 0x1, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd2b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x78, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x12}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x29}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv_slave_1\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xc96}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20008000}, 0x8001) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x1a, 0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000100)) [ 113.537646][ T7253] SELinux: failed to load policy [ 113.567514][ T7253] SELinux: ebitmap: truncated map [ 113.578211][ T7253] SELinux: failed to load policy 15:46:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:41 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:41 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) [ 113.797114][ T7278] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:46:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') read$FUSE(r0, &(0x7f0000000280), 0xfffffed3) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvfrom$inet6(r2, &(0x7f0000001280)=""/4096, 0x1000, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x4, @mcast2, 0x2}, 0x1c) 15:46:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:41 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) getresuid(&(0x7f0000004180), 0x0, 0x0) 15:46:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) utimensat(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={{0x77359400}}, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x6, 0x0, 0x0, 0x3, 0x0, 0x0, 0x54b, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x4e2c, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, 0x0, 0x0) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) dup3(0xffffffffffffffff, r9, 0x80000) r10 = socket$unix(0x1, 0x2, 0x0) r11 = fcntl$dupfd(r10, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) accept4(r11, &(0x7f00000000c0)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x800) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r12 = socket$unix(0x1, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@dev}}, {{@in=@empty}}}, &(0x7f0000000180)=0xfffffe97) r14 = perf_event_open(&(0x7f0000000700)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, r14, 0x0) open(&(0x7f0000000300)='.\x00', 0x55bb82, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) socket(0x0, 0x2, 0x0) setregid(0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000200)}, 0x20) 15:46:41 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:41 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) 15:46:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:41 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 114.254596][ T7297] SELinux: ebitmap: truncated map [ 114.266265][ T7297] SELinux: failed to load policy [ 114.272331][ T7297] SELinux: ebitmap: truncated map [ 114.278263][ T7297] SELinux: failed to load policy [ 114.285736][ T7297] SELinux: ebitmap: truncated map [ 114.290736][ T7300] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 114.294762][ T7297] SELinux: failed to load policy 15:46:41 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) r12 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r13 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r13, 0x0, 0x0, 0x8020001) ftruncate(r12, 0x8200) 15:46:41 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x6c) 15:46:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$unix(0x1, 0x2, 0x0) 15:46:41 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 114.414022][ T7313] SELinux: ebitmap: truncated map [ 114.419262][ T7313] SELinux: failed to load policy [ 114.467646][ T7334] SELinux: ebitmap: truncated map [ 114.476974][ T7334] SELinux: ebitmap: truncated map [ 114.484547][ T7334] SELinux: ebitmap: truncated map 15:46:42 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) creat(&(0x7f0000000140)='./bus\x00', 0x0) r12 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r12, 0x0, 0x0, 0x8020001) 15:46:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:42 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x800400, &(0x7f00000002c0)={[{@xino_off='xino=off'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}, {@default_permissions='default_permissions'}, {@metacopy_off='metacopy=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@obj_user={'obj_user', 0x3d, 'keyring'}}, {@smackfsroot={'smackfsroot', 0x3d, 'wlan0@self.bdev#!'}}, {@fowner_eq={'fowner', 0x3d, r2}}]}) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)={[], [{@context={'context', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'root'}}]}) 15:46:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$TIOCEXCL(r0, 0x540c) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) socket(0x10, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r3, 0x406, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$netlink(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x20}, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = gettid() r7 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) sendmsg$netlink(r5, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r8}}}], 0x20}, 0x0) r9 = socket(0x10, 0x2, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$netlink(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r11, 0x0, r10}}}], 0x20}, 0x0) r12 = socket(0x10, 0xa, 0x0) gettid() r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0) sendmsg$netlink(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)}, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x2, 0x0) gettid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getgroups(0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {0x20, 'cgroupsystem]vboxnet0\xb1procselinuxsystem)wlan1em0'}, {0x20, 'sit\x00'}, {0x20, ':&,'}, {0x20, 'sit\x00'}], 0xa, "224940f52d2ce92d7934dde2b9e6695d5d9a10593d24a720bd72b990a65296c1d1524bc0e820b6164c03fd6267c7713f4940a8115c9948f9"}, 0x84) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x1c500) [ 115.108734][ T7356] SELinux: ebitmap: truncated map [ 115.115284][ T7356] SELinux: ebitmap: truncated map [ 115.122768][ T7361] overlayfs: unrecognized mount option "obj_user=keyring" or missing value [ 115.132712][ T7356] SELinux: ebitmap: truncated map [ 115.138138][ T7361] SELinux: duplicate or incompatible mount options 15:46:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:42 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) creat(&(0x7f0000000140)='./bus\x00', 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x0) 15:46:42 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4(r3, &(0x7f00000000c0)=@ax25={{0x3, @null}, [@null, @default, @null, @default, @netrom, @bcast, @remote, @bcast]}, &(0x7f0000000040)=0x80, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="8c0000002bba3d5d36050d4267456a0ebbda31ae013e0683df09c6828dad442b9e0c7670987edbcfb9071f59a2d66fbdaf7db16e1965c1e7fea6b0179db38794a6c362ff4d048480bb87b13d0575f6a8429af34bb57e850a17af583734a5be81c6b08725fd90dc8d941e1a6cef23581cb6928ee12fd7949533c388264ee7435eb5f8b80abfb046521b1bcc292fed97d4", @ANYRES16=r5, @ANYBLOB="000425bd7000ffdbdf250300000008000600d30000001c000380060007004e200000060007004e230000060004000700000008000600060000004c00028014000100ac14143600000000000000000000000008000500e60000001400010000000000000000000000000000000000060002004e210000080003000300000006000f0031250000"], 0x8c}, 0x1, 0x0, 0x0, 0x40004}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300), 0x4) r7 = syz_open_dev$loop(&(0x7f0000000700)='/dev/loop#\x00', 0x2, 0x40000) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000740)={0x0, r3, 0x8000, 0x6, 0x751, 0x4}) r8 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f00000006c0)={0xb4, 0x0, &(0x7f0000000540)=[@decrefs={0x40046307, 0x3}, @enter_looper, @reply={0x40406301, {0x3, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)={@fd, @fd={0x66642a85, 0x0, r6}, @flat=@weak_binder={0x77622a85, 0x100, 0x1}}, &(0x7f0000000240)={0x0, 0x18, 0x30}}}, @acquire_done={0x40106309, 0x3}, @enter_looper, @reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000480)={@flat=@binder={0x73622a85, 0x0, 0x2}, @fda={0x66646185, 0xa, 0x0, 0x2}, @fd={0x66642a85, 0x0, r8}}, &(0x7f0000000500)={0x0, 0x18, 0x38}}}, @release={0x40046306, 0x3}], 0xbd, 0x0, &(0x7f0000000600)="9265bace4b80c7395ee620458cc03977847b9818688eca3167cdcd67842bd510eca2e2413179d7d00e698cd611b737bf91721d6cdcba707d61da9f5ebdff3b88b28b453f8e044f939b14c94635457686e6bb7646877a8f6b0330e93aa5622b917e66858b3dca84a53ba94141794c7c85740527bcc0ac8642b79eb1747688646f969ac5170f22f992b0cd51b95e36e943a5f4fe9357ce748b0dca0dbc00703351e5bc752791f78820e8295049449653dd13bddca47f62db403caf6cb6ca"}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x2e, &(0x7f0000000080), 0x20a15ab6) 15:46:42 executing program 1: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 115.152454][ T7361] overlayfs: unrecognized mount option "obj_user=keyring" or missing value [ 115.158909][ T7357] selinux_nlmsg_perm: 52 callbacks suppressed [ 115.159755][ T7357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7357 comm=syz-executor.4 [ 115.162875][ T7365] SELinux: duplicate or incompatible mount options 15:46:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$unix(0x1, 0x2, 0x0) 15:46:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x40000000000}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000001400), 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x8000, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa]}, 0x3c) unshare(0x40000000) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000200), &(0x7f0000000240)=0x4) r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(0xffffffffffffffff) recvmsg$can_raw(r1, &(0x7f0000002780)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000300)=""/225, 0xe1}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/34, 0x22}, {&(0x7f0000000400)=""/252, 0xfc}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000000500)=""/98, 0x62}], 0x6, &(0x7f0000000600)=""/246, 0xf6}, 0x20000001) fdatasync(r2) dup3(r0, 0xffffffffffffffff, 0xc0000) mount(&(0x7f00000027c0)=ANY=[@ANYBLOB="804115e091490002ecaacd3abcbb0ff2e438dc170ce7b7914cf6eb6d85539973144ff5ffa830832b919045967ede240df0556dbf9155394c031f265e9981c14a7474d88c8a534dc509c9769f5b86088e3c11cf4bacbd0420d0509437e0b311e3ddbac5a1ff5ccefc89cc514097c36b9c97661de0fd98f9a5ad0a9629c9a87db1d98fad1f"], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x1000, 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000140)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 115.241499][ T7376] SELinux: ebitmap: truncated map [ 115.248134][ T7376] SELinux: ebitmap: truncated map [ 115.256958][ T7376] SELinux: ebitmap: truncated map 15:46:42 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) creat(&(0x7f0000000140)='./bus\x00', 0x0) 15:46:42 executing program 1: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:42 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 115.377314][ T7405] SELinux: ebitmap: truncated map [ 115.385874][ T7405] SELinux: ebitmap: truncated map [ 115.396775][ T7405] SELinux: ebitmap: truncated map 15:46:42 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) r11 = socket(0x1e, 0x800, 0x1) ioctl$SIOCGSTAMPNS(r11, 0x8907, &(0x7f0000000300)) [ 115.511409][ T7417] SELinux: ebitmap: truncated map [ 115.519883][ T7417] SELinux: ebitmap: truncated map [ 115.527548][ T7417] SELinux: ebitmap: truncated map [ 115.762412][ T7427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7427 comm=syz-executor.4 15:46:43 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 1: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) socket(0x1e, 0x800, 0x1) 15:46:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$TIOCEXCL(r0, 0x540c) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) socket(0x10, 0x0, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r3, 0x406, r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$netlink(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x20}, 0x0) r5 = socket(0x10, 0x2, 0x0) r6 = gettid() r7 = socket(0x0, 0x0, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) sendmsg$netlink(r5, &(0x7f0000000300)={0x0, 0xffffffffffffff6d, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r8}}}], 0x20}, 0x0) r9 = socket(0x10, 0x2, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$netlink(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r11, 0x0, r10}}}], 0x20}, 0x0) r12 = socket(0x10, 0xa, 0x0) gettid() r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, 0x0, 0x0) sendmsg$netlink(r12, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000006c0)={0x10}, 0x10}], 0x1, &(0x7f00000001c0)}, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x2, 0x0) gettid() lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getgroups(0x0, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {0x20, 'cgroupsystem]vboxnet0\xb1procselinuxsystem)wlan1em0'}, {0x20, 'sit\x00'}, {0x20, ':&,'}, {0x20, 'sit\x00'}], 0xa, "224940f52d2ce92d7934dde2b9e6695d5d9a10593d24a720bd72b990a65296c1d1524bc0e820b6164c03fd6267c7713f4940a8115c9948f9"}, 0x84) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) 15:46:43 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 1: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 115.849521][ T7357] syz-executor.4 (7357) used greatest stack depth: 19288 bytes left [ 115.868973][ T7436] SELinux: ebitmap: truncated map [ 115.879759][ T7436] SELinux: ebitmap: truncated map [ 115.890480][ T7436] SELinux: ebitmap: truncated map [ 115.918274][ T7446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=7446 comm=syz-executor.4 15:46:43 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) socket$key(0xf, 0x3, 0x2) 15:46:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket$unix(0x1, 0x2, 0x0) 15:46:43 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r0 = creat(0x0, 0x10) setresuid(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000402) socket$inet6(0xa, 0x400000000803, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x6e5008989ef5ad49}, 0x4000) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x58, 0x2, 0x2, 0x3, 0x0, 0x0, {0x5, 0x0, 0x7}, [@CTA_EXPECT_MASK={0x44, 0x3, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000ec0)="ce030f00001300000000000000005c22020000000000004e99b512ec6c6dbd024000009e975050d8fc03240c3b12de1b838b33dd925d5f917c28d7e1", 0x3c, 0x0, 0x0, 0x0) [ 116.198304][ T7470] SELinux: ebitmap: truncated map [ 116.210727][ T7470] SELinux: ebitmap: truncated map [ 116.220752][ T22] kauditd_printk_skb: 57 callbacks suppressed 15:46:43 executing program 5: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 116.220760][ T22] audit: type=1326 audit(1580485603.706:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7472 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x0 [ 116.256653][ T7470] SELinux: ebitmap: truncated map 15:46:43 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) r10 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r10, 0x0) 15:46:43 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 116.404291][ T7497] SELinux: ebitmap: truncated map [ 116.422521][ T7497] SELinux: ebitmap: truncated map [ 116.438904][ T7497] SELinux: ebitmap: truncated map 15:46:43 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="0605000000000000071800000002049007000700000000000000ff03000000000000e200c20400000fff0502000104c806c67a0000002000"], 0x38) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) write(r0, &(0x7f00000000c0)="f70b9378", 0x554) socket$inet6(0xa, 0x5, 0x5) 15:46:43 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) [ 116.471667][ T7446] syz-executor.4 (7446) used greatest stack depth: 18968 bytes left 15:46:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80400, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0xb}}, {@mode={'mode', 0x3d, 0x40}}], [{@smackfsdef={'smackfsdef', 0x3d, 'devpts\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', 0xee01}}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, '@&}[^'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@subj_user={'subj_user', 0x3d, ')\xeacpuset'}}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x80, 0x0) mmap$usbfs(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x50, r0, 0xae) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='devpts\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 116.614292][ T7533] SELinux: ebitmap: truncated map [ 116.620450][ T7533] SELinux: ebitmap: truncated map [ 116.627924][ T7533] SELinux: ebitmap: truncated map 15:46:44 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:44 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) fcntl$setstatus(r0, 0x4, 0x44000) 15:46:44 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x0, 0x0) 15:46:44 executing program 4: r0 = eventfd(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f0000000040)=[{r2}, {r0, 0x4}], 0x2, 0x3f) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="ac01c5c096dd4787d9", 0x9}], 0x1) 15:46:44 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000f2030057088107dd14a6c3b9984688c17e940000000000000000fa9555a7b1f89f03da4de4eeadca9d78ca020fc8c4dc87e7750205bcef33b65818d108d02252bcddf3de19741c743ec57225f3fb0f4a7f4014d9f41a0ac8a37e925ab33e48291b91ef1f4aa76f52afcf8e0df19918b217a1a5c41bd0a79c5fdbdb19a9311cf38e3b50e8e350b8b30005a529d7126afd1e57adb99ccc29f077bc00ff0309f530dbf3152b9501905b074583e6c216e5eac7b85e935727c90f8696a4560b77eb2a3f68b0bab6f0ad2caccbfff8296fd153d2c40caa"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1, &(0x7f0000000000)=[{}]}, 0x10) 15:46:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1291, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000600), 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f0000000140)='=', 0x1}], 0x1) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x1, 0xff, 0x1ff}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001000010029bd7000000d000000000000", @ANYRES32=0x0, @ANYBLOB="9308040029920000"], 0x20}}, 0x4008001) fsetxattr$security_ima(r3, &(0x7f0000000280)='security.ima\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="03000d0000000200d6185e083ff4f5cc60df1bc3b1545df62cdffcd94e8dc835e61dde295ad328aa5d41655661b1fdc77345a5942e12f33e1759093ade79f9f0e969edbd765982ce00cf6b2b8c7f7d360c16438f7ad995fee6ddd93310ab9b1aaf67318bdda43d938daeb870195fee80b1cb7a65c6a9de77f1afb790a6c02513e207e1d927500eb8f0feff09f11970c5d17c10553ce55a4038bd9177c3032caec26005717ca8f7635301cac756dbc3d6b33d8de1a3dd8f629fbf6c855f57a5633aa38021631575aea72b263b2e542fd3a0e5d5f4d1c279cbfad931c8c0aa42"], 0xdf, 0x1) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80000000) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NLBL_UNLABEL_C_LIST(r5, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x64, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth0_to_bond\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_team\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_1\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x44}, 0x0) r6 = inotify_init() inotify_add_watch(r6, &(0x7f00000000c0)='./file0\x00', 0x80000000) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x1c500) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000400)='syz1\x00') creat(&(0x7f0000000240)='./file0\x00', 0x28) [ 117.036967][ T7544] SELinux: ebitmap: truncated map [ 117.045896][ T7544] SELinux: ebitmap: truncated map [ 117.058713][ T22] audit: type=1326 audit(1580485604.536:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:46:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="b4cdf8f6a155d0fced9f782c08710500000000000061105200000000000500f200000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/4096, 0x1000, 0x2102, &(0x7f00000010c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 15:46:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x0, 0x0) [ 117.093888][ T22] audit: type=1326 audit(1580485604.576:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 117.103503][ T7544] SELinux: ebitmap: truncated map 15:46:44 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x406, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r9, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) ppoll(&(0x7f0000000340)=[{r3, 0x10}, {0xffffffffffffffff, 0x155}, {r0, 0x94}, {r4, 0x8}, {r1, 0x60c}, {r6, 0x8021}, {r2, 0x1}, {r1, 0x20}, {r8, 0x100}, {r9, 0x3}], 0xa, &(0x7f00000003c0), &(0x7f0000000400)={[0x100]}, 0x8) [ 117.119911][ T22] audit: type=1326 audit(1580485604.576:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 117.150096][ T22] audit: type=1326 audit(1580485604.576:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:44 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:44 executing program 5: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 117.175527][ T22] audit: type=1326 audit(1580485604.576:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 117.201053][ T22] audit: type=1326 audit(1580485604.576:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7548 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:44 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000000)="0201a6ffffff00090000ff07000080ffffffbfffffff0000000100000001000100ff81000004800000000a0000000005000042000000000000000000000055aa", 0x40, 0x1c0}]) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040)) [ 117.281282][ T22] audit: type=1326 audit(1580485604.766:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7569 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 117.295988][ T7576] SELinux: ebitmap: truncated map 15:46:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x0, 0x0) 15:46:44 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 117.318517][ T22] audit: type=1326 audit(1580485604.796:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7569 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 117.335773][ T7576] SELinux: ebitmap: truncated map [ 117.346145][ T22] audit: type=1326 audit(1580485604.796:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7569 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 117.359702][ T7576] SELinux: ebitmap: truncated map 15:46:44 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:44 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:44 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 117.425225][ T7591] SELinux: ebitmap: truncated map [ 117.431627][ T7591] SELinux: ebitmap: truncated map [ 117.470621][ T7591] SELinux: ebitmap: truncated map [ 117.494013][ T7592] loop3: p1 p2 p3 [ 117.509469][ T7592] loop3: p1 start 2304 is beyond EOD, truncated [ 117.516489][ T7592] loop3: p2 start 16777216 is beyond EOD, truncated [ 117.519652][ T7608] FAULT_INJECTION: forcing a failure. [ 117.519652][ T7608] name failslab, interval 1, probability 0, space 0, times 1 [ 117.524164][ T7592] loop3: p3 start 128 is beyond EOD, truncated 15:46:45 executing program 4: ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) clone(0x30aa2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:46:45 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) [ 117.539392][ T7608] CPU: 0 PID: 7608 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 117.552001][ T7608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.562106][ T7608] Call Trace: [ 117.565424][ T7608] dump_stack+0x1b0/0x228 [ 117.569744][ T7608] ? devkmsg_release+0x127/0x127 [ 117.574682][ T7608] ? show_regs_print_info+0x18/0x18 [ 117.579888][ T7608] ? audit_log_end+0x1c6/0x230 [ 117.584629][ T7608] ? __kasan_slab_free+0x1e2/0x220 [ 117.589720][ T7608] ? __kasan_slab_free+0x168/0x220 [ 117.594871][ T7608] should_fail+0x6fb/0x860 [ 117.599275][ T7608] ? setup_fault_attr+0x2b0/0x2b0 [ 117.604278][ T7608] ? audit_filter+0xeb9/0xf20 [ 117.608946][ T7608] __should_failslab+0x11a/0x160 [ 117.613936][ T7608] ? audit_log_start+0x475/0x9a0 [ 117.618859][ T7608] should_failslab+0x9/0x20 [ 117.623348][ T7608] kmem_cache_alloc+0x37/0x2b0 [ 117.628099][ T7608] audit_log_start+0x475/0x9a0 [ 117.632851][ T7608] ? audit_serial+0x30/0x30 [ 117.637338][ T7608] ? kstrtoull+0x3c4/0x4e0 [ 117.641734][ T7608] ? kstrtouint_from_user+0x1cb/0x230 [ 117.647095][ T7608] ? kstrtol_from_user+0x180/0x180 [ 117.652199][ T7608] ? __rcu_read_lock+0x50/0x50 [ 117.656943][ T7608] audit_seccomp+0x62/0x180 [ 117.661430][ T7608] __seccomp_filter+0xd15/0x1890 [ 117.666470][ T7608] ? proc_fail_nth_read+0x1c0/0x1c0 [ 117.671651][ T7608] ? __secure_computing+0x240/0x240 [ 117.676831][ T7608] ? expand_files+0xd1/0x970 [ 117.681399][ T7608] ? memset+0x31/0x40 [ 117.685362][ T7608] ? fsnotify+0x1390/0x1450 [ 117.689854][ T7608] ? __kernel_write+0x350/0x350 [ 117.694728][ T7608] ? avc_policy_seqno+0x1b/0x70 [ 117.699571][ T7608] ? __fsnotify_parent+0x300/0x300 [ 117.704672][ T7608] ? security_file_permission+0x157/0x350 [ 117.710382][ T7608] ? rw_verify_area+0x1c2/0x360 [ 117.715213][ T7608] __secure_computing+0x1c6/0x240 [ 117.720222][ T7608] syscall_trace_enter+0x596/0xa90 [ 117.725541][ T7608] ? switch_fpu_return+0x10/0x10 [ 117.730478][ T7608] ? do_syscall_64+0x100/0x100 [ 117.735661][ T7608] ? syscall_return_slowpath+0x6f/0x500 [ 117.741544][ T7608] do_syscall_64+0x6b/0x100 [ 117.746041][ T7608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.752264][ T7608] RIP: 0033:0x45b349 [ 117.756331][ T7608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 117.776543][ T7608] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 117.784948][ T7608] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 15:46:45 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:45 executing program 2 (fault-call:4 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 117.793254][ T7608] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 117.801906][ T7608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 117.809952][ T7608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 117.818317][ T7608] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000000 15:46:45 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 15:46:45 executing program 4: socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_tcp_buf(r4, 0x6, 0x1a, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) getpid() ptrace(0xffffffffffffffff, 0x0) sendto$inet(r4, &(0x7f00000000c0)="c51548ad6cb9305f14520f2b9b9ef8df697f1bba059fcc86edd26bd37b5c7d07d8ecbf3408e8d2466d56edc515e172", 0x2f, 0x1, &(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x1}, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x4) getpgid(0x0) ptrace$getregset(0x4204, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) waitid(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000002c0)='#', 0x1, 0x40001, &(0x7f0000000240)={0xa, 0x4e22, 0x6, @loopback, 0x3}, 0x1c) poll(&(0x7f0000000040)=[{r1}], 0x1, 0xef) close(r1) [ 117.874660][ T7618] SELinux: ebitmap: truncated map [ 117.881535][ T7618] SELinux: ebitmap: truncated map [ 117.881990][ T7621] FAULT_INJECTION: forcing a failure. [ 117.881990][ T7621] name failslab, interval 1, probability 0, space 0, times 0 [ 117.899641][ T7621] CPU: 1 PID: 7621 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 117.909884][ T7621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.920552][ T7621] Call Trace: [ 117.923858][ T7621] dump_stack+0x1b0/0x228 [ 117.928183][ T7621] ? devkmsg_release+0x127/0x127 [ 117.933108][ T7621] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.939161][ T7621] ? show_regs_print_info+0x18/0x18 [ 117.944339][ T7621] ? syscall_trace_enter+0x596/0xa90 [ 117.949638][ T7621] should_fail+0x6fb/0x860 [ 117.954054][ T7621] ? setup_fault_attr+0x2b0/0x2b0 [ 117.959071][ T7621] ? __seccomp_filter+0xd15/0x1890 [ 117.964173][ T7621] ? __secure_computing+0x1c6/0x240 [ 117.969409][ T7621] ? syscall_trace_enter+0x596/0xa90 [ 117.974678][ T7621] ? should_fail+0x182/0x860 [ 117.979250][ T7621] ? ptr_to_hashval+0x90/0x90 [ 117.983908][ T7621] __should_failslab+0x11a/0x160 [ 117.988829][ T7621] ? __alloc_skb+0xbc/0x540 [ 117.993373][ T7621] should_failslab+0x9/0x20 [ 117.997862][ T7621] kmem_cache_alloc+0x37/0x2b0 [ 118.002617][ T7621] __alloc_skb+0xbc/0x540 [ 118.007034][ T7621] ? kmem_cache_alloc+0x120/0x2b0 [ 118.012059][ T7621] audit_log_start+0x4a1/0x9a0 [ 118.016811][ T7621] ? audit_serial+0x30/0x30 [ 118.021304][ T7621] ? kstrtoull+0x3c4/0x4e0 [ 118.025717][ T7621] ? kstrtouint_from_user+0x1cb/0x230 [ 118.031080][ T7621] ? kstrtol_from_user+0x180/0x180 [ 118.036173][ T7621] ? __rcu_read_lock+0x50/0x50 [ 118.041110][ T7621] audit_seccomp+0x62/0x180 [ 118.045634][ T7621] __seccomp_filter+0xd15/0x1890 [ 118.050573][ T7621] ? proc_fail_nth_read+0x1c0/0x1c0 [ 118.056026][ T7621] ? __secure_computing+0x240/0x240 [ 118.061467][ T7621] ? expand_files+0xd1/0x970 [ 118.066036][ T7621] ? memset+0x31/0x40 [ 118.070005][ T7621] ? fsnotify+0x1390/0x1450 [ 118.074656][ T7621] ? __kernel_write+0x350/0x350 [ 118.079490][ T7621] ? avc_policy_seqno+0x1b/0x70 [ 118.084325][ T7621] ? __fsnotify_parent+0x300/0x300 [ 118.089833][ T7621] ? security_file_permission+0x157/0x350 [ 118.095603][ T7621] ? rw_verify_area+0x1c2/0x360 [ 118.100556][ T7621] __secure_computing+0x1c6/0x240 [ 118.105593][ T7621] syscall_trace_enter+0x596/0xa90 [ 118.110740][ T7621] ? do_syscall_64+0x100/0x100 [ 118.115502][ T7621] ? syscall_return_slowpath+0x6f/0x500 [ 118.121176][ T7621] do_syscall_64+0x6b/0x100 [ 118.125676][ T7621] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.131923][ T7621] RIP: 0033:0x45b349 [ 118.135818][ T7621] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.156001][ T7621] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 118.164492][ T7621] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 118.172647][ T7621] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 118.180704][ T7621] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 118.188660][ T7621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 118.196640][ T7621] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000001 15:46:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b73", 0x1c8) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$setown(r4, 0x8, r5) sendfile(r1, r2, 0x0, 0x1c500) 15:46:45 executing program 2 (fault-call:4 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:45 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:45 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:45 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r6) [ 118.316807][ T7638] SELinux: ebitmap: truncated map [ 118.322420][ T7638] sel_write_load: 38 callbacks suppressed [ 118.322423][ T7638] SELinux: failed to load policy [ 118.333538][ T7638] SELinux: ebitmap: truncated map [ 118.338892][ T7638] SELinux: failed to load policy [ 118.396757][ T7659] SELinux: ebitmap: truncated map [ 118.401566][ T7651] FAULT_INJECTION: forcing a failure. [ 118.401566][ T7651] name failslab, interval 1, probability 0, space 0, times 0 [ 118.403206][ T7659] SELinux: failed to load policy 15:46:45 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 118.442953][ T7655] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 118.451548][ T7665] SELinux: ebitmap: truncated map [ 118.452624][ T7651] CPU: 1 PID: 7651 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 118.457014][ T7655] FAT-fs (loop3): Filesystem has been set read-only [ 118.466923][ T7651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.466927][ T7651] Call Trace: [ 118.466947][ T7651] dump_stack+0x1b0/0x228 15:46:45 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r6) [ 118.466958][ T7651] ? devkmsg_release+0x127/0x127 [ 118.466966][ T7651] ? __seccomp_filter+0xd15/0x1890 [ 118.466974][ T7651] ? show_regs_print_info+0x18/0x18 [ 118.466985][ T7651] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.466993][ T7651] ? syscall_trace_enter+0x596/0xa90 [ 118.467001][ T7651] should_fail+0x6fb/0x860 [ 118.467016][ T7651] ? setup_fault_attr+0x2b0/0x2b0 [ 118.474085][ T7665] SELinux: failed to load policy [ 118.483959][ T7651] ? kasan_slab_free+0xe/0x10 [ 118.483973][ T7651] ? setup_fault_attr+0x2b0/0x2b0 [ 118.483982][ T7651] ? __seccomp_filter+0xd15/0x1890 [ 118.483992][ T7651] ? _raw_spin_unlock+0x9/0x20 [ 118.484001][ T7651] __should_failslab+0x11a/0x160 [ 118.484009][ T7651] ? audit_log_start+0x4a1/0x9a0 [ 118.484022][ T7651] should_failslab+0x9/0x20 [ 118.571395][ T7651] __kmalloc_track_caller+0x5f/0x320 [ 118.576729][ T7651] ? kmem_cache_alloc+0x120/0x2b0 [ 118.581828][ T7651] ? audit_log_start+0x4a1/0x9a0 [ 118.586936][ T7651] __alloc_skb+0x109/0x540 [ 118.591341][ T7651] audit_log_start+0x4a1/0x9a0 [ 118.596405][ T7651] ? audit_serial+0x30/0x30 [ 118.601011][ T7651] ? kstrtoull+0x3c4/0x4e0 [ 118.605451][ T7651] ? kstrtouint_from_user+0x1cb/0x230 [ 118.610806][ T7651] ? kstrtol_from_user+0x180/0x180 [ 118.615997][ T7651] ? __rcu_read_lock+0x50/0x50 [ 118.620741][ T7651] audit_seccomp+0x62/0x180 [ 118.625226][ T7651] __seccomp_filter+0xd15/0x1890 [ 118.630145][ T7651] ? proc_fail_nth_read+0x1c0/0x1c0 [ 118.635375][ T7651] ? __secure_computing+0x240/0x240 [ 118.640561][ T7651] ? expand_files+0xd1/0x970 [ 118.645203][ T7651] ? memset+0x31/0x40 [ 118.649167][ T7651] ? fsnotify+0x1390/0x1450 [ 118.653651][ T7651] ? __kernel_write+0x350/0x350 [ 118.658483][ T7651] ? avc_policy_seqno+0x1b/0x70 [ 118.663363][ T7651] ? __fsnotify_parent+0x300/0x300 [ 118.668517][ T7651] ? security_file_permission+0x157/0x350 [ 118.674220][ T7651] ? rw_verify_area+0x1c2/0x360 [ 118.679075][ T7651] __secure_computing+0x1c6/0x240 [ 118.684088][ T7651] syscall_trace_enter+0x596/0xa90 [ 118.689177][ T7651] ? do_syscall_64+0x100/0x100 [ 118.693920][ T7651] ? syscall_return_slowpath+0x6f/0x500 [ 118.699446][ T7651] do_syscall_64+0x6b/0x100 [ 118.703930][ T7651] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.709799][ T7651] RIP: 0033:0x45b349 [ 118.713722][ T7651] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.733321][ T7651] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 15:46:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b73", 0x1c8) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$setown(r4, 0x8, r5) sendfile(r1, r2, 0x0, 0x1c500) 15:46:46 executing program 2 (fault-call:4 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 118.741762][ T7651] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 118.749714][ T7651] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 118.758005][ T7651] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 118.766047][ T7651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 118.774018][ T7651] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000002 15:46:46 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:46 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000000180)=0xa33, 0x4) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r5 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) write$binfmt_misc(r1, &(0x7f0000000880)=ANY=[@ANYRESDEC=0x0, @ANYRESDEC=r5, @ANYRESOCT, @ANYRES16=r4, @ANYRESOCT=0x0, @ANYRES16, @ANYBLOB="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"], 0x26b) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$packet_buf(r7, 0x107, 0x5, &(0x7f00000001c0)="23ddd6f5805b6bd8da8fd2f5a671be74eb61076128e088f56ee83098c6789bdacffb9633962914d199bda0113d652392566c047b3908e87ad56682523d84fa6d5b1711c3fce376c77b2909ca1fa6096bc84f796d9e7e86f0dc82b603ff47be77163684109065e1b8cff6a311f5220263b82b177b8da90be171dfa38f686a0bd2bb68a771e30d9d90013b242a151cdc3200ac811ce2619d84610858bf5c75d12fd7948ceb150299491912c7ae6381c266474130a310c2fc63660ca71a270de1bd7465773346dffcdf5abc5ae1b986a1cb", 0xd0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 118.863932][ T7686] SELinux: ebitmap: truncated map [ 118.869412][ T7686] SELinux: failed to load policy [ 118.875296][ T7688] SELinux: ebitmap: truncated map [ 118.881840][ T7687] FAULT_INJECTION: forcing a failure. [ 118.881840][ T7687] name failslab, interval 1, probability 0, space 0, times 0 [ 118.894507][ T7687] CPU: 1 PID: 7687 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 118.904582][ T7687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.911869][ T7688] SELinux: failed to load policy [ 118.914625][ T7687] Call Trace: [ 118.914643][ T7687] dump_stack+0x1b0/0x228 [ 118.914659][ T7687] ? devkmsg_release+0x127/0x127 [ 118.920062][ T7686] SELinux: ebitmap: truncated map [ 118.922852][ T7687] ? number+0xeac/0x1170 [ 118.922863][ T7687] ? show_regs_print_info+0x18/0x18 [ 118.922878][ T7687] ? put_dec_trunc8+0x1c4/0x2d0 [ 118.927587][ T7686] SELinux: failed to load policy [ 118.932118][ T7687] should_fail+0x6fb/0x860 15:46:46 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:46 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) [ 118.932128][ T7687] ? setup_fault_attr+0x2b0/0x2b0 [ 118.932137][ T7687] ? find_next_bit+0xd8/0x120 [ 118.932147][ T7687] __should_failslab+0x11a/0x160 [ 118.932157][ T7687] ? context_struct_to_string+0x3b5/0x7f0 [ 118.932171][ T7687] should_failslab+0x9/0x20 [ 118.938728][ T7688] SELinux: ebitmap: truncated map [ 118.941432][ T7687] __kmalloc+0x64/0x310 [ 118.941445][ T7687] context_struct_to_string+0x3b5/0x7f0 [ 118.941458][ T7687] ? security_bounded_transition+0x520/0x520 [ 118.941466][ T7687] ? sidtab_search+0x194/0x3a0 15:46:46 executing program 2 (fault-call:4 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 118.941475][ T7687] security_sid_to_context_core+0x259/0x380 [ 118.941488][ T7687] security_sid_to_context+0x33/0x40 [ 118.949411][ T7688] SELinux: failed to load policy [ 118.951547][ T7687] selinux_secid_to_secctx+0x2a/0x40 [ 118.951558][ T7687] security_secid_to_secctx+0x66/0xd0 [ 118.951574][ T7687] audit_log_task_context+0xf0/0x2d0 [ 118.957166][ T7692] SELinux: policydb magic number 0x2 does not match expected magic number 0xf97cff8c [ 118.961015][ T7687] ? audit_log_key+0x140/0x140 [ 118.961023][ T7687] ? audit_serial+0x30/0x30 [ 118.961032][ T7687] audit_log_task+0x17d/0x2e0 [ 118.961040][ T7687] ? audit_core_dumps+0x100/0x100 [ 118.961048][ T7687] ? kstrtol_from_user+0x180/0x180 [ 118.961069][ T7687] ? __rcu_read_lock+0x50/0x50 [ 118.961076][ T7687] audit_seccomp+0x83/0x180 [ 118.961083][ T7687] __seccomp_filter+0xd15/0x1890 [ 118.961092][ T7687] ? proc_fail_nth_read+0x1c0/0x1c0 [ 118.961098][ T7687] ? __secure_computing+0x240/0x240 [ 118.961105][ T7687] ? expand_files+0xd1/0x970 15:46:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x7e, 0xff, 0x0, 0x3, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r0 = dup(0xffffffffffffffff) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x6) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) fchdir(r3) inotify_init() r4 = inotify_init() inotify_add_watch(r4, &(0x7f00000000c0)='./file0\x00', 0x80000000) write$9p(r1, &(0x7f0000001400)="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", 0x600) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = socket(0x0, 0x80002, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) connect$netlink(r5, &(0x7f00000014c0)=@proc, 0xc) getpeername$packet(r5, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1c500) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r7, 0x8040450a, &(0x7f0000000140)=""/240) [ 118.961112][ T7687] ? memset+0x31/0x40 [ 118.961119][ T7687] ? fsnotify+0x1390/0x1450 [ 118.961127][ T7687] ? __kernel_write+0x350/0x350 [ 118.961134][ T7687] ? avc_policy_seqno+0x1b/0x70 [ 118.961143][ T7687] ? __fsnotify_parent+0x300/0x300 [ 118.961151][ T7687] ? security_file_permission+0x157/0x350 [ 118.961164][ T7687] ? rw_verify_area+0x1c2/0x360 [ 118.977264][ T7692] SELinux: failed to load policy [ 118.981515][ T7687] __secure_computing+0x1c6/0x240 [ 118.981527][ T7687] syscall_trace_enter+0x596/0xa90 [ 118.981538][ T7687] ? switch_fpu_return+0x10/0x10 [ 118.981546][ T7687] ? do_syscall_64+0x100/0x100 [ 118.981553][ T7687] ? syscall_return_slowpath+0x6f/0x500 [ 118.981564][ T7687] do_syscall_64+0x6b/0x100 [ 118.981584][ T7687] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.991762][ T7686] SELinux: policydb magic number 0x2 does not match expected magic number 0xf97cff8c [ 118.995312][ T7687] RIP: 0033:0x45b349 [ 118.995321][ T7687] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 118.995326][ T7687] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 118.995334][ T7687] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 118.995338][ T7687] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 118.995342][ T7687] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 118.995352][ T7687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 119.003625][ T7686] SELinux: failed to load policy [ 119.007857][ T7687] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000003 [ 119.118223][ T7705] FAULT_INJECTION: forcing a failure. [ 119.118223][ T7705] name failslab, interval 1, probability 0, space 0, times 0 [ 119.286439][ T7705] CPU: 0 PID: 7705 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 119.296502][ T7705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.306553][ T7705] Call Trace: [ 119.309835][ T7705] dump_stack+0x1b0/0x228 [ 119.314144][ T7705] ? devkmsg_release+0x127/0x127 [ 119.319060][ T7705] ? show_regs_print_info+0x18/0x18 [ 119.324365][ T7705] ? audit_log_format+0x110/0x110 [ 119.329385][ T7705] should_fail+0x6fb/0x860 [ 119.333841][ T7705] ? setup_fault_attr+0x2b0/0x2b0 [ 119.338845][ T7705] ? audit_log_format+0xc8/0x110 [ 119.343798][ T7705] ? __rcu_read_lock+0x50/0x50 [ 119.348558][ T7705] __should_failslab+0x11a/0x160 [ 119.353488][ T7705] ? audit_log_d_path+0xc2/0x260 [ 119.358419][ T7705] should_failslab+0x9/0x20 [ 119.362918][ T7705] kmem_cache_alloc_trace+0x3a/0x2f0 [ 119.368230][ T7705] audit_log_d_path+0xc2/0x260 [ 119.372993][ T7705] audit_log_d_path_exe+0x42/0x70 [ 119.378005][ T7705] audit_log_task+0x201/0x2e0 [ 119.382674][ T7705] ? audit_core_dumps+0x100/0x100 [ 119.387687][ T7705] ? kstrtol_from_user+0x180/0x180 [ 119.392823][ T7705] ? __rcu_read_lock+0x50/0x50 [ 119.397708][ T7705] audit_seccomp+0x83/0x180 [ 119.402212][ T7705] __seccomp_filter+0xd15/0x1890 [ 119.407145][ T7705] ? proc_fail_nth_read+0x1c0/0x1c0 [ 119.412325][ T7705] ? __secure_computing+0x240/0x240 [ 119.417514][ T7705] ? expand_files+0xd1/0x970 [ 119.422099][ T7705] ? memset+0x31/0x40 [ 119.426070][ T7705] ? fsnotify+0x1390/0x1450 [ 119.430569][ T7705] ? __kernel_write+0x350/0x350 [ 119.435412][ T7705] ? avc_policy_seqno+0x1b/0x70 [ 119.440253][ T7705] ? __fsnotify_parent+0x300/0x300 [ 119.445359][ T7705] ? security_file_permission+0x157/0x350 [ 119.451070][ T7705] ? rw_verify_area+0x1c2/0x360 [ 119.455916][ T7705] __secure_computing+0x1c6/0x240 [ 119.460948][ T7705] syscall_trace_enter+0x596/0xa90 [ 119.466058][ T7705] ? switch_fpu_return+0x10/0x10 [ 119.470984][ T7705] ? do_syscall_64+0x100/0x100 [ 119.475746][ T7705] ? syscall_return_slowpath+0x6f/0x500 [ 119.481277][ T7705] do_syscall_64+0x6b/0x100 [ 119.485789][ T7705] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.491788][ T7705] RIP: 0033:0x45b349 [ 119.495673][ T7705] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.515394][ T7705] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 119.523916][ T7705] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 119.531886][ T7705] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 119.539858][ T7705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 119.547827][ T7705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 119.555787][ T7705] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000004 15:46:47 executing program 2 (fault-call:4 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:47 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 119.568594][ T7711] SELinux: ebitmap: truncated map [ 119.578412][ T7711] SELinux: ebitmap: truncated map 15:46:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x1c8) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) fcntl$setown(r4, 0x8, r5) sendfile(r1, r2, 0x0, 0x1c500) 15:46:47 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:47 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 119.721677][ T7724] SELinux: ebitmap: truncated map [ 119.729325][ T7723] FAULT_INJECTION: forcing a failure. [ 119.729325][ T7723] name failslab, interval 1, probability 0, space 0, times 0 [ 119.741971][ T7723] CPU: 0 PID: 7723 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 119.748843][ T7724] SELinux: ebitmap: truncated map [ 119.752021][ T7723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.752024][ T7723] Call Trace: 15:46:47 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r4, 0x406, r4) [ 119.752041][ T7723] dump_stack+0x1b0/0x228 [ 119.752052][ T7723] ? devkmsg_release+0x127/0x127 [ 119.752060][ T7723] ? stack_trace_save+0x111/0x1e0 [ 119.752069][ T7723] ? show_regs_print_info+0x18/0x18 [ 119.752077][ T7723] ? stack_trace_snprint+0x150/0x150 [ 119.752088][ T7723] should_fail+0x6fb/0x860 [ 119.752097][ T7723] ? setup_fault_attr+0x2b0/0x2b0 [ 119.752104][ T7723] ? __kasan_slab_free+0x1e2/0x220 [ 119.752111][ T7723] ? __kasan_slab_free+0x168/0x220 [ 119.752117][ T7723] ? kasan_slab_free+0xe/0x10 [ 119.752126][ T7723] ? audit_log_end+0x1c6/0x230 [ 119.752133][ T7723] ? audit_seccomp+0x143/0x180 [ 119.752145][ T7723] ? __seccomp_filter+0xd15/0x1890 [ 119.834336][ T7723] __should_failslab+0x11a/0x160 [ 119.839263][ T7723] ? ebitmap_cpy+0x81/0x2f0 [ 119.843758][ T7723] should_failslab+0x9/0x20 [ 119.848288][ T7723] kmem_cache_alloc+0x37/0x2b0 [ 119.853051][ T7723] ebitmap_cpy+0x81/0x2f0 [ 119.857370][ T7723] mls_compute_sid+0x4c2/0x1310 [ 119.862208][ T7723] ? mls_convert_context+0x7e0/0x7e0 [ 119.867487][ T7723] ? avtab_search_node+0x4e2/0x5e0 [ 119.872576][ T7723] security_compute_sid+0xe80/0x1be0 [ 119.877850][ T7723] ? security_transition_sid+0x90/0x90 [ 119.883307][ T7723] ? audit_log_end+0x1c6/0x230 [ 119.888049][ T7723] ? audit_seccomp+0x143/0x180 [ 119.892928][ T7723] ? __seccomp_filter+0xd15/0x1890 [ 119.898018][ T7723] ? memset+0x31/0x40 [ 119.901996][ T7723] security_transition_sid+0x7d/0x90 [ 119.907445][ T7723] selinux_socket_create+0x1e1/0x2f0 [ 119.912711][ T7723] ? selinux_socket_unix_may_send+0x2d0/0x2d0 [ 119.918876][ T7723] security_socket_create+0x69/0xd0 [ 119.924054][ T7723] __sock_create+0xd6/0x7b0 [ 119.928544][ T7723] ? __kasan_check_read+0x11/0x20 [ 119.933548][ T7723] ? syscall_trace_enter+0x683/0xa90 [ 119.938827][ T7723] __sys_socket+0x115/0x350 [ 119.943311][ T7723] ? sock_create_kern+0x50/0x50 [ 119.948151][ T7723] __x64_sys_socket+0x7a/0x90 [ 119.952809][ T7723] do_syscall_64+0xc0/0x100 [ 119.957293][ T7723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 119.963170][ T7723] RIP: 0033:0x45b349 [ 119.967053][ T7723] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 119.986752][ T7723] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 119.995932][ T7723] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 120.003902][ T7723] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 120.011863][ T7723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:46:47 executing program 2 (fault-call:4 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 120.019841][ T7723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 120.027853][ T7723] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000005 15:46:47 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) socket$unix(0x1, 0x2, 0x0) 15:46:47 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 120.104408][ T7747] SELinux: ebitmap: truncated map [ 120.110356][ T7747] SELinux: ebitmap: truncated map 15:46:47 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 120.182872][ T7754] FAULT_INJECTION: forcing a failure. [ 120.182872][ T7754] name failslab, interval 1, probability 0, space 0, times 0 [ 120.192087][ T7760] SELinux: ebitmap: truncated map [ 120.195533][ T7754] CPU: 0 PID: 7754 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 120.195539][ T7754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.195548][ T7754] Call Trace: [ 120.202858][ T7760] SELinux: ebitmap: truncated map 15:46:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r1, 0x5, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_TX_RATE={0xc}]}]}]}, 0x3c}}, 0x0) [ 120.210740][ T7754] dump_stack+0x1b0/0x228 [ 120.210752][ T7754] ? devkmsg_release+0x127/0x127 [ 120.210759][ T7754] ? stack_trace_save+0x111/0x1e0 [ 120.210768][ T7754] ? show_regs_print_info+0x18/0x18 [ 120.210775][ T7754] ? stack_trace_snprint+0x150/0x150 [ 120.210792][ T7754] should_fail+0x6fb/0x860 [ 120.210802][ T7754] ? setup_fault_attr+0x2b0/0x2b0 [ 120.210811][ T7754] ? __kasan_slab_free+0x1e2/0x220 [ 120.210817][ T7754] ? __kasan_slab_free+0x168/0x220 [ 120.210823][ T7754] ? kasan_slab_free+0xe/0x10 [ 120.210838][ T7754] ? audit_log_end+0x1c6/0x230 [ 120.283214][ T7754] ? audit_seccomp+0x143/0x180 [ 120.287971][ T7754] ? __seccomp_filter+0xd15/0x1890 [ 120.293082][ T7754] __should_failslab+0x11a/0x160 [ 120.298016][ T7754] ? ebitmap_cpy+0x81/0x2f0 [ 120.302514][ T7754] should_failslab+0x9/0x20 [ 120.307007][ T7754] kmem_cache_alloc+0x37/0x2b0 [ 120.311774][ T7754] ebitmap_cpy+0x81/0x2f0 [ 120.316237][ T7754] mls_compute_sid+0x4c2/0x1310 [ 120.321077][ T7754] ? mls_convert_context+0x7e0/0x7e0 [ 120.326557][ T7754] ? avtab_search_node+0x4e2/0x5e0 [ 120.331670][ T7754] security_compute_sid+0xe80/0x1be0 [ 120.336946][ T7754] ? security_transition_sid+0x90/0x90 [ 120.342384][ T7754] ? audit_log_end+0x1c6/0x230 [ 120.347135][ T7754] ? audit_seccomp+0x143/0x180 [ 120.351913][ T7754] ? __seccomp_filter+0xd15/0x1890 [ 120.357017][ T7754] ? memset+0x31/0x40 [ 120.360988][ T7754] security_transition_sid+0x7d/0x90 [ 120.366260][ T7754] selinux_socket_create+0x1e1/0x2f0 [ 120.371534][ T7754] ? selinux_socket_unix_may_send+0x2d0/0x2d0 [ 120.377591][ T7754] security_socket_create+0x69/0xd0 [ 120.382780][ T7754] __sock_create+0xd6/0x7b0 [ 120.387277][ T7754] ? __kasan_check_read+0x11/0x20 [ 120.392297][ T7754] ? syscall_trace_enter+0x683/0xa90 [ 120.397632][ T7754] __sys_socket+0x115/0x350 [ 120.402125][ T7754] ? sock_create_kern+0x50/0x50 [ 120.406966][ T7754] __x64_sys_socket+0x7a/0x90 [ 120.411636][ T7754] do_syscall_64+0xc0/0x100 [ 120.416133][ T7754] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.422115][ T7754] RIP: 0033:0x45b349 [ 120.425994][ T7754] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.445592][ T7754] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 120.454001][ T7754] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 120.461967][ T7754] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 120.469930][ T7754] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 120.477881][ T7754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 120.485832][ T7754] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000006 15:46:48 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r0, @ANYRESHEX, @ANYBLOB="dc4a0be47e736c65dd41d4bbd20a98bf88729f9212c609509b188ebb00efc599e43cc047c7164b7459d952195fa33e5a49c150040891", @ANYRESDEC=r1], 0x5}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 15:46:48 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:48 executing program 2 (fault-call:4 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:48 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 120.559223][ T7727] syz-executor.4 (7727) used greatest stack depth: 18712 bytes left [ 120.586675][ T7778] SELinux: ebitmap: truncated map [ 120.587767][ T7777] FAULT_INJECTION: forcing a failure. [ 120.587767][ T7777] name failslab, interval 1, probability 0, space 0, times 0 [ 120.593006][ T7778] SELinux: ebitmap: truncated map 15:46:48 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) [ 120.604437][ T7777] CPU: 1 PID: 7777 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 120.619481][ T7777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.629522][ T7777] Call Trace: [ 120.632798][ T7777] dump_stack+0x1b0/0x228 [ 120.637115][ T7777] ? devkmsg_release+0x127/0x127 [ 120.642031][ T7777] ? stack_trace_save+0x111/0x1e0 [ 120.647185][ T7777] ? show_regs_print_info+0x18/0x18 [ 120.652382][ T7777] ? stack_trace_snprint+0x150/0x150 [ 120.657667][ T7777] should_fail+0x6fb/0x860 [ 120.662065][ T7777] ? setup_fault_attr+0x2b0/0x2b0 [ 120.667097][ T7777] ? __kasan_slab_free+0x1e2/0x220 [ 120.672188][ T7777] ? __kasan_slab_free+0x168/0x220 [ 120.677272][ T7777] ? kasan_slab_free+0xe/0x10 [ 120.681927][ T7777] ? audit_log_end+0x1c6/0x230 [ 120.686670][ T7777] ? audit_seccomp+0x143/0x180 [ 120.691408][ T7777] ? __seccomp_filter+0xd15/0x1890 [ 120.696523][ T7777] __should_failslab+0x11a/0x160 [ 120.701448][ T7777] ? ebitmap_cpy+0x81/0x2f0 [ 120.705933][ T7777] should_failslab+0x9/0x20 [ 120.710421][ T7777] kmem_cache_alloc+0x37/0x2b0 [ 120.715168][ T7777] ebitmap_cpy+0x81/0x2f0 [ 120.719599][ T7777] mls_compute_sid+0x4c2/0x1310 [ 120.724443][ T7777] ? mls_convert_context+0x7e0/0x7e0 [ 120.729719][ T7777] ? avtab_search_node+0x4e2/0x5e0 [ 120.734879][ T7777] security_compute_sid+0xe80/0x1be0 [ 120.740151][ T7777] ? security_transition_sid+0x90/0x90 [ 120.745595][ T7777] ? audit_log_end+0x1c6/0x230 [ 120.750481][ T7777] ? audit_seccomp+0x143/0x180 [ 120.755229][ T7777] ? __seccomp_filter+0xd15/0x1890 [ 120.760328][ T7777] ? memset+0x31/0x40 [ 120.764298][ T7777] security_transition_sid+0x7d/0x90 [ 120.769577][ T7777] selinux_socket_create+0x1e1/0x2f0 [ 120.774841][ T7777] ? selinux_socket_unix_may_send+0x2d0/0x2d0 [ 120.780893][ T7777] security_socket_create+0x69/0xd0 [ 120.786199][ T7777] __sock_create+0xd6/0x7b0 [ 120.790692][ T7777] ? __kasan_check_read+0x11/0x20 [ 120.795758][ T7777] ? syscall_trace_enter+0x683/0xa90 [ 120.801101][ T7777] __sys_socket+0x115/0x350 [ 120.805590][ T7777] ? sock_create_kern+0x50/0x50 [ 120.810421][ T7777] __x64_sys_socket+0x7a/0x90 [ 120.815189][ T7777] do_syscall_64+0xc0/0x100 [ 120.819684][ T7777] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 120.825555][ T7777] RIP: 0033:0x45b349 [ 120.829428][ T7777] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 120.849122][ T7777] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 15:46:48 executing program 2 (fault-call:4 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:48 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 120.857517][ T7777] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 120.865469][ T7777] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 120.873466][ T7777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 120.881420][ T7777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 120.889414][ T7777] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000007 15:46:48 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:48 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 120.950430][ T7791] SELinux: ebitmap: truncated map [ 120.951197][ T7792] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 120.994979][ T7793] FAULT_INJECTION: forcing a failure. [ 120.994979][ T7793] name failslab, interval 1, probability 0, space 0, times 0 [ 120.999642][ T7800] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 121.008533][ T7793] CPU: 1 PID: 7793 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 121.033724][ T7793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.043882][ T7793] Call Trace: [ 121.047205][ T7793] dump_stack+0x1b0/0x228 [ 121.051536][ T7793] ? devkmsg_release+0x127/0x127 [ 121.056506][ T7793] ? show_regs_print_info+0x18/0x18 [ 121.061775][ T7793] ? ebitmap_cpy+0x81/0x2f0 [ 121.066266][ T7793] ? security_compute_sid+0xe80/0x1be0 [ 121.071709][ T7793] ? security_transition_sid+0x7d/0x90 [ 121.077162][ T7793] ? selinux_socket_create+0x1e1/0x2f0 [ 121.082650][ T7793] ? __sock_create+0xd6/0x7b0 [ 121.087299][ T7793] ? __sys_socket+0x115/0x350 [ 121.091964][ T7793] should_fail+0x6fb/0x860 [ 121.096366][ T7793] ? setup_fault_attr+0x2b0/0x2b0 [ 121.101370][ T7793] ? stack_trace_snprint+0x150/0x150 [ 121.106680][ T7793] ? find_next_bit+0xd8/0x120 [ 121.111342][ T7793] __should_failslab+0x11a/0x160 [ 121.116270][ T7793] ? context_struct_to_string+0x3b5/0x7f0 [ 121.121964][ T7793] should_failslab+0x9/0x20 [ 121.126453][ T7793] __kmalloc+0x64/0x310 [ 121.130615][ T7793] context_struct_to_string+0x3b5/0x7f0 [ 121.136147][ T7793] ? security_bounded_transition+0x520/0x520 [ 121.142102][ T7793] ? mls_range_isvalid+0x3a8/0x4c0 [ 121.147195][ T7793] ? ebitmap_contains+0x71e/0x790 [ 121.152196][ T7793] context_add_hash+0xf5/0x200 [ 121.156939][ T7793] ? security_sid_to_context_inval+0x50/0x50 [ 121.162896][ T7793] ? mls_context_isvalid+0x27e/0x390 [ 121.168162][ T7793] ? policydb_context_isvalid+0x1d5/0x430 [ 121.173862][ T7793] security_compute_sid+0x1147/0x1be0 [ 121.179216][ T7793] ? security_transition_sid+0x90/0x90 [ 121.184648][ T7793] ? audit_log_end+0x1c6/0x230 [ 121.189391][ T7793] ? audit_seccomp+0x143/0x180 [ 121.194180][ T7793] ? __seccomp_filter+0xd15/0x1890 [ 121.199271][ T7793] ? memset+0x31/0x40 [ 121.203240][ T7793] security_transition_sid+0x7d/0x90 [ 121.208514][ T7793] selinux_socket_create+0x1e1/0x2f0 [ 121.213773][ T7793] ? selinux_socket_unix_may_send+0x2d0/0x2d0 [ 121.219815][ T7793] security_socket_create+0x69/0xd0 [ 121.224994][ T7793] __sock_create+0xd6/0x7b0 [ 121.229477][ T7793] ? __kasan_check_read+0x11/0x20 [ 121.234479][ T7793] ? syscall_trace_enter+0x683/0xa90 [ 121.239742][ T7793] __sys_socket+0x115/0x350 [ 121.244224][ T7793] ? sock_create_kern+0x50/0x50 [ 121.249058][ T7793] __x64_sys_socket+0x7a/0x90 [ 121.253710][ T7793] do_syscall_64+0xc0/0x100 [ 121.258247][ T7793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 121.264154][ T7793] RIP: 0033:0x45b349 [ 121.268026][ T7793] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 121.287609][ T7793] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 15:46:48 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r0, 0x8982, &(0x7f0000000180)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) fcntl$dupfd(r1, 0x0, r4) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x40000, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2400) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000004400)={0x2134, 0x26, 0x100, 0x70bd25, 0x25dfdbff, "", [@generic="8dfa2ec41458cda0b6c803a34706e240a371e15c66bd022427bf6d7a4aa9dbc8754d23ab27b7aacdb18d306f971be23b1158bbbebe39f56e0ceb32b84069d2e5e3a8361f174d93785a2095c800", @nested={0xc, 0x38, 0x0, 0x1, [@typed={0x8, 0x3f, 0x0, 0x0, @pid}]}, @nested={0x20a2, 0x94, 0x0, 0x1, [@generic="b19c80e06a826a83e8394dcb72bcdf493dee62ceeb2cc03d92ef9b417380b15b40e24959b6c0c486d9ff3afb7e6c31241c8e9f349a2b7c410335e31d0516d9bc3c7545723b90a3cf5f50655cf161858ea391", @generic="c854ed1e8379946544ed6575f7624919b5bc2429c845f6b00a6c8e651bbbfcd81c68d210563dc6c2ee95", @generic="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", @generic="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", @typed={0x16, 0x2d, 0x0, 0x0, @str='+vmnet1/ppp1wlan1\x00'}, @generic="fe9ac70565f44cc94ceb"]}, @typed={0x8, 0x5d, 0x0, 0x0, @uid=r5}, @typed={0x8, 0x38, 0x0, 0x0, @uid=r6}, @typed={0x14, 0x9, 0x0, 0x0, @ipv6=@empty}]}, 0x2134}], 0x1, 0x0, 0x0, 0x400c0}, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x19, 0x4, 0x5, 0x234, 0x0, 0xffffffffffffffff, 0xffffffff, [0x305f, 0x2e, 0x5f, 0x182e, 0x600005f, 0x80ffff, 0x5f, 0x5f, 0x52, 0x67, 0x2], 0x0, r1}, 0x3c) [ 121.296004][ T7793] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 121.303960][ T7793] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 121.311908][ T7793] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 121.319863][ T7793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 121.327941][ T7793] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000008 [ 121.358373][ T22] kauditd_printk_skb: 117 callbacks suppressed [ 121.358381][ T22] audit: type=1326 audit(1580485608.816:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=0 compat=0 ip=0x414e81 code=0x7ffc0000 [ 121.373409][ T7811] SELinux: ebitmap: truncated map 15:46:48 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:48 executing program 2 (fault-call:4 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 121.392247][ T22] audit: type=1326 audit(1580485608.856:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414e21 code=0x7ffc0000 [ 121.421174][ T22] audit: type=1326 audit(1580485608.856:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=3 compat=0 ip=0x414ee1 code=0x7ffc0000 [ 121.446742][ T22] audit: type=1326 audit(1580485608.856:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 121.472606][ T22] audit: type=1326 audit(1580485608.856:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 121.497998][ T22] audit: type=1326 audit(1580485608.856:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7788 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 121.563034][ T22] audit: type=1326 audit(1580485609.046:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 121.564693][ T7826] FAULT_INJECTION: forcing a failure. [ 121.564693][ T7826] name failslab, interval 1, probability 0, space 0, times 0 [ 121.589455][ T7823] SELinux: ebitmap: truncated map [ 121.600998][ T7826] CPU: 1 PID: 7826 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 121.601008][ T7826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 121.606057][ T22] audit: type=1326 audit(1580485609.046:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 121.616057][ T7826] Call Trace: [ 121.616074][ T7826] dump_stack+0x1b0/0x228 [ 121.616083][ T7826] ? devkmsg_release+0x127/0x127 [ 121.616090][ T7826] ? show_regs_print_info+0x18/0x18 [ 121.616098][ T7826] ? ebitmap_cpy+0x81/0x2f0 [ 121.616104][ T7826] ? security_compute_sid+0xe80/0x1be0 [ 121.616118][ T7826] ? security_transition_sid+0x7d/0x90 [ 121.635600][ T22] audit: type=1326 audit(1580485609.046:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 121.651418][ T7826] ? selinux_socket_create+0x1e1/0x2f0 [ 121.651430][ T7826] ? __sock_create+0xd6/0x7b0 [ 121.651437][ T7826] ? __sys_socket+0x115/0x350 [ 121.651447][ T7826] should_fail+0x6fb/0x860 [ 121.651454][ T7826] ? setup_fault_attr+0x2b0/0x2b0 [ 121.651461][ T7826] ? stack_trace_snprint+0x150/0x150 [ 121.651468][ T7826] ? find_next_bit+0xd8/0x120 [ 121.651476][ T7826] __should_failslab+0x11a/0x160 [ 121.651491][ T7826] ? context_struct_to_string+0x3b5/0x7f0 [ 121.654997][ T22] audit: type=1326 audit(1580485609.046:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=7822 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=2 compat=0 ip=0x4150e1 code=0x7ffc0000 [ 121.659079][ T7826] should_failslab+0x9/0x20 [ 121.659088][ T7826] __kmalloc+0x64/0x310 [ 121.659097][ T7826] context_struct_to_string+0x3b5/0x7f0 [ 121.659107][ T7826] ? security_bounded_transition+0x520/0x520 [ 121.659118][ T7826] ? mls_range_isvalid+0x3a8/0x4c0 [ 121.805481][ T7826] ? ebitmap_contains+0x71e/0x790 [ 121.810498][ T7826] context_add_hash+0xf5/0x200 [ 121.815259][ T7826] ? security_sid_to_context_inval+0x50/0x50 [ 121.821225][ T7826] ? mls_context_isvalid+0x27e/0x390 [ 121.826497][ T7826] ? policydb_context_isvalid+0x1d5/0x430 [ 121.832291][ T7826] security_compute_sid+0x1147/0x1be0 [ 121.837753][ T7826] ? security_transition_sid+0x90/0x90 [ 121.843200][ T7826] ? audit_log_end+0x1c6/0x230 [ 121.847948][ T7826] ? audit_seccomp+0x143/0x180 [ 121.852699][ T7826] ? __seccomp_filter+0xd15/0x1890 [ 121.857798][ T7826] ? memset+0x31/0x40 [ 121.861767][ T7826] security_transition_sid+0x7d/0x90 [ 121.867053][ T7826] selinux_socket_create+0x1e1/0x2f0 [ 121.872333][ T7826] ? selinux_socket_unix_may_send+0x2d0/0x2d0 [ 121.878386][ T7826] security_socket_create+0x69/0xd0 [ 121.883660][ T7826] __sock_create+0xd6/0x7b0 [ 121.888148][ T7826] ? __kasan_check_read+0x11/0x20 [ 121.893164][ T7826] ? syscall_trace_enter+0x683/0xa90 [ 121.898435][ T7826] __sys_socket+0x115/0x350 [ 121.902923][ T7826] ? sock_create_kern+0x50/0x50 [ 121.907770][ T7826] __x64_sys_socket+0x7a/0x90 [ 121.912430][ T7826] do_syscall_64+0xc0/0x100 [ 121.917030][ T7826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 121.922904][ T7826] RIP: 0033:0x45b349 [ 121.926781][ T7826] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 121.946373][ T7826] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 121.954788][ T7826] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 121.962771][ T7826] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 121.970732][ T7826] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 121.978692][ T7826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 121.986659][ T7826] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000009 [ 122.003610][ T7789] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 122.024684][ T7789] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 122.041809][ T7789] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:46:49 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:49 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:49 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:49 executing program 3: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./bus\x00', 0xa0, 0x9, &(0x7f00000004c0)=[{&(0x7f0000000a00)="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", 0x1000, 0x6}, {&(0x7f0000000080), 0x0, 0x100000001}, {&(0x7f0000000140)="3e9181bc9cb46e79dac04d2a414d953800dd4ea6cf9b94db58520de9d8f8c4688798d39c4ada92558a600558c2b08da704c301b48f99146d25481ab8bf814e3dc0c653748c93f58755be823418bd5b11c5af56c640a88f1873d73aa01fafd92c5da7e7bed067c30fd04781d94227fab36724c3e82b5cdcbb23eb4f125494c417a83ff217c52d715f76d28509416fff8994764aa6f59428eb63333d69c3dae68b8e54a5ef8b30dbd3a4c579a2de98834f4c3f57cce4967d0a4b7dc109bf4e5295c1b87bb01fcf75ec4586f1b26534fcbf11a1ebb1ec48060d63389d459d75a8c97cf561d4d167cad7b3", 0xe9, 0x7ff}, {&(0x7f00000000c0)="f57ddffeede3e60e81e894190eba448b006330c56f5e7affd1de862615eb351c86", 0x21, 0x40000000000000}, {&(0x7f0000000300)="17b482409dbcda4a5c3e10310b96a7d29bb109caa74ad44c28e8b4ed2e63aeac8eb4fd24ee94ed3d2b7e79523e2a976d6a2b7bb038fa3e83bbeb2a897ce4474fa6495533d089c2d63174544266c4024ae15b399d2c5b598f642ab7a70785ac072e88609edc74d071389aee4c41b9177c8a102ccda8db40caff1145471684ac6f1211e8e8ad471d6a481e800a255608e372cf58f57d70a6056abea03a866213ac19110287d65aba892cf98e6466e43e1116ac495fb03f53bfaf865b", 0xbb, 0x10001}, {&(0x7f0000000240)="fde570d62e62ad349d73", 0xa, 0x4}, {&(0x7f00000003c0)="7d90dfef07d0fd0fe46cd100b32b0e84d3c97b5d901a207427a0aaa43b051e0d739ddc9ce5daf6c021d3ade545df28ce1531a8fef7709b7831b1749b2821196cc7faf42d40f7210b4006b1a86fff8b7867b11c55971f16471f46f948bf8b33e0f3fc0c4a69d60ec3d93e3c4c6515b942b9b7da38", 0x74, 0x3c}, {&(0x7f0000001a00)="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", 0x1000, 0x6}, {&(0x7f0000000440)="7b50d4eb2f6e843824cff0bf0ed3e79e5b2ecc7c503b280fac14daa1068ec2c465113a442d755d8ac00a24bdd5003da1925788311cdce0a441c0d2dfbd9038df55fa5251c69b5fbd01a5ba9857fa55daabc6faa481f8e125d357abc2fa1e322fa09cbd34e1755c5cad27eae9ba19f5f53f68fa", 0x73, 0x33}], 0x2020002, &(0x7f00000005c0)=ANY=[@ANYBLOB="7365636c6162656c2c736d61736b6673666c6f6f723d6367726f75702c00ac48c7c3c1f3b4753f3fcd63f2616091c26782d1e8541c0ebeab3fff454de2f6fafadb60f9dd3cdf057a67caec18294afe93360b30eb06aa46c62847"]) ftruncate(r1, 0x8200) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r2, 0x20, 0x0, 0xfffffeff000) 15:46:49 executing program 2 (fault-call:4 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:49 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000140)={0x87, @empty, 0x0, 0x0, 'wrr\x00', 0x0, 0x5, 0x40}, 0x2c) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r3, 0x6, 0x1a, &(0x7f0000000340)=""/224, &(0x7f0000000040)=0xe0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 122.069782][ T7789] EXT4-fs (loop4): orphan cleanup on readonly fs [ 122.076141][ T7789] EXT4-fs error (device loop4): ext4_orphan_get:1247: comm syz-executor.4: bad orphan inode 808464432 [ 122.087398][ T7789] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 15:46:49 executing program 0: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r1 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 122.121033][ T7848] FAULT_INJECTION: forcing a failure. [ 122.121033][ T7848] name failslab, interval 1, probability 0, space 0, times 0 [ 122.133916][ T7848] CPU: 0 PID: 7848 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 122.143977][ T7848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.154026][ T7848] Call Trace: [ 122.157332][ T7848] dump_stack+0x1b0/0x228 [ 122.161665][ T7848] ? devkmsg_release+0x127/0x127 [ 122.167312][ T7848] ? show_regs_print_info+0x18/0x18 [ 122.172489][ T7848] ? ebitmap_cpy+0x81/0x2f0 [ 122.176982][ T7848] ? security_compute_sid+0xe80/0x1be0 [ 122.182519][ T7848] ? security_transition_sid+0x7d/0x90 [ 122.187974][ T7848] ? selinux_socket_create+0x1e1/0x2f0 [ 122.193420][ T7848] ? __sock_create+0xd6/0x7b0 [ 122.198089][ T7848] ? __sys_socket+0x115/0x350 [ 122.202777][ T7848] should_fail+0x6fb/0x860 [ 122.207297][ T7848] ? setup_fault_attr+0x2b0/0x2b0 [ 122.212308][ T7848] ? stack_trace_snprint+0x150/0x150 [ 122.217579][ T7848] ? find_next_bit+0xd8/0x120 [ 122.222545][ T7848] __should_failslab+0x11a/0x160 [ 122.227495][ T7848] ? context_struct_to_string+0x3b5/0x7f0 [ 122.233927][ T7848] should_failslab+0x9/0x20 [ 122.238532][ T7848] __kmalloc+0x64/0x310 [ 122.242678][ T7848] context_struct_to_string+0x3b5/0x7f0 [ 122.250763][ T7848] ? security_bounded_transition+0x520/0x520 [ 122.256732][ T7848] ? mls_range_isvalid+0x3a8/0x4c0 [ 122.261836][ T7848] ? ebitmap_contains+0x71e/0x790 [ 122.266970][ T7848] context_add_hash+0xf5/0x200 [ 122.271735][ T7848] ? security_sid_to_context_inval+0x50/0x50 [ 122.277762][ T7848] ? mls_context_isvalid+0x27e/0x390 [ 122.283033][ T7848] ? policydb_context_isvalid+0x1d5/0x430 [ 122.288732][ T7848] security_compute_sid+0x1147/0x1be0 [ 122.294158][ T7848] ? security_transition_sid+0x90/0x90 [ 122.299609][ T7848] ? audit_log_end+0x1c6/0x230 [ 122.304373][ T7848] ? audit_seccomp+0x143/0x180 [ 122.309132][ T7848] ? __seccomp_filter+0xd15/0x1890 [ 122.314238][ T7848] ? memset+0x31/0x40 [ 122.318230][ T7848] security_transition_sid+0x7d/0x90 [ 122.323508][ T7848] selinux_socket_create+0x1e1/0x2f0 [ 122.328794][ T7848] ? selinux_socket_unix_may_send+0x2d0/0x2d0 [ 122.334863][ T7848] security_socket_create+0x69/0xd0 [ 122.340052][ T7848] __sock_create+0xd6/0x7b0 [ 122.345406][ T7848] ? __kasan_check_read+0x11/0x20 [ 122.350413][ T7848] ? syscall_trace_enter+0x683/0xa90 [ 122.355688][ T7848] __sys_socket+0x115/0x350 [ 122.360245][ T7848] ? sock_create_kern+0x50/0x50 [ 122.365096][ T7848] __x64_sys_socket+0x7a/0x90 [ 122.369786][ T7848] do_syscall_64+0xc0/0x100 [ 122.374288][ T7848] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.380836][ T7848] RIP: 0033:0x45b349 [ 122.386587][ T7848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 122.407057][ T7848] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 15:46:49 executing program 2 (fault-call:4 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:49 executing program 0: creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 122.415700][ T7848] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 122.424180][ T7848] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 122.432141][ T7848] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 122.440112][ T7848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 122.448077][ T7848] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000a 15:46:50 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:50 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 122.670476][ T7873] FAULT_INJECTION: forcing a failure. [ 122.670476][ T7873] name failslab, interval 1, probability 0, space 0, times 0 [ 122.680184][ T7875] SELinux: ebitmap: truncated map [ 122.687884][ T7873] CPU: 0 PID: 7873 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 122.698474][ T7873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 122.708649][ T7873] Call Trace: [ 122.711941][ T7873] dump_stack+0x1b0/0x228 [ 122.716278][ T7873] ? devkmsg_release+0x127/0x127 [ 122.718913][ T7878] SELinux: ebitmap: truncated map [ 122.721219][ T7873] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.721231][ T7873] ? show_regs_print_info+0x18/0x18 [ 122.721248][ T7873] ? __seccomp_filter+0xd15/0x1890 [ 122.742719][ T7873] should_fail+0x6fb/0x860 [ 122.747142][ T7873] ? setup_fault_attr+0x2b0/0x2b0 [ 122.752180][ T7873] ? should_fail+0x182/0x860 [ 122.756806][ T7873] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 122.762185][ T7873] __should_failslab+0x11a/0x160 15:46:50 executing program 0: creat(&(0x7f00000002c0)='./bus\x00', 0x0) umount2(&(0x7f0000000000)='./bus\x00', 0x1) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:50 executing program 0: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:50 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000040)={0x7, 'vlan0\x00', {0xa247}, 0x3ff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x7, 0x3, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0xf, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffc}, 0x48) 15:46:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 122.767141][ T7873] ? security_inode_alloc+0x36/0x1f0 [ 122.772435][ T7873] should_failslab+0x9/0x20 [ 122.774200][ T7880] SELinux: ebitmap: truncated map [ 122.776942][ T7873] kmem_cache_alloc+0x37/0x2b0 [ 122.776954][ T7873] ? from_kuid_munged+0x3b0/0x3b0 [ 122.776964][ T7873] security_inode_alloc+0x36/0x1f0 [ 122.776974][ T7873] inode_init_always+0x39b/0x840 [ 122.776983][ T7873] ? sockfs_init_fs_context+0xb0/0xb0 [ 122.776991][ T7873] new_inode_pseudo+0x7f/0x240 [ 122.777008][ T7873] __sock_create+0x136/0x7b0 [ 122.817311][ T7873] ? __kasan_check_read+0x11/0x20 [ 122.822358][ T7873] __sys_socket+0x115/0x350 [ 122.826875][ T7873] ? sock_create_kern+0x50/0x50 [ 122.831730][ T7873] __x64_sys_socket+0x7a/0x90 [ 122.836406][ T7873] do_syscall_64+0xc0/0x100 [ 122.840916][ T7873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 122.846802][ T7873] RIP: 0033:0x45b349 [ 122.852015][ T7873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 122.873479][ T7873] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 122.882617][ T7873] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 122.891143][ T7873] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 122.899825][ T7873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 122.908325][ T7873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 15:46:50 executing program 2 (fault-call:4 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x2, 0x3, 0x258, 0x0, 0x108, 0x0, 0x0, 0x0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x1c0, 0x3, 0x0, {[{{@ip={@remote, @dev, 0x0, 0x0, '\x00', 'ip_vti0\x00', {}, {}, 0x88}, 0x0, 0xa0, 0x108, 0x0, {}, [@common=@inet=@udplite={{0x30, 'udplite\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x98, 0xb8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b8) [ 122.917423][ T7873] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000b [ 122.927035][ T7873] socket: no more sockets [ 122.958237][ T7900] SELinux: ebitmap: truncated map [ 122.980179][ T7883] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 123.022481][ T7883] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 123.038175][ T7909] xt_CT: No such helper "netbios-ns" [ 123.048390][ T7910] FAULT_INJECTION: forcing a failure. [ 123.048390][ T7910] name failslab, interval 1, probability 0, space 0, times 0 [ 123.066296][ T7910] CPU: 1 PID: 7910 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 123.076379][ T7910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.086435][ T7910] Call Trace: [ 123.089734][ T7910] dump_stack+0x1b0/0x228 [ 123.094067][ T7910] ? devkmsg_release+0x127/0x127 [ 123.099002][ T7910] ? do_syscall_64+0xc0/0x100 [ 123.103666][ T7910] ? show_regs_print_info+0x18/0x18 [ 123.108862][ T7910] ? kasan_slab_alloc+0xe/0x10 [ 123.113656][ T7910] ? sock_alloc_inode+0x1b/0xc0 [ 123.118677][ T7910] ? new_inode_pseudo+0x68/0x240 [ 123.123610][ T7910] ? __sock_create+0x136/0x7b0 [ 123.128463][ T7910] ? __x64_sys_socket+0x7a/0x90 [ 123.133291][ T7910] ? do_syscall_64+0xc0/0x100 [ 123.138071][ T7910] should_fail+0x6fb/0x860 [ 123.142480][ T7910] ? setup_fault_attr+0x2b0/0x2b0 [ 123.147494][ T7910] ? should_fail+0x182/0x860 [ 123.152079][ T7910] ? avc_has_perm+0x15f/0x260 [ 123.156751][ T7910] __should_failslab+0x11a/0x160 [ 123.162197][ T7910] ? sk_prot_alloc+0x63/0x2f0 [ 123.166862][ T7910] should_failslab+0x9/0x20 [ 123.171357][ T7910] kmem_cache_alloc+0x37/0x2b0 [ 123.176284][ T7910] sk_prot_alloc+0x63/0x2f0 [ 123.180777][ T7910] sk_alloc+0x35/0x300 [ 123.184843][ T7910] unix_create1+0x91/0x530 [ 123.189399][ T7910] ? __rcu_read_lock+0x50/0x50 [ 123.194460][ T7910] unix_create+0x136/0x1c0 [ 123.198889][ T7910] __sock_create+0x3c6/0x7b0 [ 123.203468][ T7910] __sys_socket+0x115/0x350 [ 123.208074][ T7910] ? sock_create_kern+0x50/0x50 [ 123.212914][ T7910] __x64_sys_socket+0x7a/0x90 [ 123.217696][ T7910] do_syscall_64+0xc0/0x100 [ 123.222186][ T7910] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.228093][ T7910] RIP: 0033:0x45b349 [ 123.231969][ T7910] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 123.251681][ T7910] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 123.260225][ T7910] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 15:46:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:50 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:50 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, r3, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @loopback}}}}]}]}, 0xff23}}, 0x0) 15:46:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r2, 0x8982, &(0x7f0000000000)={0x7, 'macsec0\x00', {0x1}, 0x2195}) socket$packet(0x11, 0x3, 0x300) mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 15:46:50 executing program 2 (fault-call:4 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 123.268298][ T7910] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 123.276283][ T7910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 123.284352][ T7910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 123.292319][ T7910] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000c 15:46:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000001840)='./bus\x00', 0x84442, 0x0) sendfile(r1, r2, 0x0, 0x8400fffffffa) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) fcntl$getflags(r0, 0x401) ftruncate(r3, 0x200006) [ 123.332251][ T7928] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 123.341615][ T7928] tipc: Invalid UDP bearer configuration [ 123.341639][ T7928] tipc: Enabling of bearer rejected, failed to enable media 15:46:50 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 123.401929][ T7943] FAULT_INJECTION: forcing a failure. [ 123.401929][ T7943] name failslab, interval 1, probability 0, space 0, times 0 [ 123.414930][ T7943] CPU: 1 PID: 7943 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 123.425023][ T7943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.435082][ T7943] Call Trace: [ 123.438372][ T7943] dump_stack+0x1b0/0x228 [ 123.442696][ T7943] ? devkmsg_release+0x127/0x127 [ 123.447733][ T7943] ? __sock_create+0x3c6/0x7b0 [ 123.452487][ T7943] ? show_regs_print_info+0x18/0x18 [ 123.457679][ T7943] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.463782][ T7943] ? __kasan_kmalloc+0x117/0x1b0 [ 123.468756][ T7943] ? kasan_slab_alloc+0xe/0x10 [ 123.473512][ T7943] ? security_inode_alloc+0x36/0x1f0 [ 123.478773][ T7943] ? inode_init_always+0x39b/0x840 [ 123.483871][ T7943] should_fail+0x6fb/0x860 [ 123.488272][ T7943] ? setup_fault_attr+0x2b0/0x2b0 [ 123.493284][ T7943] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.499441][ T7943] ? should_fail+0x182/0x860 [ 123.504012][ T7943] __should_failslab+0x11a/0x160 [ 123.509033][ T7943] ? selinux_sk_alloc_security+0x7b/0x1a0 [ 123.514862][ T7943] should_failslab+0x9/0x20 [ 123.519353][ T7943] kmem_cache_alloc_trace+0x3a/0x2f0 [ 123.524625][ T7943] selinux_sk_alloc_security+0x7b/0x1a0 [ 123.530228][ T7943] security_sk_alloc+0x65/0xc0 [ 123.535031][ T7943] sk_prot_alloc+0x143/0x2f0 [ 123.539604][ T7943] sk_alloc+0x35/0x300 [ 123.543657][ T7943] unix_create1+0x91/0x530 [ 123.548066][ T7943] ? __rcu_read_lock+0x50/0x50 [ 123.552810][ T7943] unix_create+0x136/0x1c0 [ 123.557210][ T7943] __sock_create+0x3c6/0x7b0 [ 123.561824][ T7943] __sys_socket+0x115/0x350 [ 123.566329][ T7943] ? sock_create_kern+0x50/0x50 [ 123.571176][ T7943] __x64_sys_socket+0x7a/0x90 [ 123.575837][ T7943] do_syscall_64+0xc0/0x100 [ 123.580409][ T7943] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.586295][ T7943] RIP: 0033:0x45b349 [ 123.590178][ T7943] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 123.609861][ T7943] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 123.618430][ T7943] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 123.626436][ T7943] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 123.634408][ T7943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 123.642377][ T7943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 15:46:51 executing program 2 (fault-call:4 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 123.650336][ T7943] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000d 15:46:51 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:51 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 123.747814][ T7965] FAULT_INJECTION: forcing a failure. [ 123.747814][ T7965] name failslab, interval 1, probability 0, space 0, times 0 [ 123.760656][ T7965] CPU: 0 PID: 7965 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 123.771099][ T7965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 123.781159][ T7965] Call Trace: [ 123.784574][ T7965] dump_stack+0x1b0/0x228 [ 123.789096][ T7965] ? devkmsg_release+0x127/0x127 [ 123.794042][ T7965] ? show_regs_print_info+0x18/0x18 [ 123.799266][ T7965] should_fail+0x6fb/0x860 [ 123.803698][ T7965] ? setup_fault_attr+0x2b0/0x2b0 [ 123.808724][ T7965] ? arch_stack_walk+0x98/0xe0 [ 123.813491][ T7965] __should_failslab+0x11a/0x160 [ 123.818442][ T7965] ? ebitmap_cpy+0x81/0x2f0 [ 123.822951][ T7965] should_failslab+0x9/0x20 [ 123.827551][ T7965] kmem_cache_alloc+0x37/0x2b0 [ 123.832325][ T7965] ebitmap_cpy+0x81/0x2f0 [ 123.836783][ T7965] mls_compute_sid+0x4c2/0x1310 [ 123.841648][ T7965] ? mls_convert_context+0x7e0/0x7e0 [ 123.847122][ T7965] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 123.852599][ T7965] ? selinux_sk_alloc_security+0x7b/0x1a0 [ 123.858330][ T7965] ? avtab_search_node+0x4e2/0x5e0 [ 123.863458][ T7965] security_compute_sid+0xe80/0x1be0 [ 123.868758][ T7965] ? security_transition_sid+0x90/0x90 [ 123.874217][ T7965] ? new_inode_pseudo+0x7f/0x240 [ 123.879166][ T7965] ? __sock_create+0x136/0x7b0 [ 123.883932][ T7965] ? __sys_socket+0x115/0x350 [ 123.888613][ T7965] ? __x64_sys_socket+0x7a/0x90 [ 123.893458][ T7965] ? do_syscall_64+0xc0/0x100 [ 123.898239][ T7965] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.904417][ T7965] ? should_fail+0x182/0x860 [ 123.909011][ T7965] ? sock_alloc_inode+0x1b/0xc0 [ 123.913974][ T7965] ? new_inode_pseudo+0x68/0x240 [ 123.919176][ T7965] ? __sock_create+0x136/0x7b0 [ 123.923947][ T7965] ? setup_fault_attr+0x2b0/0x2b0 [ 123.928973][ T7965] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 123.935049][ T7965] ? should_fail+0x182/0x860 [ 123.939640][ T7965] ? kasan_kmalloc+0x9/0x10 [ 123.944148][ T7965] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 123.949711][ T7965] ? cgroup_tryget+0x102/0x2b0 [ 123.954488][ T7965] ? __rcu_read_lock+0x50/0x50 [ 123.959255][ T7965] security_transition_sid+0x7d/0x90 [ 123.964546][ T7965] selinux_socket_post_create+0x375/0x500 [ 123.970275][ T7965] ? selinux_socket_create+0x2f0/0x2f0 [ 123.975733][ T7965] ? local_bh_enable+0x1f/0x30 [ 123.980499][ T7965] ? unix_create1+0x483/0x530 [ 123.985182][ T7965] ? __module_put_and_exit+0x20/0x20 [ 123.990619][ T7965] security_socket_post_create+0x7c/0xe0 [ 123.996253][ T7965] __sock_create+0x47c/0x7b0 [ 124.000854][ T7965] __sys_socket+0x115/0x350 [ 124.005355][ T7965] ? sock_create_kern+0x50/0x50 [ 124.010211][ T7965] __x64_sys_socket+0x7a/0x90 [ 124.014891][ T7965] do_syscall_64+0xc0/0x100 [ 124.019453][ T7965] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.025345][ T7965] RIP: 0033:0x45b349 [ 124.029236][ T7965] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:46:51 executing program 4: r0 = io_uring_setup(0x816, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/24, 0x18}], 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x5, 0xc6, 0x80}}, 0x28) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x10000, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) fsetxattr(r2, &(0x7f00000001c0)=@random={'user.', 'cpuacct.stat\x00'}, &(0x7f0000000180)='cu\x1d\xc9d\x00', 0x6, 0x5) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x68, 0x7, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5b9}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x179a4000}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x2}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x40}, 0x40000) 15:46:51 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:51 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 124.048960][ T7965] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 124.057366][ T7965] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 124.065432][ T7965] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 124.073518][ T7965] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 124.081611][ T7965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 124.089579][ T7965] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000e 15:46:51 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:51 executing program 2 (fault-call:4 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:51 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 124.233702][ T7995] FAULT_INJECTION: forcing a failure. [ 124.233702][ T7995] name failslab, interval 1, probability 0, space 0, times 0 [ 124.246388][ T7995] CPU: 1 PID: 7995 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 124.256538][ T7995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.266574][ T7995] Call Trace: [ 124.269851][ T7995] dump_stack+0x1b0/0x228 [ 124.274163][ T7995] ? devkmsg_release+0x127/0x127 [ 124.279083][ T7995] ? show_regs_print_info+0x18/0x18 [ 124.284264][ T7995] should_fail+0x6fb/0x860 [ 124.288696][ T7995] ? setup_fault_attr+0x2b0/0x2b0 [ 124.293700][ T7995] ? arch_stack_walk+0x98/0xe0 [ 124.298450][ T7995] __should_failslab+0x11a/0x160 [ 124.303373][ T7995] ? ebitmap_cpy+0x81/0x2f0 [ 124.307858][ T7995] should_failslab+0x9/0x20 [ 124.312336][ T7995] kmem_cache_alloc+0x37/0x2b0 [ 124.317078][ T7995] ebitmap_cpy+0x81/0x2f0 [ 124.321392][ T7995] mls_compute_sid+0x4c2/0x1310 [ 124.326276][ T7995] ? mls_convert_context+0x7e0/0x7e0 [ 124.331748][ T7995] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 124.337196][ T7995] ? selinux_sk_alloc_security+0x7b/0x1a0 [ 124.342896][ T7995] ? avtab_search_node+0x4e2/0x5e0 [ 124.347982][ T7995] security_compute_sid+0xe80/0x1be0 [ 124.353258][ T7995] ? security_transition_sid+0x90/0x90 [ 124.358694][ T7995] ? new_inode_pseudo+0x7f/0x240 [ 124.363606][ T7995] ? __sock_create+0x136/0x7b0 [ 124.368399][ T7995] ? __sys_socket+0x115/0x350 [ 124.373057][ T7995] ? __x64_sys_socket+0x7a/0x90 [ 124.378412][ T7995] ? do_syscall_64+0xc0/0x100 [ 124.383078][ T7995] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.389121][ T7995] ? should_fail+0x182/0x860 [ 124.393690][ T7995] ? sock_alloc_inode+0x1b/0xc0 [ 124.398515][ T7995] ? new_inode_pseudo+0x68/0x240 [ 124.403436][ T7995] ? __sock_create+0x136/0x7b0 [ 124.408187][ T7995] ? setup_fault_attr+0x2b0/0x2b0 [ 124.413195][ T7995] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.419243][ T7995] ? should_fail+0x182/0x860 [ 124.423810][ T7995] ? kasan_kmalloc+0x9/0x10 [ 124.428307][ T7995] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 124.433756][ T7995] ? cgroup_tryget+0x102/0x2b0 [ 124.438497][ T7995] ? __rcu_read_lock+0x50/0x50 [ 124.443245][ T7995] security_transition_sid+0x7d/0x90 [ 124.448515][ T7995] selinux_socket_post_create+0x375/0x500 [ 124.454209][ T7995] ? selinux_socket_create+0x2f0/0x2f0 [ 124.459650][ T7995] ? local_bh_enable+0x1f/0x30 [ 124.464392][ T7995] ? unix_create1+0x483/0x530 [ 124.469060][ T7995] ? __module_put_and_exit+0x20/0x20 [ 124.474326][ T7995] security_socket_post_create+0x7c/0xe0 [ 124.479939][ T7995] __sock_create+0x47c/0x7b0 [ 124.484509][ T7995] __sys_socket+0x115/0x350 [ 124.488993][ T7995] ? sock_create_kern+0x50/0x50 [ 124.493834][ T7995] __x64_sys_socket+0x7a/0x90 [ 124.498513][ T7995] do_syscall_64+0xc0/0x100 [ 124.502992][ T7995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.508861][ T7995] RIP: 0033:0x45b349 [ 124.512741][ T7995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:46:52 executing program 2 (fault-call:4 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 124.532444][ T7995] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 124.540838][ T7995] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 124.548789][ T7995] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 124.556737][ T7995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 124.564695][ T7995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 124.572657][ T7995] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000000f 15:46:52 executing program 3: mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sync() 15:46:52 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:52 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:52 executing program 0: openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:46:52 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) [ 124.664791][ T8007] FAULT_INJECTION: forcing a failure. [ 124.664791][ T8007] name failslab, interval 1, probability 0, space 0, times 0 [ 124.677450][ T8007] CPU: 0 PID: 8007 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 124.687494][ T8007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.697539][ T8007] Call Trace: [ 124.700863][ T8007] dump_stack+0x1b0/0x228 [ 124.705622][ T8007] ? devkmsg_release+0x127/0x127 [ 124.710563][ T8007] ? show_regs_print_info+0x18/0x18 [ 124.715745][ T8007] ? ebitmap_cpy+0x81/0x2f0 [ 124.720239][ T8007] ? security_compute_sid+0xe80/0x1be0 [ 124.725697][ T8007] ? security_transition_sid+0x7d/0x90 [ 124.731150][ T8007] ? selinux_socket_post_create+0x375/0x500 [ 124.737025][ T8007] ? __sock_create+0x47c/0x7b0 [ 124.741769][ T8007] ? __sys_socket+0x115/0x350 [ 124.746431][ T8007] should_fail+0x6fb/0x860 [ 124.750826][ T8007] ? setup_fault_attr+0x2b0/0x2b0 [ 124.755825][ T8007] ? find_next_bit+0xd8/0x120 [ 124.760487][ T8007] __should_failslab+0x11a/0x160 [ 124.765414][ T8007] ? context_struct_to_string+0x3b5/0x7f0 [ 124.771121][ T8007] should_failslab+0x9/0x20 [ 124.775612][ T8007] __kmalloc+0x64/0x310 [ 124.779748][ T8007] context_struct_to_string+0x3b5/0x7f0 [ 124.785279][ T8007] ? security_bounded_transition+0x520/0x520 [ 124.791241][ T8007] ? mls_range_isvalid+0x3a8/0x4c0 [ 124.796341][ T8007] ? ebitmap_contains+0x71e/0x790 [ 124.801361][ T8007] context_add_hash+0xf5/0x200 [ 124.806223][ T8007] ? security_sid_to_context_inval+0x50/0x50 [ 124.812185][ T8007] ? mls_context_isvalid+0x27e/0x390 [ 124.817556][ T8007] ? policydb_context_isvalid+0x1d5/0x430 [ 124.823253][ T8007] security_compute_sid+0x1147/0x1be0 [ 124.828605][ T8007] ? security_transition_sid+0x90/0x90 [ 124.834052][ T8007] ? new_inode_pseudo+0x7f/0x240 [ 124.838975][ T8007] ? __sock_create+0x136/0x7b0 [ 124.843721][ T8007] ? __sys_socket+0x115/0x350 [ 124.848377][ T8007] ? __x64_sys_socket+0x7a/0x90 [ 124.853221][ T8007] ? do_syscall_64+0xc0/0x100 [ 124.857893][ T8007] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.864075][ T8007] ? should_fail+0x182/0x860 [ 124.868655][ T8007] ? sock_alloc_inode+0x1b/0xc0 [ 124.873487][ T8007] ? new_inode_pseudo+0x68/0x240 [ 124.878408][ T8007] ? __sock_create+0x136/0x7b0 [ 124.883171][ T8007] ? setup_fault_attr+0x2b0/0x2b0 [ 124.888196][ T8007] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.894259][ T8007] ? ___slab_alloc+0xab/0x450 [ 124.898918][ T8007] ? kasan_kmalloc+0x9/0x10 [ 124.903419][ T8007] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 124.908866][ T8007] ? cgroup_tryget+0x102/0x2b0 [ 124.913608][ T8007] ? __rcu_read_lock+0x50/0x50 [ 124.918352][ T8007] security_transition_sid+0x7d/0x90 [ 124.923627][ T8007] selinux_socket_post_create+0x375/0x500 [ 124.929336][ T8007] ? selinux_socket_create+0x2f0/0x2f0 [ 124.934775][ T8007] ? local_bh_enable+0x1f/0x30 [ 124.939519][ T8007] ? unix_create1+0x483/0x530 [ 124.944189][ T8007] ? __module_put_and_exit+0x20/0x20 [ 124.949468][ T8007] security_socket_post_create+0x7c/0xe0 [ 124.955125][ T8007] __sock_create+0x47c/0x7b0 [ 124.959699][ T8007] __sys_socket+0x115/0x350 [ 124.964199][ T8007] ? sock_create_kern+0x50/0x50 [ 124.969068][ T8007] __x64_sys_socket+0x7a/0x90 [ 124.973739][ T8007] do_syscall_64+0xc0/0x100 [ 124.978277][ T8007] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.984154][ T8007] RIP: 0033:0x45b349 [ 124.988036][ T8007] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 125.007631][ T8007] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 15:46:52 executing program 2 (fault-call:4 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 125.016132][ T8007] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 125.028138][ T8007] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 125.036280][ T8007] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 125.044241][ T8007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 125.052223][ T8007] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000010 15:46:52 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:52 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$tipc(r3, &(0x7f0000000200)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x2, {0x4e22, 0x2}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000140)="aabf9295c64388158c24e83ae276fa4c45f913987a3442014677c00cc1d1911956028a20348deb4f44ae34607b3de83e65e6f4bbd257672d03efc52fb531b8eb", 0x40}], 0x1, &(0x7f00000001c0)="2ee94a912d714d1386c0da96e09d052c31d8dbdfbab4736a9ae4", 0x1a, 0x20048894}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x13) ioctl$ASHMEM_GET_PIN_STATUS(r5, 0x7709, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x5724, 0x400) ioctl$USBDEVFS_RELEASE_PORT(r7, 0x80045519, &(0x7f0000000040)=0x5) r8 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r8, 0x0, r8) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f0000000480)=ANY=[@ANYRESHEX=r8], 0x1) [ 125.105630][ T8025] syz-executor.0: vmalloc: allocation failure: 0 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0 [ 125.118322][ T8025] CPU: 0 PID: 8025 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 125.128608][ T8025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.138659][ T8025] Call Trace: [ 125.141931][ T8025] dump_stack+0x1b0/0x228 [ 125.146249][ T8025] ? devkmsg_release+0x127/0x127 [ 125.151175][ T8025] ? show_regs_print_info+0x18/0x18 [ 125.156360][ T8025] warn_alloc+0x1ee/0x340 [ 125.160680][ T8025] ? __vmalloc_node_range+0x43/0x760 [ 125.165957][ T8025] ? zone_watermark_ok_safe+0x420/0x420 [ 125.171494][ T8025] ? futex_exit_release+0xd0/0xd0 [ 125.176608][ T8025] ? putname+0xe5/0x140 [ 125.180743][ T8025] ? avc_has_perm+0x15f/0x260 [ 125.185432][ T8025] ? do_sys_open+0x60f/0x7a0 [ 125.190046][ T8025] __vmalloc_node_range+0x294/0x760 [ 125.195232][ T8025] ? mutex_lock+0xa6/0x110 [ 125.199695][ T8025] vmalloc+0x73/0x80 [ 125.203589][ T8025] ? sel_write_load+0x1c5/0x410 [ 125.208534][ T8025] sel_write_load+0x1c5/0x410 [ 125.213216][ T8025] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 125.218888][ T8025] __vfs_write+0xff/0x700 [ 125.223206][ T8025] ? __kernel_write+0x350/0x350 [ 125.228053][ T8025] ? avc_policy_seqno+0x1b/0x70 [ 125.232946][ T8025] ? selinux_file_permission+0x2ba/0x560 [ 125.238568][ T8025] ? security_file_permission+0x157/0x350 [ 125.244298][ T8025] ? rw_verify_area+0x1c2/0x360 [ 125.249216][ T8025] vfs_write+0x203/0x4e0 [ 125.253452][ T8025] ksys_write+0x168/0x2a0 [ 125.257765][ T8025] ? __ia32_sys_read+0x90/0x90 [ 125.262522][ T8025] ? __kasan_check_read+0x11/0x20 [ 125.267536][ T8025] ? __ia32_sys_clock_settime+0x230/0x230 [ 125.273241][ T8025] __x64_sys_write+0x7b/0x90 [ 125.277817][ T8025] do_syscall_64+0xc0/0x100 [ 125.282470][ T8025] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 125.288346][ T8025] RIP: 0033:0x45b349 [ 125.292314][ T8025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 125.311904][ T8025] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 125.320306][ T8025] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 125.328381][ T8025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 125.336353][ T8025] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 125.344359][ T8025] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff 15:46:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_tcp_int(r0, 0x6, 0x19, 0x0, &(0x7f0000000000)) 15:46:52 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 125.352319][ T8025] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000075bf2c [ 125.361108][ T8025] Mem-Info: [ 125.364529][ T8025] active_anon:99324 inactive_anon:9149 isolated_anon:0 [ 125.364529][ T8025] active_file:9074 inactive_file:12837 isolated_file:0 [ 125.364529][ T8025] unevictable:0 dirty:4 writeback:0 unstable:0 [ 125.364529][ T8025] slab_reclaimable:4698 slab_unreclaimable:61548 [ 125.364529][ T8025] mapped:60400 shmem:65 pagetables:1137 bounce:0 [ 125.364529][ T8025] free:1386861 free_pcp:923 free_cma:0 [ 125.436048][ T8025] Node 0 active_anon:397296kB inactive_anon:36596kB active_file:36296kB inactive_file:51348kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:241500kB dirty:16kB writeback:0kB shmem:260kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 125.440326][ T8039] FAULT_INJECTION: forcing a failure. [ 125.440326][ T8039] name failslab, interval 1, probability 0, space 0, times 0 [ 125.473979][ T8039] CPU: 0 PID: 8039 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 125.476817][ T8025] DMA free:15904kB min:24kB low:36kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 125.484056][ T8039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.484060][ T8039] Call Trace: [ 125.484077][ T8039] dump_stack+0x1b0/0x228 [ 125.484087][ T8039] ? devkmsg_release+0x127/0x127 15:46:53 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x1) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) truncate(&(0x7f0000000100)='./file0\x00', 0x81) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x1, 0xffff}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f000001cfb0)={0x0, 0x1, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 15:46:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x535840, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x2, 0x4, 0x7e, 0x8}, {0x4, 0x0, 0x3f, 0x1}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/3\x00') r2 = open(&(0x7f0000002000)='./bus\x00', 0x161042, 0x0) sendfile(r2, r1, 0x0, 0x3e) 15:46:53 executing program 2 (fault-call:4 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 125.484095][ T8039] ? show_regs_print_info+0x18/0x18 [ 125.484103][ T8039] ? new_inode_pseudo+0x7f/0x240 [ 125.484111][ T8039] ? __sys_socket+0x115/0x350 [ 125.484117][ T8039] ? __x64_sys_socket+0x7a/0x90 [ 125.484124][ T8039] ? do_syscall_64+0xc0/0x100 [ 125.484134][ T8039] should_fail+0x6fb/0x860 [ 125.484142][ T8039] ? setup_fault_attr+0x2b0/0x2b0 [ 125.484151][ T8039] ? ___slab_alloc+0xab/0x450 [ 125.484160][ T8039] __should_failslab+0x11a/0x160 [ 125.484170][ T8039] ? __d_alloc+0x2d/0x6d0 [ 125.484178][ T8039] should_failslab+0x9/0x20 [ 125.484186][ T8039] kmem_cache_alloc+0x37/0x2b0 [ 125.484194][ T8039] ? expand_files+0xd1/0x970 [ 125.484202][ T8039] __d_alloc+0x2d/0x6d0 [ 125.484217][ T8039] d_alloc_pseudo+0x1d/0x70 [ 125.520088][ T8025] lowmem_reserve[]: 0 2926 6432 6432 [ 125.520229][ T8039] alloc_file_pseudo+0x128/0x310 [ 125.520240][ T8039] ? alloc_empty_file_noaccount+0x80/0x80 [ 125.520248][ T8039] ? __alloc_fd+0x4e6/0x590 [ 125.520264][ T8039] sock_alloc_file+0xbb/0x250 [ 125.524028][ T8025] DMA32 free:2996688kB min:4660kB low:7656kB high:10652kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2998084kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1396kB local_pcp:0kB free_cma:0kB [ 125.528026][ T8039] __sys_socket+0x17c/0x350 [ 125.528034][ T8039] ? sock_create_kern+0x50/0x50 [ 125.528043][ T8039] __x64_sys_socket+0x7a/0x90 [ 125.528051][ T8039] do_syscall_64+0xc0/0x100 [ 125.528061][ T8039] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 125.528070][ T8039] RIP: 0033:0x45b349 [ 125.528078][ T8039] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 125.528088][ T8039] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 125.533449][ T8025] lowmem_reserve[]: 0 0 3506 3506 [ 125.538210][ T8039] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 125.538215][ T8039] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 125.538218][ T8039] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 125.538222][ T8039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 125.538226][ T8039] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000011 15:46:53 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 125.757939][ T8025] Normal free:2534316kB min:5588kB low:9176kB high:12764kB active_anon:397796kB inactive_anon:36596kB active_file:36296kB inactive_file:51348kB unevictable:0kB writepending:224kB present:4718592kB managed:3590720kB mlocked:0kB kernel_stack:3840kB pagetables:4696kB bounce:0kB free_pcp:2464kB local_pcp:1268kB free_cma:0kB [ 125.791641][ T8025] lowmem_reserve[]: 0 0 0 0 [ 125.796804][ T8025] DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (U) 3*4096kB (M) = 15904kB [ 125.816189][ T8025] DMA32: 4*4kB (M) 2*8kB (M) 5*16kB (M) 3*32kB (M) 2*64kB (M) 3*128kB (M) 3*256kB (M) 2*512kB (M) 2*1024kB (M) 1*2048kB (M) 730*4096kB (M) = 2996688kB 15:46:53 executing program 3: r0 = creat(0x0, 0x0) unshare(0x40000000) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x100000001}, 0x16, 0x3) r1 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f00002d5000/0x1000)=nil, 0x1000, 0x0, r1) r2 = socket(0x10, 0x80002, 0x0) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000380)=@newtaction={0x2c, 0x32, 0x81fdfaa6b79c4819, 0x0, 0x0, {}, [{0x18}]}, 0x2c}}, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000100)={0x6, 'erspan0\x00', {}, 0x80}) pkey_free(r1) [ 125.833714][ T8025] Normal: 59*4kB (UME) 84*8kB (UE) 249*16kB (UME) 38*32kB (UE) 203*64kB (UME) 153*128kB (UE) 128*256kB (UME) 52*512kB (UE) 34*1024kB (U) 2*2048kB (UE) 585*4096kB (M) = 2533148kB [ 125.857794][ T8025] 21972 total pagecache pages [ 125.862695][ T8058] FAULT_INJECTION: forcing a failure. [ 125.862695][ T8058] name failslab, interval 1, probability 0, space 0, times 0 [ 125.867961][ T8025] 0 pages in swap cache 15:46:53 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 125.897358][ T8025] Swap cache stats: add 0, delete 0, find 0/0 [ 125.903775][ T8025] Free swap = 0kB [ 125.912091][ T8025] Total swap = 0kB [ 125.918499][ T8025] 1965979 pages RAM [ 125.923477][ T8025] 0 pages HighMem/MovableOnly [ 125.923989][ T8058] CPU: 1 PID: 8058 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 15:46:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 15:46:53 executing program 4: mknod(&(0x7f0000000040)='./bus\x00', 0x2000000000001000, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) open(&(0x7f0000000280)='./bus\x00', 0x80040, 0x8) io_setup(0x3, &(0x7f0000000200)=0x0) fcntl$setstatus(r0, 0x4, 0x4800) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r3 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r3) ftruncate(r3, 0x0) write$binfmt_elf64(r2, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) r7 = open(&(0x7f00000003c0)='./file1\x00', 0x212182, 0x194) getsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @local}, &(0x7f0000000140)=0xc) r9 = socket(0x1, 0x5, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r10) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="3c020000100013070000000000000000fe880000000000000000000000000001ac1e00010000000000000000000000004e2200ff00000000020000000000000060b5f8d6ddea0626866d59c6fb12acc0607b0f06a315496ba897ae62d773ac8ecb4536fbd21560fcc806b9539e1215091262012704a0a2fb2b8dc08935bdbc8e6829dbae3e447861e9a8d8a6b8433612cc9c86a64c71de2a31a4363c336e5a148b5696ae03dda1963ff0cb67d6aa76d6f792d77cff50bce5207680db49eb95370366897b2456e7785aa457c0daebbd5cd516e372d75dc0a9218ec51a06d0fc0ae9a4425f6853b96aa9264353c3cc1a", @ANYRES32=0x0, @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r8, @ANYRES32, @ANYBLOB], 0x7}}, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x5, 0x4}, {0x0, 0x5}], r10}, 0x18, 0x6) io_submit(r1, 0x3, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r0, &(0x7f0000000000), 0x3002}]) [ 125.938217][ T8058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.945764][ T8025] 314802 pages reserved [ 125.948264][ T8058] Call Trace: [ 125.948281][ T8058] dump_stack+0x1b0/0x228 [ 125.948296][ T8058] ? devkmsg_release+0x127/0x127 [ 125.953968][ T8025] 0 pages cma reserved [ 125.955833][ T8058] ? show_regs_print_info+0x18/0x18 [ 125.955848][ T8058] ? new_inode_pseudo+0x7f/0x240 [ 125.979423][ T8058] ? __sys_socket+0x115/0x350 [ 125.984081][ T8058] ? __x64_sys_socket+0x7a/0x90 [ 125.988912][ T8058] ? do_syscall_64+0xc0/0x100 [ 125.993582][ T8058] should_fail+0x6fb/0x860 [ 125.997975][ T8058] ? setup_fault_attr+0x2b0/0x2b0 [ 126.003069][ T8058] ? should_fail+0x182/0x860 [ 126.007740][ T8058] __should_failslab+0x11a/0x160 [ 126.012656][ T8058] ? __d_alloc+0x2d/0x6d0 [ 126.017022][ T8058] should_failslab+0x9/0x20 [ 126.021502][ T8058] kmem_cache_alloc+0x37/0x2b0 [ 126.026250][ T8058] ? expand_files+0xd1/0x970 [ 126.030816][ T8058] __d_alloc+0x2d/0x6d0 [ 126.034950][ T8058] d_alloc_pseudo+0x1d/0x70 [ 126.039490][ T8058] alloc_file_pseudo+0x128/0x310 [ 126.044406][ T8058] ? alloc_empty_file_noaccount+0x80/0x80 [ 126.050104][ T8058] ? __alloc_fd+0x4e6/0x590 [ 126.054584][ T8058] sock_alloc_file+0xbb/0x250 [ 126.059246][ T8058] __sys_socket+0x17c/0x350 [ 126.063728][ T8058] ? sock_create_kern+0x50/0x50 [ 126.068554][ T8058] __x64_sys_socket+0x7a/0x90 [ 126.073203][ T8058] do_syscall_64+0xc0/0x100 [ 126.077690][ T8058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.083555][ T8058] RIP: 0033:0x45b349 [ 126.087432][ T8058] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 126.107038][ T8058] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 126.115439][ T8058] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 126.123419][ T8058] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 126.131365][ T8058] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 126.139464][ T8058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 15:46:53 executing program 2 (fault-call:4 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 126.147437][ T8058] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000012 15:46:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, 0x0, 0x0) 15:46:53 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 126.192488][ T8069] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 15:46:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 126.252501][ T8094] FAULT_INJECTION: forcing a failure. [ 126.252501][ T8094] name failslab, interval 1, probability 0, space 0, times 0 [ 126.266405][ T8094] CPU: 0 PID: 8094 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 126.276483][ T8094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.286531][ T8094] Call Trace: [ 126.289815][ T8094] dump_stack+0x1b0/0x228 [ 126.294144][ T8094] ? devkmsg_release+0x127/0x127 15:46:53 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) [ 126.299083][ T8094] ? show_regs_print_info+0x18/0x18 [ 126.304300][ T8094] ? security_transition_sid+0x90/0x90 [ 126.309781][ T8094] should_fail+0x6fb/0x860 [ 126.314202][ T8094] ? setup_fault_attr+0x2b0/0x2b0 [ 126.319225][ T8094] ? should_fail+0x182/0x860 [ 126.323804][ T8094] ? inode_doinit_with_dentry+0x117/0x10e0 [ 126.329591][ T8094] __should_failslab+0x11a/0x160 [ 126.334566][ T8094] ? __alloc_file+0x29/0x3b0 [ 126.339251][ T8094] should_failslab+0x9/0x20 [ 126.343790][ T8094] kmem_cache_alloc+0x37/0x2b0 [ 126.348560][ T8094] ? _raw_spin_trylock_bh+0x190/0x190 [ 126.353949][ T8094] __alloc_file+0x29/0x3b0 [ 126.358347][ T8094] ? alloc_empty_file+0x4c/0x1b0 [ 126.363450][ T8094] alloc_empty_file+0xac/0x1b0 [ 126.368199][ T8094] alloc_file+0x5b/0x4b0 [ 126.372530][ T8094] ? _raw_spin_unlock+0x9/0x20 [ 126.377281][ T8094] alloc_file_pseudo+0x25b/0x310 [ 126.382200][ T8094] ? alloc_empty_file_noaccount+0x80/0x80 [ 126.387959][ T8094] ? __alloc_fd+0x4e6/0x590 [ 126.392521][ T8094] sock_alloc_file+0xbb/0x250 [ 126.397186][ T8094] __sys_socket+0x17c/0x350 [ 126.401726][ T8094] ? sock_create_kern+0x50/0x50 [ 126.406561][ T8094] __x64_sys_socket+0x7a/0x90 [ 126.411223][ T8094] do_syscall_64+0xc0/0x100 [ 126.415714][ T8094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.421580][ T8094] RIP: 0033:0x45b349 [ 126.425450][ T8094] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 126.445051][ T8094] RSP: 002b:00007f6006302c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 15:46:53 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 126.453446][ T8094] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 000000000045b349 [ 126.461401][ T8094] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 126.469361][ T8094] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 126.477316][ T8094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 126.485278][ T8094] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000013 [ 126.494515][ T22] kauditd_printk_skb: 124 callbacks suppressed 15:46:54 executing program 2 (fault-call:4 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 126.494522][ T22] audit: type=1326 audit(1580485613.976:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=0 compat=0 ip=0x414e81 code=0x7ffc0000 [ 126.526039][ T22] audit: type=1326 audit(1580485613.976:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=1 compat=0 ip=0x414e21 code=0x7ffc0000 15:46:54 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 126.551203][ T22] audit: type=1326 audit(1580485613.976:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=3 compat=0 ip=0x414ee1 code=0x7ffc0000 [ 126.576545][ T22] audit: type=1326 audit(1580485613.976:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 126.609560][ T22] audit: type=1326 audit(1580485613.986:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 126.637100][ T22] audit: type=1326 audit(1580485613.986:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8087 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 126.675469][ T22] audit: type=1326 audit(1580485614.156:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8109 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 126.676976][ T8116] FAULT_INJECTION: forcing a failure. [ 126.676976][ T8116] name failslab, interval 1, probability 0, space 0, times 0 [ 126.701543][ T22] audit: type=1326 audit(1580485614.156:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8109 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 126.714350][ T8116] CPU: 0 PID: 8116 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 126.749247][ T8116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.759289][ T8116] Call Trace: [ 126.762569][ T8116] dump_stack+0x1b0/0x228 [ 126.767036][ T8116] ? devkmsg_release+0x127/0x127 [ 126.771969][ T8116] ? arch_stack_walk+0x98/0xe0 [ 126.776734][ T8116] ? show_regs_print_info+0x18/0x18 [ 126.781920][ T8116] should_fail+0x6fb/0x860 [ 126.786313][ T8116] ? setup_fault_attr+0x2b0/0x2b0 [ 126.791331][ T8116] ? audit_filter+0xeb9/0xf20 [ 126.796003][ T8116] ? stack_trace_snprint+0x150/0x150 [ 126.801274][ T8116] __should_failslab+0x11a/0x160 [ 126.806194][ T8116] ? audit_log_start+0x475/0x9a0 [ 126.811216][ T8116] should_failslab+0x9/0x20 [ 126.815726][ T8116] kmem_cache_alloc+0x37/0x2b0 [ 126.820474][ T8116] ? kasan_slab_alloc+0xe/0x10 [ 126.825231][ T8116] ? kmem_cache_alloc+0x120/0x2b0 [ 126.830237][ T8116] ? security_file_alloc+0x36/0x210 [ 126.835428][ T8116] audit_log_start+0x475/0x9a0 [ 126.840179][ T8116] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.846238][ T8116] ? audit_serial+0x30/0x30 [ 126.850736][ T8116] ? alloc_file_pseudo+0x128/0x310 [ 126.855838][ T8116] ? sock_alloc_file+0xbb/0x250 [ 126.860679][ T8116] ? __sys_socket+0x17c/0x350 [ 126.865344][ T8116] ? __x64_sys_socket+0x7a/0x90 [ 126.870180][ T8116] ? do_syscall_64+0xc0/0x100 [ 126.874851][ T8116] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 126.880908][ T8116] ? should_fail+0x182/0x860 [ 126.885475][ T8116] ? __sys_socket+0x115/0x350 [ 126.890137][ T8116] ? __x64_sys_socket+0x7a/0x90 [ 126.894980][ T8116] ? setup_fault_attr+0x2b0/0x2b0 [ 126.899993][ T8116] audit_seccomp+0x62/0x180 [ 126.904479][ T8116] __seccomp_filter+0xd15/0x1890 [ 126.909404][ T8116] ? __secure_computing+0x240/0x240 [ 126.914584][ T8116] ? __kasan_check_write+0x14/0x20 [ 126.919698][ T8116] ? __mutex_init+0xa1/0xf0 [ 126.924194][ T8116] ? percpu_counter_add_batch+0x136/0x160 [ 126.929901][ T8116] ? alloc_file+0x84/0x4b0 [ 126.934304][ T8116] ? memcpy+0x49/0x60 [ 126.938529][ T8116] ? errseq_sample+0x43/0x70 [ 126.943228][ T8116] ? alloc_file+0x3d3/0x4b0 [ 126.947720][ T8116] ? alloc_file_pseudo+0x282/0x310 [ 126.952833][ T8116] ? alloc_empty_file_noaccount+0x80/0x80 [ 126.961052][ T8116] ? __alloc_fd+0x4e6/0x590 [ 126.965551][ T8116] __secure_computing+0x1c6/0x240 [ 126.970568][ T8116] syscall_trace_enter+0x596/0xa90 [ 126.975666][ T8116] ? switch_fpu_return+0x10/0x10 [ 126.980586][ T8116] ? do_syscall_64+0x100/0x100 [ 126.985334][ T8116] ? syscall_return_slowpath+0x6f/0x500 [ 126.991000][ T8116] do_syscall_64+0x6b/0x100 [ 126.995512][ T8116] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.008267][ T8116] RIP: 0033:0x414e81 [ 127.012272][ T8116] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 127.031893][ T8116] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 127.040466][ T8116] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 127.048446][ T8116] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 127.056423][ T8116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 127.064503][ T8116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 127.072469][ T8116] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000014 [ 127.080633][ T22] audit: type=1326 audit(1580485614.156:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8109 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 127.092120][ T8116] audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 15:46:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f00000010c0)={{0x2, 0x2, 0xfffff31c, 0x1, 0x7}, 0x2, 0xb34, 'id1\x00', 'timer0\x00', 0x0, 0x0, 0xe4e, 0x4, 0x7}) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, r0, 0x0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) readv(r0, &(0x7f0000002440)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1) 15:46:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x0) 15:46:55 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:55 executing program 2 (fault-call:4 fault-nth:21): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:55 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) write$selinux_access(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0de2a219d3f0fe00abe86fc09a0ea4c6541184edb0b165036cefd106bd"], 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) lseek(r4, 0x6, 0x0) ioctl$TCSETSW(r4, 0x5403, &(0x7f0000000140)={0x87, 0x400009, 0x7f, 0x7fe, 0x9, "e687fd8d2669dc414f3b4df033e7734607e544"}) r5 = dup(0xffffffffffffffff) ioctl$EVIOCGBITKEY(r5, 0x80404521, &(0x7f0000000280)=""/65) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r3, 0x400, 0x0, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80000000) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) flock(0xffffffffffffffff, 0x0) write$9p(r1, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r1, r2, 0x0, 0x1c5f2) 15:46:55 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) [ 127.589193][ T8137] FAULT_INJECTION: forcing a failure. [ 127.589193][ T8137] name failslab, interval 1, probability 0, space 0, times 0 [ 127.602684][ T8137] CPU: 0 PID: 8137 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 127.612767][ T8137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.622815][ T8137] Call Trace: [ 127.626107][ T8137] dump_stack+0x1b0/0x228 [ 127.630422][ T8137] ? devkmsg_release+0x127/0x127 [ 127.635466][ T8137] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.641529][ T8137] ? show_regs_print_info+0x18/0x18 [ 127.646782][ T8137] ? unwind_get_return_address+0x4c/0x90 [ 127.652403][ T8137] should_fail+0x6fb/0x860 [ 127.656940][ T8137] ? setup_fault_attr+0x2b0/0x2b0 [ 127.661976][ T8137] ? should_fail+0x182/0x860 [ 127.666558][ T8137] __should_failslab+0x11a/0x160 [ 127.671481][ T8137] ? __alloc_skb+0xbc/0x540 [ 127.676114][ T8137] should_failslab+0x9/0x20 [ 127.680611][ T8137] kmem_cache_alloc+0x37/0x2b0 [ 127.685369][ T8137] __alloc_skb+0xbc/0x540 [ 127.689684][ T8137] ? kmem_cache_alloc+0x120/0x2b0 [ 127.694702][ T8137] ? security_file_alloc+0x36/0x210 [ 127.700008][ T8137] audit_log_start+0x4a1/0x9a0 [ 127.704770][ T8137] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.710840][ T8137] ? audit_serial+0x30/0x30 [ 127.715332][ T8137] ? alloc_file_pseudo+0x128/0x310 [ 127.720543][ T8137] ? sock_alloc_file+0xbb/0x250 [ 127.725389][ T8137] ? __sys_socket+0x17c/0x350 [ 127.730878][ T8137] ? __x64_sys_socket+0x7a/0x90 [ 127.735723][ T8137] ? do_syscall_64+0xc0/0x100 [ 127.740830][ T8137] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.746894][ T8137] ? should_fail+0x182/0x860 [ 127.751494][ T8137] ? __sys_socket+0x115/0x350 [ 127.756163][ T8137] ? __x64_sys_socket+0x7a/0x90 [ 127.761019][ T8137] ? do_syscall_64+0xc0/0x100 [ 127.765688][ T8137] ? setup_fault_attr+0x2b0/0x2b0 [ 127.770694][ T8137] audit_seccomp+0x62/0x180 [ 127.775460][ T8137] __seccomp_filter+0xd15/0x1890 [ 127.780468][ T8137] ? __secure_computing+0x240/0x240 [ 127.785770][ T8137] ? __kasan_check_write+0x14/0x20 [ 127.790870][ T8137] ? __mutex_init+0xa1/0xf0 [ 127.795375][ T8137] ? percpu_counter_add_batch+0x136/0x160 [ 127.801360][ T8137] ? alloc_file+0x84/0x4b0 [ 127.805882][ T8137] ? memcpy+0x49/0x60 [ 127.809847][ T8137] ? errseq_sample+0x43/0x70 [ 127.814434][ T8137] ? alloc_file+0x3d3/0x4b0 [ 127.818936][ T8137] ? alloc_file_pseudo+0x282/0x310 [ 127.824043][ T8137] ? alloc_empty_file_noaccount+0x80/0x80 [ 127.829742][ T8137] ? __alloc_fd+0x4e6/0x590 [ 127.834248][ T8137] __secure_computing+0x1c6/0x240 [ 127.839322][ T8137] syscall_trace_enter+0x596/0xa90 [ 127.844441][ T8137] ? switch_fpu_return+0x10/0x10 [ 127.849458][ T8137] ? do_syscall_64+0x100/0x100 [ 127.854360][ T8137] ? syscall_return_slowpath+0x6f/0x500 [ 127.859890][ T8137] do_syscall_64+0x6b/0x100 [ 127.864390][ T8137] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 127.870269][ T8137] RIP: 0033:0x414e81 [ 127.874167][ T8137] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 127.893758][ T8137] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 127.902257][ T8137] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 127.910218][ T8137] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 127.918182][ T8137] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 127.926145][ T8137] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 15:46:55 executing program 2 (fault-call:4 fault-nth:22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) [ 127.934104][ T8137] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000015 15:46:55 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:55 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) [ 128.039517][ T8155] FAULT_INJECTION: forcing a failure. [ 128.039517][ T8155] name failslab, interval 1, probability 0, space 0, times 0 [ 128.059798][ T8155] CPU: 0 PID: 8155 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 128.069902][ T8155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.079956][ T8155] Call Trace: [ 128.083267][ T8155] dump_stack+0x1b0/0x228 [ 128.087593][ T8155] ? devkmsg_release+0x127/0x127 [ 128.092545][ T8155] ? __seccomp_filter+0xd15/0x1890 [ 128.097666][ T8155] ? show_regs_print_info+0x18/0x18 [ 128.102869][ T8155] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.108946][ T8155] ? __kernel_text_address+0x9a/0x110 [ 128.114335][ T8155] ? unwind_get_return_address+0x4c/0x90 [ 128.119965][ T8155] should_fail+0x6fb/0x860 [ 128.124380][ T8155] ? setup_fault_attr+0x2b0/0x2b0 [ 128.129402][ T8155] ? setup_fault_attr+0x2b0/0x2b0 [ 128.134434][ T8155] ? should_fail+0x182/0x860 [ 128.139033][ T8155] __should_failslab+0x11a/0x160 [ 128.143978][ T8155] ? audit_log_start+0x4a1/0x9a0 [ 128.148923][ T8155] should_failslab+0x9/0x20 [ 128.153535][ T8155] __kmalloc_track_caller+0x5f/0x320 [ 128.158826][ T8155] ? kmem_cache_alloc+0x120/0x2b0 [ 128.163900][ T8155] ? audit_log_start+0x4a1/0x9a0 [ 128.169001][ T8155] __alloc_skb+0x109/0x540 [ 128.173425][ T8155] audit_log_start+0x4a1/0x9a0 [ 128.178287][ T8155] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.184368][ T8155] ? audit_serial+0x30/0x30 [ 128.188889][ T8155] ? alloc_file_pseudo+0x128/0x310 [ 128.194011][ T8155] ? sock_alloc_file+0xbb/0x250 [ 128.198876][ T8155] ? __sys_socket+0x17c/0x350 [ 128.203558][ T8155] ? __x64_sys_socket+0x7a/0x90 [ 128.208422][ T8155] ? do_syscall_64+0xc0/0x100 [ 128.213163][ T8155] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.219369][ T8155] ? should_fail+0x182/0x860 [ 128.223992][ T8155] ? __sys_socket+0x115/0x350 [ 128.229690][ T8155] ? __x64_sys_socket+0x7a/0x90 [ 128.234550][ T8155] ? do_syscall_64+0xc0/0x100 [ 128.239239][ T8155] ? setup_fault_attr+0x2b0/0x2b0 [ 128.244274][ T8155] audit_seccomp+0x62/0x180 [ 128.248781][ T8155] __seccomp_filter+0xd15/0x1890 [ 128.253720][ T8155] ? __secure_computing+0x240/0x240 [ 128.258931][ T8155] ? __kasan_check_write+0x14/0x20 [ 128.264060][ T8155] ? __mutex_init+0xa1/0xf0 [ 128.268573][ T8155] ? percpu_counter_add_batch+0x136/0x160 [ 128.274301][ T8155] ? alloc_file+0x84/0x4b0 [ 128.278722][ T8155] ? memcpy+0x49/0x60 [ 128.282750][ T8155] ? errseq_sample+0x43/0x70 [ 128.287341][ T8155] ? alloc_file+0x3d3/0x4b0 [ 128.291851][ T8155] ? alloc_file_pseudo+0x282/0x310 [ 128.296966][ T8155] ? alloc_empty_file_noaccount+0x80/0x80 [ 128.302709][ T8155] ? __alloc_fd+0x4e6/0x590 [ 128.307216][ T8155] __secure_computing+0x1c6/0x240 [ 128.312253][ T8155] syscall_trace_enter+0x596/0xa90 [ 128.317417][ T8155] ? fd_install+0x51/0x60 [ 128.321747][ T8155] ? do_syscall_64+0x100/0x100 [ 128.326569][ T8155] ? syscall_return_slowpath+0x6f/0x500 [ 128.332787][ T8155] do_syscall_64+0x6b/0x100 [ 128.337331][ T8155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.343665][ T8155] RIP: 0033:0x414e81 [ 128.347573][ T8155] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 128.367372][ T8155] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 128.375785][ T8155] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 128.383764][ T8155] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 128.391740][ T8155] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 128.399804][ T8155] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 128.407877][ T8155] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000016 15:46:55 executing program 3: unshare(0x400) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f00000000c0)='net/ip6_mr_vif\x00') r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) fremovexattr(r2, &(0x7f0000000000)=@known='security.apparmor\x00') syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 15:46:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r2, &(0x7f0000000000)={0x11, 0x7, 0x2, {{0x4, 'sit\x00'}, 0x8}}, 0x11) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000000000050700007fc40000000000000057", @ANYRES32=r5, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r6], 0x38}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000700)=ANY=[@ANYBLOB="400000001000472d390400800000000000000000", @ANYRES32=r6, @ANYBLOB="000000000000000020001280080001007369740014000280080005000000000005000a0000000000"], 0x40}}, 0x0) 15:46:55 executing program 2 (fault-call:4 fault-nth:23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:55 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:55 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00"], 0x1c) [ 128.491039][ T8176] FAULT_INJECTION: forcing a failure. [ 128.491039][ T8176] name failslab, interval 1, probability 0, space 0, times 0 [ 128.503978][ T8176] CPU: 0 PID: 8176 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 128.514037][ T8176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.524080][ T8176] Call Trace: [ 128.527385][ T8176] dump_stack+0x1b0/0x228 [ 128.531705][ T8176] ? devkmsg_release+0x127/0x127 [ 128.536620][ T8176] ? number+0xeac/0x1170 [ 128.540850][ T8176] ? show_regs_print_info+0x18/0x18 [ 128.546037][ T8176] ? put_dec_trunc8+0x1c4/0x2d0 [ 128.550874][ T8176] should_fail+0x6fb/0x860 [ 128.555276][ T8176] ? setup_fault_attr+0x2b0/0x2b0 [ 128.560284][ T8176] ? find_next_bit+0xd8/0x120 [ 128.564938][ T8176] __should_failslab+0x11a/0x160 [ 128.569960][ T8176] ? context_struct_to_string+0x3b5/0x7f0 [ 128.575672][ T8176] should_failslab+0x9/0x20 [ 128.580236][ T8176] __kmalloc+0x64/0x310 [ 128.584381][ T8176] context_struct_to_string+0x3b5/0x7f0 [ 128.589940][ T8176] ? security_bounded_transition+0x520/0x520 [ 128.595909][ T8176] ? sidtab_search+0x194/0x3a0 [ 128.600656][ T8176] security_sid_to_context_core+0x259/0x380 [ 128.606538][ T8176] security_sid_to_context+0x33/0x40 [ 128.611828][ T8176] selinux_secid_to_secctx+0x2a/0x40 [ 128.617154][ T8176] security_secid_to_secctx+0x66/0xd0 [ 128.622627][ T8176] audit_log_task_context+0xf0/0x2d0 [ 128.627915][ T8176] ? audit_log_key+0x140/0x140 [ 128.632669][ T8176] ? audit_serial+0x30/0x30 [ 128.637160][ T8176] ? alloc_file_pseudo+0x128/0x310 [ 128.642254][ T8176] audit_log_task+0x17d/0x2e0 [ 128.646958][ T8176] ? audit_core_dumps+0x100/0x100 [ 128.651967][ T8176] ? should_fail+0x182/0x860 [ 128.656537][ T8176] ? __sys_socket+0x115/0x350 [ 128.661193][ T8176] ? __x64_sys_socket+0x7a/0x90 [ 128.666034][ T8176] ? do_syscall_64+0xc0/0x100 [ 128.670766][ T8176] ? setup_fault_attr+0x2b0/0x2b0 [ 128.675776][ T8176] audit_seccomp+0x83/0x180 [ 128.680277][ T8176] __seccomp_filter+0xd15/0x1890 [ 128.685202][ T8176] ? __secure_computing+0x240/0x240 [ 128.690387][ T8176] ? __kasan_check_write+0x14/0x20 [ 128.695487][ T8176] ? __mutex_init+0xa1/0xf0 [ 128.699989][ T8176] ? percpu_counter_add_batch+0x136/0x160 [ 128.705687][ T8176] ? alloc_file+0x84/0x4b0 [ 128.710221][ T8176] ? memcpy+0x49/0x60 [ 128.714184][ T8176] ? errseq_sample+0x43/0x70 [ 128.718750][ T8176] ? alloc_file+0x3d3/0x4b0 [ 128.723242][ T8176] ? alloc_file_pseudo+0x282/0x310 [ 128.728339][ T8176] ? alloc_empty_file_noaccount+0x80/0x80 [ 128.734035][ T8176] ? __alloc_fd+0x4e6/0x590 [ 128.738520][ T8176] __secure_computing+0x1c6/0x240 [ 128.743526][ T8176] syscall_trace_enter+0x596/0xa90 [ 128.748614][ T8176] ? switch_fpu_return+0x10/0x10 [ 128.753584][ T8176] ? do_syscall_64+0x100/0x100 [ 128.758377][ T8176] ? syscall_return_slowpath+0x6f/0x500 [ 128.763949][ T8176] do_syscall_64+0x6b/0x100 [ 128.768439][ T8176] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 128.774311][ T8176] RIP: 0033:0x414e81 [ 128.778183][ T8176] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 128.797882][ T8176] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 128.806274][ T8176] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 128.814446][ T8176] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 128.822403][ T8176] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 128.830361][ T8176] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 15:46:56 executing program 2 (fault-call:4 fault-nth:24): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 128.838329][ T8176] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000017 15:46:56 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 128.900966][ T8189] SELinux: ebitmap: truncated map [ 128.908840][ T8189] sel_write_load: 17 callbacks suppressed [ 128.908843][ T8189] SELinux: failed to load policy [ 128.921281][ T8184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8184 comm=syz-executor.4 [ 128.923570][ T8191] SELinux: failed to load policy 15:46:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00"], 0x1c) [ 128.947335][ T8190] FAULT_INJECTION: forcing a failure. [ 128.947335][ T8190] name failslab, interval 1, probability 0, space 0, times 0 [ 128.954452][ T8184] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 128.972128][ T8190] CPU: 0 PID: 8190 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 128.975618][ T8199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8199 comm=syz-executor.4 15:46:56 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 128.982214][ T8190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.982217][ T8190] Call Trace: [ 128.982237][ T8190] dump_stack+0x1b0/0x228 [ 128.982247][ T8190] ? devkmsg_release+0x127/0x127 [ 128.982256][ T8190] ? show_regs_print_info+0x18/0x18 [ 128.982265][ T8190] ? audit_log_format+0x110/0x110 [ 128.982276][ T8190] should_fail+0x6fb/0x860 [ 128.982284][ T8190] ? setup_fault_attr+0x2b0/0x2b0 [ 128.982292][ T8190] ? audit_log_format+0xc8/0x110 [ 128.982301][ T8190] ? __rcu_read_lock+0x50/0x50 15:46:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00"], 0x1c) [ 128.982311][ T8190] __should_failslab+0x11a/0x160 [ 128.982318][ T8190] ? audit_log_d_path+0xc2/0x260 [ 128.982327][ T8190] should_failslab+0x9/0x20 [ 128.982336][ T8190] kmem_cache_alloc_trace+0x3a/0x2f0 [ 128.982344][ T8190] audit_log_d_path+0xc2/0x260 [ 128.982358][ T8190] audit_log_d_path_exe+0x42/0x70 [ 129.052281][ T8207] SELinux: failed to load policy [ 129.056900][ T8190] audit_log_task+0x201/0x2e0 [ 129.056909][ T8190] ? audit_core_dumps+0x100/0x100 [ 129.056919][ T8190] ? should_fail+0x182/0x860 [ 129.056929][ T8190] ? __sys_socket+0x115/0x350 [ 129.056936][ T8190] ? __x64_sys_socket+0x7a/0x90 [ 129.056948][ T8190] ? do_syscall_64+0xc0/0x100 [ 129.109958][ T8190] ? setup_fault_attr+0x2b0/0x2b0 [ 129.114964][ T8190] audit_seccomp+0x83/0x180 [ 129.119497][ T8190] __seccomp_filter+0xd15/0x1890 [ 129.124413][ T8190] ? __secure_computing+0x240/0x240 [ 129.129594][ T8190] ? __kasan_check_write+0x14/0x20 [ 129.134694][ T8190] ? __mutex_init+0xa1/0xf0 [ 129.139177][ T8190] ? percpu_counter_add_batch+0x136/0x160 [ 129.144922][ T8190] ? alloc_file+0x84/0x4b0 [ 129.149330][ T8190] ? memcpy+0x49/0x60 [ 129.153332][ T8190] ? errseq_sample+0x43/0x70 [ 129.157906][ T8190] ? alloc_file+0x3d3/0x4b0 [ 129.162385][ T8190] ? alloc_file_pseudo+0x282/0x310 [ 129.167480][ T8190] ? alloc_empty_file_noaccount+0x80/0x80 [ 129.173187][ T8190] ? __alloc_fd+0x4e6/0x590 [ 129.177682][ T8190] __secure_computing+0x1c6/0x240 [ 129.182685][ T8190] syscall_trace_enter+0x596/0xa90 [ 129.187771][ T8190] ? switch_fpu_return+0x10/0x10 [ 129.192694][ T8190] ? do_syscall_64+0x100/0x100 [ 129.197547][ T8190] ? syscall_return_slowpath+0x6f/0x500 [ 129.203097][ T8190] do_syscall_64+0x6b/0x100 [ 129.207587][ T8190] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.213470][ T8190] RIP: 0033:0x414e81 [ 129.217354][ T8190] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 129.237040][ T8190] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 15:46:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGLCKTRMIOS(r5, 0x5456, &(0x7f0000000040)={0x3, 0x9, 0x7, 0xffffffff, 0x6, "44d97f15a71a065601c14570a6bda66c80f15d"}) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r6 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x24) fchdir(r6) r7 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r7, 0x800) socket$inet6_tcp(0xa, 0x1, 0x0) lseek(r7, 0x0, 0x2) r8 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x280900) 15:46:56 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001100090468fe0700000000000700ff3f03000000450001070000001419001a0004", 0x25}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffa) pwrite64(0xffffffffffffffff, &(0x7f00000001c0)="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", 0x1000, 0x1) 15:46:56 executing program 2 (fault-call:4 fault-nth:25): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) 15:46:56 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 129.245519][ T8190] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 129.253481][ T8190] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 129.261440][ T8190] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 129.269408][ T8190] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 129.277360][ T8190] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000018 15:46:56 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02"], 0x2a) [ 129.367371][ T8221] SELinux: failed to load policy [ 129.383022][ T8224] FAULT_INJECTION: forcing a failure. [ 129.383022][ T8224] name failslab, interval 1, probability 0, space 0, times 0 [ 129.395825][ T8224] CPU: 1 PID: 8224 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 129.405919][ T8224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.415958][ T8224] Call Trace: [ 129.419231][ T8224] dump_stack+0x1b0/0x228 [ 129.423557][ T8224] ? devkmsg_release+0x127/0x127 [ 129.424625][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.428495][ T8224] ? show_regs_print_info+0x18/0x18 [ 129.428506][ T8224] ? audit_log_format+0x110/0x110 [ 129.428517][ T8224] should_fail+0x6fb/0x860 [ 129.428526][ T8224] ? setup_fault_attr+0x2b0/0x2b0 [ 129.428539][ T8224] ? audit_log_format+0xc8/0x110 [ 129.441552][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.446439][ T8224] ? __rcu_read_lock+0x50/0x50 [ 129.446448][ T8224] __should_failslab+0x11a/0x160 [ 129.446458][ T8224] ? audit_log_d_path+0xc2/0x260 [ 129.446467][ T8224] should_failslab+0x9/0x20 [ 129.446475][ T8224] kmem_cache_alloc_trace+0x3a/0x2f0 [ 129.446489][ T8224] audit_log_d_path+0xc2/0x260 15:46:57 executing program 2 (fault-call:4 fault-nth:26): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 129.451717][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.455903][ T8224] audit_log_d_path_exe+0x42/0x70 [ 129.455912][ T8224] audit_log_task+0x201/0x2e0 [ 129.455921][ T8224] ? audit_core_dumps+0x100/0x100 [ 129.455931][ T8224] ? should_fail+0x182/0x860 [ 129.455940][ T8224] ? __sys_socket+0x115/0x350 [ 129.455954][ T8224] ? __x64_sys_socket+0x7a/0x90 [ 129.461184][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.465893][ T8224] ? do_syscall_64+0xc0/0x100 [ 129.465905][ T8224] ? setup_fault_attr+0x2b0/0x2b0 [ 129.465914][ T8224] audit_seccomp+0x83/0x180 [ 129.465923][ T8224] __seccomp_filter+0xd15/0x1890 [ 129.465930][ T8224] ? __secure_computing+0x240/0x240 [ 129.465944][ T8224] ? __kasan_check_write+0x14/0x20 [ 129.478861][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.483358][ T8224] ? __mutex_init+0xa1/0xf0 [ 129.483369][ T8224] ? percpu_counter_add_batch+0x136/0x160 [ 129.483376][ T8224] ? alloc_file+0x84/0x4b0 [ 129.483383][ T8224] ? memcpy+0x49/0x60 [ 129.483391][ T8224] ? errseq_sample+0x43/0x70 [ 129.483398][ T8224] ? alloc_file+0x3d3/0x4b0 [ 129.483406][ T8224] ? alloc_file_pseudo+0x282/0x310 [ 129.483413][ T8224] ? alloc_empty_file_noaccount+0x80/0x80 [ 129.483427][ T8224] ? __alloc_fd+0x4e6/0x590 [ 129.488575][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.493286][ T8224] __secure_computing+0x1c6/0x240 [ 129.493347][ T8224] syscall_trace_enter+0x596/0xa90 [ 129.493360][ T8224] ? switch_fpu_return+0x10/0x10 [ 129.493368][ T8224] ? do_syscall_64+0x100/0x100 [ 129.493377][ T8224] ? syscall_return_slowpath+0x6f/0x500 [ 129.493384][ T8224] do_syscall_64+0x6b/0x100 [ 129.493393][ T8224] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 129.493405][ T8224] RIP: 0033:0x414e81 [ 129.498196][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 [ 129.503263][ T8224] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 129.503267][ T8224] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 129.503274][ T8224] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 129.503278][ T8224] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 129.503282][ T8224] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:46:57 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 129.503286][ T8224] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 129.503291][ T8224] R13: 0000000000000b5f R14: 00000000004cc426 R15: 0000000000000019 [ 129.781497][ T8227] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8227 comm=syz-executor.4 15:46:57 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:57 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r2, 0x10e, 0x6, &(0x7f0000000000)={0x28, 0x135, 0x6}, 0x10) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000240)='net/raw\x00') r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000080)=""/149, 0x95}, {&(0x7f0000000140)=""/131, 0x83}, {}], 0x3, 0x5) 15:46:57 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:57 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02"], 0x2a) [ 129.881395][ T8253] SELinux: failed to load policy [ 129.897357][ T8252] FAULT_INJECTION: forcing a failure. [ 129.897357][ T8252] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 129.919740][ T8252] CPU: 0 PID: 8252 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 129.929894][ T8252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.940045][ T8252] Call Trace: [ 129.943339][ T8252] dump_stack+0x1b0/0x228 [ 129.947658][ T8252] ? devkmsg_release+0x127/0x127 [ 129.952588][ T8252] ? show_regs_print_info+0x18/0x18 [ 129.957816][ T8252] should_fail+0x6fb/0x860 [ 129.962255][ T8252] ? setup_fault_attr+0x2b0/0x2b0 [ 129.967281][ T8252] ? arch_stack_walk+0x98/0xe0 [ 129.972042][ T8252] should_fail_alloc_page+0x4f/0x60 [ 129.977272][ T8252] __alloc_pages_nodemask+0x274/0x3010 [ 129.982729][ T8252] ? put_dec_trunc8+0x1c4/0x2d0 [ 129.987585][ T8252] ? format_decode+0xc5c/0x1ab0 [ 129.992423][ T8252] ? put_dec+0xd1/0xe0 [ 129.996481][ T8252] ? widen_string+0x40/0x3a0 [ 130.001083][ T8252] ? string+0x2c7/0x2e0 [ 130.005234][ T8252] ? vsnprintf+0x1ba3/0x1c50 [ 130.009825][ T8252] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 130.015365][ T8252] ? ptr_to_hashval+0x90/0x90 [ 130.020067][ T8252] ? vsnprintf+0x1ba3/0x1c50 [ 130.024648][ T8252] ? skb_put+0x121/0x210 [ 130.028896][ T8252] alloc_slab_page+0x3f/0x390 [ 130.033580][ T8252] new_slab+0x98/0x430 [ 130.037645][ T8252] ? setup_fault_attr+0x2b0/0x2b0 [ 130.042668][ T8252] ___slab_alloc+0x2e0/0x450 [ 130.047241][ T8252] ? audit_log_d_path+0xc2/0x260 [ 130.052180][ T8252] ? __should_failslab+0x11a/0x160 [ 130.057387][ T8252] ? audit_log_d_path+0xc2/0x260 [ 130.062319][ T8252] kmem_cache_alloc_trace+0x23f/0x2f0 [ 130.067684][ T8252] audit_log_d_path+0xc2/0x260 [ 130.072452][ T8252] audit_log_d_path_exe+0x42/0x70 [ 130.077483][ T8252] audit_log_task+0x201/0x2e0 [ 130.082169][ T8252] ? audit_core_dumps+0x100/0x100 [ 130.087203][ T8252] ? should_fail+0x182/0x860 [ 130.091792][ T8252] ? __sys_socket+0x115/0x350 [ 130.096473][ T8252] ? __x64_sys_socket+0x7a/0x90 [ 130.101307][ T8252] ? do_syscall_64+0xc0/0x100 [ 130.105978][ T8252] ? setup_fault_attr+0x2b0/0x2b0 [ 130.111005][ T8252] audit_seccomp+0x83/0x180 [ 130.115521][ T8252] __seccomp_filter+0xd15/0x1890 [ 130.120445][ T8252] ? __secure_computing+0x240/0x240 [ 130.125678][ T8252] ? __kasan_check_write+0x14/0x20 [ 130.130777][ T8252] ? __mutex_init+0xa1/0xf0 [ 130.135291][ T8252] ? percpu_counter_add_batch+0x136/0x160 [ 130.141002][ T8252] ? alloc_file+0x84/0x4b0 [ 130.145420][ T8252] ? memcpy+0x49/0x60 [ 130.149392][ T8252] ? errseq_sample+0x43/0x70 [ 130.153988][ T8252] ? alloc_file+0x3d3/0x4b0 [ 130.158491][ T8252] ? alloc_file_pseudo+0x282/0x310 [ 130.163602][ T8252] ? alloc_empty_file_noaccount+0x80/0x80 [ 130.169311][ T8252] ? __alloc_fd+0x4e6/0x590 [ 130.173817][ T8252] __secure_computing+0x1c6/0x240 [ 130.178843][ T8252] syscall_trace_enter+0x596/0xa90 [ 130.183945][ T8252] ? switch_fpu_return+0x10/0x10 [ 130.188871][ T8252] ? do_syscall_64+0x100/0x100 [ 130.193656][ T8252] ? syscall_return_slowpath+0x6f/0x500 [ 130.199201][ T8252] do_syscall_64+0x6b/0x100 [ 130.203699][ T8252] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.209609][ T8252] RIP: 0033:0x414e81 [ 130.213541][ T8252] Code: 75 14 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 64 1b 00 00 c3 48 83 ec 08 e8 6a fc ff ff 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 15:46:57 executing program 2 (fault-call:4 fault-nth:27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 130.233142][ T8252] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 130.241554][ T8252] RAX: ffffffffffffffda RBX: 00007f60063036d4 RCX: 0000000000414e81 [ 130.249534][ T8252] RDX: 000000000000000f RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 130.257505][ T8252] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 130.265488][ T8252] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 130.273560][ T8252] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000001a 15:46:57 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mknod$loop(&(0x7f0000000100)='./bus/file1\x00', 0xc000, 0x1) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="866f7765726469723d2e2f627573e600e104007469723d726469723d2e2f66696cf61d681d04e3653000"/53]) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4000) sendto$unix(r0, &(0x7f0000000340)="d48e48821f2355ecb24f2ec565209340a5c600c8058f562c51375487df23342aaefe3657804bfb48e31d6eb897aa3086436b4dd951ad9b60339f337668f9f21456ac6e7d8f0dae1e758e64e56ad778058d9790d2077f534bce43abfb280b5eb822349ec5be106a0f6b53f1a8", 0x6c, 0x40800, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) r4 = dup3(r2, r3, 0x0) mknodat(r4, &(0x7f0000000080)='./bus/file0\x00', 0x8000, 0x8000) unlink(&(0x7f0000000040)='./bus/file0\x00') r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f00000000c0)=0x100) 15:46:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setresuid(r2, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) prctl$PR_SET_NAME(0xf, 0x0) creat(0x0, 0x0) socket$inet6(0xa, 0x0, 0x5f) socket$inet6(0xa, 0x400000000803, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x280900) dup(r3) r5 = socket$inet6(0xa, 0x0, 0x5f) close(r5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) r6 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r6) r7 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) sendfile(r6, r7, 0x0, 0x80001d00c0d0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf25020000000c2797dbc167030827b27300080006000000000000001c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x20000100}, 0x4000) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) 15:46:57 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 130.350052][ T8268] FAULT_INJECTION: forcing a failure. [ 130.350052][ T8268] name failslab, interval 1, probability 0, space 0, times 0 [ 130.364403][ T8268] CPU: 0 PID: 8268 Comm: syz-executor.2 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 130.374487][ T8268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.379341][ T8274] overlayfs: unrecognized mount option "†owerdir=./busæ" or missing value [ 130.384524][ T8268] Call Trace: [ 130.384545][ T8268] dump_stack+0x1b0/0x228 [ 130.384557][ T8268] ? devkmsg_release+0x127/0x127 [ 130.384566][ T8268] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.384582][ T8268] ? show_regs_print_info+0x18/0x18 [ 130.396196][ T8274] SELinux: ebitmap: truncated map [ 130.396474][ T8268] ? finish_task_switch+0x2fe/0x560 [ 130.401438][ T8274] SELinux: failed to load policy [ 130.405746][ T8268] should_fail+0x6fb/0x860 [ 130.405757][ T8268] ? setup_fault_attr+0x2b0/0x2b0 [ 130.405766][ T8268] ? __seccomp_filter+0xd15/0x1890 [ 130.405773][ T8268] ? __secure_computing+0x1c6/0x240 [ 130.405781][ T8268] ? syscall_trace_enter+0x596/0xa90 [ 130.405789][ T8268] ? should_fail+0x182/0x860 [ 130.405799][ T8268] ? number+0xeac/0x1170 [ 130.405809][ T8268] __should_failslab+0x11a/0x160 [ 130.405818][ T8268] ? __alloc_skb+0xbc/0x540 [ 130.405826][ T8268] should_failslab+0x9/0x20 [ 130.405840][ T8268] kmem_cache_alloc+0x37/0x2b0 [ 130.429387][ T8275] overlayfs: unrecognized mount option "†owerdir=./busæ" or missing value [ 130.432308][ T8268] __alloc_skb+0xbc/0x540 [ 130.432317][ T8268] ? kmem_cache_alloc+0x120/0x2b0 [ 130.432332][ T8268] audit_log_start+0x4a1/0x9a0 [ 130.447762][ T8275] SELinux: ebitmap: truncated map [ 130.452142][ T8268] ? audit_serial+0x30/0x30 [ 130.452153][ T8268] ? ptr_to_hashval+0x90/0x90 [ 130.452161][ T8268] ? kasan_slab_free+0xe/0x10 [ 130.452168][ T8268] ? audit_log_start+0x9a0/0x9a0 [ 130.452175][ T8268] ? snprintf+0xc0/0x110 [ 130.452183][ T8268] ? check_stack_object+0x124/0x140 [ 130.452190][ T8268] audit_seccomp+0x62/0x180 [ 130.452197][ T8268] __seccomp_filter+0xd15/0x1890 [ 130.452211][ T8268] ? __secure_computing+0x240/0x240 [ 130.457741][ T8275] SELinux: failed to load policy [ 130.462066][ T8268] ? fsnotify+0x1390/0x1450 [ 130.462074][ T8268] ? __mutex_init+0xa1/0xf0 [ 130.462085][ T8268] ? percpu_counter_add_batch+0x136/0x160 [ 130.462092][ T8268] ? memset+0x31/0x40 [ 130.462098][ T8268] ? fsnotify+0x1390/0x1450 [ 130.462107][ T8268] ? rw_verify_area+0x360/0x360 [ 130.462114][ T8268] ? __fsnotify_parent+0x300/0x300 [ 130.462123][ T8268] __secure_computing+0x1c6/0x240 [ 130.462137][ T8268] syscall_trace_enter+0x596/0xa90 [ 130.603554][ T8268] ? switch_fpu_return+0x10/0x10 [ 130.608507][ T8268] ? do_syscall_64+0x100/0x100 [ 130.613250][ T8268] ? syscall_return_slowpath+0x6f/0x500 [ 130.618782][ T8268] do_syscall_64+0x6b/0x100 [ 130.623569][ T8268] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 130.629489][ T8268] RIP: 0033:0x414e21 15:46:58 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:58 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz0\x00', {0x0, 0x0, 0x2}}, 0x45c) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 15:46:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x0) [ 130.633367][ T8268] Code: 75 14 b8 01 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 c4 1b 00 00 c3 48 83 ec 08 e8 ca fc ff ff 48 89 04 24 b8 01 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 13 fd ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 130.652961][ T8268] RSP: 002b:00007f6006302c80 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 130.661363][ T8268] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000414e21 [ 130.669440][ T8268] RDX: 0000000000000001 RSI: 00007f6006302ca0 RDI: 0000000000000005 [ 130.677508][ T8268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 130.685470][ T8268] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000005 [ 130.693430][ T8268] R13: 0000000000000b5f R14: 00000000004cc426 R15: 000000000000001b 15:46:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02"], 0x2a) [ 130.726584][ T8279] SELinux: failed to load policy 15:46:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000"], 0x31) 15:46:58 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 130.804115][ T8295] SELinux: failed to load policy [ 130.819538][ T8298] input: syz0 as /devices/virtual/input/input4 15:46:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x2, 0x2, 0x0) 15:46:58 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000"], 0x31) 15:46:58 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 130.871330][ T8313] SELinux: ebitmap: truncated map [ 130.876969][ T8313] SELinux: failed to load policy 15:46:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0xb1, 0x0, 0x0, 0x400}, {0x80000006}]}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x4, 0x1, 0x5}) connect$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @loopback}, 0x10) [ 130.964547][ T8329] SELinux: ebitmap: truncated map 15:46:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000"], 0x31) 15:46:59 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x5, 0x2, 0x0) 15:46:59 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) 15:46:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000000)=0xc) setresuid(r2, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) prctl$PR_SET_NAME(0xf, 0x0) creat(0x0, 0x0) socket$inet6(0xa, 0x0, 0x5f) socket$inet6(0xa, 0x400000000803, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r3, r4, 0x0, 0x8400fffffffa) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x280900) dup(r3) r5 = socket$inet6(0xa, 0x0, 0x5f) close(r5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(0x0, 0x0) r6 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r6) r7 = open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) sendfile(r6, r7, 0x0, 0x80001d00c0d0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002bbd7000fddbdf25020000000c2797dbc167030827b27300080006000000000000001c00078008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x20000100}, 0x4000) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x143042, 0x0) 15:46:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x67, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = dup2(r0, r0) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x50, 0x0, &(0x7f0000000240)=0x1000000) [ 131.646600][ T8363] SELinux: ebitmap: truncated map [ 131.658013][ T22] kauditd_printk_skb: 121 callbacks suppressed [ 131.658022][ T22] audit: type=1326 audit(1580485619.136:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 131.663360][ T8364] EXT4-fs: 2 callbacks suppressed 15:46:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d"], 0x35) [ 131.663367][ T8364] EXT4-fs (sda1): re-mounted. Opts: [ 131.668397][ T22] audit: type=1326 audit(1580485619.146:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:59 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000180)=@ipv4_newroute={0x14, 0x18, 0x331}, 0x1c}}, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xa) close(r2) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e22, @loopback}, 0x8, 0x0, 0x0, 0x0, 0x8d79, 0x0, 0xfa, 0x5c9174c0, 0x9}) socket(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 15:46:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x6, 0x2, 0x0) [ 131.736443][ T22] audit: type=1326 audit(1580485619.186:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 131.763415][ T22] audit: type=1326 audit(1580485619.186:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 131.789046][ T22] audit: type=1326 audit(1580485619.196:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 131.816560][ T22] audit: type=1326 audit(1580485619.196:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 131.849042][ T22] audit: type=1326 audit(1580485619.196:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:46:59 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) [ 131.880946][ T22] audit: type=1326 audit(1580485619.196:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 15:46:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x8, 0x2, 0x0) [ 131.935220][ T22] audit: type=1326 audit(1580485619.196:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:46:59 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:59 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0xfffffffffffffddc, 0x10, 0xc362e63b3f31ba5f, 0xf0bd2d, 0x0, {0x0, 0x0, 0x0, 0x0, 0xd202}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = creat(&(0x7f0000000200)='./file0\x00', 0x40) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000240)=""/22) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) r3 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r3, 0x0, r3) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000000140)) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKGETSIZE(r5, 0x1260, &(0x7f00000002c0)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = fcntl$dupfd(r6, 0x0, r7) setsockopt$IPT_SO_SET_REPLACE(r8, 0x0, 0x40, &(0x7f0000000980)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$tun(r0, &(0x7f00000001c0)={@void, @val={0x5}, @mpls={[], @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, @echo_reply={0xc}}}}, 0xfdef) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000300)=0x2, 0x4) 15:46:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d"], 0x35) [ 131.976411][ T22] audit: type=1326 audit(1580485619.196:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8362 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 132.011477][ T8406] EXT4-fs (sda1): re-mounted. Opts: 15:46:59 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) 15:46:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0xa, 0x2, 0x0) [ 132.126525][ T8428] SELinux: ebitmap: truncated map [ 132.238989][ T8435] EXT4-fs (sda1): re-mounted. Opts: 15:46:59 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:46:59 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8}) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x1c5f2) 15:46:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0xf, 0x2, 0x0) 15:46:59 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:46:59 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d"], 0x35) 15:46:59 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() ioprio_get$pid(0x1, r3) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/204, 0x200000cc}], 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000005e00", 0x6) write$binfmt_misc(r5, &(0x7f0000000180)=ANY=[], 0xfffffc7b) socket$netlink(0x10, 0x3, 0x0) splice(r4, 0x0, r6, 0x0, 0x4ffde, 0x0) [ 132.508779][ T8453] SELinux: ebitmap: truncated map 15:47:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c"], 0x37) 15:47:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x10, 0x2, 0x0) 15:47:00 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 132.529578][ T8459] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:47:00 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) 15:47:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c"], 0x37) 15:47:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x11, 0x2, 0x0) [ 132.683307][ T8479] SELinux: ebitmap: truncated map 15:47:00 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) [ 132.739743][ T8485] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value [ 132.762476][ T8492] SELinux: ebitmap: truncated map 15:47:00 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) 15:47:00 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c"], 0x37) 15:47:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x2c, 0x2, 0x0) 15:47:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r1, 0x2008002) r2 = open(&(0x7f0000000780)='./bus\x00', 0x88000, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r2, 0x0) socket(0x18, 0x2, 0x7) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) getuid() r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ptrace$getregs(0xc, r5, 0x8, &(0x7f00000002c0)=""/107) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f0000000200)={0x2, 'bridge_slave_0\x00', {0xfffffff8}, 0x8e8b}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x9, 0x2}, {0x1, 0x4, 0x5, 0x8}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in6=@local}, 0x6, @in6=@rand_addr="304d8edadecf442b778e5a8382e5a896", 0x0, 0x3, 0x1, 0x0, 0x20, 0x7}}, 0xe8) socket(0x0, 0x4, 0x0) socket(0x0, 0x4, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x400, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x5, @local}, 0x10) socket(0x0, 0x0, 0x0) 15:47:00 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8}) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x1c5f2) 15:47:00 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB="0000480ff3aaae6b5ec0998ff2f2f0339e9a6b0d000097a77c7f2335e876e82572add25eaa0f0dfc6da795012c8616fe9485c7d2fa1954222b07f63e41736b7f6276be6ac1641f8522499a28818c062879bacb249fafd0c9d3c79b822cfe7f63b411005c459f8687c34aba59739def8df7fa768748f96beb2a176be03a1db85c2d48ec99b5416d3073863fe2d39987ffc417021023f504a8d9fd5a94a0bf3cfb11982988793ab57d44da8b55f2464b6aeda3074a08be9fd3cec4e962321572142b37434598234ae771333f24d5a56b533a999f9bc31c"]) 15:47:00 executing program 0 (fault-call:1 fault-nth:0): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:00 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) 15:47:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x180, 0x2, 0x0) [ 133.357763][ T8518] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value [ 133.361992][ T8530] SELinux: ebitmap: truncated map [ 133.419339][ T8537] FAULT_INJECTION: forcing a failure. [ 133.419339][ T8537] name failslab, interval 1, probability 0, space 0, times 0 [ 133.434388][ T8537] CPU: 0 PID: 8537 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 133.444466][ T8537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.454642][ T8537] Call Trace: [ 133.457955][ T8537] dump_stack+0x1b0/0x228 [ 133.462439][ T8537] ? devkmsg_release+0x127/0x127 [ 133.467385][ T8537] ? show_regs_print_info+0x18/0x18 [ 133.472585][ T8537] ? stack_trace_save+0x1e0/0x1e0 [ 133.477615][ T8537] ? __kernel_text_address+0x9a/0x110 [ 133.482990][ T8537] should_fail+0x6fb/0x860 [ 133.487419][ T8537] ? setup_fault_attr+0x2b0/0x2b0 [ 133.492445][ T8537] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 133.497838][ T8537] __should_failslab+0x11a/0x160 [ 133.502958][ T8537] ? __get_vm_area_node+0x1ac/0x380 [ 133.508172][ T8537] should_failslab+0x9/0x20 [ 133.512697][ T8537] kmem_cache_alloc_trace+0x3a/0x2f0 [ 133.517984][ T8537] ? kstrtouint_from_user+0x1cb/0x230 [ 133.523454][ T8537] __get_vm_area_node+0x1ac/0x380 [ 133.528481][ T8537] __vmalloc_node_range+0xe4/0x760 [ 133.533608][ T8537] ? sel_write_load+0x1c5/0x410 [ 133.538564][ T8537] ? mutex_lock+0xa6/0x110 [ 133.542981][ T8537] ? get_pid_task+0x8d/0xa0 [ 133.547588][ T8537] vmalloc+0x73/0x80 [ 133.551463][ T8537] ? sel_write_load+0x1c5/0x410 [ 133.556408][ T8537] sel_write_load+0x1c5/0x410 [ 133.561090][ T8537] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 133.566754][ T8537] __vfs_write+0xff/0x700 [ 133.571104][ T8537] ? __kernel_write+0x350/0x350 [ 133.575989][ T8537] ? avc_policy_seqno+0x1b/0x70 [ 133.580834][ T8537] ? selinux_file_permission+0x2ba/0x560 [ 133.586468][ T8537] ? security_file_permission+0x157/0x350 [ 133.592187][ T8537] ? rw_verify_area+0x1c2/0x360 [ 133.597089][ T8537] vfs_write+0x203/0x4e0 [ 133.601333][ T8537] ksys_write+0x168/0x2a0 [ 133.605668][ T8537] ? __ia32_sys_read+0x90/0x90 [ 133.610441][ T8537] ? __kasan_check_read+0x11/0x20 [ 133.616039][ T8537] ? __ia32_sys_clock_settime+0x230/0x230 [ 133.621746][ T8537] __x64_sys_write+0x7b/0x90 [ 133.626354][ T8537] do_syscall_64+0xc0/0x100 [ 133.630863][ T8537] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 133.636756][ T8537] RIP: 0033:0x45b349 [ 133.640656][ T8537] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 133.660261][ T8537] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:47:01 executing program 0 (fault-call:1 fault-nth:1): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 133.668888][ T8537] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 133.676865][ T8537] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 133.685007][ T8537] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 133.693286][ T8537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 133.701311][ T8537] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000000 15:47:01 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) [ 133.767024][ T8549] FAULT_INJECTION: forcing a failure. [ 133.767024][ T8549] name failslab, interval 1, probability 0, space 0, times 0 [ 133.786144][ T8554] EXT4-fs (sda1): re-mounted. Opts: [ 133.796675][ T8549] CPU: 0 PID: 8549 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 133.806779][ T8549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.816830][ T8549] Call Trace: [ 133.820124][ T8549] dump_stack+0x1b0/0x228 [ 133.824588][ T8549] ? devkmsg_release+0x127/0x127 [ 133.829528][ T8549] ? show_regs_print_info+0x18/0x18 [ 133.834710][ T8549] ? nohz_balance_enter_idle+0x3a0/0x3a0 [ 133.840324][ T8549] ? dequeue_task_fair+0x68a/0x1050 [ 133.845604][ T8549] should_fail+0x6fb/0x860 [ 133.850114][ T8549] ? setup_fault_attr+0x2b0/0x2b0 [ 133.855558][ T8549] ? __vfs_write+0xff/0x700 [ 133.863101][ T8549] ? vfs_write+0x203/0x4e0 [ 133.869434][ T8549] ? ksys_write+0x168/0x2a0 [ 133.874202][ T8549] ? __x64_sys_write+0x7b/0x90 [ 133.878963][ T8549] ? do_syscall_64+0xc0/0x100 [ 133.883822][ T8549] ? __schedule+0xea0/0x1700 [ 133.888405][ T8549] ? stack_trace_save+0x1e0/0x1e0 [ 133.893618][ T8549] __should_failslab+0x11a/0x160 [ 133.898650][ T8549] ? alloc_vmap_area+0x164/0x1bb0 [ 133.903664][ T8549] should_failslab+0x9/0x20 [ 133.908500][ T8549] kmem_cache_alloc+0x37/0x2b0 [ 133.913781][ T8549] ? __kasan_check_write+0x14/0x20 [ 133.918901][ T8549] ? _raw_spin_lock+0xa1/0x170 [ 133.923662][ T8549] alloc_vmap_area+0x164/0x1bb0 [ 133.928510][ T8549] ? setup_fault_attr+0x2b0/0x2b0 [ 133.933548][ T8549] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 133.938915][ T8549] ? __should_failslab+0x11a/0x160 [ 133.944050][ T8549] ? vm_map_ram+0x980/0x980 [ 133.948535][ T8549] ? kasan_kmalloc+0x9/0x10 [ 133.953052][ T8549] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 133.958598][ T8549] ? kstrtouint_from_user+0x1cb/0x230 [ 133.964156][ T8549] __get_vm_area_node+0x1f9/0x380 [ 133.969170][ T8549] __vmalloc_node_range+0xe4/0x760 [ 133.974275][ T8549] ? sel_write_load+0x1c5/0x410 [ 133.979238][ T8549] ? mutex_lock+0x106/0x110 [ 133.983771][ T8549] ? get_pid_task+0x8d/0xa0 [ 133.988274][ T8549] vmalloc+0x73/0x80 [ 133.992171][ T8549] ? sel_write_load+0x1c5/0x410 [ 133.997259][ T8549] sel_write_load+0x1c5/0x410 [ 134.002045][ T8549] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 134.007680][ T8549] __vfs_write+0xff/0x700 [ 134.011995][ T8549] ? __kernel_write+0x350/0x350 [ 134.016824][ T8549] ? avc_policy_seqno+0x1b/0x70 [ 134.021663][ T8549] ? selinux_file_permission+0x2ba/0x560 [ 134.027291][ T8549] ? security_file_permission+0x157/0x350 [ 134.033019][ T8549] ? rw_verify_area+0x1c2/0x360 [ 134.037864][ T8549] vfs_write+0x203/0x4e0 [ 134.042111][ T8549] ksys_write+0x168/0x2a0 [ 134.046424][ T8549] ? __ia32_sys_read+0x90/0x90 [ 134.051179][ T8549] ? __kasan_check_read+0x11/0x20 [ 134.056202][ T8549] ? __ia32_sys_clock_settime+0x230/0x230 [ 134.061926][ T8549] __x64_sys_write+0x7b/0x90 [ 134.066506][ T8549] do_syscall_64+0xc0/0x100 [ 134.070997][ T8549] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 134.077002][ T8549] RIP: 0033:0x45b349 [ 134.080893][ T8549] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.100487][ T8549] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 134.108904][ T8549] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 134.116881][ T8549] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 134.124881][ T8549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 134.132936][ T8549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 134.140893][ T8549] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000001 15:47:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x500, 0x2, 0x0) 15:47:01 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8}) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x1c5f2) 15:47:01 executing program 0 (fault-call:1 fault-nth:2): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 134.171042][ T8560] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value [ 134.306095][ T8576] FAULT_INJECTION: forcing a failure. [ 134.306095][ T8576] name failslab, interval 1, probability 0, space 0, times 0 [ 134.318879][ T8576] CPU: 1 PID: 8576 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 134.328945][ T8576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.339093][ T8576] Call Trace: [ 134.342392][ T8576] dump_stack+0x1b0/0x228 [ 134.346726][ T8576] ? devkmsg_release+0x127/0x127 15:47:01 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) 15:47:01 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) 15:47:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x69c, 0x2, 0x0) 15:47:01 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0]) [ 134.351666][ T8576] ? show_regs_print_info+0x18/0x18 [ 134.356864][ T8576] ? _raw_spin_unlock+0x9/0x20 [ 134.361657][ T8576] ? alloc_vmap_area+0x1aa7/0x1bb0 [ 134.366775][ T8576] should_fail+0x6fb/0x860 [ 134.371200][ T8576] ? setup_fault_attr+0x2b0/0x2b0 [ 134.376429][ T8576] ? __kasan_check_write+0x14/0x20 [ 134.381650][ T8576] ? _raw_spin_lock+0xa1/0x170 [ 134.386455][ T8576] ? _raw_spin_trylock_bh+0x190/0x190 [ 134.391826][ T8576] __should_failslab+0x11a/0x160 [ 134.396753][ T8576] ? __vmalloc_node_range+0x2b6/0x760 [ 134.402120][ T8576] should_failslab+0x9/0x20 [ 134.406613][ T8576] __kmalloc+0x64/0x310 [ 134.410750][ T8576] __vmalloc_node_range+0x2b6/0x760 [ 134.415945][ T8576] ? mutex_lock+0xa6/0x110 [ 134.420367][ T8576] ? get_pid_task+0x8d/0xa0 [ 134.424867][ T8576] vmalloc+0x73/0x80 [ 134.428743][ T8576] ? sel_write_load+0x1c5/0x410 [ 134.433634][ T8576] sel_write_load+0x1c5/0x410 [ 134.438360][ T8576] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 134.443973][ T8576] __vfs_write+0xff/0x700 [ 134.448287][ T8576] ? __kernel_write+0x350/0x350 [ 134.453173][ T8576] ? avc_policy_seqno+0x1b/0x70 [ 134.458022][ T8576] ? selinux_file_permission+0x2ba/0x560 [ 134.463668][ T8576] ? security_file_permission+0x157/0x350 [ 134.469431][ T8576] ? rw_verify_area+0x1c2/0x360 [ 134.474273][ T8576] vfs_write+0x203/0x4e0 [ 134.478520][ T8576] ksys_write+0x168/0x2a0 [ 134.482838][ T8576] ? __ia32_sys_read+0x90/0x90 [ 134.487580][ T8576] ? __kasan_check_read+0x11/0x20 [ 134.492609][ T8576] ? __ia32_sys_clock_settime+0x230/0x230 [ 134.498340][ T8576] __x64_sys_write+0x7b/0x90 [ 134.503121][ T8576] do_syscall_64+0xc0/0x100 [ 134.507618][ T8576] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 134.513616][ T8576] RIP: 0033:0x45b349 [ 134.517559][ T8576] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.537146][ T8576] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 134.545690][ T8576] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 15:47:02 executing program 0 (fault-call:1 fault-nth:3): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 134.553670][ T8576] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 134.561673][ T8576] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 134.569642][ T8576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 134.577822][ T8576] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000002 [ 134.624160][ T8583] EXT4-fs (sda1): re-mounted. Opts: [ 134.633127][ T8593] FAULT_INJECTION: forcing a failure. [ 134.633127][ T8593] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 134.641485][ T8584] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value [ 134.656423][ T8593] CPU: 0 PID: 8593 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 134.666788][ T8593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.676963][ T8593] Call Trace: [ 134.680251][ T8593] dump_stack+0x1b0/0x228 [ 134.684587][ T8593] ? devkmsg_release+0x127/0x127 [ 134.689533][ T8593] ? show_regs_print_info+0x18/0x18 [ 134.694721][ T8593] ? arch_stack_walk+0x98/0xe0 [ 134.699494][ T8593] should_fail+0x6fb/0x860 [ 134.703905][ T8593] ? setup_fault_attr+0x2b0/0x2b0 [ 134.708942][ T8593] ? stack_trace_snprint+0x150/0x150 [ 134.714240][ T8593] ? unwind_next_frame+0x415/0x870 [ 134.719352][ T8593] should_fail_alloc_page+0x4f/0x60 [ 134.724655][ T8593] __alloc_pages_nodemask+0x274/0x3010 [ 134.730117][ T8593] ? __kasan_kmalloc+0x179/0x1b0 [ 134.735047][ T8593] ? vfs_write+0x203/0x4e0 [ 134.739454][ T8593] ? __kasan_kmalloc+0x117/0x1b0 [ 134.744405][ T8593] ? __kmalloc+0x102/0x310 [ 134.748825][ T8593] ? __vmalloc_node_range+0x2b6/0x760 [ 134.754184][ T8593] ? vmalloc+0x73/0x80 [ 134.758252][ T8593] ? sel_write_load+0x1c5/0x410 [ 134.763898][ T8593] ? __vfs_write+0xff/0x700 [ 134.768390][ T8593] ? vfs_write+0x203/0x4e0 [ 134.772810][ T8593] ? ksys_write+0x168/0x2a0 [ 134.777640][ T8593] ? __x64_sys_write+0x7b/0x90 [ 134.782401][ T8593] ? do_syscall_64+0xc0/0x100 [ 134.787077][ T8593] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 134.793168][ T8593] ? insert_vmap_area+0x289/0x370 [ 134.798198][ T8593] ? _raw_spin_unlock+0x9/0x20 [ 134.802974][ T8593] ? alloc_vmap_area+0x1aa7/0x1bb0 [ 134.808084][ T8593] ? gfp_pfmemalloc_allowed+0x140/0x140 [ 134.813627][ T8593] ? should_fail+0x182/0x860 [ 134.818219][ T8593] ? setup_fault_attr+0x2b0/0x2b0 [ 134.823246][ T8593] ? __kasan_check_write+0x14/0x20 [ 134.828373][ T8593] ? _raw_spin_lock+0xa1/0x170 [ 134.833159][ T8593] ? _raw_spin_trylock_bh+0x190/0x190 [ 134.838532][ T8593] ? kasan_kmalloc+0x9/0x10 [ 134.843028][ T8593] ? __kmalloc+0x102/0x310 [ 134.847436][ T8593] __vmalloc_node_range+0x393/0x760 [ 134.852640][ T8593] vmalloc+0x73/0x80 [ 134.856534][ T8593] ? sel_write_load+0x1c5/0x410 [ 134.861366][ T8593] sel_write_load+0x1c5/0x410 [ 134.866033][ T8593] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 134.871663][ T8593] __vfs_write+0xff/0x700 [ 134.875995][ T8593] ? __kernel_write+0x350/0x350 [ 134.880833][ T8593] ? avc_policy_seqno+0x1b/0x70 [ 134.885683][ T8593] ? selinux_file_permission+0x2ba/0x560 [ 134.891319][ T8593] ? security_file_permission+0x157/0x350 [ 134.897067][ T8593] ? rw_verify_area+0x1c2/0x360 [ 134.901921][ T8593] vfs_write+0x203/0x4e0 [ 134.906169][ T8593] ksys_write+0x168/0x2a0 [ 134.910497][ T8593] ? __ia32_sys_read+0x90/0x90 [ 134.915278][ T8593] ? __kasan_check_read+0x11/0x20 [ 134.920299][ T8593] ? __ia32_sys_clock_settime+0x230/0x230 [ 134.926333][ T8593] __x64_sys_write+0x7b/0x90 [ 134.930909][ T8593] do_syscall_64+0xc0/0x100 [ 134.935409][ T8593] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 134.941302][ T8593] RIP: 0033:0x45b349 [ 134.945198][ T8593] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 134.964793][ T8593] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:47:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x6a0, 0x2, 0x0) 15:47:02 executing program 0 (fault-call:1 fault-nth:4): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:02 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, 0x0) [ 134.973215][ T8593] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 134.981179][ T8593] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 134.989134][ T8593] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 134.997095][ T8593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 135.005075][ T8593] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000003 15:47:02 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) memfd_create(0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8}) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x9) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x80800) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x1c5f2) 15:47:02 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0]) [ 135.089973][ T8603] FAULT_INJECTION: forcing a failure. [ 135.089973][ T8603] name failslab, interval 1, probability 0, space 0, times 0 [ 135.119820][ T8603] CPU: 0 PID: 8603 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 135.129909][ T8603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.139962][ T8603] Call Trace: [ 135.143244][ T8603] dump_stack+0x1b0/0x228 [ 135.147740][ T8603] ? devkmsg_release+0x127/0x127 [ 135.152687][ T8603] ? show_regs_print_info+0x18/0x18 [ 135.157905][ T8603] ? __kasan_check_read+0x11/0x20 [ 135.163031][ T8603] should_fail+0x6fb/0x860 [ 135.167428][ T8603] ? setup_fault_attr+0x2b0/0x2b0 [ 135.172434][ T8603] ? vfs_write+0x203/0x4e0 [ 135.176826][ T8603] ? ksys_write+0x168/0x2a0 [ 135.181324][ T8603] ? __x64_sys_write+0x7b/0x90 [ 135.186095][ T8603] ? do_syscall_64+0xc0/0x100 [ 135.190757][ T8603] __should_failslab+0x11a/0x160 [ 135.195691][ T8603] ? security_load_policy+0x131/0xfd0 [ 135.201045][ T8603] should_failslab+0x9/0x20 [ 135.205554][ T8603] kmem_cache_alloc_trace+0x3a/0x2f0 [ 135.210836][ T8603] security_load_policy+0x131/0xfd0 [ 135.216133][ T8603] ? setup_fault_attr+0x2b0/0x2b0 [ 135.221161][ T8603] ? __kasan_check_write+0x14/0x20 [ 135.226264][ T8603] ? _raw_spin_lock+0xa1/0x170 [ 135.231017][ T8603] ? _raw_spin_trylock_bh+0x190/0x190 [ 135.236387][ T8603] ? security_change_sid+0x50/0x50 [ 135.241495][ T8603] ? vmap_page_range_noflush+0x67b/0x6a0 [ 135.247127][ T8603] ? __vmalloc_node_range+0x56c/0x760 [ 135.252505][ T8603] ? __kasan_check_write+0x14/0x20 [ 135.257607][ T8603] ? _copy_from_user+0xa8/0xe0 [ 135.262364][ T8603] sel_write_load+0x24e/0x410 [ 135.267032][ T8603] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 135.272654][ T8603] __vfs_write+0xff/0x700 [ 135.276982][ T8603] ? __kernel_write+0x350/0x350 [ 135.281930][ T8603] ? avc_policy_seqno+0x1b/0x70 [ 135.286775][ T8603] ? selinux_file_permission+0x2ba/0x560 [ 135.292394][ T8603] ? security_file_permission+0x157/0x350 [ 135.298104][ T8603] ? rw_verify_area+0x1c2/0x360 [ 135.303019][ T8603] vfs_write+0x203/0x4e0 [ 135.307264][ T8603] ksys_write+0x168/0x2a0 [ 135.311595][ T8603] ? __ia32_sys_read+0x90/0x90 [ 135.316339][ T8603] ? __kasan_check_read+0x11/0x20 [ 135.321478][ T8603] ? __ia32_sys_clock_settime+0x230/0x230 [ 135.327206][ T8603] __x64_sys_write+0x7b/0x90 [ 135.331797][ T8603] do_syscall_64+0xc0/0x100 [ 135.336290][ T8603] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.342167][ T8603] RIP: 0033:0x45b349 [ 135.346047][ T8603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.365645][ T8603] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 135.374049][ T8603] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 135.382017][ T8603] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 15:47:02 executing program 0 (fault-call:1 fault-nth:5): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x7, 0x4}]}, 0xc, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_AF_SPEC={0x14, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x3c}}, 0x0) 15:47:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x7fffffea, 0x2, 0x0) [ 135.389983][ T8603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 135.397935][ T8603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 135.405905][ T8603] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000004 [ 135.417513][ T8603] sel_write_load: 7 callbacks suppressed [ 135.417517][ T8603] SELinux: failed to load policy 15:47:03 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 135.499324][ T8631] FAULT_INJECTION: forcing a failure. [ 135.499324][ T8631] name failslab, interval 1, probability 0, space 0, times 0 [ 135.519570][ T8631] CPU: 1 PID: 8631 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 135.529658][ T8631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.539712][ T8631] Call Trace: [ 135.542982][ T8631] dump_stack+0x1b0/0x228 [ 135.547301][ T8631] ? devkmsg_release+0x127/0x127 [ 135.552228][ T8631] ? show_regs_print_info+0x18/0x18 [ 135.557423][ T8631] ? __kasan_check_read+0x11/0x20 [ 135.562441][ T8631] should_fail+0x6fb/0x860 [ 135.566885][ T8631] ? setup_fault_attr+0x2b0/0x2b0 [ 135.571935][ T8631] ? vfs_write+0x203/0x4e0 [ 135.576392][ T8631] ? ksys_write+0x168/0x2a0 [ 135.580945][ T8631] ? __x64_sys_write+0x7b/0x90 [ 135.585690][ T8631] ? do_syscall_64+0xc0/0x100 [ 135.590361][ T8631] __should_failslab+0x11a/0x160 [ 135.595277][ T8631] ? security_load_policy+0x1af/0xfd0 [ 135.600727][ T8631] should_failslab+0x9/0x20 [ 135.605211][ T8631] kmem_cache_alloc_trace+0x3a/0x2f0 [ 135.610539][ T8631] security_load_policy+0x1af/0xfd0 [ 135.615720][ T8631] ? _raw_spin_lock+0xa1/0x170 [ 135.620492][ T8631] ? _raw_spin_trylock_bh+0x190/0x190 [ 135.625913][ T8631] ? security_change_sid+0x50/0x50 [ 135.631021][ T8631] ? vmap_page_range_noflush+0x67b/0x6a0 [ 135.636635][ T8631] ? __vmalloc_node_range+0x56c/0x760 [ 135.642029][ T8631] ? __kasan_check_write+0x14/0x20 [ 135.647128][ T8631] ? _copy_from_user+0xa8/0xe0 [ 135.651883][ T8631] sel_write_load+0x24e/0x410 [ 135.656545][ T8631] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 135.662170][ T8631] __vfs_write+0xff/0x700 [ 135.666554][ T8631] ? __kernel_write+0x350/0x350 [ 135.671379][ T8631] ? avc_policy_seqno+0x1b/0x70 [ 135.676269][ T8631] ? selinux_file_permission+0x2ba/0x560 [ 135.681891][ T8631] ? security_file_permission+0x157/0x350 [ 135.687588][ T8631] ? rw_verify_area+0x1c2/0x360 [ 135.692480][ T8631] vfs_write+0x203/0x4e0 [ 135.697065][ T8631] ksys_write+0x168/0x2a0 [ 135.701380][ T8631] ? __ia32_sys_read+0x90/0x90 [ 135.706119][ T8631] ? __kasan_check_read+0x11/0x20 [ 135.711121][ T8631] ? __ia32_sys_clock_settime+0x230/0x230 [ 135.716968][ T8631] __x64_sys_write+0x7b/0x90 [ 135.721609][ T8631] do_syscall_64+0xc0/0x100 [ 135.726129][ T8631] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 135.732006][ T8631] RIP: 0033:0x45b349 [ 135.735890][ T8631] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 135.755484][ T8631] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 135.763899][ T8631] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 135.771855][ T8631] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 135.779823][ T8631] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 135.787792][ T8631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x7ffffff3, 0x2, 0x0) 15:47:03 executing program 0 (fault-call:1 fault-nth:6): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ax25={{}, [@remote, @bcast, @default, @rose, @netrom, @bcast, @bcast, @default]}, &(0x7f00000000c0)=0x80) getsockname$tipc(r1, &(0x7f0000000140), &(0x7f0000000180)=0x10) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) read(r0, &(0x7f00003fefff)=""/1, 0x1) ioctl$TCSETS2(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "94fdc3c9cd01000000162c91ad4b33251407a2"}) [ 135.795845][ T8631] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000005 [ 135.805664][ T8631] SELinux: failed to load policy 15:47:03 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0]) 15:47:03 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) 15:47:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x3, 0x0) [ 135.905380][ T8652] FAULT_INJECTION: forcing a failure. [ 135.905380][ T8652] name failslab, interval 1, probability 0, space 0, times 0 [ 135.962261][ T8652] CPU: 1 PID: 8652 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 135.972399][ T8652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.982455][ T8652] Call Trace: [ 135.985746][ T8652] dump_stack+0x1b0/0x228 [ 135.990062][ T8652] ? devkmsg_release+0x127/0x127 [ 135.994983][ T8652] ? show_regs_print_info+0x18/0x18 [ 136.000267][ T8652] ? arch_stack_walk+0x98/0xe0 [ 136.005043][ T8652] should_fail+0x6fb/0x860 [ 136.009455][ T8652] ? setup_fault_attr+0x2b0/0x2b0 [ 136.014457][ T8652] ? stack_trace_snprint+0x150/0x150 [ 136.019731][ T8652] ? __kernel_text_address+0x9a/0x110 [ 136.025110][ T8652] __should_failslab+0x11a/0x160 [ 136.030056][ T8652] ? hashtab_create+0x5c/0x3f0 [ 136.034801][ T8652] should_failslab+0x9/0x20 [ 136.039284][ T8652] kmem_cache_alloc_trace+0x3a/0x2f0 [ 136.044566][ T8652] ? __kasan_kmalloc+0x117/0x1b0 [ 136.049498][ T8652] ? kasan_kmalloc+0x9/0x10 [ 136.053989][ T8652] ? symtab_init+0xa0/0xa0 [ 136.058384][ T8652] ? symhash+0x100/0x100 [ 136.062615][ T8652] hashtab_create+0x5c/0x3f0 [ 136.067205][ T8652] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.073255][ T8652] ? stack_trace_save+0x111/0x1e0 [ 136.078268][ T8652] symtab_init+0x32/0xa0 [ 136.082519][ T8652] policydb_read+0xb4/0x77f0 [ 136.087189][ T8652] ? __kasan_check_write+0x14/0x20 [ 136.092293][ T8652] ? _raw_spin_lock+0xa1/0x170 [ 136.097049][ T8652] ? _raw_spin_trylock_bh+0x190/0x190 [ 136.102414][ T8652] ? should_fail+0x182/0x860 [ 136.107118][ T8652] ? __vmalloc_node_range+0x2b6/0x760 [ 136.112479][ T8652] ? setup_fault_attr+0x2b0/0x2b0 [ 136.117490][ T8652] ? vfs_write+0x203/0x4e0 [ 136.121886][ T8652] ? ksys_write+0x168/0x2a0 [ 136.126394][ T8652] ? _raw_spin_unlock+0x9/0x20 [ 136.131144][ T8652] ? string_to_av_perm+0x1c0/0x1c0 [ 136.136356][ T8652] ? security_load_policy+0x1af/0xfd0 [ 136.141757][ T8652] ? kasan_kmalloc+0x9/0x10 [ 136.146245][ T8652] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 136.151704][ T8652] security_load_policy+0x228/0xfd0 [ 136.156915][ T8652] ? _raw_spin_lock+0xa1/0x170 [ 136.161683][ T8652] ? _raw_spin_trylock_bh+0x190/0x190 [ 136.167045][ T8652] ? security_change_sid+0x50/0x50 [ 136.172140][ T8652] ? vmap_page_range_noflush+0x67b/0x6a0 [ 136.177768][ T8652] ? __vmalloc_node_range+0x56c/0x760 [ 136.183131][ T8652] ? __kasan_check_write+0x14/0x20 [ 136.188247][ T8652] ? _copy_from_user+0xa8/0xe0 [ 136.193018][ T8652] sel_write_load+0x24e/0x410 [ 136.197686][ T8652] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 136.203327][ T8652] __vfs_write+0xff/0x700 [ 136.207654][ T8652] ? __kernel_write+0x350/0x350 [ 136.212559][ T8652] ? avc_policy_seqno+0x1b/0x70 [ 136.217402][ T8652] ? selinux_file_permission+0x2ba/0x560 [ 136.223025][ T8652] ? security_file_permission+0x157/0x350 [ 136.228847][ T8652] ? rw_verify_area+0x1c2/0x360 [ 136.233682][ T8652] vfs_write+0x203/0x4e0 [ 136.237903][ T8652] ksys_write+0x168/0x2a0 [ 136.242303][ T8652] ? __ia32_sys_read+0x90/0x90 [ 136.247107][ T8652] ? __kasan_check_read+0x11/0x20 [ 136.252112][ T8652] ? __ia32_sys_clock_settime+0x230/0x230 [ 136.257867][ T8652] __x64_sys_write+0x7b/0x90 [ 136.262452][ T8652] do_syscall_64+0xc0/0x100 [ 136.266935][ T8652] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.272815][ T8652] RIP: 0033:0x45b349 [ 136.276699][ T8652] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.296697][ T8652] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 136.305089][ T8652] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 15:47:03 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = creat(0x0, 0x0) setresuid(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6(0xa, 0x400000000803, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create1(0x0) r1 = socket(0x0, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002ec0), 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="fa0f5226b7c417f7f9f415118f500cbb", 0x10) 15:47:03 executing program 0 (fault-call:1 fault-nth:7): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 136.313049][ T8652] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 136.321015][ T8652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 136.328976][ T8652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 136.336939][ T8652] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000006 [ 136.346064][ T8652] SELinux: failed to load policy 15:47:03 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) [ 136.454737][ T8670] FAULT_INJECTION: forcing a failure. [ 136.454737][ T8670] name failslab, interval 1, probability 0, space 0, times 0 [ 136.467931][ T8670] CPU: 1 PID: 8670 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 136.478000][ T8670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.488043][ T8670] Call Trace: [ 136.491326][ T8670] dump_stack+0x1b0/0x228 [ 136.495635][ T8670] ? devkmsg_release+0x127/0x127 [ 136.500562][ T8670] ? show_regs_print_info+0x18/0x18 [ 136.505769][ T8670] ? arch_stack_walk+0x98/0xe0 [ 136.510540][ T8670] should_fail+0x6fb/0x860 [ 136.515216][ T8670] ? setup_fault_attr+0x2b0/0x2b0 [ 136.520220][ T8670] ? stack_trace_snprint+0x150/0x150 [ 136.525502][ T8670] ? __kernel_text_address+0x9a/0x110 [ 136.530866][ T8670] __should_failslab+0x11a/0x160 [ 136.535794][ T8670] ? hashtab_create+0x117/0x3f0 [ 136.540630][ T8670] should_failslab+0x9/0x20 [ 136.545321][ T8670] __kmalloc+0x64/0x310 [ 136.549472][ T8670] ? kasan_kmalloc+0x9/0x10 [ 136.553973][ T8670] hashtab_create+0x117/0x3f0 [ 136.558650][ T8670] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.564717][ T8670] ? stack_trace_save+0x111/0x1e0 [ 136.569736][ T8670] symtab_init+0x32/0xa0 [ 136.573974][ T8670] policydb_read+0xb4/0x77f0 [ 136.578549][ T8670] ? __kasan_check_read+0x11/0x20 [ 136.583565][ T8670] ? __alloc_pages_nodemask+0x52d/0x3010 [ 136.589189][ T8670] ? vfs_write+0x203/0x4e0 [ 136.593594][ T8670] ? should_fail+0x182/0x860 [ 136.598163][ T8670] ? __vmalloc_node_range+0x2b6/0x760 [ 136.603533][ T8670] ? setup_fault_attr+0x2b0/0x2b0 [ 136.608550][ T8670] ? vfs_write+0x203/0x4e0 [ 136.612959][ T8670] ? ksys_write+0x168/0x2a0 [ 136.617453][ T8670] ? __x64_sys_write+0x7b/0x90 [ 136.622231][ T8670] ? do_syscall_64+0xc0/0x100 [ 136.626904][ T8670] ? string_to_av_perm+0x1c0/0x1c0 [ 136.632007][ T8670] ? __should_failslab+0x11a/0x160 [ 136.637110][ T8670] ? security_load_policy+0x1af/0xfd0 [ 136.642471][ T8670] ? kasan_kmalloc+0x9/0x10 [ 136.646956][ T8670] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 136.652410][ T8670] security_load_policy+0x228/0xfd0 [ 136.657658][ T8670] ? _raw_spin_lock+0xa1/0x170 [ 136.662431][ T8670] ? _raw_spin_trylock_bh+0x190/0x190 [ 136.667802][ T8670] ? security_change_sid+0x50/0x50 [ 136.672921][ T8670] ? vmap_page_range_noflush+0x67b/0x6a0 [ 136.678545][ T8670] ? __vmalloc_node_range+0x56c/0x760 [ 136.683901][ T8670] ? __kasan_check_write+0x14/0x20 [ 136.689001][ T8670] ? _copy_from_user+0xa8/0xe0 [ 136.693753][ T8670] sel_write_load+0x24e/0x410 [ 136.698420][ T8670] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 136.704134][ T8670] __vfs_write+0xff/0x700 [ 136.708457][ T8670] ? __kernel_write+0x350/0x350 [ 136.713298][ T8670] ? avc_policy_seqno+0x1b/0x70 [ 136.718145][ T8670] ? selinux_file_permission+0x2ba/0x560 [ 136.723759][ T8670] ? security_file_permission+0x157/0x350 [ 136.729471][ T8670] ? rw_verify_area+0x1c2/0x360 [ 136.734302][ T8670] vfs_write+0x203/0x4e0 [ 136.738535][ T8670] ksys_write+0x168/0x2a0 [ 136.742846][ T8670] ? __ia32_sys_read+0x90/0x90 [ 136.747600][ T8670] ? __kasan_check_read+0x11/0x20 [ 136.752608][ T8670] ? __ia32_sys_clock_settime+0x230/0x230 [ 136.758426][ T8670] __x64_sys_write+0x7b/0x90 [ 136.763023][ T8670] do_syscall_64+0xc0/0x100 [ 136.767524][ T8670] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 136.773409][ T8670] RIP: 0033:0x45b349 [ 136.777294][ T8670] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 136.796904][ T8670] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 136.805313][ T8670] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 136.813271][ T8670] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 136.821246][ T8670] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 136.829196][ T8670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 136.837154][ T8670] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000007 [ 136.846000][ T8670] SELinux: failed to load policy 15:47:04 executing program 0 (fault-call:1 fault-nth:8): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x5, 0x0) [ 136.851339][ T22] kauditd_printk_skb: 250 callbacks suppressed [ 136.851347][ T22] audit: type=1326 audit(1580485624.336:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:47:04 executing program 3: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = open(0x0, 0x3a9801, 0x58) fstatfs(0xffffffffffffffff, 0x0) fcntl$setsig(r1, 0xa, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x4, r2, 0x0, 0x0, 0x0, 0x11010000}) r3 = socket$unix(0x1, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getroute={0x14, 0x1a, 0x4, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20}, 0x40840) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x80082102, &(0x7f0000000040)=r5) socket(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r4, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x3d, 0x0, 0x7f, "a0c4f2a64559acfbc6bfbe74bb88ab70", "d6efc3fdcd1a5c4476ae39aecc864784af2514076ed1d1ddaf3c9ae5fffd3ffd05a8a6688b62a31c"}, 0x3d, 0x2) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00000000000000000000010000000000000002410000000000133a000000"]}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa198) [ 136.883161][ T22] audit: type=1326 audit(1580485624.346:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 136.911786][ T22] audit: type=1326 audit(1580485624.346:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:04 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) [ 136.951344][ T22] audit: type=1326 audit(1580485624.356:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 136.979482][ T22] audit: type=1326 audit(1580485624.356:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 137.005679][ T22] audit: type=1326 audit(1580485624.356:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 137.031891][ T22] audit: type=1326 audit(1580485624.356:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 137.040514][ T8691] FAULT_INJECTION: forcing a failure. [ 137.040514][ T8691] name failslab, interval 1, probability 0, space 0, times 0 [ 137.058209][ T22] audit: type=1326 audit(1580485624.356:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 137.085888][ T8688] EXT4-fs: 5 callbacks suppressed [ 137.085897][ T8688] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value [ 137.099769][ T22] audit: type=1326 audit(1580485624.356:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=72 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:04 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0xe206c26ae4fb48fe) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000000c0)=0x6, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="78000000000000000800000000000000030000000000000006000000000000000e0000001b51000029707070302d76626f786e65743100000200000000000000ff0f00000000000007000000ae0000002b766d6e6574300001f9000000000000000000000000000001000000000000002a00000000000000"], 0x78) unshare(0x40000000) [ 137.135885][ T22] audit: type=1326 audit(1580485624.356:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8666 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 137.169958][ T8689] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value [ 137.172806][ T8691] CPU: 0 PID: 8691 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 137.188378][ T8691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.198427][ T8691] Call Trace: [ 137.201715][ T8691] dump_stack+0x1b0/0x228 [ 137.206041][ T8691] ? devkmsg_release+0x127/0x127 [ 137.210981][ T8691] ? show_regs_print_info+0x18/0x18 [ 137.216159][ T8691] ? arch_stack_walk+0x98/0xe0 [ 137.220931][ T8691] should_fail+0x6fb/0x860 [ 137.225357][ T8691] ? setup_fault_attr+0x2b0/0x2b0 [ 137.230372][ T8691] ? stack_trace_snprint+0x150/0x150 [ 137.235640][ T8691] ? __kernel_text_address+0x9a/0x110 [ 137.241109][ T8691] __should_failslab+0x11a/0x160 [ 137.246128][ T8691] ? hashtab_create+0x5c/0x3f0 [ 137.250885][ T8691] should_failslab+0x9/0x20 [ 137.255401][ T8691] kmem_cache_alloc_trace+0x3a/0x2f0 [ 137.260742][ T8691] ? kasan_kmalloc+0x9/0x10 [ 137.265256][ T8691] ? symtab_init+0xa0/0xa0 [ 137.269667][ T8691] ? symhash+0x100/0x100 [ 137.273890][ T8691] hashtab_create+0x5c/0x3f0 [ 137.278482][ T8691] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 137.284546][ T8691] ? stack_trace_save+0x111/0x1e0 [ 137.289568][ T8691] symtab_init+0x32/0xa0 [ 137.293821][ T8691] policydb_read+0xe1/0x77f0 [ 137.298407][ T8691] ? __kasan_check_read+0x11/0x20 [ 137.303427][ T8691] ? __alloc_pages_nodemask+0x52d/0x3010 [ 137.309400][ T8691] ? vfs_write+0x203/0x4e0 [ 137.313813][ T8691] ? should_fail+0x182/0x860 [ 137.318687][ T8691] ? __vmalloc_node_range+0x2b6/0x760 [ 137.324112][ T8691] ? setup_fault_attr+0x2b0/0x2b0 [ 137.329140][ T8691] ? vfs_write+0x203/0x4e0 [ 137.333554][ T8691] ? ksys_write+0x168/0x2a0 [ 137.338049][ T8691] ? __x64_sys_write+0x7b/0x90 [ 137.342807][ T8691] ? do_syscall_64+0xc0/0x100 [ 137.347576][ T8691] ? string_to_av_perm+0x1c0/0x1c0 [ 137.352698][ T8691] ? __should_failslab+0x11a/0x160 [ 137.357960][ T8691] ? security_load_policy+0x1af/0xfd0 [ 137.363331][ T8691] ? kasan_kmalloc+0x9/0x10 [ 137.367840][ T8691] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 137.373296][ T8691] security_load_policy+0x228/0xfd0 [ 137.378502][ T8691] ? _raw_spin_lock+0xa1/0x170 [ 137.383263][ T8691] ? _raw_spin_trylock_bh+0x190/0x190 [ 137.388618][ T8691] ? security_change_sid+0x50/0x50 [ 137.393722][ T8691] ? vmap_page_range_noflush+0x67b/0x6a0 [ 137.399347][ T8691] ? __vmalloc_node_range+0x56c/0x760 [ 137.404713][ T8691] ? __kasan_check_write+0x14/0x20 [ 137.409878][ T8691] ? _copy_from_user+0xa8/0xe0 [ 137.414657][ T8691] sel_write_load+0x24e/0x410 [ 137.419330][ T8691] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 137.424962][ T8691] __vfs_write+0xff/0x700 [ 137.429282][ T8691] ? __kernel_write+0x350/0x350 [ 137.434236][ T8691] ? avc_policy_seqno+0x1b/0x70 [ 137.439075][ T8691] ? selinux_file_permission+0x2ba/0x560 [ 137.444708][ T8691] ? security_file_permission+0x157/0x350 [ 137.450407][ T8691] ? rw_verify_area+0x1c2/0x360 [ 137.455249][ T8691] vfs_write+0x203/0x4e0 [ 137.459496][ T8691] ksys_write+0x168/0x2a0 [ 137.463808][ T8691] ? __ia32_sys_read+0x90/0x90 [ 137.468553][ T8691] ? __kasan_check_read+0x11/0x20 [ 137.473574][ T8691] ? __ia32_sys_clock_settime+0x230/0x230 [ 137.479308][ T8691] __x64_sys_write+0x7b/0x90 [ 137.483898][ T8691] do_syscall_64+0xc0/0x100 [ 137.488395][ T8691] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 137.494901][ T8691] RIP: 0033:0x45b349 [ 137.498801][ T8691] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 137.518397][ T8691] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 137.526799][ T8691] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 137.534759][ T8691] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 137.542723][ T8691] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 137.550682][ T8691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:05 executing program 0 (fault-call:1 fault-nth:9): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x8, 0x0) [ 137.558642][ T8691] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000008 [ 137.567657][ T8691] SELinux: failed to load policy 15:47:05 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 15:47:05 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=']) [ 137.629057][ T8711] FAULT_INJECTION: forcing a failure. [ 137.629057][ T8711] name failslab, interval 1, probability 0, space 0, times 0 15:47:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0xa, 0x0) [ 137.721901][ T8726] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value [ 137.731705][ T8711] CPU: 0 PID: 8711 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 137.741769][ T8711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.751824][ T8711] Call Trace: [ 137.755108][ T8711] dump_stack+0x1b0/0x228 [ 137.759438][ T8711] ? devkmsg_release+0x127/0x127 [ 137.764378][ T8711] ? show_regs_print_info+0x18/0x18 [ 137.769598][ T8711] ? arch_stack_walk+0x98/0xe0 [ 137.774366][ T8711] should_fail+0x6fb/0x860 [ 137.778787][ T8711] ? setup_fault_attr+0x2b0/0x2b0 [ 137.783809][ T8711] ? stack_trace_snprint+0x150/0x150 [ 137.789088][ T8711] ? __kernel_text_address+0x9a/0x110 [ 137.794447][ T8711] __should_failslab+0x11a/0x160 [ 137.799377][ T8711] ? hashtab_create+0x117/0x3f0 [ 137.804225][ T8711] should_failslab+0x9/0x20 [ 137.808765][ T8711] __kmalloc+0x64/0x310 [ 137.812927][ T8711] ? kasan_kmalloc+0x9/0x10 [ 137.817424][ T8711] hashtab_create+0x117/0x3f0 [ 137.822093][ T8711] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 137.828165][ T8711] ? stack_trace_save+0x111/0x1e0 [ 137.833238][ T8711] symtab_init+0x32/0xa0 [ 137.837477][ T8711] policydb_read+0xe1/0x77f0 [ 137.842054][ T8711] ? __kasan_check_read+0x11/0x20 [ 137.847059][ T8711] ? __alloc_pages_nodemask+0x52d/0x3010 [ 137.852687][ T8711] ? vfs_write+0x203/0x4e0 [ 137.857095][ T8711] ? should_fail+0x182/0x860 [ 137.861667][ T8711] ? __vmalloc_node_range+0x2b6/0x760 [ 137.867032][ T8711] ? setup_fault_attr+0x2b0/0x2b0 [ 137.872053][ T8711] ? vfs_write+0x203/0x4e0 [ 137.876451][ T8711] ? ksys_write+0x168/0x2a0 [ 137.880942][ T8711] ? __x64_sys_write+0x7b/0x90 [ 137.885698][ T8711] ? do_syscall_64+0xc0/0x100 [ 137.890366][ T8711] ? string_to_av_perm+0x1c0/0x1c0 [ 137.895462][ T8711] ? __should_failslab+0x11a/0x160 [ 137.900555][ T8711] ? security_load_policy+0x1af/0xfd0 [ 137.905920][ T8711] ? kasan_kmalloc+0x9/0x10 [ 137.910418][ T8711] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 137.915869][ T8711] security_load_policy+0x228/0xfd0 [ 137.921322][ T8711] ? _raw_spin_lock+0xa1/0x170 [ 137.926061][ T8711] ? _raw_spin_trylock_bh+0x190/0x190 [ 137.931434][ T8711] ? security_change_sid+0x50/0x50 [ 137.936531][ T8711] ? vmap_page_range_noflush+0x67b/0x6a0 [ 137.942193][ T8711] ? __vmalloc_node_range+0x56c/0x760 [ 137.947589][ T8711] ? __kasan_check_write+0x14/0x20 [ 137.952701][ T8711] ? _copy_from_user+0xa8/0xe0 [ 137.957453][ T8711] sel_write_load+0x24e/0x410 [ 137.962114][ T8711] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 137.967741][ T8711] __vfs_write+0xff/0x700 [ 137.972062][ T8711] ? __kernel_write+0x350/0x350 [ 137.976901][ T8711] ? avc_policy_seqno+0x1b/0x70 [ 137.981733][ T8711] ? selinux_file_permission+0x2ba/0x560 [ 137.987470][ T8711] ? security_file_permission+0x157/0x350 [ 137.993182][ T8711] ? rw_verify_area+0x1c2/0x360 [ 137.998112][ T8711] vfs_write+0x203/0x4e0 [ 138.002353][ T8711] ksys_write+0x168/0x2a0 [ 138.006679][ T8711] ? __ia32_sys_read+0x90/0x90 [ 138.011429][ T8711] ? __kasan_check_read+0x11/0x20 [ 138.016441][ T8711] ? __ia32_sys_clock_settime+0x230/0x230 [ 138.022150][ T8711] __x64_sys_write+0x7b/0x90 [ 138.026735][ T8711] do_syscall_64+0xc0/0x100 [ 138.031237][ T8711] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.037123][ T8711] RIP: 0033:0x45b349 [ 138.041015][ T8711] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.060679][ T8711] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:47:05 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) fsetxattr$security_capability(r3, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x2, 0xc23}, {0x2cf6, 0x80000000}]}, 0x14, 0x1) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_buf(r5, 0x107, 0x16, &(0x7f0000000200)="f0d227256c3d004891fffcff6df103687a935ec264608679cfe951616799bcf4227ac12d2d13deccfa9b9463ac4be81d47abf571c9d85fb287366e726d50a5cdc13d254522f6b17976cdf4d671eaece1f75dba6d8907248c3b30e8b4f1ffdd82b35a6aab89aa94d8be38d77a978943f1286e8fb32c0a739f55918e5846f290d8fa218fd971baa8a2100a30bfd13e6a6e", 0x90) r6 = socket$key(0xf, 0x3, 0x2) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "e16a403b1afd63dae6af7c42350556ef"}, 0x11, 0x3) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x80}}, 0x0) 15:47:05 executing program 4: setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x980, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, 0x1, 0x9, 0x101, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x14}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x5}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x1}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x476cd0107e2b34a}, 0x400) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0xb60) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000300)='.\x00', 0xfe) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="65029f92858f5d14dab54e89ebc4beffcb6344d95299ebe1788bbc2929d6cbfb4c0000008000000000f3c1f00417be5a5377054a0b7422efded4e9ad0873f6cc15b450a5a253cd29a5be212a4565b44b752a1b2b9cef", @ANYRESOCT, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES16]], 0x3) sendfile(r4, r4, &(0x7f0000000200), 0xa198) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syncfs(r5) [ 138.069098][ T8711] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 138.077155][ T8711] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 138.085125][ T8711] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 138.093201][ T8711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 138.101158][ T8711] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000009 [ 138.110584][ T8711] SELinux: failed to load policy 15:47:05 executing program 0 (fault-call:1 fault-nth:10): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x18, 0x0) 15:47:05 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) [ 138.139290][ T8734] EXT4-fs (sda1): Unrecognized mount option "resgid=" or missing value [ 138.157875][ T8744] SELinux: ebitmap: truncated map [ 138.163511][ T8744] SELinux: failed to load policy [ 138.202770][ T8744] SELinux: policydb magic number 0x75636573 does not match expected magic number 0xf97cff8c [ 138.213652][ T8744] SELinux: failed to load policy [ 138.219275][ T8755] FAULT_INJECTION: forcing a failure. [ 138.219275][ T8755] name failslab, interval 1, probability 0, space 0, times 0 [ 138.232485][ T8755] CPU: 0 PID: 8755 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 138.242558][ T8755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.253105][ T8755] Call Trace: [ 138.256409][ T8755] dump_stack+0x1b0/0x228 [ 138.260735][ T8755] ? devkmsg_release+0x127/0x127 [ 138.265668][ T8755] ? show_regs_print_info+0x18/0x18 [ 138.270852][ T8755] ? arch_stack_walk+0x98/0xe0 [ 138.275627][ T8755] should_fail+0x6fb/0x860 [ 138.280058][ T8755] ? setup_fault_attr+0x2b0/0x2b0 [ 138.285082][ T8755] ? stack_trace_snprint+0x150/0x150 [ 138.290351][ T8755] ? ___slab_alloc+0xab/0x450 [ 138.295020][ T8755] __should_failslab+0x11a/0x160 [ 138.299946][ T8755] ? hashtab_create+0x117/0x3f0 [ 138.304898][ T8755] should_failslab+0x9/0x20 [ 138.309385][ T8755] __kmalloc+0x64/0x310 [ 138.313531][ T8755] hashtab_create+0x117/0x3f0 [ 138.318202][ T8755] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.324256][ T8755] ? stack_trace_save+0x111/0x1e0 [ 138.329265][ T8755] symtab_init+0x32/0xa0 [ 138.333506][ T8755] policydb_read+0xe1/0x77f0 [ 138.338096][ T8755] ? alloc_slab_page+0x135/0x390 [ 138.343113][ T8755] ? kasan_init_slab_obj+0x24/0x30 [ 138.348237][ T8755] ? setup_object+0xfa/0x130 [ 138.352907][ T8755] ? new_slab+0x21b/0x430 [ 138.357232][ T8755] ? string_to_av_perm+0x1c0/0x1c0 [ 138.362347][ T8755] ? __should_failslab+0x11a/0x160 [ 138.367441][ T8755] ? security_load_policy+0x1af/0xfd0 [ 138.372809][ T8755] ? kasan_kmalloc+0x9/0x10 [ 138.377314][ T8755] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 138.382780][ T8755] security_load_policy+0x228/0xfd0 [ 138.387964][ T8755] ? _raw_spin_lock+0xa1/0x170 [ 138.392710][ T8755] ? _raw_spin_trylock_bh+0x190/0x190 [ 138.398081][ T8755] ? security_change_sid+0x50/0x50 [ 138.403190][ T8755] ? vmap_page_range_noflush+0x67b/0x6a0 [ 138.408892][ T8755] ? __vmalloc_node_range+0x56c/0x760 [ 138.414795][ T8755] ? __kasan_check_write+0x14/0x20 [ 138.419892][ T8755] ? _copy_from_user+0xa8/0xe0 [ 138.424667][ T8755] sel_write_load+0x24e/0x410 [ 138.429330][ T8755] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 138.435069][ T8755] __vfs_write+0xff/0x700 [ 138.439392][ T8755] ? __kernel_write+0x350/0x350 [ 138.444227][ T8755] ? avc_policy_seqno+0x1b/0x70 [ 138.449153][ T8755] ? selinux_file_permission+0x2ba/0x560 [ 138.454886][ T8755] ? security_file_permission+0x157/0x350 [ 138.460605][ T8755] ? rw_verify_area+0x1c2/0x360 [ 138.465439][ T8755] vfs_write+0x203/0x4e0 [ 138.469674][ T8755] ksys_write+0x168/0x2a0 [ 138.474013][ T8755] ? __ia32_sys_read+0x90/0x90 [ 138.478911][ T8755] ? __kasan_check_read+0x11/0x20 [ 138.483924][ T8755] ? __ia32_sys_clock_settime+0x230/0x230 [ 138.489663][ T8755] __x64_sys_write+0x7b/0x90 [ 138.494673][ T8755] do_syscall_64+0xc0/0x100 [ 138.499239][ T8755] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.505331][ T8755] RIP: 0033:0x45b349 [ 138.509234][ T8755] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 138.528930][ T8755] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 138.537355][ T8755] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 138.545443][ T8755] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 15:47:05 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653070000053c07bc3376003639405cb4aed12f000000000015ffa8ee79cf8048e3c3", 0x23}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPSET_CMD_PROTOCOL(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x1, 0x6, 0x300, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 15:47:06 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0]) 15:47:06 executing program 0 (fault-call:1 fault-nth:11): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 138.553442][ T8755] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 138.561425][ T8755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 138.569402][ T8755] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000a [ 138.585867][ T8755] SELinux: failed to load policy 15:47:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x180, 0x0) 15:47:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x8) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) dup3(r2, r0, 0x0) [ 138.652069][ T8769] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value [ 138.683198][ T8779] FAULT_INJECTION: forcing a failure. [ 138.683198][ T8779] name failslab, interval 1, probability 0, space 0, times 0 [ 138.698605][ T8779] CPU: 1 PID: 8779 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 138.708790][ T8779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.718847][ T8779] Call Trace: [ 138.722147][ T8779] dump_stack+0x1b0/0x228 [ 138.726589][ T8779] ? devkmsg_release+0x127/0x127 [ 138.731537][ T8779] ? show_regs_print_info+0x18/0x18 [ 138.736741][ T8779] ? arch_stack_walk+0x98/0xe0 [ 138.741520][ T8779] should_fail+0x6fb/0x860 [ 138.745949][ T8779] ? setup_fault_attr+0x2b0/0x2b0 [ 138.751003][ T8779] ? stack_trace_snprint+0x150/0x150 [ 138.756293][ T8779] ? ___slab_alloc+0xab/0x450 [ 138.761082][ T8779] __should_failslab+0x11a/0x160 [ 138.766023][ T8779] ? hashtab_create+0x117/0x3f0 [ 138.770871][ T8779] should_failslab+0x9/0x20 [ 138.775381][ T8779] __kmalloc+0x64/0x310 [ 138.779563][ T8779] hashtab_create+0x117/0x3f0 [ 138.784231][ T8779] symtab_init+0x32/0xa0 [ 138.788449][ T8779] policydb_read+0x113/0x77f0 [ 138.793144][ T8779] ? __kasan_check_read+0x11/0x20 [ 138.798248][ T8779] ? __alloc_pages_nodemask+0x52d/0x3010 [ 138.803871][ T8779] ? vfs_write+0x203/0x4e0 [ 138.808274][ T8779] ? should_fail+0x182/0x860 [ 138.812899][ T8779] ? __vmalloc_node_range+0x2b6/0x760 [ 138.818317][ T8779] ? setup_fault_attr+0x2b0/0x2b0 [ 138.823331][ T8779] ? vfs_write+0x203/0x4e0 [ 138.827777][ T8779] ? ksys_write+0x168/0x2a0 [ 138.832334][ T8779] ? __x64_sys_write+0x7b/0x90 [ 138.837075][ T8779] ? do_syscall_64+0xc0/0x100 [ 138.842085][ T8779] ? string_to_av_perm+0x1c0/0x1c0 [ 138.847192][ T8779] ? __should_failslab+0x11a/0x160 [ 138.852384][ T8779] ? security_load_policy+0x1af/0xfd0 [ 138.857740][ T8779] ? kasan_kmalloc+0x9/0x10 [ 138.862231][ T8779] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 138.867675][ T8779] security_load_policy+0x228/0xfd0 [ 138.872898][ T8779] ? _raw_spin_lock+0xa1/0x170 [ 138.877664][ T8779] ? _raw_spin_trylock_bh+0x190/0x190 [ 138.883024][ T8779] ? security_change_sid+0x50/0x50 [ 138.888168][ T8779] ? vmap_page_range_noflush+0x67b/0x6a0 [ 138.893804][ T8779] ? __vmalloc_node_range+0x56c/0x760 [ 138.899164][ T8779] ? __kasan_check_write+0x14/0x20 [ 138.904264][ T8779] ? _copy_from_user+0xa8/0xe0 [ 138.909006][ T8779] sel_write_load+0x24e/0x410 [ 138.913940][ T8779] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 138.919570][ T8779] __vfs_write+0xff/0x700 [ 138.923919][ T8779] ? __kernel_write+0x350/0x350 [ 138.928812][ T8779] ? avc_policy_seqno+0x1b/0x70 [ 138.933639][ T8779] ? selinux_file_permission+0x2ba/0x560 [ 138.939260][ T8779] ? security_file_permission+0x157/0x350 [ 138.944984][ T8779] ? rw_verify_area+0x1c2/0x360 [ 138.949868][ T8779] vfs_write+0x203/0x4e0 [ 138.954124][ T8779] ksys_write+0x168/0x2a0 [ 138.958495][ T8779] ? __ia32_sys_read+0x90/0x90 [ 138.963295][ T8779] ? __kasan_check_read+0x11/0x20 [ 138.968353][ T8779] ? __ia32_sys_clock_settime+0x230/0x230 [ 138.974070][ T8779] __x64_sys_write+0x7b/0x90 [ 138.978648][ T8779] do_syscall_64+0xc0/0x100 [ 138.983138][ T8779] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 138.989013][ T8779] RIP: 0033:0x45b349 [ 138.992885][ T8779] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.012476][ T8779] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 139.020926][ T8779] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 139.028936][ T8779] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 139.036941][ T8779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 139.044890][ T8779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x2) 15:47:06 executing program 0 (fault-call:1 fault-nth:12): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 139.052845][ T8779] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000b [ 139.062669][ T8779] SELinux: failed to load policy 15:47:06 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0]) [ 139.175681][ T8801] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value [ 139.194465][ T8805] FAULT_INJECTION: forcing a failure. [ 139.194465][ T8805] name failslab, interval 1, probability 0, space 0, times 0 [ 139.214048][ T8805] CPU: 0 PID: 8805 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 139.224122][ T8805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.234363][ T8805] Call Trace: [ 139.237648][ T8805] dump_stack+0x1b0/0x228 [ 139.242097][ T8805] ? devkmsg_release+0x127/0x127 [ 139.247040][ T8805] ? show_regs_print_info+0x18/0x18 [ 139.252239][ T8805] ? arch_stack_walk+0x98/0xe0 [ 139.257129][ T8805] should_fail+0x6fb/0x860 [ 139.261554][ T8805] ? setup_fault_attr+0x2b0/0x2b0 [ 139.266587][ T8805] ? stack_trace_snprint+0x150/0x150 [ 139.271881][ T8805] ? __kernel_text_address+0x9a/0x110 [ 139.277263][ T8805] __should_failslab+0x11a/0x160 [ 139.282309][ T8805] ? hashtab_create+0x5c/0x3f0 [ 139.287084][ T8805] should_failslab+0x9/0x20 [ 139.291604][ T8805] kmem_cache_alloc_trace+0x3a/0x2f0 [ 139.297022][ T8805] ? kasan_kmalloc+0x9/0x10 [ 139.301536][ T8805] ? symtab_init+0xa0/0xa0 [ 139.305967][ T8805] ? symhash+0x100/0x100 [ 139.310218][ T8805] hashtab_create+0x5c/0x3f0 [ 139.314811][ T8805] symtab_init+0x32/0xa0 [ 139.319069][ T8805] policydb_read+0x148/0x77f0 [ 139.323806][ T8805] ? __kasan_check_read+0x11/0x20 [ 139.328848][ T8805] ? __alloc_pages_nodemask+0x52d/0x3010 [ 139.334503][ T8805] ? vfs_write+0x203/0x4e0 [ 139.338908][ T8805] ? should_fail+0x182/0x860 [ 139.343501][ T8805] ? __vmalloc_node_range+0x2b6/0x760 [ 139.348871][ T8805] ? setup_fault_attr+0x2b0/0x2b0 [ 139.353916][ T8805] ? vfs_write+0x203/0x4e0 [ 139.358337][ T8805] ? ksys_write+0x168/0x2a0 [ 139.362848][ T8805] ? do_syscall_64+0xc0/0x100 [ 139.367521][ T8805] ? string_to_av_perm+0x1c0/0x1c0 [ 139.372623][ T8805] ? __should_failslab+0x11a/0x160 [ 139.377821][ T8805] ? security_load_policy+0x1af/0xfd0 [ 139.383189][ T8805] ? kasan_kmalloc+0x9/0x10 [ 139.387691][ T8805] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 139.393148][ T8805] security_load_policy+0x228/0xfd0 [ 139.398688][ T8805] ? _raw_spin_lock+0xa1/0x170 [ 139.403539][ T8805] ? _raw_spin_trylock_bh+0x190/0x190 [ 139.408907][ T8805] ? security_change_sid+0x50/0x50 [ 139.414019][ T8805] ? vmap_page_range_noflush+0x67b/0x6a0 [ 139.419723][ T8805] ? __vmalloc_node_range+0x56c/0x760 [ 139.425087][ T8805] ? __kasan_check_write+0x14/0x20 [ 139.430194][ T8805] ? _copy_from_user+0xa8/0xe0 [ 139.436489][ T8805] sel_write_load+0x24e/0x410 [ 139.441234][ T8805] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 139.446956][ T8805] __vfs_write+0xff/0x700 [ 139.451400][ T8805] ? __kernel_write+0x350/0x350 [ 139.456255][ T8805] ? avc_policy_seqno+0x1b/0x70 [ 139.461102][ T8805] ? selinux_file_permission+0x2ba/0x560 [ 139.466724][ T8805] ? security_file_permission+0x157/0x350 [ 139.473264][ T8805] ? rw_verify_area+0x1c2/0x360 [ 139.478233][ T8805] vfs_write+0x203/0x4e0 [ 139.482497][ T8805] ksys_write+0x168/0x2a0 [ 139.486816][ T8805] ? __ia32_sys_read+0x90/0x90 [ 139.491659][ T8805] ? __kasan_check_read+0x11/0x20 [ 139.496678][ T8805] ? __ia32_sys_clock_settime+0x230/0x230 [ 139.502411][ T8805] __x64_sys_write+0x7b/0x90 [ 139.507231][ T8805] do_syscall_64+0xc0/0x100 [ 139.511736][ T8805] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.517608][ T8805] RIP: 0033:0x45b349 [ 139.521568][ T8805] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 139.541286][ T8805] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 139.549694][ T8805] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 139.557695][ T8805] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 139.565666][ T8805] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:47:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x3) 15:47:07 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0]) 15:47:07 executing program 0 (fault-call:1 fault-nth:13): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:07 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 15:47:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4) [ 139.573852][ T8805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 139.581906][ T8805] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000c 15:47:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000340)={'filter\x00', 0x0, 0x3, 0x1000, [], 0x4, &(0x7f0000000280)=[{}, {}, {}, {}], &(0x7f0000000980)=""/4096}, &(0x7f00000002c0)=0x78) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) r5 = socket(0x25, 0x6, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x10, 0x80002, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8001}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) 15:47:07 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0]) [ 139.651949][ T8811] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value [ 139.683829][ T8823] FAULT_INJECTION: forcing a failure. [ 139.683829][ T8823] name failslab, interval 1, probability 0, space 0, times 0 [ 139.700832][ T8823] CPU: 0 PID: 8823 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 139.710955][ T8823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.721006][ T8823] Call Trace: [ 139.724287][ T8823] dump_stack+0x1b0/0x228 [ 139.728840][ T8823] ? devkmsg_release+0x127/0x127 [ 139.733779][ T8823] ? show_regs_print_info+0x18/0x18 [ 139.738966][ T8823] ? arch_stack_walk+0x98/0xe0 [ 139.743736][ T8823] should_fail+0x6fb/0x860 [ 139.748160][ T8823] ? setup_fault_attr+0x2b0/0x2b0 [ 139.753179][ T8823] ? stack_trace_snprint+0x150/0x150 [ 139.758455][ T8823] ? __kernel_text_address+0x9a/0x110 [ 139.763813][ T8823] __should_failslab+0x11a/0x160 [ 139.768758][ T8823] ? hashtab_create+0x117/0x3f0 [ 139.773628][ T8823] should_failslab+0x9/0x20 [ 139.778113][ T8823] __kmalloc+0x64/0x310 [ 139.782261][ T8823] ? kasan_kmalloc+0x9/0x10 [ 139.786866][ T8823] hashtab_create+0x117/0x3f0 [ 139.791547][ T8823] symtab_init+0x32/0xa0 [ 139.795794][ T8823] policydb_read+0x148/0x77f0 [ 139.800470][ T8823] ? __kasan_check_read+0x11/0x20 [ 139.805526][ T8823] ? __alloc_pages_nodemask+0x52d/0x3010 [ 139.811167][ T8823] ? vfs_write+0x203/0x4e0 [ 139.815581][ T8823] ? should_fail+0x182/0x860 [ 139.820171][ T8823] ? __vmalloc_node_range+0x2b6/0x760 [ 139.825558][ T8823] ? setup_fault_attr+0x2b0/0x2b0 [ 139.830576][ T8823] ? vfs_write+0x203/0x4e0 [ 139.834988][ T8823] ? ksys_write+0x168/0x2a0 [ 139.839486][ T8823] ? do_syscall_64+0xc0/0x100 [ 139.844168][ T8823] ? string_to_av_perm+0x1c0/0x1c0 [ 139.849287][ T8823] ? __should_failslab+0x11a/0x160 [ 139.854385][ T8823] ? security_load_policy+0x1af/0xfd0 [ 139.859749][ T8823] ? kasan_kmalloc+0x9/0x10 [ 139.864332][ T8823] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 139.869788][ T8823] security_load_policy+0x228/0xfd0 [ 139.874970][ T8823] ? _raw_spin_lock+0xa1/0x170 [ 139.879713][ T8823] ? _raw_spin_trylock_bh+0x190/0x190 [ 139.885078][ T8823] ? security_change_sid+0x50/0x50 [ 139.890179][ T8823] ? vmap_page_range_noflush+0x67b/0x6a0 [ 139.895792][ T8823] ? __vmalloc_node_range+0x56c/0x760 [ 139.901154][ T8823] ? __kasan_check_write+0x14/0x20 [ 139.906257][ T8823] ? _copy_from_user+0xa8/0xe0 [ 139.911004][ T8823] sel_write_load+0x24e/0x410 [ 139.915675][ T8823] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 139.921301][ T8823] __vfs_write+0xff/0x700 [ 139.925612][ T8823] ? __kernel_write+0x350/0x350 [ 139.930573][ T8823] ? avc_policy_seqno+0x1b/0x70 [ 139.935418][ T8823] ? selinux_file_permission+0x2ba/0x560 [ 139.941060][ T8823] ? security_file_permission+0x157/0x350 [ 139.946759][ T8823] ? rw_verify_area+0x1c2/0x360 [ 139.951585][ T8823] vfs_write+0x203/0x4e0 [ 139.955827][ T8823] ksys_write+0x168/0x2a0 [ 139.960145][ T8823] ? __ia32_sys_read+0x90/0x90 [ 139.964955][ T8823] ? __kasan_check_read+0x11/0x20 [ 139.969977][ T8823] ? __ia32_sys_clock_settime+0x230/0x230 [ 139.975690][ T8823] __x64_sys_write+0x7b/0x90 [ 139.980273][ T8823] do_syscall_64+0xc0/0x100 [ 139.984763][ T8823] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 139.990647][ T8823] RIP: 0033:0x45b349 [ 139.994536][ T8823] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.014133][ T8823] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 140.022547][ T8823] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 140.030516][ T8823] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 140.038484][ T8823] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:47:07 executing program 0 (fault-call:1 fault-nth:14): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:07 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0]) [ 140.046887][ T8823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.054853][ T8823] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000d [ 140.091606][ T8829] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value 15:47:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x5) [ 140.136678][ T8831] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value [ 140.155911][ T8849] FAULT_INJECTION: forcing a failure. [ 140.155911][ T8849] name failslab, interval 1, probability 0, space 0, times 0 [ 140.180207][ T8849] CPU: 1 PID: 8849 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 140.190431][ T8849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.200754][ T8849] Call Trace: [ 140.204053][ T8849] dump_stack+0x1b0/0x228 [ 140.208490][ T8849] ? devkmsg_release+0x127/0x127 [ 140.213465][ T8849] ? show_regs_print_info+0x18/0x18 [ 140.218765][ T8849] ? arch_stack_walk+0x98/0xe0 [ 140.223672][ T8849] should_fail+0x6fb/0x860 [ 140.228107][ T8849] ? setup_fault_attr+0x2b0/0x2b0 [ 140.233154][ T8849] ? __perf_event_task_sched_in+0x4ed/0x550 [ 140.239063][ T8849] ? ___slab_alloc+0xab/0x450 [ 140.243747][ T8849] __should_failslab+0x11a/0x160 [ 140.248699][ T8849] ? hashtab_create+0x5c/0x3f0 [ 140.253474][ T8849] should_failslab+0x9/0x20 [ 140.258011][ T8849] kmem_cache_alloc_trace+0x3a/0x2f0 [ 140.263301][ T8849] ? symtab_init+0xa0/0xa0 [ 140.267830][ T8849] ? symhash+0x100/0x100 [ 140.272100][ T8849] hashtab_create+0x5c/0x3f0 [ 140.276704][ T8849] symtab_init+0x32/0xa0 [ 140.281045][ T8849] policydb_read+0x17d/0x77f0 [ 140.285732][ T8849] ? __sched_text_start+0x8/0x8 [ 140.290586][ T8849] ? __alloc_pages_nodemask+0x52d/0x3010 [ 140.296225][ T8849] ? __kasan_check_read+0x11/0x20 [ 140.301364][ T8849] ? preempt_schedule_irq+0xc7/0x110 [ 140.306725][ T8849] ? preempt_schedule_notrace+0x110/0x110 [ 140.312542][ T8849] ? vfs_write+0x203/0x4e0 [ 140.316941][ T8849] ? do_syscall_64+0xc0/0x100 [ 140.321608][ T8849] ? string_to_av_perm+0x1c0/0x1c0 [ 140.326753][ T8849] ? retint_kernel+0x1b/0x1b [ 140.331355][ T8849] security_load_policy+0x228/0xfd0 [ 140.336601][ T8849] ? _raw_spin_lock+0xa1/0x170 [ 140.341470][ T8849] ? _raw_spin_trylock_bh+0x190/0x190 [ 140.346966][ T8849] ? security_change_sid+0x50/0x50 [ 140.352063][ T8849] ? vmap_page_range_noflush+0x67b/0x6a0 [ 140.358066][ T8849] ? __vmalloc_node_range+0x56c/0x760 [ 140.363732][ T8849] ? __kasan_check_write+0x14/0x20 [ 140.368831][ T8849] ? _copy_from_user+0xa8/0xe0 [ 140.373676][ T8849] sel_write_load+0x24e/0x410 [ 140.378362][ T8849] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 140.384025][ T8849] __vfs_write+0xff/0x700 [ 140.388435][ T8849] ? __kernel_write+0x350/0x350 [ 140.393634][ T8849] ? avc_policy_seqno+0x1b/0x70 [ 140.398612][ T8849] ? selinux_file_permission+0x2ba/0x560 [ 140.404303][ T8849] ? security_file_permission+0x157/0x350 [ 140.410113][ T8849] ? rw_verify_area+0x1c2/0x360 [ 140.415206][ T8849] vfs_write+0x203/0x4e0 [ 140.419445][ T8849] ksys_write+0x168/0x2a0 [ 140.423856][ T8849] ? __ia32_sys_read+0x90/0x90 [ 140.428605][ T8849] ? __kasan_check_read+0x11/0x20 [ 140.433665][ T8849] ? __ia32_sys_clock_settime+0x230/0x230 [ 140.439388][ T8849] __x64_sys_write+0x7b/0x90 [ 140.443974][ T8849] do_syscall_64+0xc0/0x100 [ 140.448492][ T8849] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 140.454546][ T8849] RIP: 0033:0x45b349 [ 140.458449][ T8849] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.478995][ T8849] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 140.487543][ T8849] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 140.495688][ T8849] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 140.503796][ T8849] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 140.511814][ T8849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.519782][ T8849] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000e [ 140.532631][ T8849] sel_write_load: 2 callbacks suppressed 15:47:08 executing program 0 (fault-call:1 fault-nth:15): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:08 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0]) 15:47:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) r7 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$BLKPBSZGET(r7, 0x127b, &(0x7f0000000000)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, 0x0, 0x4000) [ 140.532636][ T8849] SELinux: failed to load policy [ 140.550920][ T8848] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value 15:47:08 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0x2a, 0x29, 0x1, {0x7, [{{0x4, 0x1, 0x6}, 0xb4, 0x1, 0x7, './file1'}]}}, 0x2a) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) 15:47:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x6) [ 140.611555][ T8869] FAULT_INJECTION: forcing a failure. [ 140.611555][ T8869] name failslab, interval 1, probability 0, space 0, times 0 [ 140.624792][ T8869] CPU: 1 PID: 8869 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 140.634887][ T8869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.644970][ T8869] Call Trace: [ 140.648272][ T8869] dump_stack+0x1b0/0x228 [ 140.652664][ T8869] ? devkmsg_release+0x127/0x127 [ 140.657649][ T8869] ? show_regs_print_info+0x18/0x18 [ 140.662907][ T8869] ? arch_stack_walk+0x98/0xe0 [ 140.667780][ T8869] should_fail+0x6fb/0x860 [ 140.672282][ T8869] ? setup_fault_attr+0x2b0/0x2b0 [ 140.677287][ T8869] ? stack_trace_snprint+0x150/0x150 [ 140.682732][ T8869] ? ___slab_alloc+0xab/0x450 [ 140.687398][ T8869] __should_failslab+0x11a/0x160 [ 140.692340][ T8869] ? hashtab_create+0x117/0x3f0 [ 140.697234][ T8869] should_failslab+0x9/0x20 [ 140.701763][ T8869] __kmalloc+0x64/0x310 [ 140.706014][ T8869] hashtab_create+0x117/0x3f0 [ 140.710806][ T8869] symtab_init+0x32/0xa0 [ 140.715032][ T8869] policydb_read+0x17d/0x77f0 [ 140.720788][ T8869] ? __kasan_check_read+0x11/0x20 [ 140.726321][ T8869] ? __alloc_pages_nodemask+0x52d/0x3010 [ 140.732172][ T8869] ? vfs_write+0x203/0x4e0 [ 140.736570][ T8869] ? should_fail+0x182/0x860 [ 140.741145][ T8869] ? __vmalloc_node_range+0x2b6/0x760 [ 140.746766][ T8869] ? setup_fault_attr+0x2b0/0x2b0 [ 140.751775][ T8869] ? vfs_write+0x203/0x4e0 [ 140.756186][ T8869] ? ksys_write+0x168/0x2a0 [ 140.760678][ T8869] ? do_syscall_64+0xc0/0x100 [ 140.765353][ T8869] ? string_to_av_perm+0x1c0/0x1c0 [ 140.770475][ T8869] ? __should_failslab+0x11a/0x160 [ 140.775585][ T8869] ? security_load_policy+0x1af/0xfd0 [ 140.781029][ T8869] ? kasan_kmalloc+0x9/0x10 [ 140.785634][ T8869] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 140.791526][ T8869] security_load_policy+0x228/0xfd0 [ 140.796719][ T8869] ? _raw_spin_lock+0xa1/0x170 [ 140.801585][ T8869] ? _raw_spin_trylock_bh+0x190/0x190 [ 140.806946][ T8869] ? security_change_sid+0x50/0x50 [ 140.813435][ T8869] ? vmap_page_range_noflush+0x67b/0x6a0 [ 140.819061][ T8869] ? __vmalloc_node_range+0x56c/0x760 [ 140.824430][ T8869] ? __kasan_check_write+0x14/0x20 [ 140.829551][ T8869] ? _copy_from_user+0xa8/0xe0 [ 140.834312][ T8869] sel_write_load+0x24e/0x410 [ 140.839025][ T8869] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 140.844731][ T8869] __vfs_write+0xff/0x700 [ 140.849064][ T8869] ? __kernel_write+0x350/0x350 [ 140.853915][ T8869] ? avc_policy_seqno+0x1b/0x70 [ 140.858890][ T8869] ? selinux_file_permission+0x2ba/0x560 [ 140.864774][ T8869] ? security_file_permission+0x157/0x350 [ 140.870504][ T8869] ? rw_verify_area+0x1c2/0x360 [ 140.875340][ T8869] vfs_write+0x203/0x4e0 [ 140.879588][ T8869] ksys_write+0x168/0x2a0 [ 140.883907][ T8869] ? __ia32_sys_read+0x90/0x90 [ 140.888687][ T8869] ? __kasan_check_read+0x11/0x20 [ 140.893710][ T8869] ? __ia32_sys_clock_settime+0x230/0x230 [ 140.899521][ T8869] __x64_sys_write+0x7b/0x90 [ 140.904096][ T8869] do_syscall_64+0xc0/0x100 [ 140.908624][ T8869] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 140.914598][ T8869] RIP: 0033:0x45b349 [ 140.918475][ T8869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 140.938168][ T8869] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 140.946575][ T8869] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 140.954620][ T8869] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 15:47:08 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 15:47:08 executing program 0 (fault-call:1 fault-nth:16): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 140.962578][ T8869] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 140.970535][ T8869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 140.978497][ T8869] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000000f [ 140.998696][ T8869] SELinux: failed to load policy 15:47:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40, 0x163) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0xa, 0x4, 0x8) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, &(0x7f0000000080)={'batadv_slave_0\x00', 0x7}) getsockopt$TIPC_DEST_DROPPABLE(r4, 0x10f, 0x81, &(0x7f0000000280), &(0x7f00000000c0)=0x4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$unix(0x1, 0x2, 0x0) r8 = fcntl$dupfd(r7, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$packet_int(r3, 0x107, 0x3, &(0x7f0000000040)=0x7f, 0x4) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c00000010000108002aa71a30cf7f161451e791", @ANYRES32=0x0, @ANYBLOB="000000001b000000000014001680104ae3b8fd99a84a70e6c12e8d0f823c3db8efb3e91c56d2b77e225341a277d9fa4efc4be3c3846103c803370e309612f12ee06981bd938ee6feb1da23a41b981da372fb6035b9a744d46c42fe0dcf2f109cf3c06e3bf19f476768127de214df264b6960678c3598a0bfa554fc06107a9b817ad76130ee35f75ab2571c2e506a1b804c0d0aa2102a036d6f08acfb741791a5065da362dc9ca2e17e3bcb42d0e0d91eafb8f1ebb83256dade9848e11c058e5ac620008e00"/212], 0x3c}}, 0x0) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) connect$tipc(r10, &(0x7f00000002c0)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x1}}, 0x10) r11 = dup(0xffffffffffffffff) r12 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r12, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7c05000000075345204c526e757816000000000400000002ab000082577402573104000900deec028c00"/56], 0x38) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00') r14 = socket$unix(0x1, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$sock_timeval(r15, 0x1, 0x14, &(0x7f0000000440), &(0x7f0000000480)=0x10) sendmsg$NL80211_CMD_JOIN_MESH(r10, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x28, r13, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0xb726}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4004) r16 = dup2(r12, r7) getsockopt$ARPT_SO_GET_INFO(r16, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000100)=0x44) setsockopt$inet6_IPV6_ADDRFORM(r11, 0x29, 0x1, &(0x7f0000007a00), 0x4) 15:47:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x7) [ 141.085439][ T8893] FAULT_INJECTION: forcing a failure. [ 141.085439][ T8893] name failslab, interval 1, probability 0, space 0, times 0 [ 141.100707][ T8893] CPU: 0 PID: 8893 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 141.110929][ T8893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.120987][ T8893] Call Trace: [ 141.124277][ T8893] dump_stack+0x1b0/0x228 [ 141.128714][ T8893] ? devkmsg_release+0x127/0x127 [ 141.133574][ T8895] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 141.133645][ T8893] ? show_regs_print_info+0x18/0x18 [ 141.148109][ T8893] ? arch_stack_walk+0x98/0xe0 [ 141.152862][ T8893] should_fail+0x6fb/0x860 [ 141.157376][ T8893] ? setup_fault_attr+0x2b0/0x2b0 [ 141.162388][ T8893] ? stack_trace_snprint+0x150/0x150 [ 141.167773][ T8893] ? __kernel_text_address+0x9a/0x110 [ 141.173130][ T8893] __should_failslab+0x11a/0x160 [ 141.178050][ T8893] ? hashtab_create+0x117/0x3f0 [ 141.182890][ T8893] should_failslab+0x9/0x20 [ 141.187484][ T8893] __kmalloc+0x64/0x310 [ 141.191632][ T8893] ? kasan_kmalloc+0x9/0x10 [ 141.196125][ T8893] hashtab_create+0x117/0x3f0 [ 141.200787][ T8893] symtab_init+0x32/0xa0 [ 141.205013][ T8893] policydb_read+0x17d/0x77f0 [ 141.209677][ T8893] ? __kasan_check_read+0x11/0x20 [ 141.214690][ T8893] ? alloc_slab_page+0x135/0x390 [ 141.219623][ T8893] ? __kasan_check_read+0x11/0x20 [ 141.224636][ T8893] ? kasan_init_slab_obj+0x24/0x30 [ 141.229762][ T8893] ? setup_object+0xfa/0x130 [ 141.234342][ T8893] ? new_slab+0x21b/0x430 [ 141.238706][ T8893] ? string_to_av_perm+0x1c0/0x1c0 [ 141.243810][ T8893] ? __should_failslab+0x11a/0x160 [ 141.248915][ T8893] ? security_load_policy+0x1af/0xfd0 [ 141.254318][ T8893] ? kasan_kmalloc+0x9/0x10 [ 141.258809][ T8893] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 141.264308][ T8893] security_load_policy+0x228/0xfd0 [ 141.269628][ T8893] ? __sched_text_start+0x8/0x8 [ 141.274464][ T8893] ? _raw_spin_lock+0xa1/0x170 [ 141.279213][ T8893] ? _raw_spin_trylock_bh+0x190/0x190 [ 141.284601][ T8893] ? security_change_sid+0x50/0x50 [ 141.290153][ T8893] ? __kasan_check_read+0x11/0x20 [ 141.295165][ T8893] ? preempt_schedule_irq+0xc7/0x110 [ 141.300443][ T8893] ? preempt_schedule_notrace+0x110/0x110 [ 141.306147][ T8893] ? retint_kernel+0x1b/0x1b [ 141.310720][ T8893] sel_write_load+0x24e/0x410 [ 141.315419][ T8893] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 141.321031][ T8893] __vfs_write+0xff/0x700 [ 141.325348][ T8893] ? __kernel_write+0x350/0x350 [ 141.330186][ T8893] ? avc_policy_seqno+0x1b/0x70 [ 141.335010][ T8893] ? selinux_file_permission+0x2ba/0x560 [ 141.340730][ T8893] ? security_file_permission+0x157/0x350 [ 141.346441][ T8893] ? rw_verify_area+0x1c2/0x360 [ 141.351271][ T8893] vfs_write+0x203/0x4e0 [ 141.355496][ T8893] ksys_write+0x168/0x2a0 [ 141.359872][ T8893] ? __ia32_sys_read+0x90/0x90 [ 141.364625][ T8893] ? __kasan_check_read+0x11/0x20 [ 141.369660][ T8893] ? __ia32_sys_clock_settime+0x230/0x230 [ 141.375370][ T8893] __x64_sys_write+0x7b/0x90 [ 141.379961][ T8893] do_syscall_64+0xc0/0x100 [ 141.384487][ T8893] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 141.390378][ T8893] RIP: 0033:0x45b349 [ 141.394255][ T8893] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.413864][ T8893] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 141.422264][ T8893] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 15:47:08 executing program 0 (fault-call:1 fault-nth:17): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 141.430263][ T8893] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 141.438218][ T8893] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 141.446228][ T8893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 141.454226][ T8893] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000010 [ 141.462541][ T8893] SELinux: failed to load policy [ 141.475498][ T8895] SELinux: policydb magic number 0x57cff8c does not match expected magic number 0xf97cff8c 15:47:09 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0]) 15:47:09 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="020185ffffff16a40000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c30000fdfdffff80000055aa", 0x40, 0x1c0}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r2, 0x336e, 0x3ff, 0xffffffff7fffffff, 0x5}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x14, 0x17, {0x18, 0x4, @l2={'ib', 0x3a, 'sit0\x00'}}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x8010) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:47:09 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) ioctl$USBDEVFS_CONTROL(r0, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0}) [ 141.486069][ T8895] SELinux: failed to load policy [ 141.497428][ T8899] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 141.526485][ T8883] overlayfs: filesystem on './file0' not supported as upperdir 15:47:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x8) 15:47:09 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) [ 141.615162][ T8927] FAULT_INJECTION: forcing a failure. [ 141.615162][ T8927] name failslab, interval 1, probability 0, space 0, times 0 [ 141.628422][ T8927] CPU: 1 PID: 8927 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 141.638597][ T8927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.648645][ T8927] Call Trace: [ 141.651935][ T8927] dump_stack+0x1b0/0x228 [ 141.656248][ T8927] ? devkmsg_release+0x127/0x127 [ 141.661178][ T8927] ? show_regs_print_info+0x18/0x18 [ 141.666368][ T8927] ? arch_stack_walk+0x98/0xe0 [ 141.671135][ T8927] should_fail+0x6fb/0x860 [ 141.675531][ T8927] ? setup_fault_attr+0x2b0/0x2b0 [ 141.680545][ T8927] ? stack_trace_snprint+0x150/0x150 [ 141.685824][ T8927] ? ___slab_alloc+0xab/0x450 [ 141.690959][ T8927] __should_failslab+0x11a/0x160 [ 141.695886][ T8927] ? hashtab_create+0x5c/0x3f0 [ 141.700633][ T8927] should_failslab+0x9/0x20 [ 141.705118][ T8927] kmem_cache_alloc_trace+0x3a/0x2f0 [ 141.710385][ T8927] ? symtab_init+0xa0/0xa0 [ 141.714792][ T8927] ? symhash+0x100/0x100 [ 141.719028][ T8927] hashtab_create+0x5c/0x3f0 [ 141.723613][ T8927] symtab_init+0x32/0xa0 [ 141.727853][ T8927] policydb_read+0x1a7/0x77f0 [ 141.732529][ T8927] ? alloc_slab_page+0x135/0x390 [ 141.737469][ T8927] ? kasan_init_slab_obj+0x24/0x30 [ 141.742574][ T8927] ? setup_object+0xfa/0x130 [ 141.747141][ T8927] ? new_slab+0x21b/0x430 [ 141.751457][ T8927] ? string_to_av_perm+0x1c0/0x1c0 [ 141.756544][ T8927] ? __should_failslab+0x11a/0x160 [ 141.761755][ T8927] ? security_load_policy+0x1af/0xfd0 [ 141.767111][ T8927] ? kasan_kmalloc+0x9/0x10 [ 141.771611][ T8927] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 141.777076][ T8927] security_load_policy+0x228/0xfd0 [ 141.782384][ T8927] ? _raw_spin_lock+0xa1/0x170 [ 141.787261][ T8927] ? _raw_spin_trylock_bh+0x190/0x190 [ 141.793017][ T8927] ? security_change_sid+0x50/0x50 [ 141.798227][ T8927] ? vmap_page_range_noflush+0x67b/0x6a0 [ 141.803865][ T8927] ? __vmalloc_node_range+0x56c/0x760 [ 141.809230][ T8927] ? __kasan_check_write+0x14/0x20 [ 141.814324][ T8927] ? _copy_from_user+0xa8/0xe0 [ 141.819209][ T8927] sel_write_load+0x24e/0x410 [ 141.823883][ T8927] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 141.829494][ T8927] __vfs_write+0xff/0x700 [ 141.833855][ T8927] ? __kernel_write+0x350/0x350 [ 141.838695][ T8927] ? avc_policy_seqno+0x1b/0x70 [ 141.843535][ T8927] ? selinux_file_permission+0x2ba/0x560 [ 141.849162][ T8927] ? security_file_permission+0x157/0x350 [ 141.854863][ T8927] ? rw_verify_area+0x1c2/0x360 [ 141.859701][ T8927] vfs_write+0x203/0x4e0 [ 141.863946][ T8927] ksys_write+0x168/0x2a0 [ 141.868274][ T8927] ? __ia32_sys_read+0x90/0x90 [ 141.873030][ T8927] ? __kasan_check_read+0x11/0x20 [ 141.878049][ T8927] ? __ia32_sys_clock_settime+0x230/0x230 [ 141.883809][ T8927] __x64_sys_write+0x7b/0x90 [ 141.888401][ T8927] do_syscall_64+0xc0/0x100 [ 141.892900][ T8927] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 141.898775][ T8927] RIP: 0033:0x45b349 [ 141.902660][ T8927] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 141.922253][ T8927] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 141.930663][ T8927] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 141.938636][ T8927] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 141.946638][ T8927] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 141.954591][ T8927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008000400", @ANYRES32=r2, @ANYBLOB="c30fe8be3d9b1a403042dddf7f08001b00000000009c500100be"], 0x30}}, 0x0) 15:47:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x9) [ 141.962547][ T8927] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000011 [ 141.974549][ T8927] SELinux: failed to load policy [ 141.988840][ T8918] loop3: p1 < > p2 p3 < p5 > p4 [ 141.996096][ T8918] loop3: partition table partially beyond EOD, truncated [ 142.004750][ T8918] loop3: p1 start 42006 is beyond EOD, truncated 15:47:09 executing program 0 (fault-call:1 fault-nth:18): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 142.019101][ T8918] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 142.030412][ T8918] loop3: p3 size 2 extends beyond EOD, truncated [ 142.038522][ T8941] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 142.052092][ T8918] loop3: p4 start 4294835456 is beyond EOD, truncated [ 142.059604][ T22] kauditd_printk_skb: 222 callbacks suppressed 15:47:09 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0]) [ 142.059613][ T22] audit: type=1326 audit(1580485629.546:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 142.088510][ T8949] FAULT_INJECTION: forcing a failure. [ 142.088510][ T8949] name failslab, interval 1, probability 0, space 0, times 0 [ 142.096362][ T22] audit: type=1326 audit(1580485629.566:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 142.105288][ T8918] loop3: p5 size 1073741824 extends beyond EOD, truncated [ 142.129433][ T22] audit: type=1326 audit(1580485629.566:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 142.162608][ T22] audit: type=1326 audit(1580485629.566:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 142.171652][ T8949] CPU: 1 PID: 8949 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 142.188090][ T22] audit: type=1326 audit(1580485629.566:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 142.197915][ T8949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.197918][ T8949] Call Trace: [ 142.197937][ T8949] dump_stack+0x1b0/0x228 [ 142.197946][ T8949] ? devkmsg_release+0x127/0x127 [ 142.197960][ T8949] ? show_regs_print_info+0x18/0x18 [ 142.223448][ T22] audit: type=1326 audit(1580485629.566:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 142.233452][ T8949] ? arch_stack_walk+0x98/0xe0 [ 142.233466][ T8949] should_fail+0x6fb/0x860 [ 142.233474][ T8949] ? setup_fault_attr+0x2b0/0x2b0 [ 142.233487][ T8949] ? stack_trace_snprint+0x150/0x150 [ 142.236773][ T22] audit: type=1326 audit(1580485629.566:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 142.241072][ T8949] ? ___slab_alloc+0xab/0x450 [ 142.241080][ T8949] __should_failslab+0x11a/0x160 [ 142.241088][ T8949] ? hashtab_create+0x5c/0x3f0 [ 142.241102][ T8949] should_failslab+0x9/0x20 [ 142.246036][ T22] audit: type=1326 audit(1580485629.566:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 142.251209][ T8949] kmem_cache_alloc_trace+0x3a/0x2f0 [ 142.251217][ T8949] ? symtab_init+0xa0/0xa0 [ 142.251223][ T8949] ? symhash+0x100/0x100 [ 142.251235][ T8949] hashtab_create+0x5c/0x3f0 [ 142.276701][ T22] audit: type=1326 audit(1580485629.566:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 142.281406][ T8949] symtab_init+0x32/0xa0 [ 142.281418][ T8949] policydb_read+0x1d1/0x77f0 [ 142.285810][ T22] audit: type=1326 audit(1580485629.566:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8939 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 142.290806][ T8949] ? __kasan_check_read+0x11/0x20 [ 142.290814][ T8949] ? __alloc_pages_nodemask+0x52d/0x3010 [ 142.290827][ T8949] ? vfs_write+0x203/0x4e0 [ 142.458428][ T8949] ? should_fail+0x182/0x860 [ 142.462997][ T8949] ? __vmalloc_node_range+0x2b6/0x760 [ 142.468357][ T8949] ? setup_fault_attr+0x2b0/0x2b0 [ 142.473385][ T8949] ? vfs_write+0x203/0x4e0 [ 142.477788][ T8949] ? ksys_write+0x168/0x2a0 [ 142.482270][ T8949] ? do_syscall_64+0xc0/0x100 [ 142.486929][ T8949] ? string_to_av_perm+0x1c0/0x1c0 [ 142.492160][ T8949] ? __should_failslab+0x11a/0x160 [ 142.497306][ T8949] ? security_load_policy+0x1af/0xfd0 [ 142.502682][ T8949] ? kasan_kmalloc+0x9/0x10 [ 142.507173][ T8949] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 142.512624][ T8949] security_load_policy+0x228/0xfd0 [ 142.517813][ T8949] ? _raw_spin_lock+0xa1/0x170 [ 142.522569][ T8949] ? _raw_spin_trylock_bh+0x190/0x190 [ 142.528053][ T8949] ? security_change_sid+0x50/0x50 [ 142.533157][ T8949] ? vmap_page_range_noflush+0x67b/0x6a0 [ 142.538788][ T8949] ? __vmalloc_node_range+0x56c/0x760 [ 142.544154][ T8949] ? __kasan_check_write+0x14/0x20 [ 142.549257][ T8949] ? _copy_from_user+0xa8/0xe0 [ 142.554017][ T8949] sel_write_load+0x24e/0x410 [ 142.558786][ T8949] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 142.564413][ T8949] __vfs_write+0xff/0x700 [ 142.568744][ T8949] ? __kernel_write+0x350/0x350 [ 142.573581][ T8949] ? avc_policy_seqno+0x1b/0x70 [ 142.578410][ T8949] ? selinux_file_permission+0x2ba/0x560 [ 142.584027][ T8949] ? security_file_permission+0x157/0x350 [ 142.590210][ T8949] ? rw_verify_area+0x1c2/0x360 [ 142.595050][ T8949] vfs_write+0x203/0x4e0 [ 142.599274][ T8949] ksys_write+0x168/0x2a0 [ 142.603732][ T8949] ? __ia32_sys_read+0x90/0x90 [ 142.608549][ T8949] ? __kasan_check_read+0x11/0x20 [ 142.613568][ T8949] ? __ia32_sys_clock_settime+0x230/0x230 [ 142.619278][ T8949] __x64_sys_write+0x7b/0x90 [ 142.623982][ T8949] do_syscall_64+0xc0/0x100 [ 142.628465][ T8949] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 142.634342][ T8949] RIP: 0033:0x45b349 [ 142.638231][ T8949] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 142.657940][ T8949] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 142.666343][ T8949] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 142.674318][ T8949] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 142.682370][ T8949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 142.690332][ T8949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 142.698283][ T8949] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000012 15:47:10 executing program 0 (fault-call:1 fault-nth:19): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xa) 15:47:10 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRESHEX=0x0]) 15:47:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x20400) r1 = getpid() r2 = pidfd_open(r1, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab00008257014000000000002800deec02ff000000000000f89c1a2d463c"], 0x38) r4 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) ppoll(&(0x7f0000000040)=[{r0, 0x8604}, {r2}, {r3}, {r4, 0x181}], 0x4, 0x0, 0x0, 0x0) [ 142.719032][ T8949] SELinux: failed to load policy [ 142.810035][ T8965] SELinux: ebitmap: truncated map [ 142.815223][ T8965] SELinux: failed to load policy [ 142.849563][ T8960] EXT4-fs: 4 callbacks suppressed [ 142.849571][ T8960] EXT4-fs (sda1): Unrecognized mount option "resgid0x0000000000000000" or missing value 15:47:10 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$selinux_create(r0, &(0x7f0000000180)=@objname={'system_u:object_r:modules_conf_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x4000000000000000, 0x20, './file0\x00'}, 0x58) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000016010000001800120008000100736974000c00020008000300", @ANYRES32=r5], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=@newlink={0x38, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x3}]}}}]}, 0x38}}, 0x0) 15:47:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xb) [ 142.890276][ T8980] FAULT_INJECTION: forcing a failure. [ 142.890276][ T8980] name failslab, interval 1, probability 0, space 0, times 0 [ 142.911800][ T8980] CPU: 1 PID: 8980 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 142.920015][ T8973] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value 15:47:10 executing program 4: io_setup(0x80004, 0x0) io_submit(0x0, 0x1, &(0x7f0000356ff0)=[0x0]) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x3, 0x20, 0x80, 0xffff, 0x9, 0x200, 0x100, 0x8d81, 0x8}, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x98a420f1c7c5a915}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000d06cb48a1d9bfb1ea23577ceb336444e60072155db0ac090dd09e743b3d41d25c686e2df9f6822a8683f4877556d25183317def3856f60a2030000000000000068e86025f3b67c898784df960b94d2946902a72837f0fe603d8f333eef1ec86c68219bcd7c5ec6b977c9f33049c4866b4291d68b398068a755c22ab47b0815ccee90a92c45068fe6a1f8a7f6ac9b0d4acbd59e56d52d1be8d424c6db642cfe0b396663388d3367ec3ebfc9d3646349abf052d92d771c29dd46fbaff8fb7f87ccc286d214ead3ff6b220036c96e1b088649a785d5883e440ae124fb5e86f931fcd5b1e50a3fd86caff51f50d7e397896ba692e14a2c", @ANYRES16=r3, @ANYBLOB="000400000000fddbdf2507000000"], 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000091}, 0x84) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.origin\x00') fadvise64(r1, 0x0, 0x200fff0, 0x4) [ 142.921884][ T8980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.941132][ T8980] Call Trace: [ 142.944439][ T8980] dump_stack+0x1b0/0x228 [ 142.948783][ T8980] ? devkmsg_release+0x127/0x127 [ 142.953739][ T8980] ? show_regs_print_info+0x18/0x18 [ 142.958945][ T8980] ? arch_stack_walk+0x98/0xe0 [ 142.963723][ T8980] should_fail+0x6fb/0x860 [ 142.968335][ T8980] ? setup_fault_attr+0x2b0/0x2b0 [ 142.973368][ T8980] ? stack_trace_snprint+0x150/0x150 [ 142.978659][ T8980] ? ___slab_alloc+0xab/0x450 [ 142.983349][ T8980] __should_failslab+0x11a/0x160 [ 142.988292][ T8980] ? hashtab_create+0x117/0x3f0 [ 142.993162][ T8980] should_failslab+0x9/0x20 [ 142.997665][ T8980] __kmalloc+0x64/0x310 [ 143.001816][ T8980] hashtab_create+0x117/0x3f0 [ 143.006478][ T8980] symtab_init+0x32/0xa0 [ 143.010792][ T8980] policydb_read+0x1d1/0x77f0 [ 143.015466][ T8980] ? __kasan_check_read+0x11/0x20 [ 143.020483][ T8980] ? __alloc_pages_nodemask+0x52d/0x3010 [ 143.026101][ T8980] ? vfs_write+0x203/0x4e0 [ 143.030495][ T8980] ? should_fail+0x182/0x860 [ 143.035059][ T8980] ? __vmalloc_node_range+0x2b6/0x760 [ 143.040406][ T8980] ? setup_fault_attr+0x2b0/0x2b0 [ 143.045514][ T8980] ? vfs_write+0x203/0x4e0 [ 143.049901][ T8980] ? ksys_write+0x168/0x2a0 [ 143.054375][ T8980] ? do_syscall_64+0xc0/0x100 [ 143.059044][ T8980] ? string_to_av_perm+0x1c0/0x1c0 [ 143.064127][ T8980] ? __should_failslab+0x11a/0x160 [ 143.069210][ T8980] ? security_load_policy+0x1af/0xfd0 [ 143.074557][ T8980] ? kasan_kmalloc+0x9/0x10 [ 143.079032][ T8980] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 143.084465][ T8980] security_load_policy+0x228/0xfd0 [ 143.089653][ T8980] ? _raw_spin_lock+0xa1/0x170 [ 143.094388][ T8980] ? _raw_spin_trylock_bh+0x190/0x190 [ 143.099750][ T8980] ? security_change_sid+0x50/0x50 [ 143.104839][ T8980] ? vmap_page_range_noflush+0x67b/0x6a0 [ 143.110454][ T8980] ? __vmalloc_node_range+0x56c/0x760 [ 143.115817][ T8980] ? __kasan_check_write+0x14/0x20 [ 143.120910][ T8980] ? _copy_from_user+0xa8/0xe0 [ 143.125669][ T8980] sel_write_load+0x24e/0x410 [ 143.130344][ T8980] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 143.136014][ T8980] __vfs_write+0xff/0x700 [ 143.140354][ T8980] ? __kernel_write+0x350/0x350 [ 143.145190][ T8980] ? avc_policy_seqno+0x1b/0x70 [ 143.150054][ T8980] ? selinux_file_permission+0x2ba/0x560 [ 143.155724][ T8980] ? security_file_permission+0x157/0x350 [ 143.161424][ T8980] ? rw_verify_area+0x1c2/0x360 [ 143.166251][ T8980] vfs_write+0x203/0x4e0 [ 143.170505][ T8980] ksys_write+0x168/0x2a0 [ 143.174836][ T8980] ? __ia32_sys_read+0x90/0x90 [ 143.179575][ T8980] ? __kasan_check_read+0x11/0x20 [ 143.184575][ T8980] ? __ia32_sys_clock_settime+0x230/0x230 [ 143.190273][ T8980] __x64_sys_write+0x7b/0x90 [ 143.194839][ T8980] do_syscall_64+0xc0/0x100 [ 143.199317][ T8980] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 143.205182][ T8980] RIP: 0033:0x45b349 [ 143.209115][ T8980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.228710][ T8980] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:47:10 executing program 0 (fault-call:1 fault-nth:20): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 143.237109][ T8980] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 143.245060][ T8980] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 143.253008][ T8980] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 143.260997][ T8980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 143.268947][ T8980] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000013 [ 143.277834][ T8980] SELinux: failed to load policy 15:47:10 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0]) 15:47:10 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) dup2(r1, r2) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x7fff, 0x8001) fallocate(r0, 0x3, 0x5e89, 0xfff9) 15:47:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xc) 15:47:10 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0]) [ 143.376716][ T9000] EXT4-fs (sda1): Unrecognized mount option "resgid0x0000000000000000" or missing value [ 143.420296][ T9013] FAULT_INJECTION: forcing a failure. [ 143.420296][ T9013] name failslab, interval 1, probability 0, space 0, times 0 [ 143.434097][ T9013] CPU: 1 PID: 9013 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 143.444299][ T9013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.454356][ T9013] Call Trace: [ 143.457649][ T9013] dump_stack+0x1b0/0x228 [ 143.461978][ T9013] ? devkmsg_release+0x127/0x127 [ 143.466915][ T9013] ? show_regs_print_info+0x18/0x18 [ 143.472110][ T9013] ? arch_stack_walk+0x98/0xe0 [ 143.476878][ T9013] should_fail+0x6fb/0x860 [ 143.481299][ T9013] ? setup_fault_attr+0x2b0/0x2b0 [ 143.486323][ T9013] ? stack_trace_snprint+0x150/0x150 [ 143.491610][ T9013] ? ___slab_alloc+0xab/0x450 [ 143.496424][ T9013] __should_failslab+0x11a/0x160 [ 143.501503][ T9013] ? hashtab_create+0x5c/0x3f0 [ 143.506286][ T9013] should_failslab+0x9/0x20 [ 143.510792][ T9013] kmem_cache_alloc_trace+0x3a/0x2f0 [ 143.516073][ T9013] ? symtab_init+0xa0/0xa0 [ 143.520493][ T9013] ? symhash+0x100/0x100 [ 143.524758][ T9013] hashtab_create+0x5c/0x3f0 [ 143.529352][ T9013] symtab_init+0x32/0xa0 [ 143.533581][ T9013] policydb_read+0x1fb/0x77f0 [ 143.538245][ T9013] ? __kasan_check_read+0x11/0x20 [ 143.543256][ T9013] ? __alloc_pages_nodemask+0x52d/0x3010 [ 143.548883][ T9013] ? vfs_write+0x203/0x4e0 [ 143.553300][ T9013] ? should_fail+0x182/0x860 [ 143.557882][ T9013] ? __vmalloc_node_range+0x2b6/0x760 [ 143.563261][ T9013] ? setup_fault_attr+0x2b0/0x2b0 [ 143.568266][ T9013] ? vfs_write+0x203/0x4e0 [ 143.572657][ T9013] ? ksys_write+0x168/0x2a0 [ 143.577138][ T9013] ? do_syscall_64+0xc0/0x100 [ 143.581793][ T9013] ? string_to_av_perm+0x1c0/0x1c0 [ 143.586889][ T9013] ? __should_failslab+0x11a/0x160 [ 143.591984][ T9013] ? security_load_policy+0x1af/0xfd0 [ 143.597329][ T9013] ? kasan_kmalloc+0x9/0x10 [ 143.601824][ T9013] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 143.607257][ T9013] security_load_policy+0x228/0xfd0 [ 143.612443][ T9013] ? _raw_spin_lock+0xa1/0x170 [ 143.617182][ T9013] ? _raw_spin_trylock_bh+0x190/0x190 [ 143.622525][ T9013] ? security_change_sid+0x50/0x50 [ 143.627616][ T9013] ? vmap_page_range_noflush+0x67b/0x6a0 [ 143.633238][ T9013] ? __vmalloc_node_range+0x56c/0x760 [ 143.638585][ T9013] ? __kasan_check_write+0x14/0x20 [ 143.643702][ T9013] ? _copy_from_user+0xa8/0xe0 [ 143.648461][ T9013] sel_write_load+0x24e/0x410 [ 143.653117][ T9013] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 143.658762][ T9013] __vfs_write+0xff/0x700 [ 143.663089][ T9013] ? __kernel_write+0x350/0x350 [ 143.667931][ T9013] ? avc_policy_seqno+0x1b/0x70 [ 143.672764][ T9013] ? selinux_file_permission+0x2ba/0x560 [ 143.678394][ T9013] ? security_file_permission+0x157/0x350 [ 143.684115][ T9013] ? rw_verify_area+0x1c2/0x360 [ 143.688946][ T9013] vfs_write+0x203/0x4e0 [ 143.693215][ T9013] ksys_write+0x168/0x2a0 [ 143.697552][ T9013] ? __ia32_sys_read+0x90/0x90 [ 143.702298][ T9013] ? __kasan_check_read+0x11/0x20 [ 143.707308][ T9013] ? __ia32_sys_clock_settime+0x230/0x230 [ 143.713021][ T9013] __x64_sys_write+0x7b/0x90 [ 143.717601][ T9013] do_syscall_64+0xc0/0x100 [ 143.722097][ T9013] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 143.728104][ T9013] RIP: 0033:0x45b349 [ 143.731997][ T9013] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 143.751723][ T9013] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 143.760150][ T9013] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 15:47:11 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) dup2(r1, r2) fallocate(r0, 0x0, 0x0, 0x4003ff) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x7fff, 0x8001) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 143.768121][ T9013] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 143.776100][ T9013] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 143.784074][ T9013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 143.792067][ T9013] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000014 15:47:11 executing program 1 (fault-call:2 fault-nth:0): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xd) 15:47:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_newaddr={0x40, 0x14, 0x131, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_CACHEINFO={0x14, 0x6, {0x2, 0x4}}]}, 0x40}}, 0x0) 15:47:11 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0]) [ 143.888599][ T9013] SELinux: failed to load policy 15:47:11 executing program 0 (fault-call:1 fault-nth:21): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 143.911799][ T9033] FAULT_INJECTION: forcing a failure. [ 143.911799][ T9033] name failslab, interval 1, probability 0, space 0, times 0 [ 143.943170][ T9033] CPU: 1 PID: 9033 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 143.953258][ T9033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.963304][ T9033] Call Trace: [ 143.966604][ T9033] dump_stack+0x1b0/0x228 [ 143.970940][ T9033] ? devkmsg_release+0x127/0x127 [ 143.975890][ T9033] ? show_regs_print_info+0x18/0x18 [ 143.981092][ T9033] ? __fsnotify_parent+0x300/0x300 [ 143.986208][ T9033] should_fail+0x6fb/0x860 [ 143.990629][ T9033] ? setup_fault_attr+0x2b0/0x2b0 [ 143.995654][ T9033] ? __kasan_check_write+0x14/0x20 [ 144.000770][ T9033] ? fput_many+0x47/0x1a0 [ 144.005104][ T9033] __should_failslab+0x11a/0x160 [ 144.010825][ T9033] ? __se_sys_memfd_create+0xfa/0x3e0 [ 144.016199][ T9033] should_failslab+0x9/0x20 [ 144.020712][ T9033] __kmalloc+0x64/0x310 [ 144.024855][ T9033] __se_sys_memfd_create+0xfa/0x3e0 [ 144.030039][ T9033] __x64_sys_memfd_create+0x5b/0x70 [ 144.035328][ T9033] do_syscall_64+0xc0/0x100 [ 144.039813][ T9033] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.045691][ T9033] RIP: 0033:0x45b349 [ 144.049586][ T9033] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.069171][ T9033] RSP: 002b:00007f1c0b9b2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 144.077562][ T9033] RAX: ffffffffffffffda RBX: 00007f1c0b9b36d4 RCX: 000000000045b349 [ 144.085578][ T9033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 144.093586][ T9033] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 144.101609][ T9033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 144.109561][ T9033] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000000 15:47:11 executing program 1 (fault-call:2 fault-nth:1): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x6000, 0xed) readv(r2, &(0x7f0000000580)=[{&(0x7f0000000300)=""/72, 0x48}, {&(0x7f0000000600)=""/93, 0x5d}, {&(0x7f0000000440)=""/15, 0xf}, {&(0x7f0000000480)=""/75, 0x4b}, {&(0x7f0000000500)=""/89, 0x59}], 0x5) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x3000, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}], [], 0x2c}) lsetxattr$security_capability(&(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0x7fff, 0x7}, {0x2, 0xfffffffa}]}, 0x14, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, &(0x7f0000000200)={{0x1, 0x0, @identifier="f497cbaa4c0a62ed751f42306fd5b141"}}) [ 144.173350][ T9050] FAULT_INJECTION: forcing a failure. [ 144.173350][ T9050] name failslab, interval 1, probability 0, space 0, times 0 [ 144.186936][ T9050] CPU: 1 PID: 9050 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 144.197011][ T9050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.207074][ T9050] Call Trace: [ 144.210382][ T9050] dump_stack+0x1b0/0x228 [ 144.214837][ T9050] ? devkmsg_release+0x127/0x127 [ 144.219787][ T9050] ? show_regs_print_info+0x18/0x18 [ 144.224988][ T9050] ? arch_stack_walk+0x98/0xe0 [ 144.229757][ T9050] should_fail+0x6fb/0x860 [ 144.234177][ T9050] ? setup_fault_attr+0x2b0/0x2b0 [ 144.239207][ T9050] ? stack_trace_snprint+0x150/0x150 [ 144.244496][ T9050] ? ___slab_alloc+0xab/0x450 [ 144.249197][ T9050] __should_failslab+0x11a/0x160 [ 144.254245][ T9050] ? hashtab_create+0x117/0x3f0 [ 144.259096][ T9050] should_failslab+0x9/0x20 [ 144.263612][ T9050] __kmalloc+0x64/0x310 [ 144.267777][ T9050] hashtab_create+0x117/0x3f0 [ 144.272453][ T9050] symtab_init+0x32/0xa0 [ 144.276696][ T9050] policydb_read+0x1fb/0x77f0 [ 144.281374][ T9050] ? __kasan_check_write+0x14/0x20 [ 144.286487][ T9050] ? _raw_spin_lock+0xa1/0x170 [ 144.291251][ T9050] ? _raw_spin_trylock_bh+0x190/0x190 [ 144.296620][ T9050] ? should_fail+0x182/0x860 [ 144.301207][ T9050] ? __vmalloc_node_range+0x2b6/0x760 [ 144.306576][ T9050] ? setup_fault_attr+0x2b0/0x2b0 [ 144.311602][ T9050] ? vfs_write+0x203/0x4e0 [ 144.316138][ T9050] ? ksys_write+0x168/0x2a0 [ 144.320642][ T9050] ? _raw_spin_unlock+0x9/0x20 [ 144.325498][ T9050] ? string_to_av_perm+0x1c0/0x1c0 [ 144.330614][ T9050] ? security_load_policy+0x1af/0xfd0 [ 144.335990][ T9050] ? kasan_kmalloc+0x9/0x10 [ 144.340492][ T9050] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 144.345952][ T9050] security_load_policy+0x228/0xfd0 [ 144.351151][ T9050] ? _raw_spin_lock+0xa1/0x170 [ 144.355911][ T9050] ? _raw_spin_trylock_bh+0x190/0x190 [ 144.361278][ T9050] ? security_change_sid+0x50/0x50 [ 144.366386][ T9050] ? vmap_page_range_noflush+0x67b/0x6a0 15:47:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x98428d57a99b5f44) io_setup(0xe, &(0x7f0000000340)=0x0) io_submit(r3, 0x200002f1, &(0x7f0000000540)=[&(0x7f00000000c0)={0xa, 0x0, 0x80000000000000, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @initdev, @empty}, &(0x7f0000000180)=0xc) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000) r6 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, r4, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xffffff01}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xf4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x24000005}, 0x40894) r10 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x4) r11 = socket$unix(0x1, 0x2, 0x0) r12 = fcntl$dupfd(r11, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r14 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DEST(r13, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x14, r14, 0x400, 0x0, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc1}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r12, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xc8, r14, 0x0, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xfb}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xae2e62db96a712eb}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}]}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xd}}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4044800}, 0x20004000) [ 144.372019][ T9050] ? __vmalloc_node_range+0x56c/0x760 [ 144.377396][ T9050] ? __kasan_check_write+0x14/0x20 [ 144.382513][ T9050] ? _copy_from_user+0xa8/0xe0 [ 144.387275][ T9050] sel_write_load+0x24e/0x410 [ 144.391951][ T9050] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 144.397585][ T9050] __vfs_write+0xff/0x700 [ 144.402022][ T9050] ? __kernel_write+0x350/0x350 [ 144.406870][ T9050] ? avc_policy_seqno+0x1b/0x70 [ 144.411718][ T9050] ? selinux_file_permission+0x2ba/0x560 [ 144.417368][ T9050] ? security_file_permission+0x157/0x350 [ 144.423199][ T9050] ? rw_verify_area+0x1c2/0x360 [ 144.428052][ T9050] vfs_write+0x203/0x4e0 [ 144.432410][ T9050] ksys_write+0x168/0x2a0 [ 144.436739][ T9050] ? __ia32_sys_read+0x90/0x90 [ 144.441503][ T9050] ? __kasan_check_read+0x11/0x20 [ 144.446529][ T9050] ? __ia32_sys_clock_settime+0x230/0x230 [ 144.452254][ T9050] __x64_sys_write+0x7b/0x90 [ 144.456853][ T9050] do_syscall_64+0xc0/0x100 [ 144.461380][ T9050] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.467311][ T9050] RIP: 0033:0x45b349 [ 144.471327][ T9050] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 144.490926][ T9050] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 144.499340][ T9050] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 144.507312][ T9050] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 144.515278][ T9050] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 15:47:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xe) [ 144.523254][ T9050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 144.531223][ T9050] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000015 [ 144.540345][ T9050] SELinux: failed to load policy [ 144.560044][ T9049] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value 15:47:12 executing program 0 (fault-call:1 fault-nth:22): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x10) [ 144.614880][ T9064] FAULT_INJECTION: forcing a failure. [ 144.614880][ T9064] name failslab, interval 1, probability 0, space 0, times 0 [ 144.647334][ T9069] FAULT_INJECTION: forcing a failure. [ 144.647334][ T9069] name failslab, interval 1, probability 0, space 0, times 0 [ 144.679067][ T9064] CPU: 1 PID: 9064 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 144.689163][ T9064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.699218][ T9064] Call Trace: [ 144.702511][ T9064] dump_stack+0x1b0/0x228 [ 144.706838][ T9064] ? devkmsg_release+0x127/0x127 [ 144.711776][ T9064] ? show_regs_print_info+0x18/0x18 [ 144.716978][ T9064] ? get_pid_task+0x8d/0xa0 [ 144.721483][ T9064] ? proc_fail_nth_write+0x166/0x200 [ 144.726779][ T9064] ? __kasan_check_write+0x14/0x20 [ 144.732012][ T9064] should_fail+0x6fb/0x860 [ 144.736434][ T9064] ? setup_fault_attr+0x2b0/0x2b0 [ 144.741544][ T9064] ? __kasan_kmalloc+0x117/0x1b0 [ 144.746475][ T9064] ? kasan_kmalloc+0x9/0x10 [ 144.750975][ T9064] ? __kmalloc+0x102/0x310 [ 144.755388][ T9064] ? __se_sys_memfd_create+0xfa/0x3e0 [ 144.760973][ T9064] ? do_syscall_64+0xc0/0x100 [ 144.765692][ T9064] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.771764][ T9064] ? fsnotify+0x1390/0x1450 [ 144.776267][ T9064] __should_failslab+0x11a/0x160 [ 144.781212][ T9064] ? shmem_alloc_inode+0x1b/0x40 [ 144.786174][ T9064] should_failslab+0x9/0x20 [ 144.790685][ T9064] kmem_cache_alloc+0x37/0x2b0 [ 144.795553][ T9064] ? shmem_match+0x180/0x180 [ 144.800146][ T9064] shmem_alloc_inode+0x1b/0x40 [ 144.804906][ T9064] ? shmem_match+0x180/0x180 [ 144.809510][ T9064] new_inode_pseudo+0x68/0x240 [ 144.814277][ T9064] new_inode+0x28/0x1c0 [ 144.818433][ T9064] shmem_get_inode+0x114/0x690 [ 144.823339][ T9064] __shmem_file_setup+0x129/0x280 [ 144.828364][ T9064] shmem_file_setup+0x2f/0x40 [ 144.833040][ T9064] __se_sys_memfd_create+0x215/0x3e0 [ 144.838434][ T9064] __x64_sys_memfd_create+0x5b/0x70 [ 144.843632][ T9064] do_syscall_64+0xc0/0x100 [ 144.848145][ T9064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 144.854036][ T9064] RIP: 0033:0x45b349 [ 144.857927][ T9064] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:47:12 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resg', @ANYRESHEX=0x0]) 15:47:12 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="7000000000011805030200000040000002000000240001001400010008000000ffffffff08000200ac1e00010c0002000500010000000000240002000c000000001400010008000123e0000002080008f6064571c962f3881b00"/110], 0x1}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f00000002c0)=ANY=[], @ANYRES16=r4, @ANYPTR64, @ANYRESOCT, @ANYRESHEX, @ANYRES32=r2, @ANYRESHEX, @ANYRESOCT=r2, @ANYRES64=r1], 0x70) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 144.877645][ T9064] RSP: 002b:00007f1c0b9b2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 144.886050][ T9064] RAX: ffffffffffffffda RBX: 00007f1c0b9b36d4 RCX: 000000000045b349 [ 144.894022][ T9064] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 144.901996][ T9064] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 144.909969][ T9064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 144.917943][ T9064] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000001 [ 144.947937][ T9069] CPU: 0 PID: 9069 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 144.958030][ T9069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.968078][ T9069] Call Trace: [ 144.971364][ T9069] dump_stack+0x1b0/0x228 [ 144.975672][ T9069] ? devkmsg_release+0x127/0x127 [ 144.980600][ T9069] ? show_regs_print_info+0x18/0x18 [ 144.985802][ T9069] ? should_fail+0x182/0x860 [ 144.990378][ T9069] ? stack_trace_save+0x111/0x1e0 [ 144.995443][ T9069] ? setup_fault_attr+0x2b0/0x2b0 [ 145.000470][ T9069] should_fail+0x6fb/0x860 [ 145.004897][ T9069] ? setup_fault_attr+0x2b0/0x2b0 [ 145.009903][ T9069] ? __should_failslab+0x11a/0x160 [ 145.015005][ T9069] ? hashtab_create+0x117/0x3f0 [ 145.019847][ T9069] ? kasan_kmalloc+0x9/0x10 [ 145.024337][ T9069] __should_failslab+0x11a/0x160 [ 145.029255][ T9069] ? policydb_read+0x280/0x77f0 [ 145.034084][ T9069] should_failslab+0x9/0x20 [ 145.038641][ T9069] kmem_cache_alloc_trace+0x3a/0x2f0 [ 145.043941][ T9069] ? kvfree+0x47/0x50 [ 145.047901][ T9069] policydb_read+0x280/0x77f0 [ 145.052572][ T9069] ? __kasan_check_read+0x11/0x20 [ 145.057657][ T9069] ? __alloc_pages_nodemask+0x52d/0x3010 [ 145.063295][ T9069] ? vfs_write+0x203/0x4e0 [ 145.067688][ T9069] ? should_fail+0x182/0x860 [ 145.072277][ T9069] ? __vmalloc_node_range+0x2b6/0x760 [ 145.077750][ T9069] ? setup_fault_attr+0x2b0/0x2b0 [ 145.082755][ T9069] ? vfs_write+0x203/0x4e0 [ 145.087153][ T9069] ? ksys_write+0x168/0x2a0 [ 145.091647][ T9069] ? do_syscall_64+0xc0/0x100 [ 145.096332][ T9069] ? string_to_av_perm+0x1c0/0x1c0 [ 145.101426][ T9069] ? __should_failslab+0x11a/0x160 [ 145.106588][ T9069] ? security_load_policy+0x1af/0xfd0 [ 145.111956][ T9069] ? kasan_kmalloc+0x9/0x10 [ 145.116440][ T9069] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 145.121878][ T9069] security_load_policy+0x228/0xfd0 [ 145.127082][ T9069] ? _raw_spin_lock+0xa1/0x170 [ 145.131841][ T9069] ? _raw_spin_trylock_bh+0x190/0x190 [ 145.137197][ T9069] ? security_change_sid+0x50/0x50 [ 145.142341][ T9069] ? vmap_page_range_noflush+0x67b/0x6a0 [ 145.147975][ T9069] ? __vmalloc_node_range+0x56c/0x760 [ 145.154479][ T9069] ? __kasan_check_write+0x14/0x20 [ 145.159700][ T9069] ? _copy_from_user+0xa8/0xe0 [ 145.164829][ T9069] sel_write_load+0x24e/0x410 [ 145.169486][ T9069] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 145.175114][ T9069] __vfs_write+0xff/0x700 [ 145.179451][ T9069] ? __kernel_write+0x350/0x350 [ 145.184285][ T9069] ? avc_policy_seqno+0x1b/0x70 [ 145.189127][ T9069] ? selinux_file_permission+0x2ba/0x560 [ 145.194757][ T9069] ? security_file_permission+0x157/0x350 [ 145.200457][ T9069] ? rw_verify_area+0x1c2/0x360 [ 145.205297][ T9069] vfs_write+0x203/0x4e0 [ 145.209529][ T9069] ksys_write+0x168/0x2a0 [ 145.213855][ T9069] ? __ia32_sys_read+0x90/0x90 [ 145.218608][ T9069] ? __kasan_check_read+0x11/0x20 [ 145.223614][ T9069] ? __ia32_sys_clock_settime+0x230/0x230 [ 145.229333][ T9069] __x64_sys_write+0x7b/0x90 [ 145.233915][ T9069] do_syscall_64+0xc0/0x100 [ 145.238412][ T9069] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 145.244284][ T9069] RIP: 0033:0x45b349 [ 145.248175][ T9069] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.267768][ T9069] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 145.276183][ T9069] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 145.284148][ T9069] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 145.292103][ T9069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 145.300069][ T9069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 145.308026][ T9069] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000016 15:47:12 executing program 1 (fault-call:2 fault-nth:2): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:12 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000140)={0x14, 0x7, 0x2, {0xb, 'syzkaller1\x00'}}, 0x14) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000180)={@void, @val, @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x29, 0x0, @remote={0xac, 0x4}, @remote}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}, 0x32) [ 145.356817][ T9080] EXT4-fs (sda1): Unrecognized mount option "resg0x0000000000000000" or missing value 15:47:12 executing program 0 (fault-call:1 fault-nth:23): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 145.397475][ T9089] FAULT_INJECTION: forcing a failure. [ 145.397475][ T9089] name failslab, interval 1, probability 0, space 0, times 0 [ 145.419278][ T9089] CPU: 1 PID: 9089 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 145.429361][ T9089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.439447][ T9089] Call Trace: [ 145.442732][ T9089] dump_stack+0x1b0/0x228 [ 145.447115][ T9089] ? devkmsg_release+0x127/0x127 [ 145.452099][ T9089] ? __shmem_file_setup+0x129/0x280 [ 145.457283][ T9089] ? show_regs_print_info+0x18/0x18 [ 145.462475][ T9089] ? do_syscall_64+0xc0/0x100 [ 145.467143][ T9089] ? stack_trace_save+0x111/0x1e0 [ 145.472196][ T9089] should_fail+0x6fb/0x860 [ 145.476658][ T9089] ? setup_fault_attr+0x2b0/0x2b0 [ 145.481667][ T9089] ? ksys_mount+0xe2/0x100 [ 145.486204][ T9089] ? should_fail+0x182/0x860 [ 145.490812][ T9089] ? __kasan_kmalloc+0x179/0x1b0 [ 145.495728][ T9089] __should_failslab+0x11a/0x160 [ 145.500653][ T9089] ? security_inode_alloc+0x36/0x1f0 [ 145.505928][ T9089] should_failslab+0x9/0x20 [ 145.510430][ T9089] kmem_cache_alloc+0x37/0x2b0 [ 145.515190][ T9089] ? from_kuid_munged+0x3b0/0x3b0 [ 145.520206][ T9089] security_inode_alloc+0x36/0x1f0 [ 145.525377][ T9089] inode_init_always+0x39b/0x840 [ 145.530299][ T9089] ? shmem_match+0x180/0x180 [ 145.534925][ T9089] new_inode_pseudo+0x7f/0x240 [ 145.539700][ T9089] new_inode+0x28/0x1c0 [ 145.544003][ T9089] shmem_get_inode+0x114/0x690 [ 145.548768][ T9089] __shmem_file_setup+0x129/0x280 [ 145.553775][ T9089] shmem_file_setup+0x2f/0x40 [ 145.558442][ T9089] __se_sys_memfd_create+0x215/0x3e0 [ 145.563715][ T9089] __x64_sys_memfd_create+0x5b/0x70 [ 145.569336][ T9089] do_syscall_64+0xc0/0x100 [ 145.573883][ T9089] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 145.579779][ T9089] RIP: 0033:0x45b349 [ 145.583680][ T9089] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 145.603269][ T9089] RSP: 002b:00007f1c0b9b2a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 145.611666][ T9089] RAX: ffffffffffffffda RBX: 00007f1c0b9b36d4 RCX: 000000000045b349 [ 145.619690][ T9089] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 145.627677][ T9089] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 145.635762][ T9089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x11) 15:47:13 executing program 1 (fault-call:2 fault-nth:3): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 145.643721][ T9089] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000002 15:47:13 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0]) [ 145.746389][ T9105] FAULT_INJECTION: forcing a failure. [ 145.746389][ T9105] name failslab, interval 1, probability 0, space 0, times 0 [ 145.775620][ T9105] CPU: 1 PID: 9105 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 145.776460][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 145.787116][ T9105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.787120][ T9105] Call Trace: [ 145.787141][ T9105] dump_stack+0x1b0/0x228 [ 145.787152][ T9105] ? devkmsg_release+0x127/0x127 [ 145.787160][ T9105] ? show_regs_print_info+0x18/0x18 [ 145.787167][ T9105] ? __kasan_check_read+0x11/0x20 [ 145.787176][ T9105] ? preempt_schedule_irq+0xc7/0x110 [ 145.787186][ T9105] should_fail+0x6fb/0x860 [ 145.787195][ T9105] ? setup_fault_attr+0x2b0/0x2b0 [ 145.787202][ T9105] ? should_fail+0x182/0x860 [ 145.787210][ T9105] ? setup_fault_attr+0x2b0/0x2b0 [ 145.787218][ T9105] ? __should_failslab+0x11a/0x160 [ 145.787224][ T9105] ? hashtab_create+0x117/0x3f0 [ 145.787232][ T9105] __should_failslab+0x11a/0x160 [ 145.787240][ T9105] ? policydb_read+0x60f/0x77f0 [ 145.787248][ T9105] should_failslab+0x9/0x20 [ 145.787256][ T9105] __kmalloc_track_caller+0x5f/0x320 [ 145.787262][ T9105] ? kasan_kmalloc+0x9/0x10 [ 145.787270][ T9105] kstrdup+0x34/0x70 [ 145.787284][ T9105] policydb_read+0x60f/0x77f0 [ 145.794716][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 145.804675][ T9105] ? __alloc_pages_nodemask+0x52d/0x3010 [ 145.804691][ T9105] ? should_fail+0x182/0x860 [ 145.804700][ T9105] ? __vmalloc_node_range+0x2b6/0x760 [ 145.804707][ T9105] ? setup_fault_attr+0x2b0/0x2b0 [ 145.804715][ T9105] ? vfs_write+0x203/0x4e0 [ 145.804723][ T9105] ? ksys_write+0x168/0x2a0 [ 145.804730][ T9105] ? do_syscall_64+0xc0/0x100 [ 145.804745][ T9105] ? string_to_av_perm+0x1c0/0x1c0 [ 145.818828][ T9115] FAULT_INJECTION: forcing a failure. [ 145.818828][ T9115] name failslab, interval 1, probability 0, space 0, times 0 [ 145.822743][ T9105] ? __should_failslab+0x11a/0x160 [ 145.822755][ T9105] ? security_load_policy+0x1af/0xfd0 [ 145.822763][ T9105] ? kasan_kmalloc+0x9/0x10 [ 145.822779][ T9105] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 145.822789][ T9105] security_load_policy+0x228/0xfd0 [ 145.822799][ T9105] ? _raw_spin_lock+0xa1/0x170 [ 145.822813][ T9105] ? _raw_spin_trylock_bh+0x190/0x190 [ 145.989356][ T9105] ? security_change_sid+0x50/0x50 [ 145.994466][ T9105] ? vmap_page_range_noflush+0x67b/0x6a0 [ 146.000082][ T9105] ? __vmalloc_node_range+0x56c/0x760 [ 146.005466][ T9105] ? __kasan_check_write+0x14/0x20 [ 146.010591][ T9105] ? _copy_from_user+0xa8/0xe0 [ 146.015355][ T9105] sel_write_load+0x24e/0x410 [ 146.020028][ T9105] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 146.025654][ T9105] __vfs_write+0xff/0x700 [ 146.029963][ T9105] ? __kernel_write+0x350/0x350 [ 146.034798][ T9105] ? avc_policy_seqno+0x1b/0x70 [ 146.039626][ T9105] ? selinux_file_permission+0x2ba/0x560 [ 146.045358][ T9105] ? security_file_permission+0x157/0x350 [ 146.051075][ T9105] ? rw_verify_area+0x1c2/0x360 [ 146.055926][ T9105] vfs_write+0x203/0x4e0 [ 146.060176][ T9105] ksys_write+0x168/0x2a0 [ 146.064500][ T9105] ? __ia32_sys_read+0x90/0x90 [ 146.069241][ T9105] ? __kasan_check_read+0x11/0x20 [ 146.074287][ T9105] ? __ia32_sys_clock_settime+0x230/0x230 [ 146.080138][ T9105] __x64_sys_write+0x7b/0x90 [ 146.084743][ T9105] do_syscall_64+0xc0/0x100 [ 146.089236][ T9105] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.095115][ T9105] RIP: 0033:0x45b349 [ 146.099038][ T9105] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.118640][ T9105] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 146.127150][ T9105] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 146.135117][ T9105] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 146.143113][ T9105] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 146.151125][ T9105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 146.159108][ T9105] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000017 [ 146.167073][ T9115] CPU: 0 PID: 9115 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 146.168010][ T9105] sel_write_load: 1 callbacks suppressed [ 146.168013][ T9105] SELinux: failed to load policy [ 146.177157][ T9115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.177160][ T9115] Call Trace: [ 146.177180][ T9115] dump_stack+0x1b0/0x228 [ 146.177190][ T9115] ? devkmsg_release+0x127/0x127 [ 146.177197][ T9115] ? show_regs_print_info+0x18/0x18 [ 146.177204][ T9115] ? do_syscall_64+0xc0/0x100 [ 146.177210][ T9115] ? stack_trace_save+0x111/0x1e0 [ 146.177220][ T9115] should_fail+0x6fb/0x860 [ 146.177227][ T9115] ? setup_fault_attr+0x2b0/0x2b0 [ 146.177234][ T9115] ? ksys_mount+0xe2/0x100 [ 146.177247][ T9115] ? should_fail+0x182/0x860 [ 146.185607][ T9114] EXT4-fs (sda1): Unrecognized mount option "resgid0x0000000000000000" or missing value [ 146.187795][ T9115] ? __kasan_kmalloc+0x179/0x1b0 [ 146.187804][ T9115] __should_failslab+0x11a/0x160 [ 146.187813][ T9115] ? __d_alloc+0x2d/0x6d0 [ 146.187822][ T9115] should_failslab+0x9/0x20 [ 146.187830][ T9115] kmem_cache_alloc+0x37/0x2b0 [ 146.187844][ T9115] __d_alloc+0x2d/0x6d0 [ 146.281306][ T9115] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 146.287092][ T9115] d_alloc_pseudo+0x1d/0x70 [ 146.291600][ T9115] alloc_file_pseudo+0x128/0x310 [ 146.296521][ T9115] ? alloc_empty_file_noaccount+0x80/0x80 [ 146.302321][ T9115] ? __kasan_check_write+0x14/0x20 [ 146.307590][ T9115] ? clear_nlink+0x87/0xe0 [ 146.311998][ T9115] __shmem_file_setup+0x1a2/0x280 [ 146.317038][ T9115] shmem_file_setup+0x2f/0x40 [ 146.321766][ T9115] __se_sys_memfd_create+0x215/0x3e0 [ 146.327030][ T9115] __x64_sys_memfd_create+0x5b/0x70 [ 146.332241][ T9115] do_syscall_64+0xc0/0x100 [ 146.336872][ T9115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.342747][ T9115] RIP: 0033:0x45b349 [ 146.346619][ T9115] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.366254][ T9115] RSP: 002b:00007f1c0b991a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 146.374662][ T9115] RAX: ffffffffffffffda RBX: 00007f1c0b9926d4 RCX: 000000000045b349 [ 146.382619][ T9115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 146.390572][ T9115] RBP: 000000000075bfc8 R08: 00000000038028b8 R09: 0000000000000001 15:47:13 executing program 4: prctl$PR_CAPBSET_READ(0x17, 0x1d) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000a80)=ANY=[@ANYRES32]) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f0000000580)=""/120) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2000000001) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x2, 0x0, 0x8, 0x3, 0xfffffffffffffffc}, 0x0) socket(0x1, 0x5, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) getsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4) write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) 15:47:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x12) 15:47:13 executing program 0 (fault-call:1 fault-nth:24): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:13 executing program 1 (fault-call:2 fault-nth:4): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x25) [ 146.398529][ T9115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 146.406589][ T9115] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000003 15:47:13 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0]) [ 146.452353][ T9110] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 146.508619][ T9138] FAULT_INJECTION: forcing a failure. [ 146.508619][ T9138] name failslab, interval 1, probability 0, space 0, times 0 [ 146.523497][ T9138] CPU: 0 PID: 9138 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 146.533579][ T9138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.543629][ T9138] Call Trace: [ 146.546913][ T9138] dump_stack+0x1b0/0x228 [ 146.551225][ T9138] ? devkmsg_release+0x127/0x127 [ 146.556148][ T9138] ? do_syscall_64+0xc0/0x100 [ 146.560805][ T9138] ? show_regs_print_info+0x18/0x18 [ 146.566993][ T9138] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.573061][ T9138] should_fail+0x6fb/0x860 [ 146.577460][ T9138] ? setup_fault_attr+0x2b0/0x2b0 [ 146.582468][ T9138] ? should_fail+0x182/0x860 [ 146.587052][ T9138] ? stack_trace_snprint+0x150/0x150 [ 146.592329][ T9138] ? setup_fault_attr+0x2b0/0x2b0 [ 146.597331][ T9138] ? should_fail+0x182/0x860 [ 146.601907][ T9138] ? ___slab_alloc+0xab/0x450 [ 146.606564][ T9138] __should_failslab+0x11a/0x160 [ 146.611481][ T9138] ? hashtab_insert+0x2ae/0x440 [ 146.616327][ T9138] should_failslab+0x9/0x20 [ 146.620815][ T9138] kmem_cache_alloc+0x37/0x2b0 [ 146.625559][ T9138] ? symhash+0xa7/0x100 [ 146.629694][ T9138] hashtab_insert+0x2ae/0x440 [ 146.634344][ T9138] policydb_read+0x664/0x77f0 [ 146.638997][ T9138] ? __alloc_pages_nodemask+0x52d/0x3010 [ 146.644770][ T9138] ? should_fail+0x182/0x860 [ 146.649346][ T9138] ? __vmalloc_node_range+0x2b6/0x760 [ 146.654710][ T9138] ? setup_fault_attr+0x2b0/0x2b0 [ 146.659714][ T9138] ? vfs_write+0x203/0x4e0 [ 146.664108][ T9138] ? ksys_write+0x168/0x2a0 [ 146.668586][ T9138] ? do_syscall_64+0xc0/0x100 [ 146.673246][ T9138] ? string_to_av_perm+0x1c0/0x1c0 [ 146.678332][ T9138] ? __should_failslab+0x11a/0x160 [ 146.683416][ T9138] ? security_load_policy+0x1af/0xfd0 [ 146.688761][ T9138] ? kasan_kmalloc+0x9/0x10 [ 146.693253][ T9138] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 146.698698][ T9138] security_load_policy+0x228/0xfd0 [ 146.703893][ T9138] ? _raw_spin_lock+0xa1/0x170 [ 146.708634][ T9138] ? _raw_spin_trylock_bh+0x190/0x190 [ 146.713997][ T9138] ? security_change_sid+0x50/0x50 [ 146.719093][ T9138] ? vmap_page_range_noflush+0x67b/0x6a0 [ 146.724716][ T9138] ? __vmalloc_node_range+0x56c/0x760 [ 146.730078][ T9138] ? __kasan_check_write+0x14/0x20 [ 146.735193][ T9138] ? _copy_from_user+0xa8/0xe0 [ 146.739928][ T9138] sel_write_load+0x24e/0x410 [ 146.744589][ T9138] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 146.750293][ T9138] __vfs_write+0xff/0x700 [ 146.754597][ T9138] ? __kernel_write+0x350/0x350 [ 146.759547][ T9138] ? avc_policy_seqno+0x1b/0x70 [ 146.764379][ T9138] ? selinux_file_permission+0x2ba/0x560 [ 146.770005][ T9138] ? security_file_permission+0x157/0x350 [ 146.775704][ T9138] ? rw_verify_area+0x1c2/0x360 [ 146.780531][ T9138] vfs_write+0x203/0x4e0 [ 146.784955][ T9138] ksys_write+0x168/0x2a0 [ 146.789274][ T9138] ? __ia32_sys_read+0x90/0x90 [ 146.794034][ T9138] ? __kasan_check_read+0x11/0x20 [ 146.799037][ T9138] ? __ia32_sys_clock_settime+0x230/0x230 [ 146.804739][ T9138] __x64_sys_write+0x7b/0x90 [ 146.809322][ T9138] do_syscall_64+0xc0/0x100 [ 146.813821][ T9138] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 146.820124][ T9138] RIP: 0033:0x45b349 [ 146.823998][ T9138] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 146.843575][ T9138] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 146.851974][ T9138] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 146.859924][ T9138] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 146.867886][ T9138] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 146.875837][ T9138] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 146.883798][ T9138] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000018 [ 146.894813][ T9142] FAULT_INJECTION: forcing a failure. [ 146.894813][ T9142] name failslab, interval 1, probability 0, space 0, times 0 [ 146.900227][ T9138] SELinux: failed to load policy [ 146.907568][ T9142] CPU: 1 PID: 9142 Comm: syz-executor.1 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 146.922451][ T9142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.932484][ T9142] Call Trace: [ 146.935758][ T9142] dump_stack+0x1b0/0x228 [ 146.940067][ T9142] ? devkmsg_release+0x127/0x127 [ 146.944977][ T9142] ? new_inode+0x28/0x1c0 [ 146.949279][ T9142] ? show_regs_print_info+0x18/0x18 [ 146.954461][ T9142] ? path_openat+0x1e1a/0x3c00 [ 146.959198][ T9142] ? do_sys_open+0x36f/0x7a0 [ 146.963771][ T9142] ? __x64_sys_open+0x87/0x90 [ 146.968422][ T9142] should_fail+0x6fb/0x860 [ 146.972827][ T9142] ? setup_fault_attr+0x2b0/0x2b0 [ 146.977838][ T9142] __should_failslab+0x11a/0x160 [ 146.982752][ T9142] ? context_struct_to_string+0x3b5/0x7f0 [ 146.988457][ T9142] should_failslab+0x9/0x20 [ 146.992945][ T9142] __kmalloc+0x64/0x310 [ 146.997078][ T9142] context_struct_to_string+0x3b5/0x7f0 [ 147.002601][ T9142] ? security_bounded_transition+0x520/0x520 [ 147.008555][ T9142] ? mls_range_isvalid+0x3a8/0x4c0 [ 147.013640][ T9142] context_add_hash+0xf5/0x200 [ 147.018381][ T9142] ? security_sid_to_context_inval+0x50/0x50 [ 147.024332][ T9142] ? mls_context_isvalid+0x9e/0x390 [ 147.029503][ T9142] ? policydb_context_isvalid+0x1d5/0x430 [ 147.035215][ T9142] security_compute_sid+0x1147/0x1be0 [ 147.040570][ T9142] ? security_transition_sid+0x90/0x90 [ 147.046007][ T9142] ? stack_trace_save+0x111/0x1e0 [ 147.051012][ T9142] ? __kasan_kmalloc+0x179/0x1b0 [ 147.056184][ T9142] ? __kasan_kmalloc+0x117/0x1b0 [ 147.061094][ T9142] ? kasan_slab_alloc+0xe/0x10 [ 147.065836][ T9142] ? kmem_cache_alloc+0x120/0x2b0 [ 147.070852][ T9142] ? __d_alloc+0x2d/0x6d0 [ 147.075164][ T9142] ? d_alloc_pseudo+0x1d/0x70 [ 147.079825][ T9142] ? alloc_file_pseudo+0x128/0x310 [ 147.084910][ T9142] ? __shmem_file_setup+0x1a2/0x280 [ 147.090081][ T9142] ? shmem_file_setup+0x2f/0x40 [ 147.094919][ T9142] ? new_inode_pseudo+0x68/0x240 [ 147.099830][ T9142] ? new_inode+0x28/0x1c0 [ 147.104141][ T9142] ? shmem_get_inode+0x114/0x690 [ 147.109051][ T9142] ? __kasan_check_write+0x14/0x20 [ 147.114138][ T9142] ? _raw_spin_lock+0xa1/0x170 [ 147.118875][ T9142] ? _raw_spin_trylock_bh+0x190/0x190 [ 147.124227][ T9142] security_transition_sid+0x7d/0x90 [ 147.129487][ T9142] inode_doinit_with_dentry+0x5e0/0x10e0 [ 147.135092][ T9142] ? sb_finish_set_opts+0x800/0x800 [ 147.140263][ T9142] ? __d_alloc+0x2d/0x6d0 [ 147.144564][ T9142] ? kasan_slab_alloc+0xe/0x10 [ 147.149312][ T9142] ? d_set_d_op+0xfd/0x390 [ 147.153704][ T9142] selinux_d_instantiate+0x27/0x40 [ 147.158803][ T9142] security_d_instantiate+0xa0/0x100 [ 147.164062][ T9142] d_instantiate+0x55/0x90 [ 147.168455][ T9142] alloc_file_pseudo+0x24a/0x310 [ 147.173369][ T9142] ? alloc_empty_file_noaccount+0x80/0x80 [ 147.179065][ T9142] ? __kasan_check_write+0x14/0x20 [ 147.184149][ T9142] ? clear_nlink+0x87/0xe0 [ 147.188552][ T9142] __shmem_file_setup+0x1a2/0x280 [ 147.193671][ T9142] shmem_file_setup+0x2f/0x40 [ 147.198345][ T9142] __se_sys_memfd_create+0x215/0x3e0 [ 147.203612][ T9142] __x64_sys_memfd_create+0x5b/0x70 [ 147.208815][ T9142] do_syscall_64+0xc0/0x100 [ 147.213337][ T9142] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 147.219227][ T9142] RIP: 0033:0x45b349 [ 147.223098][ T9142] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 147.242684][ T9142] RSP: 002b:00007f1c0b991a68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 147.251094][ T9142] RAX: ffffffffffffffda RBX: 00007f1c0b9926d4 RCX: 000000000045b349 15:47:14 executing program 3: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x102) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) fallocate(r0, 0x11, 0x0, 0x4003fe) [ 147.259051][ T9142] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 147.267003][ T9142] RBP: 000000000075bfc8 R08: 00000000038028b8 R09: 0000000000000001 [ 147.274964][ T9142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 147.282921][ T9142] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000004 15:47:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x48) 15:47:14 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid', @ANYRESHEX=0x0]) 15:47:14 executing program 0 (fault-call:1 fault-nth:25): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 147.411266][ T22] kauditd_printk_skb: 165 callbacks suppressed [ 147.411275][ T22] audit: type=1326 audit(1580485634.896:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:47:14 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 147.451402][ T22] audit: type=1326 audit(1580485634.896:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 147.484292][ T22] audit: type=1326 audit(1580485634.896:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 147.492032][ T9167] FAULT_INJECTION: forcing a failure. [ 147.492032][ T9167] name failslab, interval 1, probability 0, space 0, times 0 [ 147.510196][ T22] audit: type=1326 audit(1580485634.896:1650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 147.550522][ T22] audit: type=1326 audit(1580485634.896:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 147.579524][ T22] audit: type=1326 audit(1580485634.896:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 147.617613][ T9171] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 147.631203][ T22] audit: type=1326 audit(1580485634.896:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 147.647564][ T9167] CPU: 1 PID: 9167 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 147.666630][ T9167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.676675][ T9167] Call Trace: [ 147.680041][ T9167] dump_stack+0x1b0/0x228 [ 147.684349][ T9167] ? devkmsg_release+0x127/0x127 [ 147.689361][ T9167] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 147.695402][ T9167] ? show_regs_print_info+0x18/0x18 [ 147.700573][ T9167] should_fail+0x6fb/0x860 [ 147.704964][ T9167] ? setup_fault_attr+0x2b0/0x2b0 [ 147.709996][ T9167] ? setup_fault_attr+0x2b0/0x2b0 [ 147.715011][ T9167] ? should_fail+0x182/0x860 [ 147.719591][ T9167] ? ___slab_alloc+0xab/0x450 [ 147.724269][ T9167] __should_failslab+0x11a/0x160 [ 147.729193][ T9167] ? hashtab_create+0x5c/0x3f0 [ 147.733954][ T9167] should_failslab+0x9/0x20 [ 147.738445][ T9167] kmem_cache_alloc_trace+0x3a/0x2f0 [ 147.743733][ T9167] ? perm_destroy+0x30/0x30 [ 147.748209][ T9167] ? filenametr_hash+0x250/0x250 [ 147.753229][ T9167] hashtab_create+0x5c/0x3f0 [ 147.757814][ T9167] policydb_read+0x6cf/0x77f0 [ 147.762481][ T9167] ? __alloc_pages_nodemask+0x52d/0x3010 [ 147.768107][ T9167] ? should_fail+0x182/0x860 [ 147.772709][ T9167] ? __vmalloc_node_range+0x2b6/0x760 [ 147.778074][ T9167] ? setup_fault_attr+0x2b0/0x2b0 [ 147.783783][ T9167] ? vfs_write+0x203/0x4e0 [ 147.788178][ T9167] ? ksys_write+0x168/0x2a0 [ 147.792661][ T9167] ? do_syscall_64+0xc0/0x100 [ 147.797439][ T9167] ? string_to_av_perm+0x1c0/0x1c0 [ 147.802545][ T9167] ? __should_failslab+0x11a/0x160 [ 147.807688][ T9167] ? security_load_policy+0x1af/0xfd0 [ 147.813052][ T9167] ? kasan_kmalloc+0x9/0x10 [ 147.817531][ T9167] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 147.822964][ T9167] security_load_policy+0x228/0xfd0 [ 147.828152][ T9167] ? _raw_spin_lock+0xa1/0x170 [ 147.832916][ T9167] ? _raw_spin_trylock_bh+0x190/0x190 [ 147.838277][ T9167] ? security_change_sid+0x50/0x50 [ 147.843403][ T9167] ? vmap_page_range_noflush+0x67b/0x6a0 [ 147.849035][ T9167] ? __vmalloc_node_range+0x56c/0x760 [ 147.854395][ T9167] ? __kasan_check_write+0x14/0x20 [ 147.859483][ T9167] ? _copy_from_user+0xa8/0xe0 [ 147.864221][ T9167] sel_write_load+0x24e/0x410 [ 147.868887][ T9167] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 147.874506][ T9167] __vfs_write+0xff/0x700 [ 147.878810][ T9167] ? __kernel_write+0x350/0x350 [ 147.883634][ T9167] ? avc_policy_seqno+0x1b/0x70 [ 147.888466][ T9167] ? selinux_file_permission+0x2ba/0x560 [ 147.894072][ T9167] ? security_file_permission+0x157/0x350 [ 147.899769][ T9167] ? rw_verify_area+0x1c2/0x360 [ 147.904595][ T9167] vfs_write+0x203/0x4e0 [ 147.908821][ T9167] ksys_write+0x168/0x2a0 [ 147.913131][ T9167] ? __ia32_sys_read+0x90/0x90 [ 147.917873][ T9167] ? __kasan_check_read+0x11/0x20 [ 147.922871][ T9167] ? __ia32_sys_clock_settime+0x230/0x230 [ 147.928567][ T9167] __x64_sys_write+0x7b/0x90 [ 147.933156][ T9167] do_syscall_64+0xc0/0x100 [ 147.937645][ T9167] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 147.943508][ T9167] RIP: 0033:0x45b349 [ 147.947391][ T9167] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:47:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4c) [ 147.966987][ T9167] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 147.975402][ T9167] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 147.983374][ T9167] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 147.991328][ T9167] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 147.999274][ T9167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 148.007220][ T9167] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 0000000000000019 [ 148.028967][ T22] audit: type=1326 audit(1580485634.896:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:15 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="851000002a00000084000000000004009500000000000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x6000, 0x0) openat$cgroup_procs(r2, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = accept4$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x80800) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'ipvs\x00'}, &(0x7f0000000300)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f00000001c0)={@ipv4={[], [], @multicast2}, @remote, @local, 0x8, 0x5, 0x40, 0x0, 0x4, 0x400040, r7}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000340)={'syz0', "5b6524c85aafc0fdafca368e16361cec26de71ccaab9fa9f3811379a68466a905907a7d1cb7406d6a42cdd78a5731617f175b7a3b2ccbd90a0e93d808dcfe77b3daf873e617dd54ce2fd18762b8306bd3ad3cd29c45eb357662186b3ef58f383e87752deec7b93"}, 0x6b) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400205) ioctl$BLKBSZSET(r9, 0x40081271, &(0x7f00000003c0)=0xa4) 15:47:15 executing program 5 (fault-call:2 fault-nth:0): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:15 executing program 0 (fault-call:1 fault-nth:26): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x68) [ 148.056514][ T22] audit: type=1326 audit(1580485634.896:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 148.080747][ T9167] SELinux: failed to load policy [ 148.083736][ T22] audit: type=1326 audit(1580485634.896:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9155 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:15 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 148.198617][ T9196] FAULT_INJECTION: forcing a failure. [ 148.198617][ T9196] name failslab, interval 1, probability 0, space 0, times 0 [ 148.219539][ T9201] FAULT_INJECTION: forcing a failure. [ 148.219539][ T9201] name failslab, interval 1, probability 0, space 0, times 0 [ 148.225465][ T9196] CPU: 1 PID: 9196 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 148.242196][ T9196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.252236][ T9196] Call Trace: [ 148.255520][ T9196] dump_stack+0x1b0/0x228 [ 148.259841][ T9196] ? devkmsg_release+0x127/0x127 [ 148.264882][ T9196] ? show_regs_print_info+0x18/0x18 [ 148.270062][ T9196] ? __fsnotify_parent+0x300/0x300 [ 148.275208][ T9196] should_fail+0x6fb/0x860 [ 148.279617][ T9196] ? setup_fault_attr+0x2b0/0x2b0 [ 148.284624][ T9196] ? __kasan_check_write+0x14/0x20 [ 148.289730][ T9196] ? fput_many+0x47/0x1a0 [ 148.294048][ T9196] __should_failslab+0x11a/0x160 [ 148.298978][ T9196] ? __se_sys_memfd_create+0xfa/0x3e0 [ 148.304344][ T9196] should_failslab+0x9/0x20 [ 148.308840][ T9196] __kmalloc+0x64/0x310 [ 148.313094][ T9196] __se_sys_memfd_create+0xfa/0x3e0 [ 148.318452][ T9196] __x64_sys_memfd_create+0x5b/0x70 [ 148.323637][ T9196] do_syscall_64+0xc0/0x100 [ 148.328136][ T9196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 148.334018][ T9196] RIP: 0033:0x45b349 [ 148.337896][ T9196] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 148.357487][ T9196] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 148.366035][ T9196] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 [ 148.374003][ T9196] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 148.381967][ T9196] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 148.390018][ T9196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x6c) 15:47:15 executing program 3: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r1, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/247, 0xf7}], 0x1) ppoll(&(0x7f0000001080)=[{r2}], 0x1, 0x0, 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0xa) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r6, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r5, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) dup3(r4, r5, 0x0) fcntl$setown(r1, 0x8, r0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r7, 0x0}]) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f0000000140)={{0x0, 0x0, @descriptor="a96963e763f33cf5"}}) r8 = fsmount(0xffffffffffffffff, 0x0, 0xb) fgetxattr(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="73656375726974792e00b0768da094808510cdefe63f522a70648ec8108cd9f8286b"], &(0x7f00000002c0)=""/55, 0x37) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/policy\x00', 0x0, 0x0) write$P9_RSTAT(r9, &(0x7f0000000380)={0x43, 0x7d, 0x2, {0x0, 0x3c, 0xbf, 0x1, {0x20, 0x1, 0x3}, 0x78100000, 0x826, 0x73, 0x674, 0x1, '\x00', 0x1, '\x00', 0x1, '\x00', 0x6, ')\\-%*!'}}, 0x43) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) tkill(r0, 0x15) [ 148.398057][ T9196] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000000 [ 148.406056][ T9201] CPU: 0 PID: 9201 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 148.416237][ T9201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.426286][ T9201] Call Trace: [ 148.426639][ T9200] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 148.429573][ T9201] dump_stack+0x1b0/0x228 [ 148.429584][ T9201] ? devkmsg_release+0x127/0x127 15:47:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r2, 0x0, r2) getpeername$unix(r2, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r4, 0x10, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x2}}}, 0x24}}, 0x0) [ 148.429591][ T9201] ? show_regs_print_info+0x18/0x18 [ 148.429603][ T9201] should_fail+0x6fb/0x860 [ 148.429610][ T9201] ? setup_fault_attr+0x2b0/0x2b0 [ 148.429616][ T9201] ? setup_fault_attr+0x2b0/0x2b0 [ 148.429623][ T9201] ? should_fail+0x182/0x860 [ 148.429638][ T9201] ? ___slab_alloc+0xab/0x450 [ 148.475292][ T9201] __should_failslab+0x11a/0x160 [ 148.480227][ T9201] ? hashtab_create+0x5c/0x3f0 [ 148.484990][ T9201] should_failslab+0x9/0x20 [ 148.489490][ T9201] kmem_cache_alloc_trace+0x3a/0x2f0 [ 148.494777][ T9201] ? perm_destroy+0x30/0x30 [ 148.499291][ T9201] ? filenametr_hash+0x250/0x250 [ 148.504219][ T9201] hashtab_create+0x5c/0x3f0 [ 148.508804][ T9201] policydb_read+0x6cf/0x77f0 [ 148.513475][ T9201] ? alloc_slab_page+0x135/0x390 [ 148.518388][ T9201] ? setup_object+0xfa/0x130 [ 148.522983][ T9201] ? new_slab+0x21b/0x430 [ 148.527420][ T9201] ? string_to_av_perm+0x1c0/0x1c0 [ 148.532520][ T9201] ? __should_failslab+0x11a/0x160 [ 148.537616][ T9201] ? security_load_policy+0x1af/0xfd0 [ 148.543076][ T9201] ? kasan_kmalloc+0x9/0x10 [ 148.547562][ T9201] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 148.552999][ T9201] security_load_policy+0x228/0xfd0 [ 148.558188][ T9201] ? _raw_spin_lock+0xa1/0x170 [ 148.562962][ T9201] ? _raw_spin_trylock_bh+0x190/0x190 [ 148.568320][ T9201] ? security_change_sid+0x50/0x50 [ 148.573433][ T9201] ? vmap_page_range_noflush+0x67b/0x6a0 [ 148.579059][ T9201] ? __vmalloc_node_range+0x56c/0x760 [ 148.584413][ T9201] ? __kasan_check_write+0x14/0x20 [ 148.589510][ T9201] ? _copy_from_user+0xa8/0xe0 [ 148.594264][ T9201] sel_write_load+0x24e/0x410 [ 148.598934][ T9201] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 148.604570][ T9201] __vfs_write+0xff/0x700 [ 148.608904][ T9201] ? __kernel_write+0x350/0x350 [ 148.613747][ T9201] ? avc_policy_seqno+0x1b/0x70 [ 148.618666][ T9201] ? selinux_file_permission+0x2ba/0x560 [ 148.624293][ T9201] ? security_file_permission+0x157/0x350 [ 148.630003][ T9201] ? rw_verify_area+0x1c2/0x360 [ 148.634860][ T9201] vfs_write+0x203/0x4e0 [ 148.639089][ T9201] ksys_write+0x168/0x2a0 [ 148.643458][ T9201] ? __ia32_sys_read+0x90/0x90 [ 148.648227][ T9201] ? __kasan_check_read+0x11/0x20 [ 148.653241][ T9201] ? __ia32_sys_clock_settime+0x230/0x230 [ 148.658944][ T9201] __x64_sys_write+0x7b/0x90 [ 148.663517][ T9201] do_syscall_64+0xc0/0x100 [ 148.668041][ T9201] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 148.673915][ T9201] RIP: 0033:0x45b349 [ 148.677919][ T9201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:47:16 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)={&(0x7f0000000680)='./file0/file0\x00', 0x0, 0x18}, 0x10) dup3(r0, 0xffffffffffffffff, 0x80000) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000180)=[{{}, 0x1}, {{0x0, 0x2710}, 0x15}], 0x30) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) execveat(r1, &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000280)='ext4\x00', &(0x7f00000002c0)='@selinuxeth1ppp1\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='ext4\x00', &(0x7f0000000380)='ext4\x00'], &(0x7f0000000540)=[&(0x7f0000000400)=']selinux@\x00', &(0x7f0000000440)='ext4\x00', &(0x7f0000000480)='ext4\x00'], 0x400) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r3, &(0x7f0000000640), 0x8) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x25, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3f}, 0x0, 0x4, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x0) move_mount(r4, &(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x44) [ 148.697713][ T9201] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 148.706114][ T9201] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 148.714074][ T9201] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 148.722035][ T9201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 148.730123][ T9201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 148.738078][ T9201] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001a 15:47:16 executing program 5 (fault-call:2 fault-nth:1): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 148.759981][ T9201] SELinux: failed to load policy 15:47:16 executing program 0 (fault-call:1 fault-nth:27): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x74) [ 148.790332][ T9218] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 148.808595][ T9229] FAULT_INJECTION: forcing a failure. [ 148.808595][ T9229] name failslab, interval 1, probability 0, space 0, times 0 [ 148.822030][ T9229] CPU: 0 PID: 9229 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 148.832079][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.842199][ T9229] Call Trace: [ 148.845475][ T9229] dump_stack+0x1b0/0x228 [ 148.849789][ T9229] ? devkmsg_release+0x127/0x127 [ 148.854708][ T9229] ? show_regs_print_info+0x18/0x18 [ 148.860009][ T9229] ? get_pid_task+0x8d/0xa0 [ 148.864495][ T9229] ? proc_fail_nth_write+0x166/0x200 [ 148.869796][ T9229] ? __kasan_check_write+0x14/0x20 [ 148.874897][ T9229] should_fail+0x6fb/0x860 [ 148.879297][ T9229] ? setup_fault_attr+0x2b0/0x2b0 [ 148.884300][ T9229] ? __kasan_kmalloc+0x117/0x1b0 [ 148.889211][ T9229] ? kasan_kmalloc+0x9/0x10 [ 148.893691][ T9229] ? __kmalloc+0x102/0x310 [ 148.898121][ T9229] ? __se_sys_memfd_create+0xfa/0x3e0 [ 148.903478][ T9229] ? do_syscall_64+0xc0/0x100 [ 148.908190][ T9229] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 148.914238][ T9229] ? fsnotify+0x1390/0x1450 [ 148.918729][ T9229] __should_failslab+0x11a/0x160 [ 148.923654][ T9229] ? shmem_alloc_inode+0x1b/0x40 [ 148.928569][ T9229] should_failslab+0x9/0x20 [ 148.933180][ T9229] kmem_cache_alloc+0x37/0x2b0 [ 148.937943][ T9229] ? shmem_match+0x180/0x180 [ 148.942527][ T9229] shmem_alloc_inode+0x1b/0x40 [ 148.947385][ T9229] ? shmem_match+0x180/0x180 [ 148.951965][ T9229] new_inode_pseudo+0x68/0x240 [ 148.956744][ T9229] new_inode+0x28/0x1c0 [ 148.960894][ T9229] shmem_get_inode+0x114/0x690 [ 148.965763][ T9229] __shmem_file_setup+0x129/0x280 [ 148.970871][ T9229] shmem_file_setup+0x2f/0x40 [ 148.975554][ T9229] __se_sys_memfd_create+0x215/0x3e0 [ 148.980848][ T9229] __x64_sys_memfd_create+0x5b/0x70 [ 148.986147][ T9229] do_syscall_64+0xc0/0x100 [ 148.990642][ T9229] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 148.996659][ T9229] RIP: 0033:0x45b349 [ 149.000537][ T9229] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.020125][ T9229] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 149.028544][ T9229] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 15:47:16 executing program 5 (fault-call:2 fault-nth:2): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 149.036511][ T9229] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 149.044476][ T9229] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 149.052437][ T9229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 149.060402][ T9229] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000001 [ 149.108800][ T9236] FAULT_INJECTION: forcing a failure. [ 149.108800][ T9236] name failslab, interval 1, probability 0, space 0, times 0 [ 149.121637][ T9236] CPU: 0 PID: 9236 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 149.131690][ T9236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.141732][ T9236] Call Trace: [ 149.145013][ T9236] dump_stack+0x1b0/0x228 [ 149.149340][ T9236] ? devkmsg_release+0x127/0x127 [ 149.154271][ T9236] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 149.161457][ T9236] ? show_regs_print_info+0x18/0x18 [ 149.166752][ T9236] should_fail+0x6fb/0x860 [ 149.171185][ T9236] ? setup_fault_attr+0x2b0/0x2b0 [ 149.176228][ T9236] ? setup_fault_attr+0x2b0/0x2b0 [ 149.181249][ T9236] ? should_fail+0x182/0x860 [ 149.185902][ T9236] ? __kernel_text_address+0x9a/0x110 [ 149.191281][ T9236] ? ___slab_alloc+0xab/0x450 [ 149.195979][ T9236] __should_failslab+0x11a/0x160 [ 149.201020][ T9236] ? hashtab_create+0x5c/0x3f0 [ 149.205778][ T9236] should_failslab+0x9/0x20 [ 149.210279][ T9236] kmem_cache_alloc_trace+0x3a/0x2f0 [ 149.215559][ T9236] ? filenametr_cmp+0x240/0x240 [ 149.220408][ T9236] ? rangetr_hash+0xf0/0xf0 [ 149.224918][ T9236] hashtab_create+0x5c/0x3f0 [ 149.229496][ T9236] policydb_read+0x731/0x77f0 [ 149.234164][ T9236] ? __alloc_pages_nodemask+0x52d/0x3010 [ 149.240070][ T9236] ? should_fail+0x182/0x860 [ 149.244656][ T9236] ? __vmalloc_node_range+0x2b6/0x760 [ 149.250024][ T9236] ? setup_fault_attr+0x2b0/0x2b0 [ 149.255028][ T9236] ? vfs_write+0x203/0x4e0 [ 149.259438][ T9236] ? ksys_write+0x168/0x2a0 [ 149.263926][ T9236] ? do_syscall_64+0xc0/0x100 [ 149.268594][ T9236] ? string_to_av_perm+0x1c0/0x1c0 [ 149.273688][ T9236] ? __should_failslab+0x11a/0x160 [ 149.278794][ T9236] ? security_load_policy+0x1af/0xfd0 [ 149.284161][ T9236] ? kasan_kmalloc+0x9/0x10 [ 149.288661][ T9236] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 149.294107][ T9236] security_load_policy+0x228/0xfd0 [ 149.299308][ T9236] ? _raw_spin_lock+0xa1/0x170 [ 149.304068][ T9236] ? _raw_spin_trylock_bh+0x190/0x190 [ 149.309530][ T9236] ? security_change_sid+0x50/0x50 [ 149.314644][ T9236] ? vmap_page_range_noflush+0x67b/0x6a0 [ 149.320263][ T9236] ? __vmalloc_node_range+0x56c/0x760 [ 149.325626][ T9236] ? __kasan_check_write+0x14/0x20 [ 149.330785][ T9236] ? _copy_from_user+0xa8/0xe0 [ 149.335539][ T9236] sel_write_load+0x24e/0x410 [ 149.340197][ T9236] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 149.345930][ T9236] __vfs_write+0xff/0x700 [ 149.350245][ T9236] ? __kernel_write+0x350/0x350 [ 149.355100][ T9236] ? avc_policy_seqno+0x1b/0x70 [ 149.359963][ T9236] ? selinux_file_permission+0x2ba/0x560 [ 149.365721][ T9236] ? security_file_permission+0x157/0x350 [ 149.371431][ T9236] ? rw_verify_area+0x1c2/0x360 [ 149.376284][ T9236] vfs_write+0x203/0x4e0 [ 149.380525][ T9236] ksys_write+0x168/0x2a0 [ 149.384906][ T9236] ? __ia32_sys_read+0x90/0x90 [ 149.389667][ T9236] ? __kasan_check_read+0x11/0x20 [ 149.394687][ T9236] ? __ia32_sys_clock_settime+0x230/0x230 [ 149.400398][ T9236] __x64_sys_write+0x7b/0x90 [ 149.404995][ T9236] do_syscall_64+0xc0/0x100 [ 149.409493][ T9236] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 149.415381][ T9236] RIP: 0033:0x45b349 [ 149.419265][ T9236] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.438880][ T9236] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 149.447295][ T9236] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 149.455260][ T9236] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 149.463335][ T9236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 149.471288][ T9236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 149.479261][ T9236] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001b 15:47:17 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x7a) 15:47:17 executing program 0 (fault-call:1 fault-nth:28): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 149.514530][ T9236] SELinux: failed to load policy [ 149.543386][ T9245] FAULT_INJECTION: forcing a failure. [ 149.543386][ T9245] name failslab, interval 1, probability 0, space 0, times 0 [ 149.556195][ T9245] CPU: 1 PID: 9245 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 149.566287][ T9245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.576373][ T9245] Call Trace: [ 149.579666][ T9245] dump_stack+0x1b0/0x228 [ 149.584152][ T9245] ? devkmsg_release+0x127/0x127 [ 149.589090][ T9245] ? __shmem_file_setup+0x129/0x280 [ 149.594298][ T9245] ? show_regs_print_info+0x18/0x18 [ 149.599485][ T9245] ? do_syscall_64+0xc0/0x100 [ 149.604822][ T9245] ? stack_trace_save+0x111/0x1e0 [ 149.609835][ T9245] should_fail+0x6fb/0x860 [ 149.614347][ T9245] ? setup_fault_attr+0x2b0/0x2b0 [ 149.619367][ T9245] ? ksys_mount+0xe2/0x100 [ 149.623763][ T9245] ? should_fail+0x182/0x860 [ 149.628539][ T9245] ? __kasan_kmalloc+0x179/0x1b0 [ 149.633456][ T9245] __should_failslab+0x11a/0x160 [ 149.638385][ T9245] ? security_inode_alloc+0x36/0x1f0 [ 149.643686][ T9245] should_failslab+0x9/0x20 [ 149.648179][ T9245] kmem_cache_alloc+0x37/0x2b0 [ 149.652936][ T9245] ? from_kuid_munged+0x3b0/0x3b0 [ 149.657948][ T9245] security_inode_alloc+0x36/0x1f0 [ 149.663041][ T9245] inode_init_always+0x39b/0x840 [ 149.668098][ T9245] ? shmem_match+0x180/0x180 [ 149.672664][ T9245] new_inode_pseudo+0x7f/0x240 [ 149.677412][ T9245] new_inode+0x28/0x1c0 [ 149.681607][ T9245] shmem_get_inode+0x114/0x690 [ 149.686370][ T9245] __shmem_file_setup+0x129/0x280 [ 149.691391][ T9245] shmem_file_setup+0x2f/0x40 [ 149.696080][ T9245] __se_sys_memfd_create+0x215/0x3e0 [ 149.701415][ T9245] __x64_sys_memfd_create+0x5b/0x70 [ 149.706621][ T9245] do_syscall_64+0xc0/0x100 [ 149.711110][ T9245] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 149.716980][ T9245] RIP: 0033:0x45b349 [ 149.720860][ T9245] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 149.740552][ T9245] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 149.748954][ T9245] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 [ 149.756910][ T9245] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 149.764864][ T9245] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 149.772862][ T9245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 149.780814][ T9245] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000002 15:47:17 executing program 5 (fault-call:2 fault-nth:3): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x180) [ 149.807289][ T9225] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 149.830063][ T9260] FAULT_INJECTION: forcing a failure. [ 149.830063][ T9260] name failslab, interval 1, probability 0, space 0, times 0 [ 149.843352][ T9260] CPU: 0 PID: 9260 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 149.853418][ T9260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.863465][ T9260] Call Trace: [ 149.866790][ T9260] dump_stack+0x1b0/0x228 [ 149.871103][ T9260] ? devkmsg_release+0x127/0x127 [ 149.876020][ T9260] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 149.882065][ T9260] ? show_regs_print_info+0x18/0x18 [ 149.887276][ T9260] should_fail+0x6fb/0x860 [ 149.891676][ T9260] ? setup_fault_attr+0x2b0/0x2b0 [ 149.896685][ T9260] ? setup_fault_attr+0x2b0/0x2b0 [ 149.901685][ T9260] ? should_fail+0x182/0x860 [ 149.906340][ T9260] ? ___slab_alloc+0xab/0x450 [ 149.910997][ T9260] __should_failslab+0x11a/0x160 [ 149.915921][ T9260] ? hashtab_create+0x117/0x3f0 [ 149.920764][ T9260] should_failslab+0x9/0x20 [ 149.925257][ T9260] __kmalloc+0x64/0x310 [ 149.929403][ T9260] hashtab_create+0x117/0x3f0 [ 149.934064][ T9260] policydb_read+0x731/0x77f0 [ 149.938845][ T9260] ? __alloc_pages_nodemask+0x52d/0x3010 [ 149.944508][ T9260] ? should_fail+0x182/0x860 [ 149.949094][ T9260] ? __vmalloc_node_range+0x2b6/0x760 [ 149.954448][ T9260] ? setup_fault_attr+0x2b0/0x2b0 [ 149.959452][ T9260] ? vfs_write+0x203/0x4e0 [ 149.963853][ T9260] ? ksys_write+0x168/0x2a0 [ 149.968336][ T9260] ? do_syscall_64+0xc0/0x100 [ 149.973097][ T9260] ? string_to_av_perm+0x1c0/0x1c0 [ 149.978256][ T9260] ? __should_failslab+0x11a/0x160 [ 149.983355][ T9260] ? security_load_policy+0x1af/0xfd0 [ 149.988707][ T9260] ? kasan_kmalloc+0x9/0x10 [ 149.993217][ T9260] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 149.998718][ T9260] security_load_policy+0x228/0xfd0 [ 150.003906][ T9260] ? _raw_spin_lock+0xa1/0x170 [ 150.008763][ T9260] ? _raw_spin_trylock_bh+0x190/0x190 [ 150.014120][ T9260] ? security_change_sid+0x50/0x50 [ 150.019210][ T9260] ? vmap_page_range_noflush+0x67b/0x6a0 [ 150.024866][ T9260] ? __vmalloc_node_range+0x56c/0x760 [ 150.030220][ T9260] ? __kasan_check_write+0x14/0x20 [ 150.035312][ T9260] ? _copy_from_user+0xa8/0xe0 [ 150.040054][ T9260] sel_write_load+0x24e/0x410 [ 150.044715][ T9260] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 150.050354][ T9260] __vfs_write+0xff/0x700 [ 150.054694][ T9260] ? __kernel_write+0x350/0x350 [ 150.059526][ T9260] ? avc_policy_seqno+0x1b/0x70 [ 150.064406][ T9260] ? selinux_file_permission+0x2ba/0x560 [ 150.070069][ T9260] ? security_file_permission+0x157/0x350 [ 150.075765][ T9260] ? rw_verify_area+0x1c2/0x360 [ 150.080686][ T9260] vfs_write+0x203/0x4e0 [ 150.084915][ T9260] ksys_write+0x168/0x2a0 [ 150.089221][ T9260] ? __ia32_sys_read+0x90/0x90 [ 150.094096][ T9260] ? __kasan_check_read+0x11/0x20 [ 150.099150][ T9260] ? __ia32_sys_clock_settime+0x230/0x230 [ 150.104910][ T9260] __x64_sys_write+0x7b/0x90 [ 150.109511][ T9260] do_syscall_64+0xc0/0x100 [ 150.114004][ T9260] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 150.119883][ T9260] RIP: 0033:0x45b349 [ 150.123771][ T9260] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.143402][ T9260] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:47:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0xb4, 0x0, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_BEARER={0x4c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x40, @mcast1, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}]}, @TIPC_NLA_SOCK={0x20, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9d21}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x400c011}, 0x2000c054) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/133, 0x85}, {&(0x7f0000000380)=""/237, 0xed}, {&(0x7f0000000480)=""/102, 0x66}, {&(0x7f0000000500)=""/204, 0xcc}], 0x4, 0x3) r1 = socket$unix(0x1, 0x2, 0x0) socketpair(0x18, 0x4, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) accept$unix(r2, 0x0, &(0x7f0000000280)) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'macvtap0\x00', 0x8000}) 15:47:17 executing program 0 (fault-call:1 fault-nth:29): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 150.151791][ T9260] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 150.159790][ T9260] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 150.167744][ T9260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 150.175708][ T9260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 150.183751][ T9260] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001c [ 150.193715][ T9260] SELinux: failed to load policy 15:47:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x474042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000940)={{0xcc, 0x5, 0x48, 0x61, 0x3d8, 0xfff, 0x6e, 0x4}, "f74cd28835c5c70de776f0a9a97d92aa8fd95c8dc4240ce6044b97481fb0ccb5222e89ee80b20d9ab179b243017ea2485589663bf2d8c1415a937f8c64d3be030a13563d69e6d3532287f210efea4d8ef13c0fd2e0483be5384e0d0c177f04cdf5445af4a7edad4d3b89293b7a684d7238bbd71411c71d97a2706f0b8c7ebba7d0a4f530974e6fc5d0c594fbeae5c4723e3467622a9b99bc3c2be5b6dd", [[], [], []]}, 0x3bd) r3 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x0, 0x80000) r5 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r5, 0x800) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="00000400", @ANYRES16=0x0, @ANYBLOB="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"], 0x158}, 0x1, 0x0, 0x0, 0x10}, 0x840) lseek(r5, 0x0, 0x2) open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r5, r2, 0x0, 0x280901) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r11 = clone3(&(0x7f0000000d40)={0x8008200, &(0x7f0000000240), &(0x7f0000000480), &(0x7f0000000600), {0x9}, &(0x7f0000000640)=""/57, 0x39, &(0x7f00000006c0)=""/122, &(0x7f0000000d00)=[0xffffffffffffffff, r6, r7, r8, r9, 0x0, r10], 0x7}, 0x50) sched_setattr(r11, &(0x7f0000000dc0)={0x38, 0x6, 0x2, 0xfffffff8, 0x4, 0x2, 0x9, 0x5d5, 0x8}, 0x0) r12 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0)='nbd\x00') r13 = open(0x0, 0x84002, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="080001", @ANYRES32, @ANYBLOB, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB, @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="080001", @ANYRES32], 0xd}}, 0x0) sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r12, @ANYBLOB="100027bd70000000000000008a0f0700"/25], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x20004001) preadv(r1, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/151, 0x97}], 0x1, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x10) lseek(r2, 0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x4, 0x3fe, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0) r14 = socket$unix(0x1, 0x2, 0x0) r15 = fcntl$dupfd(r14, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r15, 0x40305828, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x400}) [ 150.219494][ T9258] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 150.260966][ T9276] FAULT_INJECTION: forcing a failure. [ 150.260966][ T9276] name failslab, interval 1, probability 0, space 0, times 0 [ 150.263090][ T9277] FAULT_INJECTION: forcing a failure. [ 150.263090][ T9277] name failslab, interval 1, probability 0, space 0, times 0 [ 150.303056][ T9277] CPU: 1 PID: 9277 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 150.313169][ T9277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.323220][ T9277] Call Trace: [ 150.326511][ T9277] dump_stack+0x1b0/0x228 [ 150.330839][ T9277] ? devkmsg_release+0x127/0x127 [ 150.335774][ T9277] ? show_regs_print_info+0x18/0x18 [ 150.340961][ T9277] ? should_fail+0x182/0x860 [ 150.345538][ T9277] ? should_fail+0x182/0x860 [ 150.350133][ T9277] ? setup_fault_attr+0x2b0/0x2b0 [ 150.355145][ T9277] should_fail+0x6fb/0x860 [ 150.359551][ T9277] ? setup_fault_attr+0x2b0/0x2b0 [ 150.364913][ T9277] ? __should_failslab+0x11a/0x160 [ 150.370014][ T9277] ? hashtab_create+0x117/0x3f0 [ 150.374878][ T9277] __should_failslab+0x11a/0x160 [ 150.379808][ T9277] ? policydb_read+0x9ab/0x77f0 [ 150.384645][ T9277] should_failslab+0x9/0x20 [ 150.389141][ T9277] kmem_cache_alloc_trace+0x3a/0x2f0 [ 150.394427][ T9277] policydb_read+0x9ab/0x77f0 [ 150.399100][ T9277] ? __alloc_pages_nodemask+0x52d/0x3010 [ 150.404734][ T9277] ? __vmalloc_node_range+0x2b6/0x760 [ 150.410144][ T9277] ? vfs_write+0x203/0x4e0 [ 150.414553][ T9277] ? do_syscall_64+0xc0/0x100 [ 150.419224][ T9277] ? string_to_av_perm+0x1c0/0x1c0 [ 150.424330][ T9277] ? __should_failslab+0x11a/0x160 [ 150.429784][ T9277] ? security_load_policy+0x1af/0xfd0 [ 150.435145][ T9277] ? kasan_kmalloc+0x9/0x10 [ 150.439643][ T9277] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 150.445118][ T9277] security_load_policy+0x228/0xfd0 [ 150.450316][ T9277] ? _raw_spin_lock+0xa1/0x170 [ 150.455066][ T9277] ? _raw_spin_trylock_bh+0x190/0x190 [ 150.460420][ T9277] ? security_change_sid+0x50/0x50 [ 150.465524][ T9277] ? vmap_page_range_noflush+0x67b/0x6a0 [ 150.471151][ T9277] ? __vmalloc_node_range+0x56c/0x760 [ 150.476507][ T9277] ? __kasan_check_write+0x14/0x20 [ 150.481613][ T9277] ? _copy_from_user+0xa8/0xe0 [ 150.486372][ T9277] sel_write_load+0x24e/0x410 [ 150.491039][ T9277] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 150.496652][ T9277] __vfs_write+0xff/0x700 [ 150.500976][ T9277] ? __kernel_write+0x350/0x350 [ 150.505817][ T9277] ? avc_policy_seqno+0x1b/0x70 [ 150.510657][ T9277] ? selinux_file_permission+0x2ba/0x560 [ 150.516300][ T9277] ? security_file_permission+0x157/0x350 [ 150.522131][ T9277] ? rw_verify_area+0x1c2/0x360 [ 150.526970][ T9277] vfs_write+0x203/0x4e0 [ 150.531194][ T9277] ksys_write+0x168/0x2a0 [ 150.535512][ T9277] ? __ia32_sys_read+0x90/0x90 [ 150.540266][ T9277] ? __kasan_check_read+0x11/0x20 [ 150.545281][ T9277] ? __ia32_sys_clock_settime+0x230/0x230 [ 150.550978][ T9277] __x64_sys_write+0x7b/0x90 [ 150.555558][ T9277] do_syscall_64+0xc0/0x100 [ 150.560055][ T9277] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 150.565942][ T9277] RIP: 0033:0x45b349 [ 150.569820][ T9277] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.589424][ T9277] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 15:47:17 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x300) [ 150.597830][ T9277] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 150.605796][ T9277] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 150.613874][ T9277] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 150.621845][ T9277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 150.629826][ T9277] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001d [ 150.637901][ T9276] CPU: 0 PID: 9276 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 15:47:18 executing program 3: sched_setattr(0x0, 0x0, 0x0) r0 = creat(0x0, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = socket(0x10, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0}, 0x2004c000) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x7}, 0x16, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) fallocate(0xffffffffffffffff, 0x70, 0x0, 0x429cacbd) r2 = gettid() tkill(r2, 0x3c) write$P9_RGETLOCK(r0, &(0x7f0000000140)={0x1e, 0x37, 0x1, {0x2, 0x6c5d, 0x80000000, r2}}, 0x1e) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000000)={0x30, 0x6f, 0x1, {0x3, [{0x10, 0x2, 0x7}, {0x20, 0x2, 0x1}, {0x4, 0x2, 0x6}]}}, 0x30) sched_setattr(0x0, 0x0, 0x0) fstat(r0, &(0x7f0000003a40)) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x402000, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000200)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) [ 150.648060][ T9276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.658107][ T9276] Call Trace: [ 150.661397][ T9276] dump_stack+0x1b0/0x228 [ 150.665731][ T9276] ? devkmsg_release+0x127/0x127 [ 150.670662][ T9276] ? show_regs_print_info+0x18/0x18 [ 150.675855][ T9276] ? do_syscall_64+0xc0/0x100 [ 150.678220][ T9277] SELinux: unable to allocate memory for policydb string of length 8 [ 150.680526][ T9276] ? stack_trace_save+0x111/0x1e0 [ 150.680537][ T9276] should_fail+0x6fb/0x860 [ 150.680546][ T9276] ? setup_fault_attr+0x2b0/0x2b0 [ 150.680556][ T9276] ? ksys_mount+0xe2/0x100 [ 150.680563][ T9276] ? should_fail+0x182/0x860 [ 150.680571][ T9276] ? __kasan_kmalloc+0x179/0x1b0 [ 150.680579][ T9276] __should_failslab+0x11a/0x160 [ 150.680592][ T9276] ? __d_alloc+0x2d/0x6d0 [ 150.726196][ T9276] should_failslab+0x9/0x20 [ 150.730684][ T9276] kmem_cache_alloc+0x37/0x2b0 [ 150.735441][ T9276] __d_alloc+0x2d/0x6d0 [ 150.739591][ T9276] ? ktime_get_coarse_real_ts64+0xf3/0x110 [ 150.745399][ T9276] d_alloc_pseudo+0x1d/0x70 [ 150.749886][ T9276] alloc_file_pseudo+0x128/0x310 [ 150.754935][ T9276] ? alloc_empty_file_noaccount+0x80/0x80 [ 150.760644][ T9276] ? __kasan_check_write+0x14/0x20 [ 150.765734][ T9276] ? clear_nlink+0x87/0xe0 [ 150.770131][ T9276] __shmem_file_setup+0x1a2/0x280 [ 150.775145][ T9276] shmem_file_setup+0x2f/0x40 [ 150.779810][ T9276] __se_sys_memfd_create+0x215/0x3e0 [ 150.785075][ T9276] __x64_sys_memfd_create+0x5b/0x70 [ 150.790255][ T9276] do_syscall_64+0xc0/0x100 [ 150.794754][ T9276] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 150.800682][ T9276] RIP: 0033:0x45b349 [ 150.804649][ T9276] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 150.824336][ T9276] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 150.832737][ T9276] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 [ 150.840698][ T9276] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 15:47:18 executing program 0 (fault-call:1 fault-nth:30): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x346) 15:47:18 executing program 5 (fault-call:2 fault-nth:4): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 150.848668][ T9276] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 150.856626][ T9276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 150.864600][ T9276] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000003 [ 150.882593][ T9277] SELinux: failed to load policy [ 150.939887][ T9308] FAULT_INJECTION: forcing a failure. [ 150.939887][ T9308] name failslab, interval 1, probability 0, space 0, times 0 [ 150.954472][ T9308] CPU: 0 PID: 9308 Comm: syz-executor.0 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 150.964664][ T9308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.974717][ T9308] Call Trace: [ 150.978007][ T9308] dump_stack+0x1b0/0x228 [ 150.982390][ T9308] ? devkmsg_release+0x127/0x127 [ 150.987329][ T9308] ? _raw_spin_lock+0xa1/0x170 [ 150.990756][ T9312] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 150.992090][ T9308] ? show_regs_print_info+0x18/0x18 [ 150.992101][ T9308] ? should_fail+0x182/0x860 [ 150.992109][ T9308] ? should_fail+0x182/0x860 [ 150.992128][ T9308] ? setup_fault_attr+0x2b0/0x2b0 [ 151.019032][ T9308] should_fail+0x6fb/0x860 [ 151.023445][ T9308] ? setup_fault_attr+0x2b0/0x2b0 [ 151.028464][ T9308] ? __should_failslab+0x11a/0x160 [ 151.033568][ T9308] ? hashtab_create+0x117/0x3f0 [ 151.038411][ T9308] __should_failslab+0x11a/0x160 [ 151.043343][ T9308] ? policydb_read+0x9ab/0x77f0 [ 151.048186][ T9308] should_failslab+0x9/0x20 [ 151.052670][ T9308] kmem_cache_alloc_trace+0x3a/0x2f0 [ 151.057949][ T9308] policydb_read+0x9ab/0x77f0 [ 151.062800][ T9308] ? __kasan_check_write+0x14/0x20 [ 151.067899][ T9308] ? _raw_spin_trylock_bh+0x190/0x190 [ 151.073249][ T9308] ? new_slab+0x21b/0x430 [ 151.077567][ T9308] ? string_to_av_perm+0x1c0/0x1c0 [ 151.082680][ T9308] ? security_load_policy+0x1af/0xfd0 [ 151.088040][ T9308] ? kasan_kmalloc+0x9/0x10 [ 151.092527][ T9308] ? kmem_cache_alloc_trace+0xe2/0x2f0 [ 151.097976][ T9308] security_load_policy+0x228/0xfd0 [ 151.103162][ T9308] ? _raw_spin_lock+0xa1/0x170 [ 151.107919][ T9308] ? _raw_spin_trylock_bh+0x190/0x190 [ 151.113295][ T9308] ? security_change_sid+0x50/0x50 [ 151.118389][ T9308] ? vmap_page_range_noflush+0x67b/0x6a0 [ 151.123999][ T9308] ? __vmalloc_node_range+0x56c/0x760 [ 151.129362][ T9308] ? __kasan_check_write+0x14/0x20 [ 151.134476][ T9308] ? _copy_from_user+0xa8/0xe0 [ 151.139231][ T9308] sel_write_load+0x24e/0x410 [ 151.143887][ T9308] ? sel_make_policy_nodes+0x19f0/0x19f0 [ 151.149520][ T9308] __vfs_write+0xff/0x700 [ 151.153841][ T9308] ? __kernel_write+0x350/0x350 [ 151.158680][ T9308] ? avc_policy_seqno+0x1b/0x70 [ 151.163511][ T9308] ? selinux_file_permission+0x2ba/0x560 [ 151.169144][ T9308] ? security_file_permission+0x157/0x350 [ 151.174871][ T9308] ? rw_verify_area+0x1c2/0x360 [ 151.179717][ T9308] vfs_write+0x203/0x4e0 [ 151.183960][ T9308] ksys_write+0x168/0x2a0 [ 151.188274][ T9308] ? __ia32_sys_read+0x90/0x90 [ 151.193031][ T9308] ? __kasan_check_read+0x11/0x20 [ 151.198044][ T9308] ? __ia32_sys_clock_settime+0x230/0x230 [ 151.203746][ T9308] __x64_sys_write+0x7b/0x90 [ 151.208314][ T9308] do_syscall_64+0xc0/0x100 [ 151.212824][ T9308] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 151.218706][ T9308] RIP: 0033:0x45b349 [ 151.222588][ T9308] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.242182][ T9308] RSP: 002b:00007f7eeb4c0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 151.250576][ T9308] RAX: ffffffffffffffda RBX: 00007f7eeb4c16d4 RCX: 000000000045b349 [ 151.258641][ T9308] RDX: 0000000000000038 RSI: 0000000020000000 RDI: 0000000000000003 [ 151.266597][ T9308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 151.274923][ T9308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 151.282881][ T9308] R13: 0000000000000cb8 R14: 00000000004cd905 R15: 000000000000001e [ 151.316891][ T9308] SELinux: unable to allocate memory for policydb string of length 8 [ 151.325546][ T9318] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 151.338066][ T9323] FAULT_INJECTION: forcing a failure. [ 151.338066][ T9323] name failslab, interval 1, probability 0, space 0, times 0 [ 151.350838][ T9323] CPU: 1 PID: 9323 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 151.360899][ T9323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.370952][ T9323] Call Trace: [ 151.374246][ T9323] dump_stack+0x1b0/0x228 [ 151.378583][ T9323] ? devkmsg_release+0x127/0x127 [ 151.383510][ T9323] ? new_inode+0x28/0x1c0 [ 151.387941][ T9323] ? show_regs_print_info+0x18/0x18 [ 151.393141][ T9323] ? path_openat+0x1e1a/0x3c00 [ 151.398016][ T9323] ? do_sys_open+0x36f/0x7a0 [ 151.398177][ T9308] SELinux: failed to load policy [ 151.402591][ T9323] ? __x64_sys_open+0x87/0x90 [ 151.402603][ T9323] should_fail+0x6fb/0x860 15:47:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x806000) ftruncate(r1, 0xff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x6628, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) 15:47:18 executing program 0 (fault-call:1 fault-nth:31): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x480) [ 151.402611][ T9323] ? setup_fault_attr+0x2b0/0x2b0 [ 151.402621][ T9323] __should_failslab+0x11a/0x160 [ 151.402632][ T9323] ? context_struct_to_string+0x3b5/0x7f0 [ 151.402640][ T9323] should_failslab+0x9/0x20 [ 151.402647][ T9323] __kmalloc+0x64/0x310 [ 151.402660][ T9323] context_struct_to_string+0x3b5/0x7f0 [ 151.446458][ T9323] ? security_bounded_transition+0x520/0x520 [ 151.452422][ T9323] ? mls_range_isvalid+0x3a8/0x4c0 [ 151.457556][ T9323] context_add_hash+0xf5/0x200 [ 151.462336][ T9323] ? security_sid_to_context_inval+0x50/0x50 [ 151.468301][ T9323] ? mls_context_isvalid+0x9e/0x390 [ 151.473480][ T9323] ? policydb_context_isvalid+0x1d5/0x430 [ 151.479176][ T9323] security_compute_sid+0x1147/0x1be0 [ 151.484537][ T9323] ? security_transition_sid+0x90/0x90 [ 151.489975][ T9323] ? stack_trace_save+0x111/0x1e0 [ 151.494975][ T9323] ? __kasan_kmalloc+0x179/0x1b0 [ 151.499887][ T9323] ? __kasan_kmalloc+0x117/0x1b0 [ 151.504814][ T9323] ? kasan_slab_alloc+0xe/0x10 [ 151.509608][ T9323] ? kmem_cache_alloc+0x120/0x2b0 [ 151.514736][ T9323] ? __d_alloc+0x2d/0x6d0 [ 151.519045][ T9323] ? d_alloc_pseudo+0x1d/0x70 [ 151.523714][ T9323] ? alloc_file_pseudo+0x128/0x310 [ 151.528806][ T9323] ? __shmem_file_setup+0x1a2/0x280 [ 151.533993][ T9323] ? shmem_file_setup+0x2f/0x40 [ 151.538832][ T9323] ? new_inode_pseudo+0x68/0x240 [ 151.543754][ T9323] ? new_inode+0x28/0x1c0 [ 151.548107][ T9323] ? shmem_get_inode+0x114/0x690 [ 151.553035][ T9323] ? __kasan_check_write+0x14/0x20 [ 151.558131][ T9323] ? _raw_spin_lock+0xa1/0x170 [ 151.562911][ T9323] ? _raw_spin_trylock_bh+0x190/0x190 [ 151.568270][ T9323] security_transition_sid+0x7d/0x90 [ 151.573545][ T9323] inode_doinit_with_dentry+0x5e0/0x10e0 [ 151.579187][ T9323] ? sb_finish_set_opts+0x800/0x800 [ 151.584365][ T9323] ? __d_alloc+0x2d/0x6d0 [ 151.588682][ T9323] ? kasan_slab_alloc+0xe/0x10 [ 151.593471][ T9323] ? d_set_d_op+0xfd/0x390 [ 151.597868][ T9323] selinux_d_instantiate+0x27/0x40 [ 151.602959][ T9323] security_d_instantiate+0xa0/0x100 [ 151.608275][ T9323] d_instantiate+0x55/0x90 [ 151.612669][ T9323] alloc_file_pseudo+0x24a/0x310 [ 151.617592][ T9323] ? alloc_empty_file_noaccount+0x80/0x80 [ 151.623298][ T9323] ? __kasan_check_write+0x14/0x20 [ 151.628447][ T9323] ? clear_nlink+0x87/0xe0 [ 151.632953][ T9323] __shmem_file_setup+0x1a2/0x280 [ 151.637999][ T9323] shmem_file_setup+0x2f/0x40 [ 151.642664][ T9323] __se_sys_memfd_create+0x215/0x3e0 [ 151.647931][ T9323] __x64_sys_memfd_create+0x5b/0x70 [ 151.653233][ T9323] do_syscall_64+0xc0/0x100 [ 151.657718][ T9323] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 151.663636][ T9323] RIP: 0033:0x45b349 [ 151.667515][ T9323] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 151.687796][ T9323] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 151.696182][ T9323] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 [ 151.704130][ T9323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 15:47:19 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 151.712081][ T9323] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 151.720024][ T9323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 151.727976][ T9323] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000004 15:47:19 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000100)={'raw\x00'}, &(0x7f0000000180)=0x54) syz_read_part_table(0x80044, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffff8500e931190000000000004000ffffffbf000000e100000088770072003007000500000000000000008000da55aa", 0x40, 0x1c0}]) 15:47:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x500) [ 151.769199][ T9323] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 151.803935][ T9341] SELinux: ebitmap: truncated map [ 151.813302][ T9341] SELinux: failed to load policy 15:47:19 executing program 5 (fault-call:2 fault-nth:5): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x600) 15:47:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8c037cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 151.871224][ T9345] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 151.899867][ T9358] SELinux: ebitmap: truncated map [ 151.905461][ T9358] SELinux: failed to load policy [ 151.963144][ T9361] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 151.971377][ T9371] FAULT_INJECTION: forcing a failure. [ 151.971377][ T9371] name failslab, interval 1, probability 0, space 0, times 0 [ 151.985062][ T9371] CPU: 0 PID: 9371 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 151.995135][ T9371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.005181][ T9371] Call Trace: [ 152.008471][ T9371] dump_stack+0x1b0/0x228 [ 152.012820][ T9371] ? devkmsg_release+0x127/0x127 [ 152.017750][ T9371] ? show_regs_print_info+0x18/0x18 [ 152.022929][ T9371] ? new_inode+0x28/0x1c0 [ 152.027239][ T9371] ? shmem_get_inode+0x114/0x690 [ 152.032157][ T9371] should_fail+0x6fb/0x860 [ 152.036552][ T9371] ? setup_fault_attr+0x2b0/0x2b0 [ 152.041567][ T9371] ? _raw_spin_unlock+0x9/0x20 [ 152.046474][ T9371] ? inode_doinit_with_dentry+0x782/0x10e0 [ 152.052363][ T9371] __should_failslab+0x11a/0x160 [ 152.057294][ T9371] ? __alloc_file+0x29/0x3b0 [ 152.061877][ T9371] should_failslab+0x9/0x20 [ 152.066374][ T9371] kmem_cache_alloc+0x37/0x2b0 [ 152.071130][ T9371] ? _raw_spin_trylock_bh+0x190/0x190 [ 152.076499][ T9371] __alloc_file+0x29/0x3b0 [ 152.080896][ T9371] ? alloc_empty_file+0x4c/0x1b0 [ 152.085826][ T9371] alloc_empty_file+0xac/0x1b0 [ 152.090569][ T9371] alloc_file+0x5b/0x4b0 [ 152.094808][ T9371] ? _raw_spin_unlock+0x9/0x20 [ 152.099571][ T9371] alloc_file_pseudo+0x25b/0x310 [ 152.104502][ T9371] ? alloc_empty_file_noaccount+0x80/0x80 [ 152.110320][ T9371] ? __kasan_check_write+0x14/0x20 [ 152.115406][ T9371] ? clear_nlink+0x87/0xe0 [ 152.119800][ T9371] __shmem_file_setup+0x1a2/0x280 [ 152.124827][ T9371] shmem_file_setup+0x2f/0x40 [ 152.129494][ T9371] __se_sys_memfd_create+0x215/0x3e0 [ 152.134772][ T9371] __x64_sys_memfd_create+0x5b/0x70 [ 152.139961][ T9371] do_syscall_64+0xc0/0x100 [ 152.144456][ T9371] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.150331][ T9371] RIP: 0033:0x45b349 [ 152.154201][ T9371] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.173932][ T9371] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 152.182348][ T9371] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 [ 152.190400][ T9371] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 152.198364][ T9371] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 [ 152.206325][ T9371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 15:47:19 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000000a45204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:19 executing program 5 (fault-call:2 fault-nth:6): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 152.214300][ T9371] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000005 [ 152.222669][ T9375] SELinux: policydb magic number 0xf97c038c does not match expected magic number 0xf97cff8c [ 152.234932][ T9375] SELinux: failed to load policy [ 152.301588][ T9373] loop4: p1 p2 < > p3 p4 < p5 p6 > [ 152.306945][ T9373] loop4: p1 size 11290111 extends beyond EOD, truncated [ 152.327116][ T9373] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 152.337832][ T9373] loop4: p5 size 11290111 extends beyond EOD, truncated [ 152.345647][ T9389] SELinux: policydb string [ 152.345647][ T9389] E Linux does not match my string SE Linux [ 152.357423][ T9373] loop4: p6 size 1912633224 extends beyond EOD, truncated [ 152.365125][ T9390] FAULT_INJECTION: forcing a failure. [ 152.365125][ T9390] name failslab, interval 1, probability 0, space 0, times 0 [ 152.365562][ T9389] SELinux: failed to load policy [ 152.383386][ T9390] CPU: 0 PID: 9390 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 15:47:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x700) 15:47:19 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 152.393547][ T9390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 152.403703][ T9390] Call Trace: [ 152.407005][ T9390] dump_stack+0x1b0/0x228 [ 152.411338][ T9390] ? devkmsg_release+0x127/0x127 [ 152.416276][ T9390] ? alloc_file_pseudo+0x128/0x310 [ 152.421400][ T9390] ? show_regs_print_info+0x18/0x18 [ 152.426692][ T9390] should_fail+0x6fb/0x860 [ 152.431111][ T9390] ? setup_fault_attr+0x2b0/0x2b0 [ 152.436149][ T9390] ? should_fail+0x182/0x860 [ 152.440745][ T9390] ? setup_fault_attr+0x2b0/0x2b0 [ 152.445763][ T9390] __should_failslab+0x11a/0x160 [ 152.450693][ T9390] ? security_file_alloc+0x36/0x210 [ 152.455890][ T9390] should_failslab+0x9/0x20 [ 152.460395][ T9390] kmem_cache_alloc+0x37/0x2b0 [ 152.465160][ T9390] security_file_alloc+0x36/0x210 [ 152.470182][ T9390] __alloc_file+0xd2/0x3b0 [ 152.474599][ T9390] alloc_empty_file+0xac/0x1b0 [ 152.479373][ T9390] alloc_file+0x5b/0x4b0 [ 152.483608][ T9390] ? _raw_spin_unlock+0x9/0x20 [ 152.488403][ T9390] alloc_file_pseudo+0x25b/0x310 [ 152.493332][ T9390] ? alloc_empty_file_noaccount+0x80/0x80 [ 152.499042][ T9390] ? __kasan_check_write+0x14/0x20 [ 152.504252][ T9390] ? clear_nlink+0x87/0xe0 [ 152.508661][ T9390] __shmem_file_setup+0x1a2/0x280 [ 152.513701][ T9390] shmem_file_setup+0x2f/0x40 [ 152.518395][ T9390] __se_sys_memfd_create+0x215/0x3e0 [ 152.523678][ T9390] __x64_sys_memfd_create+0x5b/0x70 [ 152.528885][ T9390] do_syscall_64+0xc0/0x100 [ 152.533402][ T9390] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 152.539310][ T9390] RIP: 0033:0x45b349 [ 152.543198][ T9390] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 152.562814][ T9390] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 152.571426][ T9390] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b349 [ 152.579681][ T9390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004c03f8 [ 152.587638][ T9390] RBP: 000000000075bf20 R08: 00000000038028b8 R09: 0000000000000001 15:47:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000002545204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 152.595685][ T9390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 152.603664][ T9390] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000006 [ 152.634674][ T22] kauditd_printk_skb: 188 callbacks suppressed [ 152.634683][ T22] audit: type=1326 audit(1580485640.116:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 152.671137][ T9396] print_req_error: 23 callbacks suppressed [ 152.671148][ T9396] blk_update_request: I/O error, dev loop4, sector 10 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 152.675727][ T9399] blk_update_request: I/O error, dev loop4, sector 225 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 15:47:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x900) [ 152.683518][ T183] blk_update_request: I/O error, dev loop4, sector 10 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 152.701534][ T22] audit: type=1326 audit(1580485640.116:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 152.713465][ T183] buffer_io_error: 20 callbacks suppressed [ 152.713471][ T183] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 152.753426][ T183] blk_update_request: I/O error, dev loop4, sector 225 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 152.763920][ T22] audit: type=1326 audit(1580485640.116:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 152.764646][ T183] Buffer I/O error on dev loop4p6, logical block 0, async page read [ 152.794868][ T9412] SELinux: policydb string %E Linux does not match my string SE Linux [ 152.799855][ T183] blk_update_request: I/O error, dev loop4, sector 12 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 152.809576][ T9412] SELinux: failed to load policy [ 152.819327][ T183] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 152.831132][ T22] audit: type=1326 audit(1580485640.116:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 152.834130][ T183] blk_update_request: I/O error, dev loop4, sector 14 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 152.864897][ T22] audit: type=1326 audit(1580485640.126:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 152.877221][ T183] Buffer I/O error on dev loop4p1, logical block 2, async page read [ 152.904400][ T22] audit: type=1326 audit(1580485640.126:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 152.911339][ T183] blk_update_request: I/O error, dev loop4, sector 16 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 152.937141][ T22] audit: type=1326 audit(1580485640.126:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 152.947689][ T183] Buffer I/O error on dev loop4p1, logical block 3, async page read [ 152.973518][ T22] audit: type=1326 audit(1580485640.126:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 152.981092][ T183] blk_update_request: I/O error, dev loop4, sector 226 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 153.008299][ T22] audit: type=1326 audit(1580485640.126:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=72 compat=0 ip=0x45b349 code=0x7ffc0000 [ 153.017589][ T183] Buffer I/O error on dev loop4p6, logical block 1, async page read [ 153.043268][ T22] audit: type=1326 audit(1580485640.126:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9393 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 153.050942][ T183] blk_update_request: I/O error, dev loop4, sector 227 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 153.087365][ T183] Buffer I/O error on dev loop4p6, logical block 2, async page read [ 153.095464][ T183] blk_update_request: I/O error, dev loop4, sector 228 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 153.106587][ T183] Buffer I/O error on dev loop4p6, logical block 3, async page read [ 153.114665][ T183] Buffer I/O error on dev loop4p6, logical block 4, async page read [ 153.122798][ T183] Buffer I/O error on dev loop4p6, logical block 5, async page read 15:47:20 executing program 5 (fault-call:2 fault-nth:7): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000280)) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', r10}) r12 = socket$unix(0x1, 0x2, 0x0) r13 = fcntl$dupfd(r12, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r13, 0x0, 0x11, &(0x7f00000012c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000013c0)=0xe8) r15 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) getsockname$packet(r17, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r15, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="3800000013000100"/20, @ANYRES32=r18, @ANYBLOB="0000418010000900"/24], 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001400)={'team0\x00', 0x0}) r20 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = dup(r21) getsockname$packet(r22, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r20, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001480)={0x0, @tipc=@nameseq={0x1e, 0x1, 0x1, {0x43, 0x1}}, @l2tp={0x2, 0x0, @broadcast, 0x1}, @xdp={0x2c, 0x2, r23, 0x1e}, 0x3f, 0x0, 0x0, 0x0, 0x9, &(0x7f0000001440)='ip6tnl0\x00', 0x1f, 0xf78, 0x6}) getsockname$packet(r0, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001540)=0x14) r26 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r28 = dup(r27) getsockname$packet(r28, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r26, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r29}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001880)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001840)={&(0x7f00000004c0)={0x294, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r5}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xd3}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x43be}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r14}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r25}}}]}}, {{0x8, 0x1, r29}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}]}}]}, 0x294}, 0x1, 0x0, 0x0, 0x85}, 0x4000) getdents64(r0, &(0x7f00000000c0)=""/183, 0xb7) 15:47:20 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080200005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 153.152373][ T9373] __loop_clr_fd: partition scan of loop4 failed (rc=-16) 15:47:20 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=@setlink={0x38, 0x13, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_VFINFO_LIST={0x18, 0x16, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0x10, 0x9}]}]}]}, 0x38}}, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x7, 0x5}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x5, &(0x7f0000000080)=@raw=[@generic={0x81, 0xb, 0x7, 0x1, 0x9}, @exit, @map={0x18, 0x7, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x4f}], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x3, [], r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xbc72c58b}, 0x10, 0x0, r7}, 0x78) [ 153.195015][ T9406] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 153.222386][ T9420] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 15:47:20 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xa00) [ 153.271298][ T9428] SELinux: policydb string length 520 does not match expected length 8 [ 153.289746][ T9429] FAULT_INJECTION: forcing a failure. [ 153.289746][ T9429] name failslab, interval 1, probability 0, space 0, times 0 [ 153.294484][ T9433] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 153.314816][ T9428] SELinux: failed to load policy [ 153.328121][ T9429] CPU: 1 PID: 9429 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 153.338306][ T9429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.348352][ T9429] Call Trace: [ 153.351692][ T9429] dump_stack+0x1b0/0x228 [ 153.356112][ T9429] ? devkmsg_release+0x127/0x127 [ 153.361044][ T9429] ? show_regs_print_info+0x18/0x18 [ 153.366221][ T9429] ? memset+0x31/0x40 [ 153.370187][ T9429] should_fail+0x6fb/0x860 [ 153.374592][ T9429] ? setup_fault_attr+0x2b0/0x2b0 [ 153.379608][ T9429] ? __fsnotify_parent+0x300/0x300 [ 153.384703][ T9429] __should_failslab+0x11a/0x160 [ 153.389728][ T9429] ? getname_flags+0xba/0x640 [ 153.394387][ T9429] should_failslab+0x9/0x20 [ 153.398879][ T9429] kmem_cache_alloc+0x37/0x2b0 [ 153.403663][ T9429] getname_flags+0xba/0x640 [ 153.408169][ T9429] getname+0x19/0x20 [ 153.412062][ T9429] do_sys_open+0x32a/0x7a0 [ 153.416476][ T9429] ? file_open_root+0x440/0x440 [ 153.421307][ T9429] ? __kasan_check_read+0x11/0x20 [ 153.426312][ T9429] __x64_sys_open+0x87/0x90 [ 153.430798][ T9429] do_syscall_64+0xc0/0x100 [ 153.435299][ T9429] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 153.441219][ T9429] RIP: 0033:0x4150e1 [ 153.445090][ T9429] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 153.464672][ T9429] RSP: 002b:00007fa4f22dba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 15:47:21 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x72, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)=""/114}, &(0x7f0000000140)=0x78) r3 = dup(r0) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getitimer(0x1, &(0x7f0000000180)) 15:47:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RREADDIR(r5, &(0x7f0000000040)={0x2a, 0x29, 0x1, {0x1, [{{0x4, 0x4, 0x6}, 0x3, 0xff, 0x7, './file0'}]}}, 0x2a) r6 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0300580010002c00000060d2b402ac6f3a0000000000000000000000000001000000ff020000000000000000000000000001040000000000000000000000000000007c0f897c00"/98], 0xfdef) [ 153.473109][ T9429] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 00000000004150e1 [ 153.481064][ T9429] RDX: 00007fa4f22dbb0a RSI: 0000000000000002 RDI: 00007fa4f22dbb00 [ 153.489074][ T9429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 153.497054][ T9429] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 153.505021][ T9429] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000007 15:47:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080300005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:21 executing program 5 (fault-call:2 fault-nth:8): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xb00) 15:47:21 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x0, 'veth1_virt_wifi\x00', {0x3}, 0x800}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000480000000000e1ff95000000000000002ba7e1d30cb599e83f24a3aa81d36bb3019c13bd23212fb56f040026fbfefc41056bd8174b7960317142fa9ea41d8123741c4e345c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404000000c788b277beee1cbf9b0a4def23d410f6accd3641110bec4e90a6341965c39e9ef8f6e3968f200e011ea665c45a3449abe802f5ab3e89cf6c662ed4148d3b3e22278d00031e5388ee5c867de2c6211d6ececb0cd2b6d357b8580218ce740068720000074e468ee23fd2f73902ebcfcf49822775985bf31b405b433a8acd715f5888b2007f00000000000000000100000000000000000006a10f58fa64533500000000000000000000000031000000000000000000e75a89faff01210cce39bf405f1e846c12423a164a33e680846f26dc7add65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d617de7a6520655a80d608df4d431623c850af895abba14f6fbd7fb5e2a431ab9142f3a06d54740a46792cbf4609646b6c5c29647d2f900"/434], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x2, 0xe, 0x0, &(0x7f0000001140)="afa55ea5081d1dc7610da2290f9e", 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 153.551995][ T9442] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 153.568401][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 153.623463][ T9464] SELinux: policydb string length 776 does not match expected length 8 [ 153.636311][ T9462] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 153.644334][ T9467] FAULT_INJECTION: forcing a failure. [ 153.644334][ T9467] name failslab, interval 1, probability 0, space 0, times 0 [ 153.646712][ T9464] SELinux: failed to load policy [ 153.658044][ T9467] CPU: 1 PID: 9467 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 15:47:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080400005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 153.663461][ T9451] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 153.672202][ T9467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 153.672207][ T9467] Call Trace: [ 153.672228][ T9467] dump_stack+0x1b0/0x228 [ 153.672238][ T9467] ? devkmsg_release+0x127/0x127 [ 153.672246][ T9467] ? show_regs_print_info+0x18/0x18 [ 153.672257][ T9467] should_fail+0x6fb/0x860 [ 153.672265][ T9467] ? setup_fault_attr+0x2b0/0x2b0 [ 153.672272][ T9467] ? __rcu_read_lock+0x50/0x50 [ 153.672282][ T9467] __should_failslab+0x11a/0x160 [ 153.672289][ T9467] ? __alloc_file+0x29/0x3b0 [ 153.672296][ T9467] should_failslab+0x9/0x20 [ 153.672305][ T9467] kmem_cache_alloc+0x37/0x2b0 [ 153.672313][ T9467] ? is_bpf_text_address+0x2c8/0x2e0 [ 153.672319][ T9467] __alloc_file+0x29/0x3b0 [ 153.672325][ T9467] ? alloc_empty_file+0x4c/0x1b0 [ 153.672332][ T9467] alloc_empty_file+0xac/0x1b0 [ 153.672340][ T9467] path_openat+0x122/0x3c00 [ 153.672346][ T9467] ? stack_trace_save+0x111/0x1e0 [ 153.672359][ T9467] ? stack_trace_snprint+0x150/0x150 [ 153.774436][ T9467] ? unwind_get_return_address+0x4c/0x90 [ 153.780054][ T9467] ? __kasan_kmalloc+0x179/0x1b0 [ 153.784970][ T9467] ? do_filp_open+0x430/0x430 [ 153.789631][ T9467] ? getname_flags+0xba/0x640 [ 153.794313][ T9467] ? getname+0x19/0x20 [ 153.798384][ T9467] ? do_sys_open+0x32a/0x7a0 [ 153.803086][ T9467] ? __x64_sys_open+0x87/0x90 [ 153.807741][ T9467] ? do_syscall_64+0xc0/0x100 [ 153.812409][ T9467] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 153.818455][ T9467] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 153.823805][ T9467] ? should_fail+0x182/0x860 [ 153.828388][ T9467] ? memset+0x31/0x40 [ 153.832351][ T9467] ? fsnotify+0x1389/0x1450 [ 153.836853][ T9467] ? expand_files+0xd1/0x970 [ 153.841428][ T9467] do_filp_open+0x1f7/0x430 [ 153.845914][ T9467] ? vfs_tmpfile+0x230/0x230 [ 153.850483][ T9467] ? __kasan_check_write+0x14/0x20 [ 153.855569][ T9467] ? _raw_spin_lock+0xa1/0x170 [ 153.860311][ T9467] ? _raw_spin_trylock_bh+0x190/0x190 [ 153.865659][ T9467] ? __kasan_check_read+0x11/0x20 [ 153.870660][ T9467] ? __check_object_size+0x309/0x3d0 [ 153.875923][ T9467] ? _raw_spin_unlock+0x9/0x20 [ 153.880667][ T9467] ? get_unused_fd_flags+0x97/0xb0 [ 153.885795][ T9467] do_sys_open+0x36f/0x7a0 [ 153.890209][ T9467] ? file_open_root+0x440/0x440 [ 153.895075][ T9467] ? __kasan_check_read+0x11/0x20 [ 153.900098][ T9467] __x64_sys_open+0x87/0x90 [ 153.904601][ T9467] do_syscall_64+0xc0/0x100 [ 153.909104][ T9467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 153.914982][ T9467] RIP: 0033:0x4150e1 [ 153.918879][ T9467] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 153.938464][ T9467] RSP: 002b:00007fa4f22dba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 153.946860][ T9467] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 00000000004150e1 [ 153.954812][ T9467] RDX: 00007fa4f22dbb0a RSI: 0000000000000002 RDI: 00007fa4f22dbb00 [ 153.962763][ T9467] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 15:47:21 executing program 5 (fault-call:2 fault-nth:9): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xc00) 15:47:21 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 153.970713][ T9467] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 153.978684][ T9467] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000008 15:47:21 executing program 3: r0 = add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="570c3d1e8de06c5e1169c9cccac18291322f44687d74daf90bfef708c526", 0x1e, 0xfffffffffffffffc) keyctl$revoke(0x3, r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'cpu'}]}, 0x5) 15:47:21 executing program 4: syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000000)={0x64, 0x3, [0x3ff, 0x8001, 0x4, 0x8, 0x81], 0x4}) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mmap(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mremap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2002, 0x3, &(0x7f0000009000/0x2000)=nil) 15:47:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xd00) 15:47:21 executing program 3: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 154.063302][ T9487] SELinux: policydb string length 1032 does not match expected length 8 [ 154.081708][ T9486] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 154.101823][ T9487] SELinux: failed to load policy 15:47:21 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080500005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:21 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$netlink(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="5500000018007f5f00fe01b2a4a29093020600000000ff", 0x17}], 0x1}, 0x800) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffdd, 0x0) [ 154.117662][ T9500] FAULT_INJECTION: forcing a failure. [ 154.117662][ T9500] name failslab, interval 1, probability 0, space 0, times 0 [ 154.130761][ T9500] CPU: 1 PID: 9500 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 154.140827][ T9500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.150872][ T9500] Call Trace: [ 154.154153][ T9500] dump_stack+0x1b0/0x228 [ 154.158471][ T9500] ? devkmsg_release+0x127/0x127 [ 154.163412][ T9500] ? show_regs_print_info+0x18/0x18 [ 154.168610][ T9500] should_fail+0x6fb/0x860 [ 154.173025][ T9500] ? setup_fault_attr+0x2b0/0x2b0 [ 154.178035][ T9500] ? should_fail+0x182/0x860 [ 154.182625][ T9500] ? __read_once_size_nocheck+0x10/0x10 [ 154.188152][ T9500] ? unwind_next_frame+0x415/0x870 [ 154.193268][ T9500] ? setup_fault_attr+0x2b0/0x2b0 [ 154.198286][ T9500] __should_failslab+0x11a/0x160 [ 154.203223][ T9500] ? security_file_alloc+0x36/0x210 [ 154.209369][ T9500] should_failslab+0x9/0x20 [ 154.214142][ T9500] kmem_cache_alloc+0x37/0x2b0 [ 154.221631][ T9500] security_file_alloc+0x36/0x210 [ 154.227019][ T9500] __alloc_file+0xd2/0x3b0 [ 154.231607][ T9500] alloc_empty_file+0xac/0x1b0 [ 154.236897][ T9500] path_openat+0x122/0x3c00 [ 154.241411][ T9500] ? stack_trace_save+0x111/0x1e0 [ 154.246442][ T9500] ? stack_trace_snprint+0x150/0x150 [ 154.253152][ T9500] ? unwind_get_return_address+0x4c/0x90 [ 154.259489][ T9500] ? __kasan_kmalloc+0x179/0x1b0 [ 154.264416][ T9500] ? do_filp_open+0x430/0x430 [ 154.269104][ T9500] ? getname_flags+0xba/0x640 [ 154.274454][ T9500] ? getname+0x19/0x20 [ 154.278698][ T9500] ? do_sys_open+0x32a/0x7a0 [ 154.287994][ T9500] ? __x64_sys_open+0x87/0x90 [ 154.292776][ T9500] ? do_syscall_64+0xc0/0x100 [ 154.297715][ T9500] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 154.305526][ T9500] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 154.310901][ T9500] ? should_fail+0x182/0x860 [ 154.315585][ T9500] ? memset+0x31/0x40 [ 154.319920][ T9500] ? fsnotify+0x1389/0x1450 [ 154.324438][ T9500] ? expand_files+0xd1/0x970 [ 154.329272][ T9500] do_filp_open+0x1f7/0x430 [ 154.334373][ T9500] ? vfs_tmpfile+0x230/0x230 [ 154.341835][ T9500] ? __kasan_check_write+0x14/0x20 [ 154.347239][ T9500] ? _raw_spin_lock+0xa1/0x170 [ 154.351999][ T9500] ? _raw_spin_trylock_bh+0x190/0x190 [ 154.357446][ T9500] ? __kasan_check_read+0x11/0x20 [ 154.362640][ T9500] ? __check_object_size+0x309/0x3d0 [ 154.367986][ T9500] ? _raw_spin_unlock+0x9/0x20 [ 154.372854][ T9500] ? get_unused_fd_flags+0x97/0xb0 [ 154.377949][ T9500] do_sys_open+0x36f/0x7a0 [ 154.382367][ T9500] ? file_open_root+0x440/0x440 [ 154.388498][ T9500] ? __kasan_check_read+0x11/0x20 [ 154.393497][ T9500] __x64_sys_open+0x87/0x90 [ 154.397972][ T9500] do_syscall_64+0xc0/0x100 [ 154.402579][ T9500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 154.408464][ T9500] RIP: 0033:0x4150e1 [ 154.412347][ T9500] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 154.431941][ T9500] RSP: 002b:00007fa4f22dba60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 154.440355][ T9500] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 00000000004150e1 [ 154.448317][ T9500] RDX: 00007fa4f22dbb0a RSI: 0000000000000002 RDI: 00007fa4f22dbb00 [ 154.456274][ T9500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a 15:47:21 executing program 5 (fault-call:2 fault-nth:10): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 154.464233][ T9500] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 154.472181][ T9500] R13: 0000000000000b9e R14: 00000000004cc70a R15: 0000000000000009 15:47:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xe00) [ 154.512585][ T9505] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 154.548645][ T9521] SELinux: policydb string length 1288 does not match expected length 8 [ 154.558073][ T9521] SELinux: failed to load policy [ 154.560550][ T9513] FAULT_INJECTION: forcing a failure. [ 154.560550][ T9513] name failslab, interval 1, probability 0, space 0, times 0 [ 154.576405][ T9513] CPU: 1 PID: 9513 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 154.586478][ T9513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 154.596519][ T9513] Call Trace: [ 154.599800][ T9513] dump_stack+0x1b0/0x228 [ 154.604109][ T9513] ? devkmsg_release+0x127/0x127 [ 154.609046][ T9513] ? show_regs_print_info+0x18/0x18 [ 154.614252][ T9513] ? __kasan_check_read+0x11/0x20 [ 154.619276][ T9513] ? update_curr+0x176/0x8c0 [ 154.623858][ T9513] should_fail+0x6fb/0x860 [ 154.628283][ T9513] ? setup_fault_attr+0x2b0/0x2b0 [ 154.633301][ T9513] ? __kasan_check_write+0x14/0x20 [ 154.638396][ T9513] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 154.644027][ T9513] __should_failslab+0x11a/0x160 [ 154.648943][ T9513] ? __kthread_create_on_node+0x142/0x470 [ 154.654738][ T9513] should_failslab+0x9/0x20 [ 154.659241][ T9513] kmem_cache_alloc_trace+0x3a/0x2f0 [ 154.664503][ T9513] ? __kasan_check_write+0x14/0x20 [ 154.669607][ T9513] ? loop_set_fd+0x1280/0x1280 [ 154.674363][ T9513] __kthread_create_on_node+0x142/0x470 [ 154.679895][ T9513] ? kthread_create_on_node+0x110/0x110 [ 154.685437][ T9513] ? _raw_spin_unlock+0x9/0x20 [ 154.690179][ T9513] ? bd_start_claiming+0x469/0x550 [ 154.695271][ T9513] ? loop_set_fd+0x1280/0x1280 [ 154.700117][ T9513] kthread_create_on_node+0xc6/0x110 [ 154.705420][ T9513] ? tsk_fork_get_node+0x10/0x10 [ 154.710346][ T9513] ? mutex_lock_killable+0x10a/0x120 [ 154.715614][ T9513] ? unwind_next_frame+0x415/0x870 [ 154.720732][ T9513] ? memset+0x31/0x40 [ 154.724710][ T9513] loop_set_fd+0x69d/0x1280 [ 154.729207][ T9513] lo_ioctl+0x17a/0x2340 [ 154.733442][ T9513] ? lo_release+0x1f0/0x1f0 [ 154.737929][ T9513] ? enqueue_task_fair+0x2255/0x24a0 [ 154.743201][ T9513] ? check_preempt_wakeup+0x56a/0xba0 [ 154.748561][ T9513] ? __kasan_check_read+0x11/0x20 [ 154.753578][ T9513] ? ttwu_do_wakeup+0x1dc/0x5d0 [ 154.758431][ T9513] ? __kasan_check_read+0x11/0x20 [ 154.763484][ T9513] ? try_to_wake_up+0x1615/0x2190 [ 154.768510][ T9513] ? cpus_share_cache+0xd0/0xd0 [ 154.773342][ T9513] ? __kasan_check_write+0x14/0x20 [ 154.778538][ T9513] ? _raw_spin_lock+0xa1/0x170 [ 154.783399][ T9513] ? _raw_spin_trylock_bh+0x190/0x190 [ 154.788759][ T9513] ? wake_up_q+0x84/0xb0 [ 154.792992][ T9513] ? __mutex_unlock_slowpath+0x219/0x260 [ 154.798619][ T9513] ? mutex_unlock+0x40/0x40 [ 154.803108][ T9513] ? down_write+0xd8/0x150 [ 154.807504][ T9513] ? up_read+0x10/0x10 [ 154.811579][ T9513] ? disk_unblock_events+0x51/0x60 [ 154.816687][ T9513] ? __blkdev_get+0x125b/0x1b40 [ 154.821535][ T9513] ? __read_once_size_nocheck+0x10/0x10 [ 154.827096][ T9513] ? unwind_next_frame+0x415/0x870 [ 154.832186][ T9513] ? __rcu_read_lock+0x50/0x50 [ 154.836936][ T9513] ? unwind_next_frame+0x415/0x870 [ 154.842053][ T9513] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 154.848033][ T9513] ? is_bpf_text_address+0x2c8/0x2e0 [ 154.853297][ T9513] ? lo_release+0x1f0/0x1f0 [ 154.857780][ T9513] blkdev_ioctl+0x89a/0x2c30 [ 154.862366][ T9513] ? __kernel_text_address+0x9a/0x110 [ 154.867747][ T9513] ? unwind_get_return_address+0x4c/0x90 [ 154.873376][ T9513] ? arch_stack_walk+0x98/0xe0 [ 154.878144][ T9513] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 154.883426][ T9513] ? __rcu_read_lock+0x50/0x50 [ 154.888188][ T9513] ? stack_trace_save+0x111/0x1e0 [ 154.893217][ T9513] ? avc_has_extended_perms+0xb27/0x10d0 [ 154.898846][ T9513] ? __kasan_slab_free+0x1e2/0x220 [ 154.903949][ T9513] ? __kasan_slab_free+0x168/0x220 [ 154.909038][ T9513] ? kasan_slab_free+0xe/0x10 [ 154.913711][ T9513] ? kmem_cache_free+0x181/0x7a0 [ 154.918628][ T9513] ? avc_ss_reset+0x3e0/0x3e0 [ 154.923297][ T9513] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 154.929363][ T9513] ? should_fail+0x182/0x860 [ 154.933946][ T9513] ? memset+0x31/0x40 [ 154.937916][ T9513] ? fsnotify+0x1389/0x1450 [ 154.942414][ T9513] ? expand_files+0xd1/0x970 [ 154.947007][ T9513] ? do_filp_open+0x2e1/0x430 [ 154.951678][ T9513] ? memset+0x31/0x40 [ 154.955655][ T9513] block_ioctl+0xbd/0x100 [ 154.959988][ T9513] ? blkdev_iopoll+0x100/0x100 [ 154.964740][ T9513] do_vfs_ioctl+0x747/0x1700 [ 154.969336][ T9513] ? selinux_file_ioctl+0x6e6/0x930 [ 154.974964][ T9513] ? ioctl_preallocate+0x240/0x240 [ 154.980180][ T9513] ? __fget+0x37c/0x3c0 [ 154.984328][ T9513] ? __kasan_check_write+0x14/0x20 [ 154.989436][ T9513] ? fget_many+0x30/0x30 [ 154.993688][ T9513] ? security_file_ioctl+0xae/0xd0 [ 154.998804][ T9513] __x64_sys_ioctl+0xe3/0x120 [ 155.003475][ T9513] do_syscall_64+0xc0/0x100 [ 155.007990][ T9513] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 155.013871][ T9513] RIP: 0033:0x45b1b7 [ 155.017754][ T9513] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.037438][ T9513] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 155.045847][ T9513] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7 [ 155.053823][ T9513] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 15:47:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080600005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 155.061807][ T9513] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 155.069781][ T9513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 155.077757][ T9513] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000a [ 155.087125][ T9523] selinux_nlmsg_perm: 86 callbacks suppressed [ 155.087134][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 15:47:22 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 155.118287][ T9516] EXT4-fs (loop3): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 155.134714][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 15:47:22 executing program 5 (fault-call:2 fault-nth:11): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 155.156372][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.171770][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.185051][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.209462][ T9535] SELinux: policydb string length 1544 does not match expected length 8 15:47:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x1100) 15:47:22 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080700005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 155.223490][ T9533] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 155.237917][ T9541] FAULT_INJECTION: forcing a failure. [ 155.237917][ T9541] name failslab, interval 1, probability 0, space 0, times 0 [ 155.253831][ T9541] CPU: 0 PID: 9541 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 155.263918][ T9541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:47:22 executing program 3: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) sched_getaffinity(r1, 0x8, &(0x7f0000000140)) syncfs(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.current\x00', 0x275a, 0x0) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYRESHEX=r3], 0x12) fallocate(r3, 0x8, 0x8000, 0x3) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) r4 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r4, 0x0, r4) sendfile(r2, r4, &(0x7f0000000040)=0x8, 0x7fffffff) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x3f}) [ 155.273968][ T9541] Call Trace: [ 155.277249][ T9541] dump_stack+0x1b0/0x228 [ 155.280620][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.281575][ T9541] ? devkmsg_release+0x127/0x127 [ 155.281587][ T9541] ? show_regs_print_info+0x18/0x18 [ 155.281597][ T9541] ? __perf_event_task_sched_in+0x4ed/0x550 [ 155.281604][ T9541] ? __kasan_check_read+0x11/0x20 [ 155.281613][ T9541] should_fail+0x6fb/0x860 [ 155.281622][ T9541] ? setup_fault_attr+0x2b0/0x2b0 [ 155.281639][ T9541] ? finish_task_switch+0x2fe/0x560 [ 155.295300][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.299253][ T9541] __should_failslab+0x11a/0x160 [ 155.299263][ T9541] ? __kernfs_new_node+0xdb/0x6e0 [ 155.299272][ T9541] should_failslab+0x9/0x20 [ 155.299280][ T9541] kmem_cache_alloc+0x37/0x2b0 [ 155.299288][ T9541] __kernfs_new_node+0xdb/0x6e0 [ 155.299300][ T9541] ? kernfs_new_node+0x170/0x170 [ 155.304791][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.310490][ T9541] ? __kasan_check_read+0x11/0x20 [ 155.310498][ T9541] ? preempt_schedule+0xeb/0x110 [ 155.310505][ T9541] ? schedule_preempt_disabled+0x20/0x20 [ 155.310514][ T9541] ? ___preempt_schedule+0x16/0x20 [ 155.310523][ T9541] kernfs_create_dir_ns+0x9b/0x230 [ 155.310532][ T9541] internal_create_group+0x234/0xe40 [ 155.310545][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.310551][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.310556][ T9541] ? down_write+0xd8/0x150 [ 155.310571][ T9541] ? sysfs_create_group+0x30/0x30 [ 155.315830][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.320036][ T9541] sysfs_create_group+0x1f/0x30 [ 155.320047][ T9541] loop_set_fd+0xdbd/0x1280 [ 155.320057][ T9541] lo_ioctl+0x17a/0x2340 [ 155.320065][ T9541] ? lo_release+0x1f0/0x1f0 [ 155.320076][ T9541] ? __read_once_size_nocheck+0x10/0x10 [ 155.320083][ T9541] ? unwind_next_frame+0x415/0x870 [ 155.320096][ T9541] ? __rcu_read_lock+0x50/0x50 [ 155.325314][ T9523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9523 comm=syz-executor.4 [ 155.330321][ T9541] ? unwind_next_frame+0x415/0x870 [ 155.330331][ T9541] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 155.330338][ T9541] ? stack_trace_save+0x1e0/0x1e0 [ 155.330347][ T9541] ? is_bpf_text_address+0x2c8/0x2e0 [ 155.330353][ T9541] ? stack_trace_save+0x1e0/0x1e0 [ 155.330361][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.330367][ T9541] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 155.330373][ T9541] ? kobj_kset_leave+0x3a0/0x3a0 [ 155.330386][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.330394][ T9541] ? mutex_lock+0xa6/0x110 [ 155.330408][ T9541] ? __module_put_and_exit+0x20/0x20 [ 155.553393][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.558487][ T9541] ? __up_read+0x6f/0x1b0 [ 155.562813][ T9541] ? disk_check_events+0x600/0x600 [ 155.567917][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.573034][ T9541] ? up_write+0xa1/0x190 [ 155.577412][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.582519][ T9541] ? down_write+0xd8/0x150 [ 155.586935][ T9541] ? up_read+0x10/0x10 [ 155.591016][ T9541] ? __kasan_check_write+0x14/0x20 [ 155.596128][ T9541] ? disk_unblock_events+0x51/0x60 [ 155.601226][ T9541] ? __blkdev_get+0x125b/0x1b40 [ 155.606196][ T9541] ? __read_once_size_nocheck+0x10/0x10 [ 155.611742][ T9541] ? unwind_next_frame+0x415/0x870 [ 155.616957][ T9541] ? __rcu_read_lock+0x50/0x50 [ 155.621695][ T9541] ? unwind_next_frame+0x415/0x870 [ 155.626780][ T9541] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 155.632748][ T9541] ? is_bpf_text_address+0x2c8/0x2e0 [ 155.638201][ T9541] ? lo_release+0x1f0/0x1f0 [ 155.642715][ T9541] blkdev_ioctl+0x89a/0x2c30 [ 155.647288][ T9541] ? __kernel_text_address+0x9a/0x110 [ 155.652649][ T9541] ? unwind_get_return_address+0x4c/0x90 [ 155.658310][ T9541] ? arch_stack_walk+0x98/0xe0 [ 155.663198][ T9541] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 155.668473][ T9541] ? __rcu_read_lock+0x50/0x50 [ 155.673226][ T9541] ? stack_trace_save+0x111/0x1e0 [ 155.678239][ T9541] ? avc_has_extended_perms+0xb27/0x10d0 [ 155.683859][ T9541] ? __kasan_slab_free+0x1e2/0x220 [ 155.688962][ T9541] ? __kasan_slab_free+0x168/0x220 [ 155.694071][ T9541] ? kasan_slab_free+0xe/0x10 [ 155.698747][ T9541] ? kmem_cache_free+0x181/0x7a0 [ 155.703684][ T9541] ? avc_ss_reset+0x3e0/0x3e0 [ 155.708369][ T9541] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 155.714430][ T9541] ? should_fail+0x182/0x860 [ 155.719006][ T9541] ? memset+0x31/0x40 [ 155.722974][ T9541] ? fsnotify+0x1389/0x1450 [ 155.727458][ T9541] ? expand_files+0xd1/0x970 [ 155.732038][ T9541] ? do_filp_open+0x2e1/0x430 [ 155.736800][ T9541] ? memset+0x31/0x40 [ 155.740770][ T9541] block_ioctl+0xbd/0x100 [ 155.745083][ T9541] ? blkdev_iopoll+0x100/0x100 [ 155.749844][ T9541] do_vfs_ioctl+0x747/0x1700 [ 155.754423][ T9541] ? selinux_file_ioctl+0x6e6/0x930 [ 155.759608][ T9541] ? ioctl_preallocate+0x240/0x240 [ 155.764776][ T9541] ? __fget+0x37c/0x3c0 [ 155.768966][ T9541] ? fget_many+0x30/0x30 [ 155.773224][ T9541] ? security_file_ioctl+0xae/0xd0 [ 155.778323][ T9541] __x64_sys_ioctl+0xe3/0x120 [ 155.783074][ T9541] do_syscall_64+0xc0/0x100 [ 155.787648][ T9541] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 155.793519][ T9541] RIP: 0033:0x45b1b7 [ 155.797395][ T9541] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 155.817263][ T9541] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 155.825663][ T9541] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7 [ 155.833621][ T9541] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 155.841580][ T9541] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 155.849787][ T9541] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 155.857749][ T9541] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000b 15:47:23 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) unlink(&(0x7f0000000080)='./bus/file0\x00') creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./bus/file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x2, 0x3, 0x401, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x11}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x200}]}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x4) 15:47:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080800005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 155.883607][ T9541] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 155.897542][ T9549] SELinux: policydb string length 1800 does not match expected length 8 15:47:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x1200) 15:47:23 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080900005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:23 executing program 5 (fault-call:2 fault-nth:12): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 155.969155][ T9559] SELinux: policydb string length 2056 does not match expected length 8 [ 155.995596][ T9552] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:47:23 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 156.018571][ T9563] SELinux: policydb magic number 0x30307830 does not match expected magic number 0xf97cff8c [ 156.031204][ T9571] overlayfs: upperdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. [ 156.046221][ T9571] overlayfs: workdir is in-use as upperdir/workdir of another mount, accessing files from both mounts will result in undefined behavior. 15:47:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x2500) [ 156.111168][ T9583] SELinux: policydb string length 2312 does not match expected length 8 [ 156.114138][ T9581] FAULT_INJECTION: forcing a failure. [ 156.114138][ T9581] name failslab, interval 1, probability 0, space 0, times 0 [ 156.133997][ T9581] CPU: 1 PID: 9581 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 156.144072][ T9581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.154237][ T9581] Call Trace: [ 156.157535][ T9581] dump_stack+0x1b0/0x228 [ 156.161871][ T9581] ? devkmsg_release+0x127/0x127 [ 156.166830][ T9581] ? show_regs_print_info+0x18/0x18 [ 156.172037][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.177243][ T9581] ? mutex_lock+0xa6/0x110 [ 156.181661][ T9581] ? mutex_trylock+0xb0/0xb0 [ 156.186364][ T9581] should_fail+0x6fb/0x860 [ 156.190850][ T9581] ? setup_fault_attr+0x2b0/0x2b0 [ 156.195936][ T9581] ? kernfs_xattr_get+0x80/0x90 [ 156.200816][ T9581] ? selinux_kernfs_init_security+0x10a/0x700 [ 156.206898][ T9581] __should_failslab+0x11a/0x160 [ 156.211828][ T9581] ? __kernfs_new_node+0xdb/0x6e0 [ 156.216959][ T9581] should_failslab+0x9/0x20 [ 156.221458][ T9581] kmem_cache_alloc+0x37/0x2b0 [ 156.226211][ T9581] ? idr_alloc+0x300/0x300 [ 156.230610][ T9581] __kernfs_new_node+0xdb/0x6e0 [ 156.235492][ T9581] ? kernfs_new_node+0x170/0x170 [ 156.240416][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.245507][ T9581] ? mutex_lock+0xa6/0x110 [ 156.249980][ T9581] ? mutex_trylock+0xb0/0xb0 [ 156.254560][ T9581] kernfs_new_node+0x97/0x170 [ 156.259219][ T9581] __kernfs_create_file+0x4a/0x270 [ 156.264314][ T9581] sysfs_add_file_mode_ns+0x274/0x320 [ 156.269677][ T9581] internal_create_group+0x511/0xe40 [ 156.274952][ T9581] ? down_write+0xd8/0x150 [ 156.279355][ T9581] ? sysfs_create_group+0x30/0x30 [ 156.284376][ T9581] ? _raw_spin_unlock_irqrestore+0x28/0x30 [ 156.290163][ T9581] sysfs_create_group+0x1f/0x30 [ 156.294997][ T9581] loop_set_fd+0xdbd/0x1280 [ 156.299484][ T9581] lo_ioctl+0x17a/0x2340 [ 156.303753][ T9581] ? lo_release+0x1f0/0x1f0 [ 156.308289][ T9581] ? __read_once_size_nocheck+0x10/0x10 [ 156.313849][ T9581] ? unwind_next_frame+0x415/0x870 [ 156.318977][ T9581] ? __rcu_read_lock+0x50/0x50 [ 156.323739][ T9581] ? unwind_next_frame+0x415/0x870 [ 156.328834][ T9581] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 156.334793][ T9581] ? stack_trace_save+0x1e0/0x1e0 [ 156.339805][ T9581] ? is_bpf_text_address+0x2c8/0x2e0 [ 156.345176][ T9581] ? stack_trace_save+0x1e0/0x1e0 [ 156.350172][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.355260][ T9581] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 156.360876][ T9581] ? kobj_kset_leave+0x3a0/0x3a0 [ 156.365896][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.370998][ T9581] ? mutex_lock+0xa6/0x110 [ 156.375694][ T9581] ? __module_put_and_exit+0x20/0x20 [ 156.381107][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.386225][ T9581] ? __up_read+0x6f/0x1b0 [ 156.390541][ T9581] ? disk_check_events+0x600/0x600 [ 156.395634][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.400739][ T9581] ? up_write+0xa1/0x190 [ 156.404969][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.410074][ T9581] ? down_write+0xd8/0x150 [ 156.414470][ T9581] ? up_read+0x10/0x10 [ 156.418520][ T9581] ? __kasan_check_write+0x14/0x20 [ 156.423635][ T9581] ? disk_unblock_events+0x51/0x60 [ 156.428735][ T9581] ? __blkdev_get+0x125b/0x1b40 [ 156.433596][ T9581] ? __read_once_size_nocheck+0x10/0x10 [ 156.439145][ T9581] ? unwind_next_frame+0x415/0x870 [ 156.444310][ T9581] ? __rcu_read_lock+0x50/0x50 [ 156.449061][ T9581] ? unwind_next_frame+0x415/0x870 [ 156.454159][ T9581] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 156.460238][ T9581] ? is_bpf_text_address+0x2c8/0x2e0 [ 156.465589][ T9581] ? lo_release+0x1f0/0x1f0 [ 156.470099][ T9581] blkdev_ioctl+0x89a/0x2c30 [ 156.474672][ T9581] ? __kernel_text_address+0x9a/0x110 [ 156.480020][ T9581] ? unwind_get_return_address+0x4c/0x90 [ 156.485635][ T9581] ? arch_stack_walk+0x98/0xe0 [ 156.490503][ T9581] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 156.495787][ T9581] ? __rcu_read_lock+0x50/0x50 [ 156.500551][ T9581] ? stack_trace_save+0x111/0x1e0 [ 156.505561][ T9581] ? avc_has_extended_perms+0xb27/0x10d0 [ 156.511177][ T9581] ? __kasan_slab_free+0x1e2/0x220 [ 156.516265][ T9581] ? __kasan_slab_free+0x168/0x220 [ 156.521351][ T9581] ? kasan_slab_free+0xe/0x10 [ 156.526008][ T9581] ? kmem_cache_free+0x181/0x7a0 [ 156.530927][ T9581] ? avc_ss_reset+0x3e0/0x3e0 [ 156.535583][ T9581] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 156.541654][ T9581] ? should_fail+0x182/0x860 [ 156.546238][ T9581] ? memset+0x31/0x40 [ 156.550210][ T9581] ? fsnotify+0x1389/0x1450 [ 156.554688][ T9581] ? expand_files+0xd1/0x970 [ 156.559258][ T9581] ? do_filp_open+0x2e1/0x430 [ 156.564036][ T9581] ? memset+0x31/0x40 [ 156.568016][ T9581] block_ioctl+0xbd/0x100 [ 156.572319][ T9581] ? blkdev_iopoll+0x100/0x100 [ 156.577068][ T9581] do_vfs_ioctl+0x747/0x1700 [ 156.581642][ T9581] ? selinux_file_ioctl+0x6e6/0x930 [ 156.586818][ T9581] ? ioctl_preallocate+0x240/0x240 [ 156.591908][ T9581] ? __fget+0x37c/0x3c0 [ 156.596091][ T9581] ? fget_many+0x30/0x30 [ 156.600321][ T9581] ? security_file_ioctl+0xae/0xd0 [ 156.605406][ T9581] __x64_sys_ioctl+0xe3/0x120 [ 156.610059][ T9581] do_syscall_64+0xc0/0x100 [ 156.614545][ T9581] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 156.620434][ T9581] RIP: 0033:0x45b1b7 [ 156.624328][ T9581] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 156.644008][ T9581] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 156.652428][ T9581] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7 15:47:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080a00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 156.660375][ T9581] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 156.668586][ T9581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 156.676540][ T9581] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 156.684492][ T9581] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000c [ 156.700447][ T9581] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:47:24 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x2}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000007580)}) r3 = openat$selinux_load(0xffffffffffffff9c, 0xffffffffffffffff, 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x14) signalfd4(r3, &(0x7f0000000040)={[0x7]}, 0x8, 0x80800) 15:47:24 executing program 5 (fault-call:2 fault-nth:13): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4000) [ 156.749897][ T9586] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 156.776358][ T9598] SELinux: policydb string length 2568 does not match expected length 8 [ 156.794234][ T9598] sel_write_load: 5 callbacks suppressed 15:47:24 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r3, &(0x7f0000000780)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="dec7befe35d129281f226501c4b9c6059a0cc79e171bff0b2ec19c7d0f6be9184a7d6d2102e84aeebdc55a3efb0a96de20d8224496c5e1d198a04b9a9827e70f1b6582c1919034dd15ae9c7e8f960a0067bd48be9213c66383dbee7575144febcdd3d82a2d37a602df9d2fcec3d60cc0446321cfdbcf2406e8034df243629d6a9db1c6c484d00832501afc1e320ccd46140e398843e774adca6c578e900a7162cc8ac5643dad7bcd21e2471463f86fbbaa9cabae9436fa16cf80a7eef4b0575758b2519b04cc42315e9c427722cf678901a2883d", 0xd4}, {&(0x7f0000000180)="91d76d5174d286b2738dd4bac704a76616b98bd78fb3ff711883786e9a7a8e6edbc7c8b51fac372ca2728fa5c37469d9f952ee50f66a7b98669d43109d1bafa11d2fcbac179d10d14f30bd4345c662af4a96478e32806d461ffba192948be47c6bdc2cff18e611414e457e1ff1508fd538c86583835281787d175449b761ca05dbff86ebfe82ead4a84aa6b501955fd0b5ff9da039f596f477d9b8c3aec07fee59d188f56a0475e1a10c90c44011c901df80f62fe9fc9006f10fbd007483781b55a3a9244a8db6cc067aa877511101f3515d0620c9b67510efe6f28147b38f83af9bc47a013b699061c2ff39eb505a", 0xef}, {&(0x7f0000000280)="66667e2c166bf3b262d76835fce64b508a2b9ae71e437b7a5986d3fa43522866024ae1", 0x23}], 0x3, &(0x7f0000000300)=[{0x18, 0x1, 0x0, "4cd3e520687a04a0"}, {0x70, 0x10c, 0xffffff80, "bd31f769175198c4192821550fa3dc6ee49fbfed15795e9dd66803effa5178990f9477773c43d31f3be05032a98153b6321da42427403a355801256d61847e43cb0bd3fe3636d6555744d5527f898af324fe6488afb849ef6fb41144"}, {0xc0, 0x1, 0x3ff, "3ef547d9c6970a6dac1f2cc6f0759a54017a2ed45b05f29b9980cb91c811e3a02256917f9105b75631033f27b3e198b634c3c2670a65d864762c4b7b96de0561dec3bf1dae7f5a91624cca923ed8472ad5c5e4cf15bb746179c27059aae0c98008a579275b383e2e36654da95ea6b565578ab3e1c9bb6ff01c95bd90dbec7a1dbc2fd51361229222545c4f6137dd8f2425a14b9ccd5e8a35a1e843afb63f9b056ee4dda3c37ddd2cba5a736e8be6b8"}, {0xd0, 0x1, 0x8637, "9c2bd12aaa22caf4a2b88e529b6c062a3cb4eba2b44eeaad37ef2f7efbd3c4d05e6cdca8e8a7e9e1ca5e7895b95bc968b2cf3cf29a55736d2e2ba722f0ab7b25c08999202cf8560a2eccdf004605ce9b1decffabdf87db65ab14764ad81e45ad02b6e99980992025eadb2b64ff044fe4498a61b776a049e05c0a9355b8ef3eaa9eb64000da79c3fd69358d6314cd85712dd27c3a96876ddd2d6eb363eb423497b4bae836658924e0debc54e16ff159553be7bb8fc6a5edabd45493d1e08a9737"}, {0xc0, 0xff, 0x1, "c14d22b6874650fc6903afb11cc6f1a541bd18d7519ca06ef1e624da37ec28ee4958074fc1dcccaa8fb8d1bb46d9bf63287d45860e55aa2a349c1f428459d248bbd3489cd23c7b8bd0e1d9ce97e148d532979e6f512793b6b88c91ed767bcc0958ca3fbc62087f749e68b0a75883dc261ca98c22731b0076e96514ef64164a9d0f47e2ddc0f4835d5f02231cf3a883c7dc7478bd41116e3d27dffb12315db9614694eefd4685e7370febbfedfba5"}, {0xe0, 0x114, 0x91fb, "1fd36a4f2f92b9409ef6f48e25f4111f45e192d43504ff2e7d2b50dd117281704d05e89b1bd390b232aa3208bb62653ae42ad27a55d4ac01b96b39db0912214536f3622a859711073d79cfcba87fa2670b6acb2f24ee999e4c654cb1db2dc2cc5f9c2083078e87ab162ae3cb44b6caf4eff36189670bc860faa2a64cb33431f9177f17ed998ecaeee4b50b0f81be50000b40c9c3655091d977beb7984800b6ed30ba736a2a8fe7ffa62fb6b7db59d82ebad50501aa410dee72a2a385e38245536ad56109e1761dfbae"}, {0xb8, 0x0, 0x1, "b7e36138179d5d2054880925ed109560121a77e07fe87ec65ae0dc2ee6c0694de9df4167b3cea4f2c3e0f792a8cfc5031cc360920165ed56f7927cfbff364dfe12721f3d35655f7f8eae52ed682973ae72d57b09ceca9b175088f1fa5dd6f8195fe5f3f2d55f34611ba23cfc865fcf05fdde55d8fce503f69a9280b26b2592fdf6803d864fb2dc2f0fcc82f8666475a0589338bb1e0f7938c9ec72b430aa8d0bd4e6f3d0bc43cae4"}], 0x470}, 0x20000040) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x40, &(0x7f0000001fde), 0x4) 15:47:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080b00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 156.794237][ T9598] SELinux: failed to load policy 15:47:24 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x16) r0 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x8004) epoll_create1(0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000840)="78e5a9ef319f386ed9e6f9bbf76596d792f9e94c5eca15b12fcbd298a5ffebeda93452a65c61ebbbb798de43ef1b4f1bc6a54aa45272b0ce7d8a92c982d44df3dba3477fa27df52e810deeeb8e6b1121aedf416ed427017c024ccc0ad263b8b8c7ed859fd4b0", 0x66}, {&(0x7f00000009c0)}], 0x2}}], 0x1, 0x40) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x0, 0x4, 0xd, 0x0, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x803, 0x2) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x20000}, {}, 0x10000, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) getsockopt$sock_int(r0, 0x1, 0x918e9f2342b0b2a9, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 156.821917][ T9600] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 156.901095][ T9609] FAULT_INJECTION: forcing a failure. [ 156.901095][ T9609] name failslab, interval 1, probability 0, space 0, times 0 [ 156.910561][ T9616] SELinux: policydb string length 2824 does not match expected length 8 [ 156.918256][ T9609] CPU: 0 PID: 9609 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 156.929498][ T9616] SELinux: failed to load policy [ 156.932171][ T9609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 156.932175][ T9609] Call Trace: 15:47:24 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080c00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 156.932191][ T9609] dump_stack+0x1b0/0x228 [ 156.932208][ T9609] ? devkmsg_release+0x127/0x127 [ 156.959699][ T9609] ? show_regs_print_info+0x18/0x18 [ 156.964900][ T9609] ? __kasan_check_write+0x14/0x20 [ 156.970036][ T9609] ? mutex_lock+0xa6/0x110 [ 156.974471][ T9609] ? mutex_trylock+0xb0/0xb0 [ 156.979056][ T9609] should_fail+0x6fb/0x860 [ 156.983491][ T9609] ? setup_fault_attr+0x2b0/0x2b0 [ 156.988509][ T9609] ? kernfs_xattr_get+0x80/0x90 [ 156.993362][ T9609] ? selinux_kernfs_init_security+0x10a/0x700 [ 156.999856][ T9609] __should_failslab+0x11a/0x160 [ 157.004901][ T9609] ? __kernfs_new_node+0xdb/0x6e0 [ 157.009908][ T9609] should_failslab+0x9/0x20 [ 157.014399][ T9609] kmem_cache_alloc+0x37/0x2b0 [ 157.019151][ T9609] ? idr_alloc+0x300/0x300 [ 157.023549][ T9609] __kernfs_new_node+0xdb/0x6e0 [ 157.028390][ T9609] ? kernfs_new_node+0x170/0x170 [ 157.033312][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.038511][ T9609] ? mutex_lock+0xa6/0x110 [ 157.042908][ T9609] ? mutex_trylock+0xb0/0xb0 [ 157.047492][ T9609] kernfs_new_node+0x97/0x170 [ 157.052147][ T9609] __kernfs_create_file+0x4a/0x270 [ 157.057241][ T9609] sysfs_add_file_mode_ns+0x274/0x320 [ 157.062592][ T9609] internal_create_group+0x511/0xe40 [ 157.067860][ T9609] ? down_write+0xd8/0x150 [ 157.072255][ T9609] ? sysfs_create_group+0x30/0x30 [ 157.077260][ T9609] ? _raw_spin_unlock_irqrestore+0x28/0x30 [ 157.083094][ T9609] sysfs_create_group+0x1f/0x30 [ 157.087940][ T9609] loop_set_fd+0xdbd/0x1280 [ 157.092430][ T9609] lo_ioctl+0x17a/0x2340 [ 157.096685][ T9609] ? lo_release+0x1f0/0x1f0 [ 157.101173][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.106273][ T9609] ? _raw_spin_lock_irqsave+0xda/0x1c0 [ 157.111727][ T9609] ? __read_once_size_nocheck+0x10/0x10 [ 157.117269][ T9609] ? _raw_spin_lock+0x170/0x170 [ 157.122103][ T9609] ? __rcu_read_lock+0x50/0x50 [ 157.126943][ T9609] ? unwind_next_frame+0x415/0x870 [ 157.132034][ T9609] ? try_to_wake_up+0x32f/0x2190 [ 157.136959][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.142049][ T9609] ? stack_trace_save+0x1e0/0x1e0 [ 157.147045][ T9609] ? cpus_share_cache+0xd0/0xd0 [ 157.151874][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.157047][ T9609] ? _raw_spin_lock+0xa1/0x170 [ 157.161787][ T9609] ? _raw_spin_trylock_bh+0x190/0x190 [ 157.167140][ T9609] ? mutex_lock+0xa6/0x110 [ 157.171535][ T9609] ? wake_up_q+0x84/0xb0 [ 157.175754][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.180844][ T9609] ? up_write+0xa1/0x190 [ 157.185068][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.190173][ T9609] ? down_write+0xd8/0x150 [ 157.194609][ T9609] ? up_read+0x10/0x10 [ 157.198669][ T9609] ? __kasan_check_write+0x14/0x20 [ 157.203775][ T9609] ? disk_unblock_events+0x51/0x60 [ 157.209010][ T9609] ? __blkdev_get+0x125b/0x1b40 [ 157.213887][ T9609] ? __read_once_size_nocheck+0x10/0x10 [ 157.219451][ T9609] ? unwind_next_frame+0x415/0x870 [ 157.224548][ T9609] ? __rcu_read_lock+0x50/0x50 [ 157.229295][ T9609] ? unwind_next_frame+0x415/0x870 [ 157.234401][ T9609] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 157.240416][ T9609] ? is_bpf_text_address+0x2c8/0x2e0 [ 157.245704][ T9609] ? lo_release+0x1f0/0x1f0 [ 157.250185][ T9609] blkdev_ioctl+0x89a/0x2c30 [ 157.254769][ T9609] ? __kernel_text_address+0x9a/0x110 [ 157.260119][ T9609] ? unwind_get_return_address+0x4c/0x90 [ 157.265742][ T9609] ? arch_stack_walk+0x98/0xe0 [ 157.270495][ T9609] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 157.275770][ T9609] ? __rcu_read_lock+0x50/0x50 [ 157.280508][ T9609] ? stack_trace_save+0x111/0x1e0 [ 157.285515][ T9609] ? avc_has_extended_perms+0xb27/0x10d0 [ 157.291166][ T9609] ? __kasan_slab_free+0x1e2/0x220 [ 157.296261][ T9609] ? __kasan_slab_free+0x168/0x220 [ 157.301349][ T9609] ? kasan_slab_free+0xe/0x10 [ 157.306018][ T9609] ? kmem_cache_free+0x181/0x7a0 [ 157.310934][ T9609] ? avc_ss_reset+0x3e0/0x3e0 [ 157.315585][ T9609] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 157.321631][ T9609] ? should_fail+0x182/0x860 [ 157.326196][ T9609] ? memset+0x31/0x40 [ 157.330152][ T9609] ? fsnotify+0x1389/0x1450 [ 157.334661][ T9609] ? expand_files+0xd1/0x970 [ 157.339245][ T9609] ? do_filp_open+0x2e1/0x430 [ 157.343911][ T9609] ? memset+0x31/0x40 [ 157.347878][ T9609] block_ioctl+0xbd/0x100 [ 157.352190][ T9609] ? blkdev_iopoll+0x100/0x100 [ 157.356940][ T9609] do_vfs_ioctl+0x747/0x1700 [ 157.361518][ T9609] ? selinux_file_ioctl+0x6e6/0x930 [ 157.366733][ T9609] ? ioctl_preallocate+0x240/0x240 [ 157.371822][ T9609] ? __fget+0x37c/0x3c0 [ 157.375954][ T9609] ? fget_many+0x30/0x30 [ 157.380174][ T9609] ? security_file_ioctl+0xae/0xd0 [ 157.385258][ T9609] __x64_sys_ioctl+0xe3/0x120 [ 157.389913][ T9609] do_syscall_64+0xc0/0x100 [ 157.394392][ T9609] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 157.400262][ T9609] RIP: 0033:0x45b1b7 [ 157.404133][ T9609] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 157.423717][ T9609] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 157.432146][ T9609] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7 [ 157.440110][ T9609] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 15:47:24 executing program 3: unshare(0x400) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) write$binfmt_misc(r3, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRES64=0x0, @ANYRESDEC=0x0, @ANYRES16=r0, @ANYRES16=r0, @ANYRES16]], 0xfffffffe) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000340)='io.stat\x00', 0x275a, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffd83) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1000, 0x3}) readahead(r6, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r8, &(0x7f00000001c0)={0x2, 0xfffc, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r8, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x78, 0x21fc}, 0x14) splice(r7, 0x0, r8, 0x0, 0x10003, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) close(r11) ioctl$int_in(r11, 0x5421, &(0x7f0000000040)=0xdd5d) ioctl$int_in(r11, 0x5452, &(0x7f0000000140)=0x5) setsockopt$inet_tcp_int(r10, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r10, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r10, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x78, 0x21fc}, 0x14) splice(r9, 0x0, r10, 0x0, 0x10003, 0x0) getcwd(&(0x7f0000000200)=""/227, 0xe3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$TUNSETOWNER(r9, 0x400454cc, r12) ioctl$NS_GET_PARENT(r7, 0xb702, 0x0) 15:47:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4603) [ 157.448084][ T9609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 157.456046][ T9609] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 157.464024][ T9609] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000d 15:47:25 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:25 executing program 5 (fault-call:2 fault-nth:14): open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 157.566924][ T9636] SELinux: ebitmap: truncated map [ 157.590200][ T9636] SELinux: failed to load policy [ 157.608549][ T9635] SELinux: policydb string length 3080 does not match expected length 8 [ 157.622209][ T9642] FAULT_INJECTION: forcing a failure. [ 157.622209][ T9642] name failslab, interval 1, probability 0, space 0, times 0 [ 157.623919][ T9635] SELinux: failed to load policy [ 157.640273][ T9642] CPU: 0 PID: 9642 Comm: syz-executor.5 Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 157.650347][ T9642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 157.660405][ T9642] Call Trace: [ 157.663692][ T9642] dump_stack+0x1b0/0x228 [ 157.667996][ T9642] ? devkmsg_release+0x127/0x127 [ 157.672907][ T9642] ? show_regs_print_info+0x18/0x18 [ 157.678079][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.683183][ T9642] ? mutex_unlock+0x1d/0x40 [ 157.687667][ T9642] ? kernfs_xattr_get+0x80/0x90 [ 157.692493][ T9642] should_fail+0x6fb/0x860 [ 157.696933][ T9642] ? setup_fault_attr+0x2b0/0x2b0 [ 157.702035][ T9642] ? idr_alloc+0x300/0x300 [ 157.706435][ T9642] __should_failslab+0x11a/0x160 [ 157.711350][ T9642] ? __kernfs_new_node+0xdb/0x6e0 [ 157.716389][ T9642] should_failslab+0x9/0x20 [ 157.720874][ T9642] kmem_cache_alloc+0x37/0x2b0 [ 157.725613][ T9642] __kernfs_new_node+0xdb/0x6e0 [ 157.730530][ T9642] ? mutex_lock+0xa6/0x110 [ 157.734920][ T9642] ? kernfs_new_node+0x170/0x170 [ 157.739838][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.744926][ T9642] ? mutex_unlock+0x1d/0x40 [ 157.749403][ T9642] ? kernfs_activate+0x459/0x470 [ 157.754313][ T9642] kernfs_new_node+0x97/0x170 [ 157.759072][ T9642] __kernfs_create_file+0x4a/0x270 [ 157.764211][ T9642] sysfs_add_file_mode_ns+0x274/0x320 [ 157.769581][ T9642] internal_create_group+0x511/0xe40 [ 157.774852][ T9642] ? down_write+0xd8/0x150 [ 157.779249][ T9642] ? sysfs_create_group+0x30/0x30 [ 157.784255][ T9642] ? _raw_spin_unlock_irqrestore+0x28/0x30 [ 157.790051][ T9642] sysfs_create_group+0x1f/0x30 [ 157.794914][ T9642] loop_set_fd+0xdbd/0x1280 [ 157.799469][ T9642] lo_ioctl+0x17a/0x2340 [ 157.803700][ T9642] ? __kasan_check_read+0x11/0x20 [ 157.808702][ T9642] ? perf_pmu_sched_task+0x370/0x370 [ 157.813962][ T9642] ? __kasan_check_read+0x11/0x20 [ 157.818967][ T9642] ? switch_mm_irqs_off+0x6a1/0x9d0 [ 157.824145][ T9642] ? lo_release+0x1f0/0x1f0 [ 157.828699][ T9642] ? _raw_spin_unlock_irq+0x9/0x20 [ 157.833796][ T9642] ? finish_task_switch+0x274/0x560 [ 157.839075][ T9642] ? __schedule+0xea0/0x1700 [ 157.843646][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.848739][ T9642] ? _raw_spin_lock+0xa1/0x170 [ 157.853555][ T9642] ? _raw_spin_trylock_bh+0x190/0x190 [ 157.858930][ T9642] ? schedule+0x14b/0x1d0 [ 157.863240][ T9642] ? _raw_spin_unlock+0x9/0x20 [ 157.867980][ T9642] ? __mutex_lock+0xabf/0xc40 [ 157.872632][ T9642] ? stack_trace_save+0x1e0/0x1e0 [ 157.877638][ T9642] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 157.884387][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.889476][ T9642] ? mutex_lock+0xa6/0x110 [ 157.893870][ T9642] ? __module_put_and_exit+0x20/0x20 [ 157.899130][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.904222][ T9642] ? __up_read+0x6f/0x1b0 [ 157.908529][ T9642] ? disk_check_events+0x600/0x600 [ 157.913626][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.918743][ T9642] ? up_write+0xa1/0x190 [ 157.922966][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.928051][ T9642] ? down_write+0xd8/0x150 [ 157.932492][ T9642] ? up_read+0x10/0x10 [ 157.936538][ T9642] ? __kasan_check_write+0x14/0x20 [ 157.941638][ T9642] ? disk_unblock_events+0x51/0x60 [ 157.946813][ T9642] ? __blkdev_get+0x125b/0x1b40 [ 157.951706][ T9642] ? __read_once_size_nocheck+0x10/0x10 [ 157.957342][ T9642] ? unwind_next_frame+0x415/0x870 [ 157.962440][ T9642] ? __rcu_read_lock+0x50/0x50 [ 157.967191][ T9642] ? unwind_next_frame+0x415/0x870 [ 157.972348][ T9642] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 157.978429][ T9642] ? is_bpf_text_address+0x2c8/0x2e0 [ 157.983700][ T9642] ? lo_release+0x1f0/0x1f0 [ 157.988195][ T9642] blkdev_ioctl+0x89a/0x2c30 [ 157.993201][ T9642] ? __kernel_text_address+0x9a/0x110 [ 157.998560][ T9642] ? unwind_get_return_address+0x4c/0x90 [ 158.004211][ T9642] ? arch_stack_walk+0x98/0xe0 [ 158.008971][ T9642] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 158.014274][ T9642] ? __rcu_read_lock+0x50/0x50 [ 158.019045][ T9642] ? stack_trace_save+0x111/0x1e0 [ 158.024064][ T9642] ? avc_has_extended_perms+0xb27/0x10d0 [ 158.029703][ T9642] ? __kasan_slab_free+0x1e2/0x220 [ 158.034840][ T9642] ? __kasan_slab_free+0x168/0x220 [ 158.039968][ T9642] ? kasan_slab_free+0xe/0x10 [ 158.044632][ T9642] ? kmem_cache_free+0x181/0x7a0 [ 158.049589][ T9642] ? avc_ss_reset+0x3e0/0x3e0 [ 158.054250][ T9642] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.060338][ T9642] ? should_fail+0x182/0x860 [ 158.064915][ T9642] ? memset+0x31/0x40 [ 158.068892][ T9642] ? fsnotify+0x1389/0x1450 [ 158.073427][ T9642] ? expand_files+0xd1/0x970 [ 158.078022][ T9642] ? do_filp_open+0x2e1/0x430 [ 158.082736][ T9642] ? memset+0x31/0x40 [ 158.086716][ T9642] block_ioctl+0xbd/0x100 [ 158.091025][ T9642] ? blkdev_iopoll+0x100/0x100 [ 158.095775][ T9642] do_vfs_ioctl+0x747/0x1700 [ 158.100379][ T9642] ? selinux_file_ioctl+0x6e6/0x930 [ 158.105581][ T9642] ? ioctl_preallocate+0x240/0x240 [ 158.110679][ T9642] ? __fget+0x37c/0x3c0 [ 158.114966][ T9642] ? __kasan_check_write+0x14/0x20 [ 158.120082][ T9642] ? fget_many+0x30/0x30 [ 158.124337][ T9642] ? security_file_ioctl+0xae/0xd0 [ 158.129437][ T9642] __x64_sys_ioctl+0xe3/0x120 [ 158.134095][ T9642] do_syscall_64+0xc0/0x100 [ 158.138621][ T9642] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 158.144606][ T9642] RIP: 0033:0x45b1b7 [ 158.148481][ T9642] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 158.168223][ T9642] RSP: 002b:00007fa4f22dba68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.176675][ T9642] RAX: ffffffffffffffda RBX: 00007fa4f22dc6d4 RCX: 000000000045b1b7 [ 158.184648][ T9642] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 15:47:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4800) 15:47:25 executing program 4: setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000100)=[@mss, @sack_perm, @sack_perm, @window={0x3, 0x7}], 0x4) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2500, 0x0) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, 0x3, 0x1, 0x0, 0x0, 0x0, {}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0xc, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x7f}]}}]}, 0x24}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xffffff8c, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 15:47:25 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080d00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 158.192854][ T9642] RBP: 000000000075bf20 R08: 0000000000000000 R09: 000000000000000a [ 158.200829][ T9642] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 158.208786][ T9642] R13: 0000000000000b9e R14: 00000000004cc70a R15: 000000000000000e 15:47:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4c00) [ 158.255418][ T22] kauditd_printk_skb: 217 callbacks suppressed [ 158.255426][ T22] audit: type=1326 audit(1580485645.736:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 158.288015][ T22] audit: type=1326 audit(1580485645.736:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.313535][ T22] audit: type=1326 audit(1580485645.736:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.338953][ T22] audit: type=1326 audit(1580485645.766:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 158.364406][ T22] audit: type=1326 audit(1580485645.766:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.389703][ T22] audit: type=1326 audit(1580485645.766:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 158.415185][ T22] audit: type=1326 audit(1580485645.766:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bind$inet(r6, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) r7 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x9) write$9p(r7, &(0x7f0000001400)="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", 0x600) sendfile(r7, r8, 0x0, 0x1c500) write$binfmt_misc(r3, &(0x7f0000000180)=ANY=[], 0xfffffc7b) splice(r2, 0x0, r4, 0x0, 0x4ffde, 0x0) [ 158.440784][ T22] audit: type=1326 audit(1580485645.766:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 158.470443][ T22] audit: type=1326 audit(1580485645.766:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:47:26 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 158.495955][ T22] audit: type=1326 audit(1580485645.766:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=9655 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080e00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x6800) [ 158.580157][ T9675] SELinux: policydb string length 3336 does not match expected length 8 [ 158.589726][ T9674] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 158.591508][ T9675] SELinux: failed to load policy [ 158.606138][ T9674] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 158.617773][ T9674] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 158.628095][ T9683] EXT4-fs: 4 callbacks suppressed [ 158.628103][ T9683] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 158.628335][ T9674] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 158.651475][ T9674] EXT4-fs (loop4): no journal found 15:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x6c00) 15:47:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9081000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 158.673426][ T9686] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 158.696891][ T9698] SELinux: policydb string length 3592 does not match expected length 8 [ 158.705987][ T9698] SELinux: failed to load policy [ 158.719032][ T9689] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x7400) 15:47:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:26 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x7) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, &(0x7f00000001c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x18, &(0x7f0000000400)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc70005b5977900023566b34c450f4e2759500faff00000000dd3299a621f50a062cd2988aa1210329017b83c83ce13d70f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb77489c5ea2a361b18c"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000340), 0x8, 0x10, &(0x7f0000000000), 0x10, r4}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000000580)=""/181, 0xb5, r4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000640)=r5, 0x4) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) r6 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r6, &(0x7f0000000540)=ANY=[], 0x133) getdents(0xffffffffffffffff, &(0x7f0000000280)=""/217, 0xd9) sendfile(r6, r6, &(0x7f00000001c0), 0xa198) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r7, 0x1, &(0x7f0000000180)='nl80211\x00', &(0x7f0000000400)='nl80211\x00', 0x0) bind(0xffffffffffffffff, 0x0, 0x0) 15:47:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9081100005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 158.854683][ T9718] SELinux: policydb string length 4104 does not match expected length 8 [ 158.867787][ T9718] SELinux: failed to load policy [ 158.877951][ T9720] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 158.922652][ T9725] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 158.937758][ T9734] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 158.954118][ T9739] SELinux: policydb string length 4360 does not match expected length 8 [ 158.962852][ T9739] SELinux: failed to load policy [ 159.038499][ T9743] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:47:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9081200005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x7a00) 15:47:26 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$key(0xf, 0x3, 0x2) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000180)="f4a38ebe8a8e5e03a4f7f6515191303cfde71ca0f01e835164f1dcde8d5149dacd5d5d74b1de3213a5ca6aea9a91fc6aa465ab07a2339b7fcab726f8f284017296eb916d9c937376d282a62fe27d46", 0x4f}, {&(0x7f00000002c0)="9aa0640ab0d33277cdfa11f1c468a23066c3b1084b45e77819f06a3b327c169161aeb12872f6f07373a10e1c1e3202dd76c8f092f0cf5d84e59160fb182ed058ad096b2e5c8c52580593a726b26dc6f9088c29be2832a74dd8ed9675fc2580ea6ed2ddc67b0bc9d9085dede45368f29814930fc8f7b5f81078e9dd5dcca0d001de5397f59e97ef999e96ecfdd35698b8f2b2680efff4b092614ca2", 0x9b}], 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8400fffffffb) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xece40000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x24fa, 0x1f4}}], 0x1, 0x100, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountstats\x00') r2 = socket(0x0, 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x1a6, &(0x7f0000000080)=""/4, &(0x7f0000000140)=0x4) socket(0x10, 0x4, 0x0) pipe(&(0x7f0000000000)) setresgid(0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}]}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x58, r4, 0x200, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xa46}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004}, 0x4800) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 15:47:26 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:26 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x94fe92986df27bf3}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$P9_RREADDIR(r9, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xff, [{{0x10, 0x1, 0x5}, 0x3, 0x40, 0x7, './file0'}, {{0x80, 0x2, 0x4}, 0x7, 0x80, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x4d2, 0x0, 0x7, './file0'}, {{0x4, 0x1, 0x6}, 0x1ff, 0x2, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x2, 0x9e, 0x7, './file0'}, {{0x80, 0x0, 0x4}, 0x40000000, 0x0, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x3}, 0x100000001, 0x7, 0x7, './file0'}]}}, 0x103) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0x171a, 0x0, "7c93d49ecfa850b2"}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '&)\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, 'eth1keyring\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) 15:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x8004) 15:47:26 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9082500005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 159.394936][ T9760] SELinux: policydb string length 4616 does not match expected length 8 [ 159.397748][ T9759] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 159.403981][ T9760] SELinux: failed to load policy 15:47:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xff03) [ 159.446636][ T9758] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 159.523158][ T9778] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 15:47:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x1000000) [ 159.601603][ T9795] SELinux: policydb string length 9480 does not match expected length 8 [ 159.628147][ T9788] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 159.637129][ T9795] SELinux: failed to load policy 15:47:27 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x10, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9084800005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:27 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 159.644871][ T9788] EXT4-fs (loop4): failed to parse options in superblock:  [ 159.654925][ T9788] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 15:47:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x2000000) [ 159.727854][ T9813] SELinux: policydb string length 18440 does not match expected length 8 [ 159.745273][ T9788] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 15:47:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9084c00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 159.769075][ T9788] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 159.791743][ T9788] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue [ 159.851797][ T9833] SELinux: policydb string length 19464 does not match expected length 8 15:47:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x3000000) 15:47:27 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:27 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x11, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:27 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x94fe92986df27bf3}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$P9_RREADDIR(r9, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xff, [{{0x10, 0x1, 0x5}, 0x3, 0x40, 0x7, './file0'}, {{0x80, 0x2, 0x4}, 0x7, 0x80, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x4d2, 0x0, 0x7, './file0'}, {{0x4, 0x1, 0x6}, 0x1ff, 0x2, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x2, 0x9e, 0x7, './file0'}, {{0x80, 0x0, 0x4}, 0x40000000, 0x0, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x3}, 0x100000001, 0x7, 0x7, './file0'}]}}, 0x103) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0x171a, 0x0, "7c93d49ecfa850b2"}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '&)\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, 'eth1keyring\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) 15:47:27 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_STATION(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000226f17889f", @ANYRES16=r4, @ANYBLOB="2b0f0000000000000000110000000800120100000000"], 0x1c}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r4, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1_to_batadv\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000001}, 0x448e95e9c3724a06) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$UHID_CREATE(r1, &(0x7f0000000200)={0x0, {'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000340)=""/264, 0x108, 0x3, 0x52, 0x50000000, 0x1000, 0x9}}, 0x120) 15:47:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086800005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4000000) 15:47:27 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpgrp(r0) ptrace$cont(0x20, r1, 0xdbc, 0xd1f3) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 160.317907][ T9855] SELinux: policydb string length 24584 does not match expected length 8 15:47:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x8000000025dfdbfb}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x8000000025dfdbfb}, 0xc) dup3(r0, r1, 0x0) 15:47:27 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9086c00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x5000000) [ 160.477688][ T9884] SELinux: policydb string length 26632 does not match expected length 8 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9087400005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:28 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$inet(r3, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = gettid() tkill(r5, 0x3c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r5, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='@]!@\x00', 0xffffffffffffffff}, 0x30) ioprio_get$pid(0x2, r6) epoll_create(0x401) [ 160.530811][ T9896] SELinux: policydb string length 27656 does not match expected length 8 [ 160.588793][ T9906] SELinux: policydb string length 29704 does not match expected length 8 15:47:28 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x12, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x6000000) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9087a00005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)={0x94fe92986df27bf3}) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) r8 = socket$unix(0x1, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$P9_RREADDIR(r9, &(0x7f0000000300)={0x103, 0x29, 0x1, {0xff, [{{0x10, 0x1, 0x5}, 0x3, 0x40, 0x7, './file0'}, {{0x80, 0x2, 0x4}, 0x7, 0x80, 0x7, './file0'}, {{0x8, 0x0, 0x3}, 0x4d2, 0x0, 0x7, './file0'}, {{0x4, 0x1, 0x6}, 0x1ff, 0x2, 0x7, './file0'}, {{0x1, 0x3, 0x2}, 0x2, 0x9e, 0x7, './file0'}, {{0x80, 0x0, 0x4}, 0x40000000, 0x0, 0x7, './file0'}, {{0x4, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}, {{0x20, 0x2, 0x3}, 0x100000001, 0x7, 0x7, './file0'}]}}, 0x103) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0x171a, 0x0, "7c93d49ecfa850b2"}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60103c56c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r5, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_DOMAIN={0x7, 0x1, '&)\x00'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_DOMAIN={0x10, 0x1, 'eth1keyring\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x10) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r2, &(0x7f0000000040)=[{}], 0x1, 0xffffae84) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) 15:47:28 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r0, 0x0, r0) getpeername$unix(r0, &(0x7f00000001c0), &(0x7f00000000c0)=0x6e) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) flistxattr(r1, 0x0, 0x0) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080003005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x7000000) [ 160.681423][ T9921] SELinux: policydb string length 31240 does not match expected length 8 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x8000000) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080005005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYRES64, @ANYRES32=0x0, @ANYBLOB="08000400", @ANYRES32=0x0, @ANYBLOB], 0x7}, 0x1, 0x0, 0x0, 0x4}, 0x0) dup(0xffffffffffffffff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000000)={0x4, @empty, 0x0, 0x3, 'lc\x00', 0x0, 0x4, 0xdc}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x5, 0x8000, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0xa]}, 0x3c) unshare(0x40000000) [ 160.766267][ T9946] SELinux: policydb string length 196616 does not match expected length 8 [ 160.803142][ T9948] overlayfs: filesystem on './file0' not supported as upperdir 15:47:28 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:28 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x22, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 160.861110][ T9951] EXT4-fs (loop4): Unrecognized mount option "" or missing value [ 160.870031][ T9951] EXT4-fs (loop4): failed to parse options in superblock:  [ 160.880151][ T9964] SELinux: policydb string length 327688 does not match expected length 8 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x9000000) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080006005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 160.916127][ T9951] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 160.957249][ T9951] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 160.978467][ T9981] SELinux: policydb string length 393224 does not match expected length 8 [ 160.982659][ T9951] EXT4-fs (loop4): ext4_check_descriptors: Inode table for group 0 overlaps superblock 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xa000000) [ 160.999126][ T9951] EXT4-fs (loop4): mounted filesystem without journal. Opts: ; ,errors=continue 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080007005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 3: write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000a80)=ANY=[@ANYBLOB="00000000000800001900800000e00000010000000000000062c0a486beb56de128b9d0ea8f7acd362e24a37103de9564da8d13318dccc5d9ee8de46719cf70bd2293f44a16208ecbff64fd7837339235588e75c74be9c25dc60f34e6488cb2d1c5da18089436ce86d3d5b71523415f3f1db5e82cab7fc78d887f2528001b2e5656c6896dc5ee6c10eee904f2ebd9ed4c6ad8c95965d4d009c2b8d409032f136a067392f4e1ee2cb441d95f12db1d1fd0a200fc5c8657b45c1be1dcbb4138d2d2cd642f33f41cd704cce8b2805a02cd3bc0668146ceb4d1023e55f3b6f7cf4a0e83cffcb820aff7ccdeead03370b815391cad8854078cd0", @ANYRES32=r1, @ANYBLOB="fb2824ff00000000000007c6f6ba72d9001d00000000000000cf0000ff000000000044fd027a30e75d1884a988ad922c0b847e3970378cf14e398f88a745fca07adf35c245c49b6f0220875dc5f7af309e04"]) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000580)=""/120) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc050, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f00000002c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) socket(0x1, 0x5, 0x0) ioctl(r2, 0x10001, &(0x7f00000004c0)="ad606acc0d87a67c5a60fba8d845096adfb8ac205fb51fed76e83ac995468a131395210368de04091a9bf63458446bad7fad2cf00d936398313b85facdfef163713f55612f5d56153f60ca9aeee47fd56bc85e090e162a") r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r5, &(0x7f0000000300)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r5, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) getsockopt$TIPC_IMPORTANCE(r3, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4) pipe(&(0x7f0000000240)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$UHID_DESTROY(r6, &(0x7f0000000640), 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xb000000) 15:47:28 executing program 4: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000000)=0x400, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000014001680100001800c00030000000000000000001400030073797a5f74756e400000000000000000"], 0x3}}, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000100)) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) timerfd_settime(r6, 0x1, &(0x7f0000000140), &(0x7f0000000180)) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) sched_getaffinity(r7, 0x8, &(0x7f00000000c0)) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080009005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x25, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 161.080413][T10003] SELinux: policydb string length 458760 does not match expected length 8 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xc000000) [ 161.174897][T10024] SELinux: policydb string length 589832 does not match expected length 8 15:47:28 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000a005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000b005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xd000000) [ 161.355275][T10041] SELinux: policydb string length 655368 does not match expected length 8 15:47:28 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000c005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000001c0)=r2) ioctl$KDDELIO(r0, 0x4b35, 0x8) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000600), 0x0) writev(r4, &(0x7f0000000440)=[{&(0x7f0000000140)='=', 0x1}], 0x1) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x1, 0xff, 0x1ff}, &(0x7f0000000180)=0x6, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)}, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x80000000) r6 = socket$unix(0x1, 0x2, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BLKZEROOUT(r7, 0x127f, &(0x7f0000000280)={0x58a, 0x1f}) r8 = inotify_init() inotify_add_watch(r8, &(0x7f00000000c0)='./file0\x00', 0x80000000) write$9p(r0, &(0x7f0000001400)="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", 0x600) r9 = socket$unix(0x1, 0x2, 0x0) r10 = fcntl$dupfd(r9, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = open(&(0x7f00000000c0)='./file0\x00', 0x80420, 0x104) r12 = syz_genetlink_get_family_id$fou(&(0x7f0000000780)='fou\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000280)={@rand_addr, 0x0}, &(0x7f0000000400)=0x14) sendmsg$FOU_CMD_ADD(r11, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000580)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="e60127bd7000fbdbdf25010000000400050008000b005d0e378bdbbf2d74cf61237510083baa58eca9c3c6313d807e27bf70fe8fb6c9757ae838becd576a8815a2dc189c9bf34ce45c3f6dd2fb096fd8ff6faa8aedaea9c99a1cdd75", @ANYRES32=r13, @ANYBLOB="05000200f6ff000014000900ff02000000000000000000000000000108000600ac1414aa"], 0x44}, 0x1, 0x0, 0x0, 0x4000181}, 0x24000001) sendmsg$FOU_CMD_GET(r10, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x88, r12, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr="b58c053e9e8ca42fdd76048b5b7a07a6"}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @empty}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @loopback}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}]}, 0x88}, 0x1, 0x0, 0x0, 0x4008002}, 0x20040014) sendfile(r0, r3, 0x0, 0x1c500) r14 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r14, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) write$binfmt_misc(r14, &(0x7f0000000240)=ANY=[@ANYBLOB="73797a31c2e82e410e1ac53eb2ee4c3f2f00000000"], 0x15) [ 161.456658][T10051] SELinux: policydb string length 720904 does not match expected length 8 [ 161.540379][T10068] SELinux: policydb string length 786440 does not match expected length 8 [ 161.617726][T10074] SELinux: ebitmap: truncated map [ 161.627442][T10074] SELinux: policydb magic number 0x317a7973 does not match expected magic number 0xf97cff8c [ 161.845756][T10062] SELinux: policydb magic number 0x317a7973 does not match expected magic number 0xf97cff8c [ 161.856373][T10062] sel_write_load: 17 callbacks suppressed [ 161.856375][T10062] SELinux: failed to load policy 15:47:29 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2e, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0xe000000) 15:47:29 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x9, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000d005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:29 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x25, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) ustat(0x8, &(0x7f0000000100)) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x35a, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b000000000097a5ca5aa31051000000000000"], 0x28}}, 0x0) write$tun(r0, &(0x7f0000000400)={@void, @val, @ipv6=@icmpv6={0x0, 0x6, '/g0', 0x40, 0x3a, 0x0, @loopback={0x2}, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "a86282", 0x0, 0x0, 0x0, @ipv4={[], [], @loopback}, @mcast1, [@routing={0x6}], "fd3b0ba2dcabdd82"}}}}}, 0x72) 15:47:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x10000000) 15:47:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908000e005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 162.066033][T10085] SELinux: policydb string length 851976 does not match expected length 8 [ 162.081765][T10085] SELinux: failed to load policy [ 162.103073][T10092] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:47:29 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x11000000) [ 162.151191][T10100] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:47:29 executing program 3: clone(0x800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x600, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'macvlan1\x00'}) 15:47:29 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r1 = open(0x0, 0x0, 0x0) ftruncate(r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x20000}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x1}}, 0xe8) sendmmsg(r2, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000180)={0x5, 0x8, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x8}}, 0x10) pipe(&(0x7f0000000200)) socket$pptp(0x18, 0x1, 0x2) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:47:29 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x48, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080011005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x12000000) [ 162.277521][T10118] SELinux: policydb string length 917512 does not match expected length 8 [ 162.286820][T10118] SELinux: failed to load policy 15:47:29 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xb, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:29 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/302], &(0x7f0000000140)='GPL\x00', 0x2, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64) r0 = socket$unix(0x1, 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fallocate(r3, 0x8, 0x80, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r4, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}]}, 0x1c}}, 0x8000) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r8, 0x1}, 0x14}}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r6, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x54, r8, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xb8a}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) [ 162.410663][T10148] SELinux: policydb string length 1114120 does not match expected length 8 15:47:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x25000000) [ 162.458178][T10148] SELinux: failed to load policy 15:47:29 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080012005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xa, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:30 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x4c, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x40000000) 15:47:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080020005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 162.591761][T10186] SELinux: policydb string length 1179656 does not match expected length 8 [ 162.604835][T10186] SELinux: failed to load policy [ 162.652441][T10200] SELinux: policydb string length 2097160 does not match expected length 8 [ 162.661780][T10200] SELinux: failed to load policy 15:47:30 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xc, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x46030000) 15:47:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080025005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000580)={0x18}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r1, 0x0, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r3 = socket$inet6(0xa, 0x400000000803, 0x5f) sendfile(r3, 0xffffffffffffffff, 0x0, 0x80081d00c0d0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) modify_ldt$write(0x1, &(0x7f0000000000)={0x7, 0x0, 0x4000, 0x1, 0x0, 0x1, 0x1, 0x1}, 0x10) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600f53f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) fdatasync(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = socket$unix(0x1, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKRAGET(r5, 0x1263, &(0x7f0000000040)) pipe(0x0) 15:47:30 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in6=@ipv4={[], [], @remote}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x8}, [@algo_auth_trunc={0x4c, 0x14, {{'md5\x00'}}}]}, 0x13c}}, 0x0) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x411040}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4010004}, 0xc0000) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000d00)={'syz1\x00', {}, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x1, 0x0, 0x0, 0x0, 0x4c8e], [0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x1b, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d9d], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff], [0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x40000000]}, 0x45c) link(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000240)='./file0\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x2000000000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 15:47:30 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x68, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x48000000) 15:47:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080040005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 162.829229][T10216] SELinux: policydb string length 2424840 does not match expected length 8 [ 162.852605][T10216] SELinux: failed to load policy 15:47:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x4c000000) 15:47:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080048005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 162.936995][T10241] SELinux: policydb string length 4194312 does not match expected length 8 [ 162.963342][T10241] SELinux: failed to load policy 15:47:30 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xd, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:30 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x6c, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf908004c005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x68000000) [ 163.153795][T10253] SELinux: policydb string length 4718600 does not match expected length 8 [ 163.174571][T10253] SELinux: failed to load policy [ 163.298521][T10275] SELinux: policydb string length 4980744 does not match expected length 8 [ 163.307614][T10275] SELinux: failed to load policy [ 163.312990][ T22] kauditd_printk_skb: 562 callbacks suppressed [ 163.312998][ T22] audit: type=1326 audit(1580485650.796:2644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 163.345570][ T22] audit: type=1326 audit(1580485650.796:2645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 15:47:30 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080060005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) [ 163.378214][ T22] audit: type=1326 audit(1580485650.796:2646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 163.413266][ T22] audit: type=1326 audit(1580485650.796:2647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 163.450879][ T22] audit: type=1326 audit(1580485650.796:2648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 15:47:31 executing program 5: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xe, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) [ 163.482243][ T22] audit: type=1326 audit(1580485650.796:2649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 163.510662][T10290] SELinux: policydb string length 6291464 does not match expected length 8 [ 163.512229][ T22] audit: type=1326 audit(1580485650.796:2650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 163.545533][ T22] audit: type=1326 audit(1580485650.796:2651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=41 compat=0 ip=0x45b349 code=0x7ffc0000 [ 163.571353][ T22] audit: type=1326 audit(1580485650.796:2652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45e18a code=0x7ffc0000 [ 163.597503][ T22] audit: type=1326 audit(1580485650.796:2653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=10274 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x45b349 code=0x7ffc0000 [ 163.635299][T10292] EXT4-fs: 41 callbacks suppressed [ 163.635308][T10292] EXT4-fs (sda1): re-mounted. Opts: resgid=0x0000000000000000 [ 163.635325][T10296] kasan: CONFIG_KASAN_INLINE enabled [ 163.654372][T10296] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 163.662546][T10296] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 163.669480][T10296] CPU: 0 PID: 10296 Comm: udevd Not tainted 5.4.16-syzkaller-01242-g383f53ee186a #0 [ 163.678830][T10296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.688877][T10296] RIP: 0010:path_openat+0x324/0x3c00 [ 163.694172][T10296] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 163.713803][T10296] RSP: 0018:ffff8881c89874c0 EFLAGS: 00010247 [ 163.719847][T10296] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881c89876e8 [ 163.727800][T10296] RDX: ffff8881c7c7fdd8 RSI: 0000000000000000 RDI: 0000000000000004 [ 163.735773][T10296] RBP: ffff8881c8987790 R08: ffffffff817828c1 R09: 0000000000000003 [ 163.743733][T10296] R10: ffffed1039130e4b R11: 0000000000000004 R12: ffff8881c89877e8 [ 163.751687][T10296] R13: ffff888194318100 R14: ffff8881c89879f0 R15: dffffc0000000000 [ 163.759639][T10296] FS: 00007f5e50bf97a0(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 163.768545][T10296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 163.775110][T10296] CR2: 00007f5e505b6518 CR3: 00000001c0001003 CR4: 00000000001606f0 [ 163.783064][T10296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 163.791019][T10296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 163.798970][T10296] Call Trace: [ 163.802345][T10296] ? stack_trace_save+0x1e0/0x1e0 [ 163.807381][T10296] ? is_bpf_text_address+0x2c8/0x2e0 [ 163.812655][T10296] ? stack_trace_save+0x1e0/0x1e0 [ 163.817680][T10296] ? do_filp_open+0x430/0x430 [ 163.822340][T10296] ? stack_trace_save+0x111/0x1e0 [ 163.827411][T10296] ? stack_trace_snprint+0x150/0x150 [ 163.832676][T10296] do_filp_open+0x1f7/0x430 [ 163.837202][T10296] ? vfs_tmpfile+0x230/0x230 [ 163.841765][T10296] ? load_elf_binary+0x1abd/0x3720 [ 163.846926][T10296] ? memset+0x31/0x40 [ 163.850892][T10296] ? rw_verify_area+0x360/0x360 [ 163.855743][T10296] do_open_execat+0x178/0x860 [ 163.860402][T10296] ? security_file_permission+0x241/0x350 [ 163.866097][T10296] ? open_exec+0x60/0x60 [ 163.870343][T10296] ? __should_failslab+0x11a/0x160 [ 163.875436][T10296] ? getname_kernel+0x59/0x2f0 [ 163.880268][T10296] ? getname_kernel+0x15d/0x2f0 [ 163.885091][T10296] ? memcpy+0x49/0x60 [ 163.889047][T10296] ? getname_kernel+0x214/0x2f0 [ 163.893890][T10296] open_exec+0x3d/0x60 [ 163.897967][T10296] load_elf_binary+0x1abd/0x3720 [ 163.902917][T10296] ? populate_vma_page_range+0x100/0x100 [ 163.908546][T10296] ? __kasan_check_write+0x14/0x20 [ 163.913745][T10296] ? _raw_read_unlock+0x12/0x30 [ 163.918571][T10296] ? load_script+0x184/0x970 [ 163.923136][T10296] ? bm_evict_inode+0xd0/0xd0 [ 163.927787][T10296] ? copy_strings+0x7e4/0x900 [ 163.932445][T10296] ? load_script+0x970/0x970 [ 163.937019][T10296] search_binary_handler+0x190/0x5e0 [ 163.942287][T10296] __do_execve_file+0x12a2/0x1c00 [ 163.947296][T10296] ? do_execve_file+0x40/0x40 [ 163.952026][T10296] ? getname_flags+0x214/0x640 [ 163.956809][T10296] __x64_sys_execve+0x94/0xb0 [ 163.961472][T10296] do_syscall_64+0xc0/0x100 [ 163.965961][T10296] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 163.971844][T10296] RIP: 0033:0x7f5e502dd207 [ 163.976259][T10296] Code: 77 19 f4 48 89 d7 44 89 c0 0f 05 48 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 f7 d8 64 41 89 01 eb df b8 3b 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 f3 c3 48 8b 15 00 8c 2d 00 f7 d8 64 89 02 [ 163.995970][T10296] RSP: 002b:00007fff9254f418 EFLAGS: 00000206 ORIG_RAX: 000000000000003b [ 164.004497][T10296] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f5e502dd207 [ 164.012448][T10296] RDX: 0000000001c7aae0 RSI: 00007fff9254f510 RDI: 00007fff92550520 [ 164.020401][T10296] RBP: 0000000000625500 R08: 000000000000019c R09: 000000000000019c [ 164.028520][T10296] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000001c7aae0 [ 164.036486][T10296] R13: 0000000000000007 R14: 0000000001b1e030 R15: 0000000000000005 [ 164.044445][T10296] Modules linked in: 15:47:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) getpid() ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$selinux_user(r2, &(0x7f0000000080)={'system_u:object_r:ipmi_device_t:s0', 0x20, 'user_u\x00'}, 0x2a) open(&(0x7f0000000100)='./file1\x00', 0x143042, 0x0) 15:47:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x6c000000) 15:47:31 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x74, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0]) 15:47:31 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080068005345204c696e757816000000000000000002ab000082570140000000000000deec02ff000000000000f89c1a2d463c67"], 0x38) 15:47:31 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0) r0 = creat(0x0, 0x10) setresuid(0x0, 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000402) socket$inet6(0xa, 0x400000000803, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfff}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') fchdir(r1) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB='\x00'/14], 0x3}, 0x1, 0x0, 0x0, 0x24000810}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="48fcffff74881523335b6f07950f347bb62e26602d7d48005abc94326f822653fbda43fe509a5ad45385ca1e4b62b0637a8fa9022d3998721e8fcbeaebfe764415e15fea3dc5a7cdb0ec0000de2cbe744c0db504fbbed75eea7e48e0e68f5329ece017022792454998112f4e29630110cf293efd6bb8eeb9fcdfb27cacd90574095a582c801fe5e5c3649a6b660059b109eb204e94836407846b00"/172, @ANYRES16=r4, @ANYBLOB="0008000000000014000100ff01000000000000000000000000000105000600070000000800004083693620e9a44ecee43bbf45e726d1cc620100000001000000dafbcaaf5369a21c6b79c23cf205a64768aab447c93668083f4eda5745cb3b00"/107], 0x48}, 0x1, 0x0, 0x0, 0x90}, 0x24000000) [ 164.049528][T10296] ---[ end trace 145f28c1257a2e39 ]--- [ 164.055259][T10296] RIP: 0010:path_openat+0x324/0x3c00 [ 164.061111][T10296] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 164.083574][T10296] RSP: 0018:ffff8881c89874c0 EFLAGS: 00010247 [ 164.090223][T10296] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff8881c89876e8 [ 164.098759][T10296] RDX: ffff8881c7c7fdd8 RSI: 0000000000000000 RDI: 0000000000000004 [ 164.107242][T10296] RBP: ffff8881c8987790 R08: ffffffff817828c1 R09: 0000000000000003 [ 164.115416][T10296] R10: ffffed1039130e4b R11: 0000000000000004 R12: ffff8881c89877e8 [ 164.124016][T10308] SELinux: policydb string length 6815752 does not match expected length 8 [ 164.124077][T10296] R13: ffff888194318100 R14: ffff8881c89879f0 R15: dffffc0000000000 [ 164.141029][T10296] FS: 00007f5e50bf97a0(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 15:47:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) socket$unix(0x1, 0x2, 0x74000000) [ 164.160558][T10296] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 164.167219][T10296] CR2: 00000000011fa9b8 CR3: 00000001c0001006 CR4: 00000000001606e0 [ 164.177157][T10296] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 164.185463][T10296] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 164.194060][T10296] Kernel panic - not syncing: Fatal exception [ 164.200904][T10296] Kernel Offset: disabled [ 164.205305][T10296] Rebooting in 86400 seconds..